Papers (273)

#Title
Citations
1.Decentralized reputation Tassos Dimitriou. 2020
23
2.Streamlet: Textbook Streamlined Blockchains Benjamin Y Chan and Elaine Shi. 2020  
12
3.Coda: Decentralized Cryptocurrency at Scale Joseph Bonneau and Izaak Meckler and Vanishree Rao and Evan Shapiro. 2020  
10
4.A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network Tran, Muoi and Choi, Inho and Moon, Gi Jun and Vu, Anh V and Kang, Min Suk. 2020
9
5.Bandwidth-efficient threshold EC-DSA Guilhem Castagnos and Dario Catalano and Fabien Laguillaumie and Federico Savasta and Ida Tucker. 2020  
9
6.One-shot Signatures and Applications to Hybrid Quantum/Classical Authentication Amos, Ryan and Georgiou, Marios and Kiayias, Aggelos and Zhandry, Mark. 2020
9
7.Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit Qin, Kaihua and Zhou, Liyi and Livshits, Benjamin and Gervais, Arthur. 2020  
9
8.Threshold ECDSA for Decentralized Asset Custody Adam Gągol and Damian Straszak. 2020
9
9.Out of Oddity -- New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems Tim Beyne and Anne Canteaut and Itai Dinur and Maria Eichlseder and Gregor Leander and Gaëtan Leurent and María Naya-Plasencia and Léo Perrin and Yu Sasaki and Yosuke Todo and Friedrich Wiemer. 2020
8
10.The Decentralized Financial Crisis: Attacking DeFi Gudgeon, Lewis and Perez, Daniel and Harz, Dominik and Gervais, Arthur and Livshits, Benjamin. 2020  
8
11.Order-Fairness for Byzantine Consensus Mahimna Kelkar and Fan Zhang and Steven Goldfeder and Ari Juels. 2020
8
12.Fast Threshold ECDSA with Honest Majority Ivan Damgård and Thomas Pelle Jakobsen and Jesper Buus Nielsen and Jakob Illeborg Pagter and Michael Bæksvang Østergård. 2020
8
13.Lift-and-Shift: Obtaining Simulation Extractable Subversion and Updatable SNARKs Generically Bezhad Abdolmaleki and Sebastian Ramacher and Daniel Slamanig. 2020
7
14.Toward Active and Passive Confidentiality Attacks On Cryptocurrency Off-Chain Networks Nisslmueller, Utz and Foerster, Klaus-Tycho and Schmid, Stefan and Decker, Christian. 2020
7
15.One Round Threshold ECDSA with Identifiable Abort Rosario Gennaro and Steven Goldfeder. 2020  
7
16.Everything is a Race and Nakamoto Always Wins Amir Dembo and Sreeram Kannan and Ertem Nusret Tas and David Tse and Pramod Viswanath and Xuechao Wang and Ofer Zeitouni. 2020
7
17.A Survey on Blockchain Interoperability: Past, Present, and Future Trends Belchior, Rafael and Vasconcelos, Andr\'e and Guerreiro, S\'ergio and Correia, Miguel. 2020
7
18.Mind the Middle Layer: The HADES Design Strategy Revisited Nathan Keller and Asaf Rosemarin. 2020
6
19.An Empirical Analysis of Privacy in the Lightning Network Kappos, George and Yousaf, Haaroon and Piotrowska, Ania and Kanjalkar, Sanket and Delgado-Segura, Sergi and Miller, Andrew and Meiklejohn, Sarah. 2020
6
20.Albert, an intermediate smart-contract language for the Tezos blockchain Bernardo, Bruno and Cauderlier, Rapha\"el and Pesin, Basile and Tesson, Julien. 2020
5
21.The Arwen Trading Protocols (Full Version) Ethan Heilman and Sebastien Lipmann and Sharon Goldberg. 2020
5
22.Streamlined Blockchains: A Simple and Elegant Approach (A Tutorial and Survey) Elaine Shi. 2020
5
23.Trustless Groups of Unknown Order with Hyperelliptic Curves Samuel Dobson and Steven D. Galbraith. 2020  
5
24.Remote Side-Channel Attacks on Anonymous Transactions Florian Tramèr and Dan Boneh and Kenneth G. Paterson. 2020
5
25.Full Analysis of Nakamoto Consensus in Bounded-Delay Networks Juan Garay and Aggelos Kiayias and Nikos Leonardos. 2020
5
26.Hydra: Fast Isomorphic State Channels Chakravarty, Manuel MT and Coretti, Sandro and Fitzi, Matthias and Gazi, Peter and Kant, Philipp and Kiayias, Aggelos and Russell, Alexander. 2020
5
27.AAVE: Protocol Whitepaper V1.0 Usal, Ernesto. 2020
5
28.ConCert: A Smart Contract Certification Framework in Coq Annenkov, Danil and Nielsen, Jakob Botsch and Spitters, Bas. 2020
4
29.Securing Proof-of-Work Ledgers via Checkpointing Dimitris Karakostas and Aggelos Kiayias. 2020
4
30.An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC Maria Eichlseder and Lorenzo Grassi and Reinhard Lüftenegger and Morten Øygarden and Christian Rechberger and Markus Schofnegger and Qingju Wang. 2020
4
31.On the Profitability of Selfish Mining Against Multiple Difficulty Adjustment Algorithms Michael Davidson and Tyler Diamond. 2020
4
32.Optimal Good-case Latency for Byzantine Broadcast and State Machine Replication Abraham, Ittai and Nayak, Kartik and Ren, Ling and Xiang, Zhuolun. 2020
4
33.Can a Blockchain Keep a Secret? Benhamouda, Fabrice and Gentry, Craig and Gorbunov, Sergey and Halevi, Shai and Krawczyk, Hugo and Lin, Chengyu and Rabin, Tal and Reyzin, Leonid. 2020
4
34.Proof-Carrying Data from Accumulation Schemes Benedikt Bünz and Alessandro Chiesa and Pratyush Mishra and Nicholas Spooner. 2020  
4
35.Improved Price Oracles: Constant Function Market Makers Angeris, Guillermo and Chitra, Tarun. 2020
4
36.Uniswap v2 Core Adams, Hayden and Robinson, Dan. 2020
4
37.Scalable Open-Vote Network on Ethereum Mohamed Seifelnasr and Hisham S. Galal and Amr M. Youssef. 2020
3
38.Network-Agnostic State Machine Replication Blum, Erica and Katz, Jonathan and Loss, Julian. 2020
3
39.Generic-Group Delay Functions Require Hidden-Order Groups Lior Rotem and Gil Segev and Ido Shahaf. 2020
3
40.Empirical Measurements on Pricing Oracles and Decentralized Governance for Stablecoins Gu, Wanyun and Raghuvanshi, Anika and Boneh, Dan. 2020
3
41.Vector Commitment Techniques and Applications to Verifiable Decentralized Storage Matteo Campanelli and Dario Fiore and Nicola Greco and Dimitris Kolonelos and Luca Nizzardo. 2020  
3
42.MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs Ahmed Kosba and Dimitrios Papadopoulos and Charalampos Papamanthou and Dawn Song. 2020
3
43.Smart Contract Derivatives Kostis Karantias and Aggelos Kiayias and Dionysis Zindros. 2020
3
44.Combining GHOST and Casper Buterin, Vitalik and Hernandez, Diego and Kamphefner, Thor and Pham, Khiem and Qiao, Zhi and Ryan, Danny and Sin, Juhyeok and Wang, Ying and Zhang, Yan X. 2020
3
45.Vyper: A Security Comparison with Solidity Based on Common Vulnerabilities Kaleem, Mudabbir and Laszka, Aron. 2020
3
46.A Quantitative Analysis of Security, Anonymity and Scalability for the Lightning Network Sergei Tikhomirov and Pedro Moreno-Sanchez and Matteo Maffei. 2020
3
47.Pointproofs: Aggregating Proofs for Multiple Vector Commitments Sergey Gorbunov and Leonid Reyzin and Hoeteck Wee and Zhenfei Zhang. 2020
3
48.Efficient Post-quantum SNARKs for RSIS and RLWE and Their Applications to Privacy Boschini, Cecilia and Camenisch, Jan and Ovsiankin, Max and Spooner, Nicholas. 2020  
3
49.Generalized Bitcoin-Compatible Channels Lukas Aumayr and Oguzhan Ersoy and Andreas Erwig and Sebastian Faust and Kristina Hostakova and Matteo Maffei and Pedro Moreno-Sanchez and Siavash Riahi. 2020
3
50.Aggregatable Subvector Commitments for Stateless Cryptocurrencies Alin Tomescu and Ittai Abraham and Vitalik Buterin and Justin Drake and Dankrad Feist and Dmitry Khovratovich. 2020
3
51.Resource-Restricted Cryptography: Revisiting MPC Bounds in the Proof-of-Work Era Garay, Juan and Kiayias, Aggelos and Ostrovsky, Rafail M and Panagiotakos, Giorgos and Zikas, Vassilis. 2020
3
52.Splitting Payments Locally While Routing Interdimensionally Lisa Eckey and Sebastian Faust and Kristina Hostáková and Stefanie Roos. 2020
3
53.Expected Constant Round Byzantine Broadcast under Dishonest Majority Jun Wan and Hanshen Xiao and Elaine Shi and Srinivas Devadas. 2020
3
54.plookup: A simplified polynomial protocol for lookup tables Ariel Gabizon and Zachary J. Williamson. 2020
3
55.Minerva: The curse of ECDSA nonces Jan Jancar and Vladimir Sedlacek and Petr Svenda and Marek Sys. 2020
3
56.On the Security of Time-Locked Puzzles and Timed Commitments Jonathan Katz and Julian Loss and Jiayu Xu. 2020
3
57.Flood \& Loot: A Systemic Attack On The Lightning Network Harris, Jona and Zohar, Aviv. 2020  
3
58.Ride the lightning: The game theory of payment channels Avarikioti, Zeta and Heimbach, Lioba and Wang, Yuyi and Wattenhofer, Roger. 2020
3
59.MuSig-DN: Schnorr Multi-Signatures with Verifiably Deterministic Nonces Jonas Nick and Tim Ruffing and Yannick Seurin and Pieter Wuille. 2020  
3
60.Consistency in Proof-of-Stake Blockchains with Concurrent Honest Slot Leaders Aggelos Kiayias and Saad Quader and Alexander Russell. 2020
2
61.Reparo: Publicly Verifiable Layer to Repair Blockchains Thyagarajan, Sri Aravinda Krishnan and Bhat, Adithya and Magri, Bernardo and Tschudi, Daniel and Kate, Aniket. 2020
2
62.Triptych: logarithmic-sized linkable ring signatures with applications Sarang Noether and Brandon Goodell. 2020
2
63.Short Selling Attack: A Self-Destructive But Profitable 51% Attack On PoS Blockchains Suhyeon Lee and Seungjoo Kim. 2020
2
64.Single Secret Leader Election Boneh, Dan and Eskandarian, Saba and Hanzlik, Lucjan and Greco, Nicola. 2020
2
65.Formalising and verifying smart contracts with Solidifier: a bounded model checker for Solidity Antonino, Pedro and Roscoe, AW. 2020
2
66.Proof of Necessary Work: Succinct State Verification with Fairness Guarantees Assimakis Kattis and Joseph Bonneau. 2020
2
67.Zendoo: a zk-SNARK Verifiable Cross-Chain Transfer Protocol Enabling Decoupled and Decentralized Sidechains Alberto Garoffolo and Dmytro Kaidalov and Roman Oliynykov. 2020
2
68.Pricing ASICs for Cryptocurrency Mining Yaish, Aviv and Zohar, Aviv. 2020
2
69.The security of Groups of Unknown Order based on Jacobians of Hyperelliptic Curves Jonathan Lee. 2020
2
70."Many-out-of-Many" Proofs with Applications to Anonymous Zether Benjamin E. Diamond. 2020
2
71.Fully Distributed Verifiable Random Functions and their Application to Decentralised Random Beacons David Galindo and Jia Liu and Mihai Ordean and Jin-Mann Wong. 2020
2
72.Expected Linear Round Synchronization: The Missing Link for Linear Byzantine SMR Naor, Oded and Keidar, Idit. 2020
2
73.Triptych-2: efficient proofs for confidential transactions Noether, Sarang. 2020  
2
74.Accountability in a Permissioned Blockchain: Formal Analysis of Hyperledger Fabric Ralf Kuesters and Daniel Rausch and Mike Simon. 2020
2
75.UTxO-vs account-based smart contract blockchain programming paradigms Brunjes, Lars and Gabbay, Murdoch J. 2020
2
76.UC Non-Interactive, Proactive, Threshold ECDSA Ran Canetti and Nikolaos Makriyannis and Udi Peled. 2020
2
77.Analyzing Smart Contracts: From EVM to a sound Control-Flow Graph Albert, Elvira and Correas, Jes\'us and Gordillo, Pablo and Rom\'an-D\'\iez, Guillermo and Rubio, Albert. 2020
2
78.SoK: Lifting Transformations for Simulation Extractable Subversion and Updatable SNARKs⋆ Abdolmaleki, Behzad and Ramacher, Sebastian and Slamanig, Daniel. 2020
2
79.eThor: Practical and Provably Sound Static Analysis of Ethereum Smart Contracts Schneidewind, Clara and Grishchenko, Ilya and Scherer, Markus and Maffei, Matteo. 2020
2
80.TxChain: Efficient Cryptocurrency Light Clients via Contingent Transaction Aggregation Alexei Zamyatin and Zeta Avarikioti and Daniel Perez and William J. Knottenbelt. 2020
2
81.Bitcoin-Compatible Virtual Channels Lukas Aumayr and Oguzhan Ersoy and Andreas Erwig and Sebastian Faust and Kristina Hostáková and Matteo Maffei and Pedro Moreno-Sanchez and Siavash Riahi. 2020
2
82.Why Do Smart Contracts Self-Destruct? Investigating the Selfdestruct Function on Ethereum Chen, Jiachi and Xia, Xin and Lo, David and Grundy, John. 2020
2
83.Optimized and secure pairing-friendly elliptic curves suitable for one layer proof composition Youssef El Housni and Aurore Guillevic. 2020  
2
84.LadderLeak: Breaking ECDSA With Less Than One Bit Of Nonce Leakage Diego F. Aranha and Felipe Rodrigues Novaes and Akira Takahashi and Mehdi Tibouchi and Yuval Yarom. 2020  
2
85.Overview of Polkadot and its Design Considerations Jeff Burdges and Alfonso Cevallos and Peter Czaban and Rob Habermeier and Syed Hosseini and Fabio Lama and Handan Kilinc Alper and Ximin Luo and Fatemeh Shirazi and Alistair Stewart and Gavin Wood. 2020
2
86.A non-PCP Approach to Succinct Quantum-Safe Zero-Knowledge Jonathan Bootle and Vadim Lyubashevsky and Ngoc Khanh Nguyen and Gregor Seiler. 2020
2
87.How to Keep a Secret and Share a Public Key (Using Polynomial Commitments) Nicolescu, Ioan Alin Tomescu. 2020
2
88.MAD-HTLC: Because HTLC is Crazy-Cheap to Attack Itay Tsabary and Matan Yechieli and Ittay Eyal. 2020  
2
89.Stablecoins 2.0: Economic Foundations and Risk-based Models Ariah Klages-Mundt and Dominik Harz and Lewis Gudgeon and Jun-You Liu and Andreea Minca. 2020
2
90.Diogenes: Lightweight Scalable RSA Modulus Generation with a Dishonest Majority Megan Chen and Carmit Hazay and Yuval Ishai and Yuriy Kashnikov and Daniele Micciancio and Tarik Riviere and abhi shelat and Muthu Venkitasubramaniam and Ruihan Wang. 2020  
2
91.Verifiable state machines: Proofs that untrusted services operate correctly Srinath Setty and Sebastian Angel and Jonathan Lee. 2020
2
92.Accountability in a Permissioned Blockchain: Formal Analysis of Hyperledger Fabric Ralf Kuesters and Daniel Rausch and Mike Simon. 2020
2
93.CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability Deepak Maram and Harjasleen Malvai and Fan Zhang and Nerla Jean-Louis and Alexander Frolov and Tyler Kell and Tyrone Lobban and Christine Moy and Ari Juels and Andrew Miller. 2020
2
94.Native Custom Tokens in the Extended UTXO Model Chakravarty, Manuel MT and Chapman, James and MacKenzie, Kenneth and Melkonian, Orestis and M\"uller, Jann and Jones, Michael Peyton and Vinogradova, Polina and Wadler, Philip. 2020
2
95.Proof-of-Stake Blockchain Protocols with Near-Optimal Throughput Matthias Fitzi and Peter Gaži and Aggelos Kiayias and Alexander Russell. 2020
1
96.Lower Bounds for Off-Chain Protocols: Exploring the Limits of Plasma Stefan Dziembowski and Grzegorz Fabiański and Sebastian Faust and Siavash Riahi. 2020
1
97.WIP: Finding Bugs Automatically in Smart Contracts with Parameterized Invariants Bernardi, Thomas and Dor, Nurit and Fedotov, Anastasia and Grossman, Shelly and Immerman, Neil and Jackson, Daniel and Nutz, Alex and Oppenheim, Lior and Pistiner, Or and Rinetzky, Noam and others. 2020
1
98.The mathematics of Bitcoin Grunspan, Cyril and P\'erez-Marco, Ricardo. 2020
1
99.Renegotiation and recursion in Bitcoin contracts Bartoletti, Massimo and Murgia, Maurizio and Zunino, Roberto. 2020
1
100.Domain Specific Language for Smart Contract Development W\"ohrer, Maximilian and Zdun, Uwe. 2020
1
101.Efficient polynomial commitment schemes for multiple points and polynomials Dan Boneh and Justin Drake and Ben Fisch and Ariel Gabizon. 2020
1
102.Constructing hidden order groups using genus three Jacobians Steve Thakur. 2020
1
103.zkRelay: Facilitating Sidechains using zkSNARK-based Chain-Relays Martin Westerkamp and Jacob Eberhardt. 2020
1
104.Resources: A Safe Language Abstraction for Money Blackshear, Sam and Dill, David L and Qadeer, Shaz and Barrett, Clark W and Mitchell, John C and Padon, Oded and Zohar, Yoni. 2020
1
105.Mining for Privacy: How to Bootstrap a Snarky Blockchain Thomas Kerber and Aggelos Kiayias and Markulf Kohlweiss. 2020
1
106.A PoR/PoS-Hybrid Blockchain: Proof of Reputation with Nakamoto Fallback Leonard Kleinrock and Rafail Ostrovsky and Vassilis Zikas. 2020
1
107.A Note on Low Order Assumptions in RSA groups István András Seres and Péter Burcsi. 2020
1
108.Updateable Inner Product Argument with Logarithmic Verifier and Applications Daza, Vanesa and R\`afols, Carla and Zacharakis, Alexandros. 2020
1
109.Termination of Ethereum's Smart Contracts Genet, Thomas and Jensen, Thomas and Sauvage, Justine. 2020
1
110.Storing and Retrieving Secrets on a Blockchain Vipul Goyal and Abhiram Kothapalli and Elisaweta Masserova and Bryan Parno and Yifan Song. 2020
1
111.Implementing a Smart Contract PKI Patsonakis, Christos and Samari, Katerina and Kiayias, Aggelos and Roussopoulos, Mema. 2020
1
112.Anonymous Lottery in the Proof-of-Stake Setting Foteini Baldimtsi and Varun Madathil and Alessandra Scafuro and Linfeng Zhou. 2020
1
113.Formal Verification of Solidity contracts in Event-B Zhu, Jian and Hu, Kai and Filali, Mamoun and Bodeveix, Jean-Paul and Talpin, Jean-Pierre. 2020
1
114.MoneyMorph: Censorship Resistant Rendezvous using Permissionless Cryptocurrencies Minaei, Mohsen and Moreno-Sanchez, Pedro and Kate, Aniket. 2020
1
115.EthScope: A Transaction-centric Security Analytics Framework to Detect Malicious Smart Contracts on Ethereum Wu, Lei and Wu, Siwei and Zhou, Yajin and Li, Runhuai and Wang, Zhi and Luo, Xiapu and Wang, Cong and Ren, Kui. 2020
1
116.Unbounded Simulation-Sound Subversion Resistant Quasi-Adaptive NIZK Proofs and Applications to Modular zk-SNARKs Behzad Abdolmaleki and Daniel Slamanig. 2020
1
117.Formal Specification and Verification of Solidity Contracts with Events Hajdu, Akos and Jovanovic, Dejan and Ciocarlie, Gabriela. 2020
1
118.Tezla, an Intermediate Representation for Static Analysis of Michelson Smart Contracts Santos Reis, Jo\~ao and Crocker, Paul and Melo de Sousa, Sim\~ao. 2020
1
119.WhylSon: Proving your Michelson Smart Contracts in Why3 da Horta, Lu\'\is Pedro Arrojado and Reis, Jo\~ao Santos and Pereira, M\'ario and de Sousa, Sim\~ao Melo. 2020  
1
120.Ledger Combiners for Fast Settlement Matthias Fitzi and Peter Gazi and Aggelos Kiayias and Alexander Russell. 2020
1
121.Tight Consistency Bounds for Bitcoin Peter Gaži and Aggelos Kiayias and Alexander Russell. 2020
1
122.Blockchain is Watching You: Profiling and Deanonymizing Ethereum Users B\'eres, Ferenc and Seres, Istv\'an Andr\'as and Bencz\'ur, Andr\'as A and Quintyne-Collins, Mikerah. 2020
1
123.Blockchain with Varying Number of Players T-H. Hubert Chan and Naomi Ephraim and Antonio Marcedone and Andrew Morgan and Rafael Pass and Elaine Shi. 2020
1
124.Bitcoin covenants unchained Bartoletti, Massimo and Lande, Stefano and Zunino, Roberto. 2020
1
125.Smart Contract modeling and verification techniques: A survey Imeri, Adnan and Agoulmine, Nazim and Khadraoui, Djamel. 2020
1
126.Fast amortized Kate proofs Dankrad Feist and Dmitry Khovratovich. 2020
1
127.Fluid MPC: Secure Multiparty Computation with Dynamic Participants Arka Rai Choudhuri and Aarushi Goel and Matthew Green and Abhishek Jain and Gabriel Kaptchuk. 2020
1
128.The Provable Security of Ed25519: Theory and Practice Jacqueline Brendel and Cas Cremers and Dennis Jackson and Mang Zhao. 2020
1
129.Cross-Layer Deanonymization Methods in the Lightning Protocol Romiti, Matteo and Victor, Friedhelm and Moreno-Sanchez, Pedro and Haslhofer, Bernhard and Maffei, Matteo. 2020
1
130.Threshold ECDSA with an Offline Recovery Party Battagliola, Michele and Longo, Riccardo and Meneghetti, Alessio and Sala, Massimiliano. 2020
1
131.Non-Atomic Payment Splitting in Channel Networks Dziembowski, Stefan and Kedzior, Pawe\l. 2020
1
132.A Gas-Efficient Superlight Bitcoin Client in Solidity Stelios Daveas and Kostis Karantias and Aggelos Kiayias and Dionysis Zindros. 2020  
1
133.STARK Friendly Hash -- Survey and Recommendation Eli Ben-Sasson and Lior Goldberg and David Levit. 2020
1
134.A Survey of Smart Contract Formal Specification and Verification Tolmach, Palina and Li, Yi and Lin, Shang-Wei and Liu, Yang and Li, Zengxiang. 2020
1
135.Aardvark: A Concurrent Authenticated Dictionary with Short Proofs Derek Leung and Yossi Gilad and Sergey Gorbunov and Leonid Reyzin and Nickolai Zeldovich. 2020
1
136.Lightweight Virtual Payment Channels Maxim Jourenko and Mario Larangeira and Keisuke Tanaka. 2020
1
137.SPARKs: Succinct Parallelizable Arguments of Knowledge Naomi Ephraim and Cody Freitag and Ilan Komargodski and Rafael Pass. 2020
1
138.Attacking Threshold Wallets Jean-Philippe Aumasson and Omer Shlomovits. 2020
1
139.Decentralized Cross-Blockchain Asset Transfers Sigwart, Marten and Frauenthaler, Philipp and Spanring, Christof and Schulte, Stefan. 2020
1
140.The Provable Security of Ed25519: Theory and Practice Brendel, Jacqueline and Cremers, Cas and Jackson, Dennis and Zhao, Mang. 2020
1
141.Dory: Efficient, Transparent arguments for Generalised Inner Products and Polynomial Commitments Jonathan Lee. 2020
1
142.MuSig2: Simple Two-Round Schnorr Multi-Signatures Jonas Nick and Tim Ruffing and Yannick Seurin. 2020
1
143.Taming the many EdDSAs Konstantinos Chalkias and François Garillot and Valeria Nikolaenko. 2020
1
144.KVaC: Key-Value Commitments for Blockchains and Beyond Shashank Agrawal and Srinivasan Raghuraman. 2020
1
145.Tendermint blockchain synchronization: formal specification and model checking Braithwaite, Sean and Buchman, Ethan and Konnov, Igor and Milosevic, Zarko and Stoilkovska, Ilina and Widder, Josef and Zamfir, Anca. 2020
1
146.Economic Principles of PoPCoin, a Democratic Time-based Cryptocurrency Zhang, Haoqian and Basescu, Cristina and Ford, Bryan. 2020
1
147.Kachina--Foundations of Private Smart Contracts Kerber, Thomas and Kiayias, Aggelos and Kohlweiss, Markulf. 2020
0
148.Bypassing Non-Outsourceable Proof-of-Work Schemes Using Collateralized Smart Contracts Alexander Chepurnoy and Amitabh Saxena. 2020
0
149.Formal specification of a security framework for smart contracts Mandrykin, Mikhail and O'Shannessy, Jake and Payne, Jacob and Shchepetkov, Ilya. 2020
0
150.Anonymous Tokens with Private Metadata Bit Ben Kreuter and Tancrede Lepoint and Michele Orru and Mariana Raykova. 2020
0
151.Baby SNARK (do do dodo dodo) Andrew Miller and Ye Zhang and Sanket Kanjalkar. 2020  
0
152.Ethna: Channel Network with Dynamic Internal Payment Splitting Stefan Dziembowski and Paweł Kędzior. 2020
0
153.Bitcoin Crypto–Bounties for Quantum Capable Adversaries Dragos Ioan Ilie and Kostis Karantias and William J. Knottenbelt. 2020
0
154.Committing to Quantum Resistance, Better: A Speed–and–Risk–Configurable Defence for Bitcoin against a Fast Quantum Computing Attack Dragos Ioan Ilie and William J. Knottenbelt and Iain Stewart. 2020
0
155.An airdrop that preserves recipient privacy⋆ Wahby, Riad S and Boneh, Dan and Jeffrey, Christopher and Poon, Joseph. 2020  
0
156.Proof of Storage-Time: Efficiently Checking Continuous Data Availability Ateniese, Giuseppe and Chen, Long and Etemad, Mohammad and Tang, Qiang. 2020
0
157.Optimized Collision Search for STARK-Friendly Hash Challenge Candidates Udovenko, Aleksei. 2020
0
158.Multichain-MWPoW: A $p/2$ Adversary Power Resistant Blockchain Sharding Approach to a Decentralised Autonomous Organisation Architecture Yibin Xu and Yangyu Huang and Jianhua Shao and George Theodorakopoulos. 2020
0
159.FastPay: High-Performance Byzantine Fault Tolerant Settlement Baudet, Mathieu and Danezis, George and Sonnino, Alberto. 2020
0
160.Plumo: Towards Scalable Interoperable Blockchains Using Ultra Light Validation Systems Gabizon, Ariel and Gurkan, Kobi and Jovanovic, Philipp and Konstantopoulos, Georgios and Oines, Asa and Olszewski, Marek and Straka, Michael and Tromer, Eran. 2020  
0
161.Promise: Leveraging Future Gains for Collateral Reduction Dominik Harz and Lewis Gudgeon and Rami Khalil and Alexei Zamyatin. 2020
0
162.Tiramisu: Black-Box Simulation Extractable NIZKs in the Updatable CRS Model Karim Baghery and Mahdi Sedaghat. 2020
0
163.Bitcoin Transaction Networks: an overview of recent results Vallarano, Nicol\`o and Tessone, Claudio and Squartini, Tiziano. 2020
0
164.Prism Removes Consensus Bottleneck for Smart Contracts Wang, Gerui and Wang, Shuo and Bagaria, Vivek and Tse, David and Viswanath, Pramod. 2020
0
165.ZeroJoin: Combining ZeroCoin and CoinJoin Alexander Chepurnoy and Amitabh Saxena. 2020
0
166.Account Management in Proof of Stake Ledgers Dimitris Karakostas and Aggelos Kiayias and Mario Larangeira. 2020
0
167.Alt-Coin Traceability Claire Ye and Chinedu Ojukwu and Anthony Hsu and Ruiqi Hu. 2020
0
168.Proposal: The Turbo-PLONK program syntaxfor specifying SNARK programs Ariel Gabizon and Zachary J. Williamson. 2020  
0
169.Community Proposal: A Benchmarking Framework for (Zero-Knowledge) Proof Systems Benarroch, Daniel and Nicolas, Aur\'elien and Thaler, Justin and Tromer, Eran. 2020
0
170.Permissionless Consensus in the Resource Model Benjamin Terner. 2020
0
171.Layer 2 Atomic Cross-Blockchain Function Calls Robinson, Peter and Ramesh, Raghavendra. 2020
0
172.Performance Overhead of Atomic Crosschain Transactions Robinson, Peter. 2020
0
173.Distributed Auditing Proofs of Liabilities Konstantinos Chalkias and Kevin Lewi and Payman Mohassel and Valeria Nikolaenko. 2020
0
174.Custody Protocols Using Bitcoin Vaults Swambo, Jacob and Hommel, Spencer and McElrath, Bob and Bishop, Bryan. 2020
0
175.Zero-Knowledge Proofs for Set Membership: Efficient, Succinct, Modular Benarroch, Daniel and Campanelli, Matteo and Fiore, Dario and Gurkan, Kobi and Kolonelos, Dimitris. 2020  
0
176.Liquid: A Bitcoin Sidechain Nick, Jonas and Poelstra, Andrew and Sanders, Gregory. 2020
0
177.Game theoretical framework for analyzing Blockchains Robustness Paolo Zappalà and Marianna Belotti and Maria Potop-Butucaru and Stefano Secci. 2020
0
178.On Subversion-Resistant SNARKs Behzad Abdolmaleki and Helger Lipmaa and Janno Siim and Michał Zając. 2020
0
179.About Blockchain Interoperability Pascal Lafourcade and Marius Lombard-Platet. 2020
0
180.Towards Smart Hybrid Fuzzing for Smart Contracts Torres, Christof Ferreira and Iannillo, Antonio Ken and Gervais, Arthur and State, Radu. 2020
0
181.Smart Contract With Secret Parameters Thiercelin, Marin and Cheng, Chen-Mou and Miyaji, Atsuko and Vaudenay, Serge. 2020
0
182.zkInterface, a standard tool for zero-knowledge interoperability Daniel Benarroch and Kobi Gurkan and Ron Kahat and Aurélien Nicolas 1 and Eran Tromer. 2020   
0
183.TinyRAM Architecture Specification v2. 000 Chiesa, Eli Ben-Sasson Alessandro and Genkin, Daniel and Tromer, Eran and Virza, Madars. 2020
0
184.Succinct Diophantine-Satisfiability Arguments Patrick Towa and Damien Vergnaud. 2020
0
185.On the Confidentiality of Amounts in Grin Suyash Bagad and Saravanan Vijayakumaran. 2020
0
186.Reputable List Curation from Decentralized Voting Elizabeth C. Crites and Mary Maller and Sarah Meiklejohn and Rebekah Mercer. 2020
0
187.Rational Behavior in Committee-Based Blockchains Yackolley Amoussou-Guenou and Bruno Biais and Maria Potop-Butucaru and Sara Tucci-Piergiovanni. 2020
0
188.Leveraging Weight Functions for Optimistic Responsiveness in Blockchains Simon Holmgaard Kamp and Bernardo Magri and Christian Matt and Jesper Buus Nielsen and Søren Eller Thomsen and Daniel Tschudi. 2020
0
189.Bulletproofs+: Shorter Proofs for Privacy-Enhanced Distributed Ledger Heewon Chung and Kyoohyung Han and Chanyang Ju and Myungsun Kim and Jae Hong Seo. 2020
0
190.Dynamic proofs of retrievability with low server storage Anthoine, Gaspard and Dumas, Jean-Guillaume and Hanling, Michael and de Jonghe, M\'elanie and Maignan, Aude and Pernet, Cl\'ement and Roche, Daniel S. 2020
0
191.BTSO: A Blockchain Protocol Based on Reconfigurable Byzantine Consensus Abraham, Ittai and Malkhi, Dahlia and Nayak, Kartik and Rowadoski, Listovich and Spiegelman, Alexander. 2020  
0
192.A Simple Range Proof From Polynomial Commitments Dan Boneh and Ben Fisch and Ariel Gabizon and Zac Williamson. 2020  
0
193.Timelocked Bribes Majid Khabbazian and Tejaswi Nadahalli and Roger Wattenhofer. 2020
0
194.Dynamic Universal Accumulator with Batch Update over Bilinear Groups Giuseppe Vitto and Alex Biryukov. 2020
0
195.Anonymous probabilistic payment in payment hub Tatsuo Mitani and Akira Otsuka. 2020
0
196.Compressing Proofs of $k$-Out-Of-$n$ Partial Knowledge Thomas Attema and Ronald Cramer and Serge Fehr. 2020
0
197.Time-release Cryptography from Minimal Circuit Assumptions Samuel Jaques and Hart Montgomery and Arnab Roy. 2020
0
198.An Empirical Study of Ownership, Typestate, and Assets in the Obsidian Smart Contract Language Coblenz, Michael and Aldrich, Jonathan and Sunshine, Joshua and Myers, Brad. 2020
0
199.Groth16 SNARKs are Randomizable and (Weakly) Simulation Extractable Mikhail Volkhov and Markulf Kohlweiss. 2020
0
200.PayPlace: A Scalable Sidechain Protocol for Flexible Payment Mechanisms in Blockchain-based Marketplaces Harishankar, Madhumitha and Iyer, Sriram V and Laszka, Aron and Joe-Wong, Carlee and Tague, Patrick. 2020
0
201.An empirical study of availability and reliability properties of the Bitcoin Lightning Network Waugh, Finnegan and Holz, Ralph. 2020
0
202.Virtual ASICs: Generalized Proof-of-Stake Mining in Cryptocurrencies Chaya Ganesh and Claudio Orlandi and Daniel Tschudi and Aviv Zohar. 2020
0
203.Flexible Formality Practical Experience with Agile Formal Methods Szamotulski, Marcin and Vinogradova, Polina. 2020
0
204.Proofs of Useless Work--Positive and Negative Results for Wasteless Mining Systems Dotan, Maya and Tochner, Saar. 2020
0
205.zk-SNARKs Analysis and Implementation on Ethereum Ballesteros Rodr\'\iguez, Alberto. 2020
0
206.SmartBugs: A Framework to Analyze Solidity Smart Contracts Ferreira, Jo\~ao F and Cruz, Pedro and Durieux, Thomas and Abreu, Rui. 2020  
0
207.Updatable Blockchains⋆ Ciampi, Michele and Karayannidis, Nikos and Kiayias, Aggelos and Zindros, Dionysis. 2020
0
208.Model Checking Bitcoin and other Proof-of-Work Consensus Protocols DiGiacomo-Castillo, Max and Liang, Yiyun and Pal, Advay and Mitchell, John C. 2020
0
209.Undercutting Bitcoin Is Not Profitable Tiantian Gong and Mohsen Minaei and Wenhai Sun and Aniket Kate. 2020
0
210.Performance Trade-offs in Design of MimbleWimble Proofs of Reserves Suyash Bagad and Saravanan Vijayakumaran. 2020
0
211.Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits Chenkai Weng and Kang Yang and Jonathan Katz and Xiao Wang. 2020
0
212.Design choices for Central Bank Digital Currency Allen, Sarah and Capkun, Srdjan and Eyal, Ittay and Fanti, Giulia and Ford, Bryan and Grimmelmann, James and Juels, Ari and Kostiainen, Kari and Meiklejohn, Sarah and Miller, Andrew and others. 2020
0
213.JugglingSwap: Scriptless Atomic Cross-Chain Swaps Shlomovits, Omer and Leiba, Oded. 2020
0
214.Formalizing Nakamoto-Style Proof of Stake Søren Eller Thomsen and Bas Spitters. 2020
0
215.UTXOma: UTXO with Multi-Asset Support Chakravarty, Manuel MT and Chapman, James and MacKenzie, Kenneth and Melkonian, Orestis and M\"uller, Jann and Jones, Michael Peyton and Vinogradova, Polina and Wadler, Philip and Zahnentferner, Joachim. 2020
0
216.Synthetix Synthetix. 2020
0
217.Zecale: Reconciling Privacy and Scalability on Ethereum Rondelet, Antoine. 2020
0
218.Foundations of DistributedConsensus and Blockchains Elaine Shi. 2020
0
219.GasMet: Profiling Gas Leaks in the Deployment of Solidity Smart Contracts Canfora, Gerardo and Di Sorbo, Andrea and Laudanna, Sonia and Vacca, Anna and Visaggio, Corrado A. 2020
0
220.Compiling a Higher-Order Smart Contract Language to LLVM Nagaraj, Vaivaswatha and Johannsen, Jacob and Trunov, Anton and P\^\irlea, George and Kumar, Amrit and Sergey, Ilya. 2020
0
221.FileBounty: Fair Data Exchange Janin, Simon and Qin, Kaihua and Mamageishvili, Akaki and Gervais, Arthur. 2020
0
222.Polynomial IOPs for Linear Algebra Relations Alan Szepieniec. 2020
0
223.Consensus Redux: Distributed Ledgers in the Face of Adversarial Supremacy Badertscher, Christian and Gazi, Peter and Kiayias, Aggelos and Russell, Alexander and Zikas, Vassilis. 2020
0
224.A Comprehensive Survey on Smart Contract Construction and Execution: Paradigms, Tools and Systems Hu, Bin and Zhang, Zongyang and Liu, Jianwei and Liu, Yizhong and Yin, Jiayuan and Lu, Rongxing and Lin, Xiaodong. 2020
0
225.Lunar: a Toolbox for More Efficient Universal and Updatable zkSNARKs and Commit-and-Prove Extensions Matteo Campanelli and Antonio Faonio and Dario Fiore and Anaïs Querol and Hadrián Rodríguez. 2020
0
226.High-Frequency Trading on Decentralized On-Chain Exchanges Zhou, Liyi and Qin, Kaihua and Torres, Christof Ferreira and Le, Duc V and Gervais, Arthur. 2020
0
227.Tracking Mixed Bitcoins Tironsakkul, Tin and Maarek, Manuel and Eross, Andrea and Just, Mike. 2020
0
228.Information Theoretic HotStuff Abraham, Ittai and Stern, Gilad. 2020
0
229.A formal model of Algorand smart contracts Bartoletti, Massimo and Bracciali, Andrea and Lepore, Cristian and Scalas, Alceste and Zunino, Roberto. 2020
0
230.The Velvet Path to Superlight Blockchain Clients Kiayias, Aggelos and Polydouri, Andrianna and Zindros, Dionysis. 2020
0
231.Impossibility on the Schnorr Signature from the One-more DL Assumption in the Non-programmable Random Oracle Model Masayuki Fukumitsu and Shingo Hasegawa. 2020
0
232.Authenticated Dictionaries with Cross-Incremental Proof (Dis)aggregation Alin Tomescu and Yu Xia and Zachary Newman. 2020
0
233.EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts Rodler, Michael and Li, Wenting and Karame, Ghassan O and Davi, Lucas. 2020
0
234.Quarks: Quadruple-efficient transparent zkSNARKs Srinath Setty and Jonathan Lee. 2020
0
235.Liquidations: DeFi on a Knife-edge Perez, Daniel and Werner, Sam M and Xu, Jiahua and Livshits, Benjamin. 2020
0
236.Simulation Extractable Versions of Groth’s zk-SNARK Revisited Karim Baghery and Zaira Pindado and Carla Ràfols. 2020
0
237.On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work Kai-Min Chung and Serge Fehr and Yu-Hsuan Huang and Tai-Ning Liao. 2020
0
238.A note on the low order assumption in class group of an imaginary quadratic number fields Karim Belabas and Thorsten Kleinjung and Antonio Sanso and Benjamin Wesolowski. 2020
0
239.A Tendermint Light Client Braithwaite, Sean and Buchman, Ethan and Khoffi, Ismail and Konnov, Igor and Milosevic, Zarko and Ruetschi, Romain and Widder, Josef. 2020
0
240.Round-Efficient Byzantine Broadcast under Strongly Adaptive and Majority Corruptions Wan, Jun and Xiao, Hanshen and Devadas, Srinivas and Shi, Elaine. 2020
0
241.Smart Contract Languages: A Thorough Comparison Gramlich, Benjamin. 2020
0
242.Succinct Non-Interactive Arguments for Arithmetic Circuits Spooner, Nicholas. 2020
0
243.Multi-Shard Private Transactions for Permissioned Blockchains Androulaki, Elli and De Caro, Angelo and Elkhiyaoui, Kaoutar and Gorenflo, Christian and Sorniotti, Alessandro and Vukolic, Marko. 2020
0
244.Liquidity Provider Returns in Geometric Mean Markets Evans, Alex. 2020
0
245.PoSAT: Proof-of-Work Availability andUnpredictability, without the Work Deb, Soubhik and Kannan, Sreeram and Tse, David. 2020
0
246.Doubly Efficient Interactive Proofs for General Arithmetic Circuits with Linear Prover Time Jiaheng Zhang and Weijie Wang and Yinuo Zhang and Yupeng Zhang. 2020
0
247.Payment Trees: Low Collateral Payments for Payment Channel Networks Maxim Jourenko and Mario Larangeira and Keisuke Tanaka. 2020
0
248.A Direct Construction for Asymptotically Optimal zkSNARKs Abhiram Kothapalli and Elisaweta Masserova and Bryan Parno. 2020
0
249.AMR: Autonomous Coin Mixer with Privacy Preserving Reward Distribution Le, Duc V and Gervais, Arthur. 2020
0
250.Practical Post-Quantum Few-Time Verifiable Random Function with Applications to Algorand Esgin, Muhammed F and Kuchta, Veronika and Sakzad, Amin and Steinfeld, Ron and Zhang, Zhenfei and Sun, Shifeng and Chu, Shumo. 2020
0
251.Bitcoin--Monero Cross-chain Atomic Swap Gugger, Jo\"el. 2020
0
252.Accumulators in (and Beyond) Generic Groups: Non-Trivial Batch Verification Requires Interaction Schul-Ganz, Gili and Segev, Gil. 2020
0
253.Formal Verification of Ethereum Smart Contracts Using Isabelle/HOL Ribeiro, Maria and Adao, Pedro and Mateus, Paulo. 2020
0
254.The Checkpointed Longest Chain: User-dependent Adaptivity and Finality Sankagiri, Suryanarayana and Wang, Xuechao and Kannan, Sreeram and Viswanath, Pramod. 2020
0
255.On Succinct Non-InteractiveZero-Knowledge Protocols UnderWeaker Trust Assumptions Behzad Abdolmaleki. 2020
0
256.Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments Erkan Tairi and Pedro Moreno-Sanchez and Matteo Maffei. 2020
0
257.A Survey of ECDSA Threshold Signing Jean-Philippe Aumasson and Adrian Hamelink and Omer Shlomovits. 2020
0
258.SodsMPC: FSM based Anonymous and Private Quantum-safe Smart Contracts Shlomi Dolev and Ziyu Wang. 2020
0
259.Ethereum Smart Contracts Optimization Margherita Renieri. 2020
0
260.WI is Almost Enough: Contingent Payment All Over Again Nguyen, Ky and Ambrona, Miguel and Abe, Masayuki. 2020
0
261.Ligero++: A New Optimized Sublinear IOP Bhadauria, Rishabh and Fang, Zhiyong and Hazay, Carmit and Venkitasubramaniam, Muthuramakrishnan and Xie, Tiancheng and Zhang, Yupeng. 2020
0
262.UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts Canetti, Ran and Gennaro, Rosario and Goldfeder, Steven and Makriyannis, Nikolaos and Peled, Udi. 2020
0
263.Liquidity Provision by Automated Market Makers Jun Aoyagi. 2020
0
264.Mac n Cheese: Zero-Knowledge Proofs for Arithmetic Circuits with Nested Disjunctions Baum, Carsten and Malozemoff, Alex J and Rosen, Marc and Scholl, Peter. 2020
0
265.Barriers for Succinct Arguments in the Random Oracle Model Alessandro Chiesa and Eylon Yogev. 2020
0
266.Publicly Verifiable Zero Knowledge from (Collapsing) Blockchains Scafuro, Alessandra and Siniscalchi, Luisa and Visconti, Ivan. 2020
0
267.Load Balancing for Sharded Blockchains Okanami, Naoya and Nakamura, Ryuya and Nishide, Takashi. 2020
0
268.TaiJi: Longest Chain Availability with BFT Fast Confirmation Songze Li and David Tse. 2020
0
269.Linear-Time Arguments with Sublinear Verification from Tensor Codes Bootle, Jonathan and Chiesa, Alessandro and Groth, Jens. 2020
0
270.Lower bounds for the depth of modular squaring Benjamin Wesolowski and Ryan Williams. 2020
0
271.PERIMETER: A network-layer attack on the anonymity of cryptocurrencies Maire, Maria Apostolaki Cedric and Vanbever, Laurent. 2020
0
272.PayMo: Payment Channels For Monero Sri Aravinda Krishnan Thyagarajan and Giulio Malavolta and Fritz Schmidt and Dominique Schröder. 2020
0
273.SoK: Cyber-Attack Taxonomy of Distributed Ledger- and Legacy Systems-based Financial Infrastructures Ralph Ankele and Kai Nahrgang and Branka Stojanovic and Atta Badii. 2020
0

Videos