Papers (69)

#Title
Citations
1.Blockchains and smart contracts for the internet of things Christidis, Konstantinos and Devetsikiotis, Michael. 2016
2234
2.Hawk: The blockchain model of cryptography and privacy-preserving smart contracts Kosba, Ahmed and Miller, Andrew and Shi, Elaine and Wen, Zikai and Papamanthou, Charalampos. 2016  
1410
3.Bitcoin and cryptocurrency technologies: a comprehensive introduction Narayanan, Arvind and Bonneau, Joseph and Felten, Edward and Miller, Andrew and Goldfeder, Steven. 2016
1282
4.Making smart contracts smarter Luu, Loi and Chu, Duc-Hiep and Olickel, Hrishi and Saxena, Prateek and Hobor, Aquinas. 2016  
961
5.Bitcoin-NG: A Scalable Blockchain Protocol Eyal, Ittay and Gencer, Adem Efe and Sirer, Emin Gün and van Renesse, Robbert. 2016  
920
6.On Scaling Decentralized Blockchains Croman, Kyle and Decker, Christian and Eyal, Ittay and Gencer, Adem Efe and Juels, Ari and Kosba, Ahmed and Miller, Andrew and Saxena, Prateek and Shi, Elaine and Gün Sirer, Emin. 2016
843
7.On the security and performance of proof of work blockchains Gervais, Arthur and Karame, Ghassan O and W\"ust, Karl and Glykantzis, Vasileios and Ritzdorf, Hubert and Capkun, Srdjan. 2016  
779
8.Algorand Chen, Jing and Micali, Silvio. 2016
636
9.The bitcoin lightning network: Scalable off-chain instant payments Poon, Joseph and Dryja, Thaddeus. 2016  
577
10.A secure sharding protocol for open blockchains Luu, Loi and Narayanan, Viswesh and Zheng, Chaodong and Baweja, Kunal and Gilbert, Seth and Saxena, Prateek. 2016  
532
11.Enhancing bitcoin security and performance with strong consistency via collective signing Kogias, Eleftherios Kokoris and Jovanovic, Philipp and Gailly, Nicolas and Khoffi, Ismail and Gasser, Linus and Ford, Bryan. 2016  
452
12.Step by step towards creating a safe smart contract: Lessons and insights from a cryptocurrency lab Delmolino, Kevin and Arnett, Mitchell and Kosba, Ahmed and Miller, Andrew and Shi, Elaine. 2016
419
13.Analysis of the Blockchain Protocol in Asynchronous Networks Pass, Rafael and Seeman, Lior and abhi Shelat. 2016
419
14.Formal verification of smart contracts: Short paper Bhargavan, Karthikeyan and Delignat-Lavaud, Antoine and Fournet, C\'edric and Gollamudi, Anitha and Gonthier, Georges and Kobeissi, Nadim and Kulatova, Natalia and Rastogi, Aseem and Sibut-Pinote, Thomas and Swamy, Nikhil and others. 2016
384
15.The honey badger of BFT protocols Miller, Andrew and Xia, Yu and Croman, Kyle and Shi, Elaine and Song, Dawn. 2016
354
16.Town crier: An authenticated data feed for smart contracts Zhang, Fan and Cecchetti, Ethan and Croman, Kyle and Juels, Ari and Shi, Elaine. 2016  
351
17.Cryptocurrencies without proof of work Bentov, Iddo and Gabizon, Ariel and Mizrahi, Alex. 2016
279
18.On the instability of bitcoin without the block reward Carlsten, Miles and Kalodner, Harry and Weinberg, S Matthew and Narayanan, Arvind. 2016
217
19.On the size of pairing-based non-interactive arguments Groth, Jens. 2016  
212
20.Fruitchains: A fair blockchain Pass, Rafael and Shi, Elaine. 2016
196
21.Tendermint: Byzantine fault tolerance in the age of blockchains Buchman, Ethan. 2016   
192
22.Difficulty control for blockchain-based consensus systems Kraft, Daniel. 2016
189
23.Snow White: Provably Secure Proofs of Stake. Bentov, Iddo and Pass, Rafael and Shi, Elaine. 2016
186
24.The Bitcoin Backbone Protocol with Chains of Variable Difficulty Juan A. Garay and Aggelos Kiayias and Nikos Leonardos. 2016  
139
25.The ring of gyges: Investigating the future of criminal smart contracts Juels, Ari and Kosba, Ahmed and Shi, Elaine. 2016
124
26.Incentive Compatibility of Bitcoin Mining Pool Reward Functions Schrijvers, Okke and Bonneau, Joseph and Boneh, Dan and Roughgarden, Tim. 2016
124
27.Blindly signed contracts: Anonymous on-blockchain and off-blockchain bitcoin transactions Heilman, Ethan and Baldimtsi, Foteini and Goldberg, Sharon. 2016
124
28.Zcash protocol specification Hopwood, Daira and Bowe, Sean and Hornby, Taylor and Wilcox, Nathan. 2016
123
29.Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security Gennaro, Rosario and Goldfeder, Steven and Narayanan, Arvind. 2016
120
30.ZKBoo: Faster Zero-Knowledge for Boolean Circuits. Giacomelli, Irene and Madsen, Jesper and Orlandi, Claudio. 2016
117
31.Interactive oracle proofs Ben-Sasson, Eli and Chiesa, Alessandro and Spooner, Nicholas. 2016   
103
32.Efficient zero-knowledge arguments for arithmetic circuits in the discrete log setting Bootle, Jonathan and Cerulli, Andrea and Chaidos, Pyrros and Groth, Jens and Petit, Christophe. 2016
101
33.Polkadot: Vision for a heterogeneous multi-chain framework Wood, Gavin. 2016
90
34.MiMC: Efficient encryption and cryptographic hashing with minimal multiplicative complexity Albrecht, Martin and Grassi, Lorenzo and Rechberger, Christian and Roy, Arnab and Tiessen, Tyge. 2016
78
35.Chain interoperability Buterin, Vitalik. 2016
76
36.On Trees, Chains and Fast Transactions in the Blockchain Kiayias, Aggelos and Panagiotakos, Giorgos. 2016
74
37.Accountable privacy for decentralized anonymous payments Garman, Christina and Green, Matthew and Miers, Ian. 2016
66
38.Bitcoin's security model revisited Sompolinsky, Yonatan and Zohar, Aviv. 2016
64
39.Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge. Tramer, Florian and Zhang, Fan and Lin, Huang and Hubaux, Jean-Pierre and Juels, Ari and Shi, Elaine. 2016
63
40.Solidus: An Incentive-compatible Cryptocurrency Based on Permissionless Byzantine Consensus Abraham, Ittai and Malkhi, Dahlia and Nayak, Kartik and Ren, Ling and Spiegelman, Alexander. 2016
62
41.Flare: An approach to routing in lightning network Prihodko, Pavel and Zhigulin, Slava and Sahno, Mykola and Ostrovskiy, Aleksei and Osuntokun, Olaoluwa. 2016
60
42.Towards bitcoin payment networks McCorry, Patrick and M\"oser, Malte and Shahandasti, Siamak F and Hao, Feng. 2016
60
43.Cosmos: A network of distributed ledgers Kwon, Jae and Buchman, Ethan. 2016  
59
44.EthIKS: Using Ethereum to audit a CONIKS key transparency log Bonneau, Joseph. 2016
57
45.Setting standards for altering and undoing smart contracts Marino, Bill and Juels, Ari. 2016
53
46.Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks Boneh, Dan and Corrigan-Gibbs, Henry and Schechter, Stuart. 2016
47
47.Bitcoin covenants M\"oser, Malte and Eyal, Ittay and Sirer, Emin G\"un. 2016
44
48.Strong federations: An interoperable blockchain solution to centralized third-party risks Dilley, Johnny and Poelstra, Andrew and Wilkins, Jonathan and Piekarska, Marta and Gorlick, Ben and Friedenbach, Mark. 2016
42
49.When cryptocurrencies mine their own business Teutsch, Jason and Jain, Sanjay and Saxena, Prateek. 2016
40
50.Listening to whispers of ripple: Linking wallets and deanonymizing transactions in the ripple network Moreno-Sanchez, Pedro and Zafar, Muhammad Bilal and Kate, Aniket. 2016
39
51.Zero-Collateral Lotteries in Bitcoin and Ethereum Miller, Andrew and Bentov, Iddo. 2016
35
52.Proofs of Proofs of Work with Sublinear Complexity Kiayias, Aggelos and Lamprou, Nikolaos and Stouka, Aikaterini-Panagiota. 2016
34
53.IKP: Turning a PKI Around with Blockchains Stephanos Matsumoto and Raphael M. Reischuk. 2016
33
54.Quasi-linear size zero knowledge from linear-algebraic PCPs Ben-Sasson, Eli and Chiesa, Alessandro and Gabizon, Ariel and Virza, Madars. 2016
31
55.Interledger: Creating a standard for payments Hope-Bailie, Adrian and Thomas, Stefan. 2016
30
56.Refund attacks on Bitcoin’s payment protocol McCorry, Patrick and Shahandashti, Siamak F and Hao, Feng. 2016
29
57.Improving Authenticated Dynamic Dictionaries, with Applications to Cryptocurrencies Reyzin, Leonid and Meshkov, Dmitry and Chepurnoy, Alexander and Ivanov, Sasha. 2016
27
58.SPECTRE: Serialization of Proof-of-work Events: Confirming Transactions via Recursive Elections Sompolinsky, Yonatan and Lewenberg, Yoad and Zohar, Aviv. 2016
27
59.Why buy when you can rent? bribery attacks on bitcoin consensus Bonneau, Joseph and Felten, Edward W and Goldfeder, Steven and Kroll, Joshua A and Narayanan, Arvind. 2016
26
60.Service-Oriented Sharding with Aspen Gencer, Adem Efe and van Renesse, Robbert and Sirer, Emin G\"un. 2016
25
61.Lightweight delegatable proofs of storage Xu, Jia and Yang, Anjia and Zhou, Jianying and Wong, Duncan S. 2016
25
62.Formal verification of Deed contract in Ethereum name service Hirai, Yoichi. 2016   
23
63.Blockchain-Free Cryptocurrencies: A Framework for Truly Decentralised Fast Transactions Boyen, Xavier and Carr, Christopher and Haines, Thomas. 2016
22
64.Mimblewimble Poelstra, Andrew. 2016  
20
65.On the (in) security of SNARKs in the presence of oracles Fiore, Dario and Nitulescu, Anca. 2016
18
66.The Bitcoin brain drain: a short paper on the use and abuse of bitcoin brain wallets Vasek, Marie and Bonneau, Joseph and Castellucci, Ryan and Keith, Cameron and Moore, Tyler. 2016
16
67.Drivechains, sidechains and hybrid 2-way peg designs Lerner, Sergio Damian. 2016
16
68.Swap, Swear, and Swindle: Incentive System for Swarm Tr\'on, Viktor and Fischer, Aron and Nagy, D\'aniel A and Felf\"oldi, Zsolt and Johnson, Nick. 2016   
10
69.Automated Verification of Electrum Wallet Mathieu Turuani and Thomas Voegtlin and Micha\"el Rusinowitch. 2016
9

Videos