all algorand anonymity [applications] attacks bitcoin blockchain book bullet-proofs byzantine chainspace consensus credentials crime cryptocurrencies dag data-science ddos discrete-log e-voting ecdsa ethereum exchanges formal-methods game-theory governance key-management lattices layer2 litecoin mining model-checking monero network ouroboros pki post-quantum privacy proof-of-* proof-of-space proof-of-stake proof-of-work provable-security ripple scalability secure-multiparty-computation sidechains signatures simple-verification-payments smart-contracts snarks solidity starks storage survey theory truebit trusted-computing wallet whitepaper zero-knowledge zerocash zerocoin

A curated list of papers ordered by number of citations. Last updated 2019-05-13

1.Town crier: An authenticated data feed for smart contracts Zhang, Fan and Cecchetti, Ethan and Croman, Kyle and Juels, Ari and Shi, Elaine. 2016
2.Centrally banked cryptocurrencies Danezis, George and Meiklejohn, Sarah. 2015
3.A smart contract for boardroom voting with maximum voter privacy McCorry, Patrick and Shahandashti, Siamak F and Hao, Feng. 2017
4.A Decentralized Public Key Infrastructure with Identity Retention. Fromknecht, Conner and Velicanu, Dragos and Yakoubov, Sophia. 2014
5.On Bitcoin as a public randomness source. Bonneau, Joseph and Clark, Jeremy and Goldfeder, Steven. 2015
6.The ring of gyges: Investigating the future of criminal smart contracts Juels, Ari and Kosba, Ahmed and Shi, Elaine. 2016
7.Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge. Tramer, Florian and Zhang, Fan and Lin, Huang and Hubaux, Jean-Pierre and Juels, Ari and Shi, Elaine. 2016
8.SCPKI: A smart contract-based PKI and identity system Al-Bassam, Mustafa. 2017
9.Liar, liar, coins on fire!: Penalizing equivocation by loss of bitcoins Ruffing, Tim and Kate, Aniket and Schr\"oder, Dominique. 2015
10.SMART POOL : Practical Decentralized Pooled Mining Luu, Loi and Velner, Yaron and Teutsch, Jason and Saxena, Prateek. 2017
11.Verifiable Delay Functions Dan Boneh, Joseph Bonneau, Benedikt Bünz, Ben Fisch. 2018
12.Provisions: Privacy-preserving Proofs of Solvency for Bitcoin Exchanges Dagher, Gaby G and Bünz, Benedikt and Bonneau, Joseph and Clark, Jeremy and Boneh, Dan. 2015
13.Instantaneous Decentralized Poker Iddo Bentov and Ranjit Kumaresan and Andrew Miller. 2017
14.Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services Matteo Campanelli and Rosario Gennaro and Steven Goldfeder and Luca Nizzardo. 2017
15.IKP: Turning a PKI Around with Blockchains Stephanos Matsumoto and Raphael M. Reischuk. 2016
16.ZombieCoin: powering next-generation botnets with bitcoin Ali, Syed Taha and McCorry, Patrick and Lee, Peter Hyun-Jeen and Hao, Feng. 2015
17.0x: An open protocol for decentralized exchange on the Ethereum blockchain Warren, Will and Bandeali, Amir. 2017
18.Escrow protocols for cryptocurrencies: How to buy physical goods using Bitcoin Goldfeder, Steven and Bonneau, Joseph and Gennaro, Rosario and Narayanan, Arvind.. 2017
19.Zero-Collateral Lotteries in Bitcoin and Ethereum Miller, Andrew and Bentov, Iddo. 2016
20.Improving Authenticated Dynamic Dictionaries, with Applications to Cryptocurrencies Reyzin, Leonid and Meshkov, Dmitry and Chepurnoy, Alexander and Ivanov, Sasha. 2016
21.zkLedger: Privacy-Preserving Auditing for Distributed Ledgers Neha Narula and Willy Vasquez and Madars Virza. 2018
22.SBFT: a Scalable Decentralized Trust Infrastructure for Blockchains Gueta, Guy Golan and Abraham, Ittai and Grossman, Shelly and Malkhi, Dahlia and Pinkas, Benny and Reiter, Michael K and Seredinschi, Dragos-Adrian and Tamir, Orr and Tomescu, Alin. 2018
23.Strain: A Secure Auction for Blockchains Erik-Oliver Blass and Florian Kerschbaum. 2017
24.Bootstrapping the Blockchain, with Applications to Consensus and Fast PKI Setup Garay, Juan A and Kiayias, Aggelos and Leonardos, Nikos and Panagiotakos, Giorgos. 2018
25.FairSwap: How to fairly exchange digital goods Dziembowski, Stefan and Eckey, Lisa and Faust, Sebastian. 2018
26.Kaleidoscope: An Efficient Poker Protocol with Payment Distribution and Penalty Enforcement Bernardo David and Rafael Dowsley and Mario Larangeira. 2017
27.Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers Sonnino, Alberto and Al-Bassam, Mustafa and Bano, Shehar and Danezis, George. 2018
28.ROYALE: A Framework for Universally Composable Card Games with Financial Rewards and Penalties Enforcement Bernardo David and Rafael Dowsley and Mario Larangeira. 2018
29.21-bringing down the complexity: fast composable protocols for card games without secret state David, Bernardo and Dowsley, Rafael and Larangeira, Mario. 2018
30.Public Accountability vs. Secret Laws: Can They Coexist?: A Cryptographic Proposal Goldwasser, Shafi and Park, Sunoo. 2017
31.Decentralized Blacklistable Anonymous Credentials with Reputation Yang, Rupeng and Au, Man Ho and Xu, Qiuliang and Yu, Zuoxia. 2017
32.R3C3: Cryptographically secure Censorship Resistant Rendezvous using Cryptocurrencies Mohsen Minaei and Pedro Moreno-Sanchez and Aniket Kate. 2018
33.Pies: Public incompressible encodings for decentralized storage Cecchetti, Ethan and Miers, Ian and Juels, Ari. 2018
34.MARS: Monetized Ad-hoc Routing System (A Position Paper) David, Bernardo and Dowsley, Rafael and Larangeira, Mario. 2018
35.Developing a K-ary malware using Blockchain Moubarak, Joanna and Filiol, Eric and Chamoun, Maroun. 2018
36.Privacy Preserving Verifiable Key Directories. Chase, Melissa and Deshpande, Apoorvaa and Ghosh, Esha. 2018
37.Loopring: A decentralized token exchange protocol Wang, Daniel and Zhou, Jay and Wang, Alex and Finestone, Matthew. 2018
38.ZeroLedge: Proving Solvency with Privacy Doerner, Jack and Shelat, Abhi and Evans, David. 2018
39.On the Practicality of Smart Contract PKI Patsonakis, Christos and Samari, Katerina and Kiayias, Aggelos and Roussopoulos, Mema. 2019