all algorand anonymity applications [attacks] bitcoin blockchain book bullet-proofs byzantine chainspace consensus credentials crime cryptocurrencies dag data-science ddos dex discrete-log e-voting ecdsa ethereum exchanges formal-methods game-theory governance key-management lattices litecoin mining model-checking monero network ouroboros pki post-quantum privacy proof-of-* proof-of-space proof-of-stake proof-of-work provable-security ripple scalability secure-multiparty-computation sharding sidechains signatures simple-verification-payments smart-contracts snarks solidity starks state-channels storage survey theory truebit trusted-hardware wallet whitepaper zero-knowledge zerocash zerocoin


A curated list of papers ordered by number of citations. Last updated 2018-12-08

#Title
Citations
1.Majority is not enough: Bitcoin mining is vulnerable Eyal, Ittay and Gün Sirer, Emin. 2014
659
2.Bitter to better - How to make bitcoin a better currency Barber, Simon and Boyen, Xavier and Shi, Elaine and Uzun, Ersin. 2012
420
3.A Survey of Attacks on Ethereum Smart Contracts (SoK) Atzei, Nicola and Bartoletti, Massimo and Cimoli, Tiziana. 2016
198
4.Eclipse Attacks on Bitcoin's Peer-to-Peer Network Heilman, Ethan and Kendler, Alison and Zohar, Aviv and Goldberg, Sharon. 2015
180
5.Analysis of Hashrate-Based Double Spending Rosenfeld, Meni. 2014
154
6.On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency Courtois, Nicolas T and Bahack, Lear. 2013
95
7.An empirical analysis of smart contracts: platforms, applications, and design patterns Bartoletti, Massimo and Pompianu, Livio. 2017
76
8.Game-theoretic analysis of DDoS attacks against Bitcoin mining pools Johnson, Benjamin and Laszka, Aron and Grossklags, Jens and Vasek, Marie and Moore, Tyler. 2014
68
9.Hijacking bitcoin: Routing attacks on cryptocurrencies Apostolaki, Maria and Zohar, Aviv and Vanbever, Laurent. 2017
54
10.On power splitting games in distributed computation: The case of bitcoin pooled mining Luu, Loi and Saha, Ratul and Parameshwaran, Inian and Saxena, Prateek and Hobor, Aquinas. 2015
49
11.When cryptocurrencies mine their own business Teutsch, Jason and Jain, Sanjay and Saxena, Prateek. 2016
21
12.Refund attacks on Bitcoin’s payment protocol McCorry, Patrick and Shahandashti, Siamak F and Hao, Feng. 2016
16
13.Hierarchical deterministic Bitcoin wallets that tolerate key leakage Gutoski, Gus and Stebila, Douglas. 2015
9
14.An Empirical Analysis of Anonymity in Zcash Kappos, George and Yousaf, Haaroon and Maller, Mary and Meiklejohn, Sarah. 2018
9
15.Low-Resource Eclipse Attacks on Ethereum’s Peer-to-Peer Network Marcus, Yuval and Heilman, Ethan and Goldberg, Sharon. 2018
7
16.Stake-Bleeding Attacks on Proof-of-Stake Blockchains Peter Gaži and Aggelos Kiayias and Alexander Russell. 2018
5
17.BeatCoin: Leaking Private Keys from Air-Gapped Cryptocurrency Wallets Guri, Mordechai. 2018
1
18.Burning Zerocoins for Fun and for Profit: A Cryptographic Denial-of-Spending Attack on the Zerocoin Protocol Tim Ruffing and Sri Aravinda Thyagarajan and Viktoria Ronge and Dominique Schröder. 2018
1
19.SABRE: Protecting Bitcoin against Routing Attacks Apostolaki, Maria and Marti, Gian and M\"uller, Jan and Vanbever, Laurent. 2018
1
20.Empirical Vulnerability Analysis of Automated Smart Contracts Security Testing on Blockchains Parizi, Reza M and Dehghantanha, Ali and Choo, Kim-Kwang Raymond and Singh, Amritraj. 2018
1
21.Pitchforks in Cryptocurrencies: Enforcing Rule Changes Through Offensive Weippl, Edgar. 2018
0
22.A New Look at the Refund Mechanism in the Bitcoin Payment Protocol Avizheh, Sepideh and Safavi-Naini, Reihaneh and Shahandashti, Siamak F. 2018
0