all algorand anonymity [applications] attacks bitcoin blockchain book bullet-proofs byzantine chainspace consensus credentials crime cryptocurrencies dag data-science ddos discrete-log e-voting ecdsa ethereum exchanges formal-methods game-theory governance key-management lattices layer2 litecoin mining model-checking monero network ouroboros pki post-quantum privacy proof-of-* proof-of-space proof-of-stake proof-of-work provable-security ripple scalability secure-multiparty-computation sidechains signatures simple-verification-payments smart-contracts snarks solidity starks storage survey theory truebit trusted-computing wallet whitepaper zero-knowledge zerocash zerocoin


A curated list of papers ordered by number of citations. Last updated 2019-05-13

#Title
Citations
1.Town crier: An authenticated data feed for smart contracts Zhang, Fan and Cecchetti, Ethan and Croman, Kyle and Juels, Ari and Shi, Elaine. 2016
163
2.Centrally banked cryptocurrencies Danezis, George and Meiklejohn, Sarah. 2015
133
3.A smart contract for boardroom voting with maximum voter privacy McCorry, Patrick and Shahandashti, Siamak F and Hao, Feng. 2017
83
4.A Decentralized Public Key Infrastructure with Identity Retention. Fromknecht, Conner and Velicanu, Dragos and Yakoubov, Sophia. 2014
70
5.On Bitcoin as a public randomness source. Bonneau, Joseph and Clark, Jeremy and Goldfeder, Steven. 2015
67
6.The ring of gyges: Investigating the future of criminal smart contracts Juels, Ari and Kosba, Ahmed and Shi, Elaine. 2016
66
7.Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge. Tramer, Florian and Zhang, Fan and Lin, Huang and Hubaux, Jean-Pierre and Juels, Ari and Shi, Elaine. 2016
38
8.SCPKI: A smart contract-based PKI and identity system Al-Bassam, Mustafa. 2017
38
9.Liar, liar, coins on fire!: Penalizing equivocation by loss of bitcoins Ruffing, Tim and Kate, Aniket and Schr\"oder, Dominique. 2015
36
10.SMART POOL : Practical Decentralized Pooled Mining Luu, Loi and Velner, Yaron and Teutsch, Jason and Saxena, Prateek. 2017
35
11.Verifiable Delay Functions Dan Boneh, Joseph Bonneau, Benedikt Bünz, Ben Fisch. 2018
27
12.Provisions: Privacy-preserving Proofs of Solvency for Bitcoin Exchanges Dagher, Gaby G and Bünz, Benedikt and Bonneau, Joseph and Clark, Jeremy and Boneh, Dan. 2015
26
13.Instantaneous Decentralized Poker Iddo Bentov and Ranjit Kumaresan and Andrew Miller. 2017
25
14.Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services Matteo Campanelli and Rosario Gennaro and Steven Goldfeder and Luca Nizzardo. 2017
24
15.IKP: Turning a PKI Around with Blockchains Stephanos Matsumoto and Raphael M. Reischuk. 2016
17
16.ZombieCoin: powering next-generation botnets with bitcoin Ali, Syed Taha and McCorry, Patrick and Lee, Peter Hyun-Jeen and Hao, Feng. 2015
17
17.0x: An open protocol for decentralized exchange on the Ethereum blockchain Warren, Will and Bandeali, Amir. 2017
17
18.Escrow protocols for cryptocurrencies: How to buy physical goods using Bitcoin Goldfeder, Steven and Bonneau, Joseph and Gennaro, Rosario and Narayanan, Arvind.. 2017
16
19.Zero-Collateral Lotteries in Bitcoin and Ethereum Miller, Andrew and Bentov, Iddo. 2016
15
20.Improving Authenticated Dynamic Dictionaries, with Applications to Cryptocurrencies Reyzin, Leonid and Meshkov, Dmitry and Chepurnoy, Alexander and Ivanov, Sasha. 2016
13
21.zkLedger: Privacy-Preserving Auditing for Distributed Ledgers Neha Narula and Willy Vasquez and Madars Virza. 2018
12
22.SBFT: a Scalable Decentralized Trust Infrastructure for Blockchains Gueta, Guy Golan and Abraham, Ittai and Grossman, Shelly and Malkhi, Dahlia and Pinkas, Benny and Reiter, Michael K and Seredinschi, Dragos-Adrian and Tamir, Orr and Tomescu, Alin. 2018
11
23.Strain: A Secure Auction for Blockchains Erik-Oliver Blass and Florian Kerschbaum. 2017
10
24.Bootstrapping the Blockchain, with Applications to Consensus and Fast PKI Setup Garay, Juan A and Kiayias, Aggelos and Leonardos, Nikos and Panagiotakos, Giorgos. 2018
8
25.FairSwap: How to fairly exchange digital goods Dziembowski, Stefan and Eckey, Lisa and Faust, Sebastian. 2018
8
26.Kaleidoscope: An Efficient Poker Protocol with Payment Distribution and Penalty Enforcement Bernardo David and Rafael Dowsley and Mario Larangeira. 2017
6
27.Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers Sonnino, Alberto and Al-Bassam, Mustafa and Bano, Shehar and Danezis, George. 2018
5
28.ROYALE: A Framework for Universally Composable Card Games with Financial Rewards and Penalties Enforcement Bernardo David and Rafael Dowsley and Mario Larangeira. 2018
4
29.21-bringing down the complexity: fast composable protocols for card games without secret state David, Bernardo and Dowsley, Rafael and Larangeira, Mario. 2018
3
30.Public Accountability vs. Secret Laws: Can They Coexist?: A Cryptographic Proposal Goldwasser, Shafi and Park, Sunoo. 2017
3
31.Decentralized Blacklistable Anonymous Credentials with Reputation Yang, Rupeng and Au, Man Ho and Xu, Qiuliang and Yu, Zuoxia. 2017
3
32.R3C3: Cryptographically secure Censorship Resistant Rendezvous using Cryptocurrencies Mohsen Minaei and Pedro Moreno-Sanchez and Aniket Kate. 2018
2
33.Pies: Public incompressible encodings for decentralized storage Cecchetti, Ethan and Miers, Ian and Juels, Ari. 2018
2
34.MARS: Monetized Ad-hoc Routing System (A Position Paper) David, Bernardo and Dowsley, Rafael and Larangeira, Mario. 2018
1
35.Developing a K-ary malware using Blockchain Moubarak, Joanna and Filiol, Eric and Chamoun, Maroun. 2018
1
36.Privacy Preserving Verifiable Key Directories. Chase, Melissa and Deshpande, Apoorvaa and Ghosh, Esha. 2018
1
37.Loopring: A decentralized token exchange protocol Wang, Daniel and Zhou, Jay and Wang, Alex and Finestone, Matthew. 2018
1
38.ZeroLedge: Proving Solvency with Privacy Doerner, Jack and Shelat, Abhi and Evans, David. 2018
0
39.On the Practicality of Smart Contract PKI Patsonakis, Christos and Samari, Katerina and Kiayias, Aggelos and Roussopoulos, Mema. 2019
0