Papers (38)

#Title
Citations
1.Ethereum: a secure decentralised generalised transaction ledger Wood, Gavin. 2014   
3581
2.A next-generation smart contract and decentralized application platform Buterin, Vitalik. 2014   
1865
3.Majority is not enough: Bitcoin mining is vulnerable Eyal, Ittay and Gün Sirer, Emin. 2014  
1788
4.Mastering Bitcoin: unlocking digital cryptocurrencies Antonopoulos, Andreas M. 2014
1621
5.Zerocash: Decentralized anonymous payments from bitcoin Ben-Sasson, Eli and Chiesa, Alessandro and Garman, Christina and Green, Matthew and Miers, Ian and Tromer, Eran and Virza, Madars. 2014  
1272
6.The Bitcoin Backbone Protocol : Analysis and Applications Garay, Juan A and Kiayias, Aggelos and Leonardos, Nikos. 2014  
1047
7.Ipfs-content addressed, versioned, p2p file system Benet, Juan. 2014   
687
8.Enabling blockchain innovations with pegged sidechains Back, A and Corallo, M and Dashjr, L. 2014
489
9.Proof of Activity: Extending Bitcoin's Proof of Work via Proof of Stake Bentov, Iddo and Lee, Charles and Mizrahi, Alex and Rosenfeld, Meni. 2014
482
10.The Ripple protocol consensus algorithm Schwartz, D and Youngs, N and Britto, A. 2014
468
11.Secure multiparty computations on bitcoin Andrychowicz, Marcin and Dziembowski, Stefan and Malinowski, Daniel and Mazurek, Lukasz. 2014
392
12.Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture. Ben-Sasson, Eli and Chiesa, Alessandro and Tromer, Eran and Virza, Madars. 2014
381
13.The Miner's Dilemma Eyal, Ittay. 2014  
377
14.Analysis of Hashrate-Based Double Spending Rosenfeld, Meni. 2014
355
15.An analysis of anonymity in bitcoin using p2p network traffic Koshy, Philip and Koshy, Diana and McDaniel, Patrick. 2014
354
16.Mixcoin: Anonymity for bitcoin with accountable mixes Bonneau, Joseph and Narayanan, Arvind and Miller, Andrew and Clark, Jeremy and Kroll, Joshua A. and Felten, Edward W.. 2014
350
17.Darkcoin : Peer ­ to ­ Peer Crypto ­ Currency with Anonymous Blockchain Transactions and an Improved Proof ­ of ­ Work System Duffield, Evan and Hagan, Kyle. 2014
322
18.CoinShuffle: Practical decentralized coin mixing for bitcoin Ruffing, Tim and Moreno-Sanchez, Pedro and Kate, Aniket. 2014
322
19.Is bitcoin a decentralized currency? Gervais, Arthur and Karame, Ghassan O and Capkun, Vedran and Capkun, Srdjan. 2014
308
20.How to use Bitcoin to design fair protocols Bentov, Iddo and Kumaresan, Ranjit. 2014
307
21.Permacoin: Repurposing bitcoin work for data preservation Miller, Andrew and Juels, Ari and Shi, Elaine and Parno, Bryan and Katz, Jonathan. 2014
267
22.Bitcoin transaction malleability and MtGox Decker, Christian and Wattenhofer, Roger. 2014
191
23.Empirical analysis of denial-of-service attacks in the Bitcoin ecosystem Vasek, Marie and Thornton, Micah and Moore, Tyler. 2014
187
24.Game-theoretic analysis of DDoS attacks against Bitcoin mining pools Johnson, Benjamin and Laszka, Aron and Grossklags, Jens and Vasek, Marie and Moore, Tyler. 2014
181
25.A Decentralized Public Key Infrastructure with Identity Retention. Fromknecht, Conner and Velicanu, Dragos and Yakoubov, Sophia. 2014
166
26.Fair two-party computations via bitcoin deposits Andrychowicz, Marcin and Dziembowski, Stefan and Malinowski, Daniel and Mazurek, Lukasz. 2014
152
27.Anonymous Byzantine Consensus from Moderately-Hard Puzzles: A Model for Bitcoin Miller, Andrew and Jr, Jj LaViola. 2014
104
28.Square span programs with applications to succinct NIZK arguments Danezis, George and Fournet, C\'edric and Groth, Jens and Kohlweiss, Markulf. 2014  
91
29.Tezos -- a self-amending crypto-ledger Goodman, L.M.. 2014
62
30.How did dread pirate roberts acquire and protect his bitcoin wealth? Ron, Dorit and Shamir, Adi. 2014
62
31.On The Longest Chain Rule and Programmed Self-Destruction of Crypto Currencies Courtois, Nicolas T. 2014
51
32.Increasing anonymity in bitcoin Saxena, Amitabh and Misra, Janardan and Dhar, Aritra. 2014
48
33.Certified Bitcoins Ateniese, Giuseppe and Faonio, Antonio and Magri, Bernardo and de Medeiros, Breno. 2014
41
34.Modeling bitcoin contracts by timed automata Andrychowicz, Marcin and Dziembowski, Stefan and Malinowski, Daniel and Mazurek, \Lukasz. 2014
40
35.Distributed Cryptography Based on the Proofs of Work. Andrychowicz, Marcin and Dziembowski, Stefan. 2014
30
36.Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management, Wallet and Cold Storage Solutions in Presence of Poor RNG Events. Courtois, Nicolas T and Valsorda, Filippo and Emirdag, Pinar. 2014
20
37.Rational zero: Economic security for zerocoin with everlasting anonymity Garman, Christina and Green, Matthew and Miers, Ian and Rubin, Aviel D. 2014
18
38.Deanonymisation of clients in Bitcoin P2P network Biryukov, Alex and Khovratovich, Dmitry and Pustogarov, Ivan. 2014
0

Videos