all algorand anonymity applications attacks bitcoin [blockchain] book bullet-proofs byzantine chainspace consensus credentials crime cryptocurrencies dag data-science ddos discrete-log e-voting ecdsa ethereum exchanges formal-methods game-theory governance key-management lattices layer2 litecoin mining model-checking monero network ouroboros pki post-quantum privacy proof-of-* proof-of-space proof-of-stake proof-of-work provable-security ripple scalability secure-multiparty-computation sidechains signatures simple-verification-payments smart-contracts snarks solidity starks storage survey theory truebit trusted-computing wallet whitepaper zero-knowledge zerocash zerocoin

A curated list of papers ordered by number of citations. Last updated 2019-04-21

1.Decentralizing privacy: Using blockchain to protect personal data Zyskind, Guy and Nathan, Oz and others. 2015
2.Blockchain Access Privacy: Challenges and Directions Henry, Ryan and Herzberg, Amir and Kate, Aniket. 2018
3.Xclaim: Interoperability with cryptocurrency-backed tokens Zamyatin, Alexei and Harz, Dominik and Lind, Joshua and Panayiotou, Panayiotis and Gervais, Arthur and Knottenbelt, William J. 2018
4.Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains Boneh, Dan and B\"unz, Benedikt and Fisch, Benjamin. 2018
5.EDRAX: A Cryptocurrency with Stateless Transaction Validation Chepurnoy, Alexander and Papamanthou, Charalampos and Zhang, Yupeng. 2018
6.Parallel Chains: Improving Throughput and Latency of Blockchain Protocols via Parallel Composition Fitzi, Matthias and Gazi, Peter and Kiayias, Aggelos and Russell, Alexander. 2018
7.PiLi: An Extremely Simple Synchronous Blockchain Chan, TH Hubert and Pass, Rafael and Shi, Elaine. 2018
8.Analysis of Deterministic Longest-Chain Protocols Shi, Elaine. 2018