all algorand anonymity applications attacks bitcoin [blockchain] book bullet-proofs byzantine chainspace consensus credentials crime cryptocurrencies dag data-science ddos discrete-log e-voting ecdsa ethereum exchanges formal-methods game-theory governance key-management lattices layer2 litecoin mining model-checking monero network ouroboros pki post-quantum privacy proof-of-* proof-of-space proof-of-stake proof-of-work provable-security ripple scalability secure-multiparty-computation sidechains signatures simple-verification-payments smart-contracts snarks solidity starks storage survey theory truebit trusted-computing wallet whitepaper zero-knowledge zerocash zerocoin


A curated list of papers ordered by number of citations. Last updated 2019-05-13

#Title
Citations
1.Decentralizing privacy: Using blockchain to protect personal data Zyskind, Guy and Nathan, Oz and others. 2015
581
2.Blockchain Access Privacy: Challenges and Directions Henry, Ryan and Herzberg, Amir and Kate, Aniket. 2018
8
3.Xclaim: Interoperability with cryptocurrency-backed tokens Zamyatin, Alexei and Harz, Dominik and Lind, Joshua and Panayiotou, Panayiotis and Gervais, Arthur and Knottenbelt, William J. 2018
4
4.Parallel Chains: Improving Throughput and Latency of Blockchain Protocols via Parallel Composition Fitzi, Matthias and Gazi, Peter and Kiayias, Aggelos and Russell, Alexander. 2018
2
5.Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains Boneh, Dan and B\"unz, Benedikt and Fisch, Benjamin. 2018
2
6.EDRAX: A Cryptocurrency with Stateless Transaction Validation Chepurnoy, Alexander and Papamanthou, Charalampos and Zhang, Yupeng. 2018
1
7.PiLi: An Extremely Simple Synchronous Blockchain Chan, TH Hubert and Pass, Rafael and Shi, Elaine. 2018
0
8.Analysis of Deterministic Longest-Chain Protocols Shi, Elaine. 2018
0