Papers (25)

#Title
Citations
1.An analysis of anonymity in the bitcoin system Reid, F and Harrigan, M. 2013
968
2.A fistful of bitcoins: characterizing payments among men with no names Meiklejohn, Sarah and Pomarole, Marjori and Jordan, Grant and Levchenko, Kirill and McCoy, Damon and Voelker, Geoffrey M and Savage, Stefan. 2013  
905
3.Quantitative analysis of the full bitcoin transaction graph Ron, Dorit and Shamir, Adi. 2013
809
4.Information propagation in the Bitcoin network Decker, Christian and Wattenhofer, Roger. 2013  
775
5.Zerocoin: Anonymous distributed e-cash from bitcoin Miers, Ian and Garman, Christina and Green, Matthew and Rubin, Aviel D. 2013  
721
6.Pinocchio: Nearly practical verifiable computation Parno, Bryan and Howell, Jon and Gentry, Craig and Raykova, Mariana. 2013
634
7.Evaluating user privacy in bitcoin Androulaki, Elli and Karame, Ghassan O and Roeschlin, Marc and Scherer, Tobias and Capkun, Srdjan. 2013
519
8.The economics of Bitcoin mining, or Bitcoin in the presence of adversaries Kroll, Joshua A and Davey, Ian C and Felten, Edward W. 2013
477
9.Quadratic span programs and succinct NIZKs without PCPs Gennaro, Rosario and Gentry, Craig and Parno, Bryan and Raykova, Mariana. 2013
461
10.SNARKs for C: Verifying program executions succinctly and in zero knowledge Ben-Sasson, Eli and Chiesa, Alessandro and Genkin, Daniel and Tromer, Eran and Virza, Madars. 2013  
401
11.Succinct non-interactive arguments via linear interactive proofs Bitansky, Nir and Chiesa, Alessandro and Ishai, Yuval and Paneth, Omer and Ostrovsky, Rafail. 2013
199
12.Recursive composition and bootstrapping for SNARKs and proof-carrying data Bitansky, Nir and Canetti, Ran and Chiesa, Alessandro and Tromer, Eran. 2013
199
13.On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency Courtois, Nicolas T and Bahack, Lear. 2013
174
14.CryptoNote v 2.0 Saberhagen, Nicolas Van. 2013
146
15.Primecoin: Cryptocurrency with prime number proof-of-work King, Sunny. 2013
144
16.Vector commitments and their applications Catalano, Dario and Fiore, Dario. 2013
144
17.Have a Snack, Pay with Bitcoins Bamert, Tobias and Decker, Christian and Elsen, Lennart and Wattenhofer, Roger and Welten, Samuel. 2013
140
18.Accelerating Bitcoin's Transaction Processing. Fast Money Grows on Trees, Not Chains Sompolinsky, Yonatan and Zohar, A. 2013
124
19.Resolving the conflict between generality and plausibility in verified computation Setty, Srinath and Braun, Benjamin and Vu, Victor and Blumberg, Andrew J and Parno, Bryan and Walfish, Michael. 2013
109
20.Pinocchio coin Danezis, George and Fournet, Cedric and Kohlweiss, Markulf and Parno, Bryan. 2013
99
21.Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft) Lear Bahack. 2013
95
22.Proofs of Space: When Space is of the Essence Ateniese, Giuseppe and Bonacina, Ilario and Faonio, Antonio and Galesi, Nicola. 2013
88
23.Succinct non-interactive zero knowledge arguments from span programs and linear error-correcting codes Lipmaa, Helger. 2013  
79
24.Publicly Verifiable Proofs of Sequential Work Mahmoody, Mohammad and Moran, Tal and Vadhan, Salil. 2013
54
25.Alt chains and atomic transfers Tier Nolan. 2013
15

Videos