all algorand anonymity applications attacks bitcoin blockchain book bullet-proofs byzantine chainspace consensus credentials crime cryptocurrencies dag data-science ddos discrete-log e-voting ecdsa ethereum exchanges formal-methods game-theory governance key-management lattices layer2 litecoin mining model-checking monero network ouroboros pki post-quantum privacy proof-of-* proof-of-space proof-of-stake proof-of-work provable-security ripple scalability secure-multiparty-computation sidechains signatures simple-verification-payments smart-contracts snarks solidity starks storage survey theory truebit trusted-computing [wallet] whitepaper zero-knowledge zerocash zerocoin

A curated list of papers ordered by number of citations. Last updated 2019-05-13

1.Hierarchical deterministic Bitcoin wallets that tolerate key leakage Gutoski, Gus and Stebila, Douglas. 2015
2.A Formal Treatment of Hardware Wallets Arapinis, Myrto and Gkaniatsou, Andriana and Karakostas, Dimitris and Kiayias, Aggelos. 2019
3.Dynamic-Committee Proactive Secret Sharing Maram, Sai Krishna Deepak and Zhang, Fan and Wang, Lun and Low, Andrew and Zhang, Yupeng and Juels, Ari and Song, Dawn. 2019