all algorand anonymity applications attacks bitcoin blockchain book bullet-proofs byzantine chainspace consensus credentials crime cryptocurrencies dag data-science ddos dex discrete-log e-voting ecdsa ethereum exchanges formal-methods game-theory governance [key-management] lattices litecoin mining model-checking monero network ouroboros pki post-quantum privacy proof-of-* proof-of-space proof-of-stake proof-of-work provable-security ripple scalability secure-multiparty-computation sharding sidechains signatures simple-verification-payments smart-contracts snarks solidity starks state-channels storage survey theory truebit trusted-hardware wallet whitepaper zero-knowledge zerocash zerocoin


A curated list of papers ordered by number of citations. Last updated 2018-12-08

#Title
Citations
1.Hierarchical deterministic Bitcoin wallets that tolerate key leakage Gutoski, Gus and Stebila, Douglas. 2015
9
2.BeatCoin: Leaking Private Keys from Air-Gapped Cryptocurrency Wallets Guri, Mordechai. 2018
1
3.Paralysis Proofs: Safe Access-Structure Updates for Cryptocurrencies and More Fan Zhang and Philip Daian and Iddo Bentov and Ari Juels. 2018
0