Papers (47)

#Title
Citations
1.Decentralizing privacy: Using blockchain to protect personal data Zyskind, Guy and Nathan, Oz and others. 2015
1883
2.SoK: Research perspectives and challenges for bitcoin and cryptocurrencies Bonneau, Joseph and Miller, Andrew and Clark, Jeremy and Narayanan, Arvind and Kroll, Joshua A. and Felten, Edward W.. 2015  
1136
3.The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication Vukolić, Marko. 2015
963
4.Eclipse Attacks on Bitcoin's Peer-to-Peer Network Heilman, Ethan and Kendler, Alison and Zohar, Aviv and Goldberg, Sharon. 2015  
624
5.Optimal Selfish Mining Strategies in Bitcoin Sapirshtein, Ayelet and Sompolinsky, Yonatan and Zohar, Aviv. 2015
546
6.Enigma: Decentralized computation platform with guaranteed privacy Zyskind, Guy and Nathan, Oz and Pentland, Alex. 2015  
410
7.A fast and scalable payment network with bitcoin duplex micropayment channels Decker, Christian and Wattenhofer, Roger. 2015
382
8.The stellar consensus protocol: A federated model for internet-level consensus Mazieres, David. 2015  
375
9.Inclusive block chain protocols Lewenberg, Yoad and Sompolinsky, Yonatan and Zohar, Aviv. 2015
318
10.Centrally banked cryptocurrencies Danezis, George and Meiklejohn, Sarah. 2015
299
11.Proofs of Space Dziembowski, Stefan and Faust, Sebastian and Kolmogorov, Vladimir and Pietrzak, Krzysztof. 2015
244
12.Geppetto: Versatile verifiable computation Costello, Craig and Fournet, C\'edric and Howell, Jon and Kohlweiss, Markulf and Kreuter, Benjamin and Naehrig, Michael and Parno, Bryan and Zahur, Samee. 2015  
203
13.Demystifying incentives in the consensus computer Luu, Loi and Teutsch, Jason and Kulkarni, Raghav and Saxena, Prateek. 2015
194
14.Speed-Security Tradeoffs in Blockchain Protocols Kiayias, Aggelos and Panagiotakos, Giorgos. 2015
159
15.Ring Signature Confidential Transactions for Monero Shen Noether. 2015
158
16.Efficient RAM and control flow in verifiable outsourced computation. Wahby, Riad S and Setty, Srinath TV and Ren, Zuocheng and Blumberg, Andrew J and Walfish, Michael. 2015
141
17.On power splitting games in distributed computation: The case of bitcoin pooled mining Luu, Loi and Saha, Ratul and Parameshwaran, Inian and Saxena, Prateek and Hobor, Aquinas. 2015
138
18.On Bitcoin as a public randomness source. Bonneau, Joseph and Clark, Jeremy and Goldfeder, Steven. 2015
134
19.Secure sampling of public parameters for succinct zero knowledge proofs Ben-Sasson, Eli and Chiesa, Alessandro and Green, Matthew and Tromer, Eran and Virza, Madars. 2015
133
20.One-out-of-many proofs: Or how to leak a secret and spend a coin Groth, Jens and Kohlweiss, Markulf. 2015
117
21.How to use bitcoin to play decentralized poker Kumaresan, Ranjit and Moran, Tal and Bentov, Iddo. 2015
112
22.Nonoutsourceable scratch-off puzzles to discourage bitcoin mining coalitions Miller, Andrew and Kosba, Ahmed and Katz, Jonathan and Shi, Elaine. 2015
111
23.Trends, tips, tolls: A longitudinal study of Bitcoin transaction fees M\"oser, Malte and B\"ohme, Rainer. 2015
110
24.Spacecoin : A Cryptocurrency Based on Proofs of Space Park, Sunoo and Pietrzak, Krzysztof and Alwen, Joel and Fuchsbauer, Georg and Gazi, Peter. 2015
103
25.A protocol for interledger payments Thomas, Stefan and Schwartz, Evan. 2015
100
26.Scp: A computationally-scalable byzantine consensus protocol for blockchains Luu, Loi and Narayanan, Viswesh and Baweja, Kunal and Zheng, Chaodong and Gilbert, Seth and Saxena, Prateek. 2015
90
27.High Parallel Complexity Graphs and Memory-Hard Functions Alwen, Jo\"el and Serbinenko, Vladimir. 2015
80
28.SpaceMint: A Cryptocurrency Based on Proofs of Space Sunoo Park and Albert Kwon and Georg Fuchsbauer and Peter Gaži and Joël Alwen and Krzysztof Pietrzak. 2015
80
29.Validation of decentralised smart contracts through game theory and formal methods Bigi, Giancarlo and Bracciali, Andrea and Meacci, Giovanni and Tuosto, Emilio. 2015
78
30.On the Malleability of Bitcoin Transactions Marcin Andrychowicz and Stefan Dziembowski and Daniel Malinowski and Lukasz Mazurek. 2015
75
31.Micropayments for decentralized currencies Pass, Rafael and Shelat, Abhi. 2015
73
32.Provisions: Privacy-preserving Proofs of Solvency for Bitcoin Exchanges Dagher, Gaby G and Bünz, Benedikt and Bonneau, Joseph and Clark, Jeremy and Boneh, Dan. 2015
61
33.Liar, liar, coins on fire!: Penalizing equivocation by loss of bitcoins Ruffing, Tim and Kate, Aniket and Schr\"oder, Dominique. 2015
60
34.Privacy preserving payments in credit networks Moreno-Sanchez, Pedro and Kate, Aniket and Maffei, Matteo and Pecina, Kim. 2015
59
35.Securing Bitcoin wallets via a new DSA/ECDSA threshold signature scheme Goldfeder, Steven and Gennaro, Rosario and Kalodner, Harry and Bonneau, Joseph and Kroll, Joshua A and Felten, Edward W and Narayanan, Arvind. 2015
49
36.Hierarchical deterministic Bitcoin wallets that tolerate key leakage Gutoski, Gus and Stebila, Douglas. 2015
44
37.ZombieCoin: powering next-generation botnets with bitcoin Ali, Syed Taha and McCorry, Patrick and Lee, Peter Hyun-Jeen and Hao, Feng. 2015
41
38.Cuckoo Cycle: a memory bound graph-theoretic proof-of-work Tromp, John. 2015
37
39.Decaf: Eliminating cofactors through point compression Hamburg, Mike. 2015
31
40.How to Use SNARKs in Universally Composable Protocols. Kosba, Ahmed E and Zhao, Zhichao and Miller, Andrew and Qian, Yi and Chan, T-H Hubert and Papamanthou, Charalampos and Pass, Rafael and Shelat, Abhi and Shi, Elaine. 2015
25
41.Rootstock: Bitcoin powered smart contracts Lerner, S Demian. 2015
22
42.Making bitcoin exchanges transparent Decker, Christian and Guthrie, James and Seidel, Jochen and Wattenhofer, Roger. 2015
21
43.How perfect offline wallets can still leak bitcoin private keys Verb\"ucheln, Stephan. 2015
9
44.A Note on the Unsoundness of vnTinyRAM's SNARK. Parno, Bryan. 2015
8
45.Drivechain-the simple two way peg, November 2015 Sztorc, Paul. 2015
6
46.C$\emptyset$C$\emptyset$: A Framework for Building Composable Zero-Knowledge Proofs Ahmed Kosba and Zhichao Zhao and Andrew Miller and Yi Qian and Hubert Chan and Charalampos Papamanthou and Rafael Pass and abhi shelat and Elaine Shi. 2015
3
47.When bitcoin mining pools run dry Laszka, Aron and Johnson, Benjamin and Grossklags, Jens. 2015
0

Videos