Papers (38)

#Title
Citations
1.Ethereum: a secure decentralised generalised transaction ledger Wood, Gavin. 2014
5206
2.A next-generation smart contract and decentralized application platform Buterin, Vitalik. 2014
2696
3.Majority is not enough: Bitcoin mining is vulnerable Eyal, Ittay and Gün Sirer, Emin. 2014
2195
4.Mastering Bitcoin: unlocking digital cryptocurrencies Antonopoulos, Andreas M. 2014
1871
5.Zerocash: Decentralized anonymous payments from bitcoin Ben-Sasson, Eli and Chiesa, Alessandro and Garman, Christina and Green, Matthew and Miers, Ian and Tromer, Eran and Virza, Madars. 2014
1708
6.The Bitcoin Backbone Protocol : Analysis and Applications Garay, Juan A and Kiayias, Aggelos and Leonardos, Nikos. 2014
1356
7.Ipfs-content addressed, versioned, p2p file system Benet, Juan. 2014
1103
8.Proof of Activity: Extending Bitcoin's Proof of Work via Proof of Stake Bentov, Iddo and Lee, Charles and Mizrahi, Alex and Rosenfeld, Meni. 2014
669
9.The Ripple protocol consensus algorithm Schwartz, D and Youngs, N and Britto, A. 2014
642
10.Enabling blockchain innovations with pegged sidechains Back, A and Corallo, M and Dashjr, L. 2014
595
11.Deanonymisation of clients in Bitcoin P2P network Biryukov, Alex and Khovratovich, Dmitry and Pustogarov, Ivan. 2014
555
12.Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture. Ben-Sasson, Eli and Chiesa, Alessandro and Tromer, Eran and Virza, Madars. 2014
515
13.Secure multiparty computations on bitcoin Andrychowicz, Marcin and Dziembowski, Stefan and Malinowski, Daniel and Mazurek, Lukasz. 2014
477
14.Mixcoin: Anonymity for bitcoin with accountable mixes Bonneau, Joseph and Narayanan, Arvind and Miller, Andrew and Clark, Jeremy and Kroll, Joshua A. and Felten, Edward W.. 2014
467
15.The Miner's Dilemma Eyal, Ittay. 2014
442
16.Analysis of Hashrate-Based Double Spending Rosenfeld, Meni. 2014
435
17.An analysis of anonymity in bitcoin using p2p network traffic Koshy, Philip and Koshy, Diana and McDaniel, Patrick. 2014
434
18.CoinShuffle: Practical decentralized coin mixing for bitcoin Ruffing, Tim and Moreno-Sanchez, Pedro and Kate, Aniket. 2014
424
19.How to use Bitcoin to design fair protocols Bentov, Iddo and Kumaresan, Ranjit. 2014
382
20.Is bitcoin a decentralized currency? Gervais, Arthur and Karame, Ghassan O and Capkun, Vedran and Capkun, Srdjan. 2014
360
21.Permacoin: Repurposing bitcoin work for data preservation Miller, Andrew and Juels, Ari and Shi, Elaine and Parno, Bryan and Katz, Jonathan. 2014
333
22.Bitcoin transaction malleability and MtGox Decker, Christian and Wattenhofer, Roger. 2014
242
23.Empirical analysis of denial-of-service attacks in the Bitcoin ecosystem Vasek, Marie and Thornton, Micah and Moore, Tyler. 2014
239
24.Game-theoretic analysis of DDoS attacks against Bitcoin mining pools Johnson, Benjamin and Laszka, Aron and Grossklags, Jens and Vasek, Marie and Moore, Tyler. 2014
229
25.A Decentralized Public Key Infrastructure with Identity Retention. Fromknecht, Conner and Velicanu, Dragos and Yakoubov, Sophia. 2014
217
26.Fair two-party computations via bitcoin deposits Andrychowicz, Marcin and Dziembowski, Stefan and Malinowski, Daniel and Mazurek, Lukasz. 2014
181
27.Square span programs with applications to succinct NIZK arguments Danezis, George and Fournet, C\'edric and Groth, Jens and Kohlweiss, Markulf. 2014
121
28.Anonymous Byzantine Consensus from Moderately-Hard Puzzles: A Model for Bitcoin Miller, Andrew and Jr, Jj LaViola. 2014
116
29.Tezos -- a self-amending crypto-ledger Goodman, L.M.. 2014
93
30.On The Longest Chain Rule and Programmed Self-Destruction of Crypto Currencies Courtois, Nicolas T. 2014
62
31.How did dread pirate roberts acquire and protect his bitcoin wealth? Ron, Dorit and Shamir, Adi. 2014
57
32.Certified Bitcoins Ateniese, Giuseppe and Faonio, Antonio and Magri, Bernardo and de Medeiros, Breno. 2014
55
33.Increasing anonymity in bitcoin Saxena, Amitabh and Misra, Janardan and Dhar, Aritra. 2014
54
34.Modeling bitcoin contracts by timed automata Andrychowicz, Marcin and Dziembowski, Stefan and Malinowski, Daniel and Mazurek, \Lukasz. 2014
49
35.Distributed Cryptography Based on the Proofs of Work. Andrychowicz, Marcin and Dziembowski, Stefan. 2014
33
36.Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management, Wallet and Cold Storage Solutions in Presence of Poor RNG Events. Courtois, Nicolas T and Valsorda, Filippo and Emirdag, Pinar. 2014
28
37.Rational zero: Economic security for zerocoin with everlasting anonymity Garman, Christina and Green, Matthew and Miers, Ian and Rubin, Aviel D. 2014
23
38.Darkcoin : Peer ­ to ­ Peer Crypto ­ Currency with Anonymous Blockchain Transactions and an Improved Proof ­ of ­ Work System Duffield, Evan and Hagan, Kyle. 2014
0

Videos