all algorand anonymity applications [attacks] bitcoin blockchain book bullet-proofs byzantine chainspace consensus credentials crime cryptocurrencies dag data-science ddos dex discrete-log e-voting ecdsa ethereum exchanges formal-methods game-theory governance key-management lattices litecoin mining model-checking monero network ouroboros pki post-quantum privacy proof-of-* proof-of-space proof-of-stake proof-of-work provable-security ripple scalability secure-multiparty-computation sharding sidechains signatures simple-verification-payments smart-contracts snarks solidity starks state-channels storage survey theory truebit trusted-hardware wallet whitepaper zero-knowledge zerocash zerocoin

A curated list of papers ordered by number of citations. Last updated 2018-12-08

1.Majority is not enough: Bitcoin mining is vulnerable Eyal, Ittay and Gün Sirer, Emin. 2014
2.Bitter to better - How to make bitcoin a better currency Barber, Simon and Boyen, Xavier and Shi, Elaine and Uzun, Ersin. 2012
3.A Survey of Attacks on Ethereum Smart Contracts (SoK) Atzei, Nicola and Bartoletti, Massimo and Cimoli, Tiziana. 2016
4.Eclipse Attacks on Bitcoin's Peer-to-Peer Network Heilman, Ethan and Kendler, Alison and Zohar, Aviv and Goldberg, Sharon. 2015
5.Analysis of Hashrate-Based Double Spending Rosenfeld, Meni. 2014
6.On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency Courtois, Nicolas T and Bahack, Lear. 2013
7.An empirical analysis of smart contracts: platforms, applications, and design patterns Bartoletti, Massimo and Pompianu, Livio. 2017
8.Game-theoretic analysis of DDoS attacks against Bitcoin mining pools Johnson, Benjamin and Laszka, Aron and Grossklags, Jens and Vasek, Marie and Moore, Tyler. 2014
9.Hijacking bitcoin: Routing attacks on cryptocurrencies Apostolaki, Maria and Zohar, Aviv and Vanbever, Laurent. 2017
10.On power splitting games in distributed computation: The case of bitcoin pooled mining Luu, Loi and Saha, Ratul and Parameshwaran, Inian and Saxena, Prateek and Hobor, Aquinas. 2015
11.When cryptocurrencies mine their own business Teutsch, Jason and Jain, Sanjay and Saxena, Prateek. 2016
12.Refund attacks on Bitcoin’s payment protocol McCorry, Patrick and Shahandashti, Siamak F and Hao, Feng. 2016
13.Hierarchical deterministic Bitcoin wallets that tolerate key leakage Gutoski, Gus and Stebila, Douglas. 2015
14.An Empirical Analysis of Anonymity in Zcash Kappos, George and Yousaf, Haaroon and Maller, Mary and Meiklejohn, Sarah. 2018
15.Low-Resource Eclipse Attacks on Ethereum’s Peer-to-Peer Network Marcus, Yuval and Heilman, Ethan and Goldberg, Sharon. 2018
16.Stake-Bleeding Attacks on Proof-of-Stake Blockchains Peter Gaži and Aggelos Kiayias and Alexander Russell. 2018
17.BeatCoin: Leaking Private Keys from Air-Gapped Cryptocurrency Wallets Guri, Mordechai. 2018
18.Burning Zerocoins for Fun and for Profit: A Cryptographic Denial-of-Spending Attack on the Zerocoin Protocol Tim Ruffing and Sri Aravinda Thyagarajan and Viktoria Ronge and Dominique Schröder. 2018
19.SABRE: Protecting Bitcoin against Routing Attacks Apostolaki, Maria and Marti, Gian and M\"uller, Jan and Vanbever, Laurent. 2018
20.Empirical Vulnerability Analysis of Automated Smart Contracts Security Testing on Blockchains Parizi, Reza M and Dehghantanha, Ali and Choo, Kim-Kwang Raymond and Singh, Amritraj. 2018
21.Pitchforks in Cryptocurrencies: Enforcing Rule Changes Through Offensive Weippl, Edgar. 2018
22.A New Look at the Refund Mechanism in the Bitcoin Payment Protocol Avizheh, Sepideh and Safavi-Naini, Reihaneh and Shahandashti, Siamak F. 2018