all algorand anonymity applications attacks bitcoin [blockchain] book bullet-proofs byzantine chainspace consensus credentials crime cryptocurrencies dag data-science ddos dex discrete-log e-voting ecdsa ethereum exchanges formal-methods game-theory governance key-management lattices litecoin mining model-checking monero network ouroboros pki post-quantum privacy proof-of-* proof-of-space proof-of-stake proof-of-work provable-security ripple scalability secure-multiparty-computation sharding sidechains signatures simple-verification-payments smart-contracts snarks solidity starks state-channels storage survey theory truebit trusted-hardware wallet whitepaper zero-knowledge zerocash zerocoin

A curated list of papers ordered by number of citations. Last updated 2018-12-08

1.Decentralizing privacy: Using blockchain to protect personal data Zyskind, Guy and Nathan, Oz and others. 2015
2.Xclaim: Interoperability with cryptocurrency-backed tokens Zamyatin, Alexei and Harz, Dominik and Lind, Joshua and Panayiotou, Panayiotis and Gervais, Arthur and Knottenbelt, William J. 2018
3.Blockchain Access Privacy: Challenges and Directions Henry, Ryan and Herzberg, Amir and Kate, Aniket. 2018
4.PiLi: An Extremely Simple Synchronous Blockchain Chan, TH Hubert and Pass, Rafael and Shi, Elaine. 2018
5.EDRAX: A Cryptocurrency with Stateless Transaction Validation Chepurnoy, Alexander and Papamanthou, Charalampos and Zhang, Yupeng. 2018
6.Parallel Chains: Improving Throughput and Latency of Blockchain Protocols via Parallel Composition Fitzi, Matthias and Gazi, Peter and Kiayias, Aggelos and Russell, Alexander. 2018