bitcoin

Papers (160)
# | Title | |
1. | Bitcoin: A Peer-to-Peer Electronic Cash System Nakamoto, Satoshi. 2008 | |
2. | Decentralizing privacy: Using blockchain to protect personal data Zyskind, Guy and Nathan, Oz and others. 2015 | |
3. | Bitcoin and cryptocurrency technologies: a comprehensive introduction Narayanan, Arvind and Bonneau, Joseph and Felten, Edward and Miller, Andrew and Goldfeder, Steven. 2016 | |
4. | Mastering Bitcoin: unlocking digital cryptocurrencies Antonopoulos, Andreas M. 2014 | |
5. | Zerocash: Decentralized anonymous payments from bitcoin Ben-Sasson, Eli and Chiesa, Alessandro and Garman, Christina and Green, Matthew and Miers, Ian and Tromer, Eran and Virza, Madars. 2014 | |
6. | A fistful of bitcoins: characterizing payments among men with no names Meiklejohn, Sarah and Pomarole, Marjori and Jordan, Grant and Levchenko, Kirill and McCoy, Damon and Voelker, Geoffrey M and Savage, Stefan. 2013 | |
7. | Information propagation in the Bitcoin network Decker, Christian and Wattenhofer, Roger. 2013 | |
8. | The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication Vukolić, Marko. 2015 | |
9. | The bitcoin lightning network: Scalable off-chain instant payments Poon, Joseph and Dryja, Thaddeus. 2016 | |
10. | Bitter to better - How to make bitcoin a better currency Barber, Simon and Boyen, Xavier and Shi, Elaine and Uzun, Ersin. 2012 | |
11. | A survey on security and privacy issues of bitcoin Conti, Mauro and Kumar, E Sandeep and Lal, Chhagan and Ruj, Sushmita. 2018 | |
12. | Evaluating user privacy in bitcoin Androulaki, Elli and Karame, Ghassan O and Roeschlin, Marc and Scherer, Tobias and Capkun, Srdjan. 2013 | |
13. | The economics of Bitcoin mining, or Bitcoin in the presence of adversaries Kroll, Joshua A and Davey, Ian C and Felten, Edward W. 2013 | |
14. | Enhancing bitcoin security and performance with strong consistency via collective signing Kogias, Eleftherios Kokoris and Jovanovic, Philipp and Gailly, Nicolas and Khoffi, Ismail and Gasser, Linus and Ford, Bryan. 2016 | |
15. | Deanonymisation of clients in Bitcoin P2P network Biryukov, Alex and Khovratovich, Dmitry and Pustogarov, Ivan. 2014 | |
16. | Analysis of Hashrate-Based Double Spending Rosenfeld, Meni. 2014 | |
17. | Hijacking bitcoin: Routing attacks on cryptocurrencies Apostolaki, Maria and Zohar, Aviv and Vanbever, Laurent. 2017 | |
18. | Is bitcoin a decentralized currency? Gervais, Arthur and Karame, Ghassan O and Capkun, Vedran and Capkun, Srdjan. 2014 | |
19. | On Bitcoin and red balloons Babaioff, Moshe and Dobzinski, Shahar and Oren, Sigal and Zohar, Aviv. 2011 | |
20. | On the instability of bitcoin without the block reward Carlsten, Miles and Kalodner, Harry and Weinberg, S Matthew and Narayanan, Arvind. 2016 | |
21. | Decentralization in bitcoin and ethereum networks Gencer, Adem Efe and Basu, Soumya and Eyal, Ittay and Van Renesse, Robbert and Sirer, Emin G\"un. 2018 | |
22. | Difficulty control for blockchain-based consensus systems Kraft, Daniel. 2016 | |
23. | Bitcoin transaction malleability and MtGox Decker, Christian and Wattenhofer, Roger. 2014 | |
24. | Empirical analysis of denial-of-service attacks in the Bitcoin ecosystem Vasek, Marie and Thornton, Micah and Moore, Tyler. 2014 | |
25. | Game-theoretic analysis of DDoS attacks against Bitcoin mining pools Johnson, Benjamin and Laszka, Aron and Grossklags, Jens and Vasek, Marie and Moore, Tyler. 2014 | |
26. | TumbleBit: An untrusted Bitcoin-compatible anonymous payment hub Heilman, Ethan and Alshenibr, Leen and Baldimtsi, Foteini and Scafuro, Alessandra and Goldberg, Sharon. 2017 | |
27. | The Bitcoin Backbone Protocol with Chains of Variable Difficulty Juan A. Garay and Aggelos Kiayias and Nikos Leonardos. 2016 | |
28. | On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency Courtois, Nicolas T and Bahack, Lear. 2013 | |
29. | Simple schnorr multi-signatures with applications to bitcoin Maxwell, Gregory and Poelstra, Andrew and Seurin, Yannick and Wuille, Pieter. 2018 | |
30. | Blindly signed contracts: Anonymous on-blockchain and off-blockchain bitcoin transactions Heilman, Ethan and Baldimtsi, Foteini and Goldberg, Sharon. 2016 | |
31. | Concurrency and privacy with payment-channel networks Malavolta, Giulio and Moreno-Sanchez, Pedro and Kate, Aniket and Maffei, Matteo and Ravi, Srivatsan. 2017 | |
32. | Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security Gennaro, Rosario and Goldfeder, Steven and Narayanan, Arvind. 2016 | |
33. | Bitcoin as a Transaction Ledger: A Composable Treatment Christian Badertscher and Ueli Maurer and Daniel Tschudi and Vassilis Zikas. 2017 | |
34. | Have a Snack, Pay with Bitcoins Bamert, Tobias and Decker, Christian and Elsen, Lennart and Wattenhofer, Roger and Welten, Samuel. 2013 | |
35. | Incentive Compatibility of Bitcoin Mining Pool Reward Functions Schrijvers, Okke and Bonneau, Joseph and Boneh, Dan and Roughgarden, Tim. 2016 | |
36. | On Bitcoin as a public randomness source. Bonneau, Joseph and Clark, Jeremy and Goldfeder, Steven. 2015 | |
37. | On power splitting games in distributed computation: The case of bitcoin pooled mining Luu, Loi and Saha, Ratul and Parameshwaran, Inian and Saxena, Prateek and Hobor, Aquinas. 2015 | |
38. | Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft) Lear Bahack. 2013 | |
39. | Nonoutsourceable scratch-off puzzles to discourage bitcoin mining coalitions Miller, Andrew and Kosba, Ahmed and Katz, Jonathan and Shi, Elaine. 2015 | |
40. | Trends, tips, tolls: A longitudinal study of Bitcoin transaction fees M\"oser, Malte and B\"ohme, Rainer. 2015 | |
41. | How to use bitcoin to play decentralized poker Kumaresan, Ranjit and Moran, Tal and Bentov, Iddo. 2015 | |
42. | P2P Mixing and Unlinkable Bitcoin Transactions. Ruffing, Tim and Moreno-Sanchez, Pedro and Kate, Aniket. 2017 | |
43. | Flare: An approach to routing in lightning network Prihodko, Pavel and Zhigulin, Slava and Sahno, Mykola and Ostrovskiy, Aleksei and Osuntokun, Olaoluwa. 2016 | |
44. | Validation of decentralised smart contracts through game theory and formal methods Bigi, Giancarlo and Bracciali, Andrea and Meacci, Giovanni and Tuosto, Emilio. 2015 | |
45. | When bitcoin mining pools run dry Laszka, Aron and Johnson, Benjamin and Grossklags, Jens. 2015 | |
46. | Publish or Perish: A Backward-Compatible Defense against Selfish Mining in Bitcoin Zhang, Ren and Preneel, Bart. 2017 | |
47. | On the Malleability of Bitcoin Transactions Marcin Andrychowicz and Stefan Dziembowski and Daniel Malinowski and Lukasz Mazurek. 2015 | |
48. | Bitcoin's security model revisited Sompolinsky, Yonatan and Zohar, Aviv. 2016 | |
49. | Incentivizing blockchain forks via whale transactions Liao, Kevin and Katz, Jonathan. 2017 | |
50. | Confidential assets Poelstra, Andrew and Back, Adam and Friedenbach, Mark and Maxwell, Gregory and Wuille, Pieter. 2018 | |
51. | Towards bitcoin payment networks McCorry, Patrick and M\"oser, Malte and Shahandasti, Siamak F and Hao, Feng. 2016 | |
52. | Liar, liar, coins on fire!: Penalizing equivocation by loss of bitcoins Ruffing, Tim and Kate, Aniket and Schr\"oder, Dominique. 2015 | |
53. | Escrow protocols for cryptocurrencies: How to buy physical goods using Bitcoin Goldfeder, Steven and Bonneau, Joseph and Gennaro, Rosario and Narayanan, Arvind.. 2017 | |
54. | Bitcoin covenants M\"oser, Malte and Eyal, Ittay and Sirer, Emin G\"un. 2016 | |
55. | When cryptocurrencies mine their own business Teutsch, Jason and Jain, Sanjay and Saxena, Prateek. 2016 | |
56. | Proof-of-Burn Kostis Karantias and Aggelos Kiayias and Dionysis Zindros. 2019 | |
57. | Strong federations: An interoperable blockchain solution to centralized third-party risks Dilley, Johnny and Poelstra, Andrew and Wilkins, Jonathan and Piekarska, Marta and Gorlick, Ben and Friedenbach, Mark. 2016 | |
58. | SoK: unraveling Bitcoin smart contracts Nicola Atzei and Massimo Bartoletti and Tiziana Cimoli and Stefano Lande and Roberto Zunino. 2018 | |
59. | TxProbe: Discovering Bitcoin's Network Topology Using Orphan Transactions Delgado-Segura, Sergi and Bakshi, Surya and P\'erez-Sol\`a, Cristina and Litton, James and Pachulski, Andrew and Miller, Andrew and Bhattacharjee, Bobby. 2018 | |
60. | Hierarchical deterministic Bitcoin wallets that tolerate key leakage Gutoski, Gus and Stebila, Douglas. 2015 | |
61. | Smart contracts make bitcoin mining pools vulnerable Velner, Yaron and Teutsch, Jason and Luu, Loi. 2017 | |
62. | How did dread pirate roberts acquire and protect his bitcoin wealth? Ron, Dorit and Shamir, Adi. 2014 | |
63. | Securing Bitcoin wallets via a new DSA/ECDSA threshold signature scheme Goldfeder, Steven and Gennaro, Rosario and Kalodner, Harry and Bonneau, Joseph and Kroll, Joshua A and Felten, Edward W and Narayanan, Arvind. 2015 | |
64. | BitML: a calculus for Bitcoin smart contracts Massimo Bartoletti and Roberto Zunino. 2018 | |
65. | Atomic multi-channel updates with constant collateral in bitcoin-compatible payment-channel networks Egger, Christoph and Moreno-Sanchez, Pedro and Maffei, Matteo. 2019 | |
66. | Increasing anonymity in bitcoin Saxena, Amitabh and Misra, Janardan and Dhar, Aritra. 2014 | |
67. | FastKitten: Practical Smart Contracts on Bitcoin Das, Poulami and Eckey, Lisa and Frassetto, Tommaso and Gens, David and Host\'akov\'a, Kristina and Jauernig, Patrick and Faust, Sebastian and Sadeghi, Ahmad-Reza. 2019 | |
68. | Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies Breitner, Joachim and Heninger, Nadia. 2019 | |
69. | Modeling bitcoin contracts by timed automata Andrychowicz, Marcin and Dziembowski, Stefan and Malinowski, Daniel and Mazurek, \Lukasz. 2014 | |
70. | A user-centric system for verified identities on the bitcoin blockchain Augot, Daniel and Chabanne, Herv\'e and Chenevier, Thomas and George, William and Lambert, Laurent. 2017 | |
71. | Analysis of Nakamoto Consensus Ling Ren. 2019 | |
72. | Revisiting Difficulty Control for Blockchain Systems Meshkov, Dmitry and Chepurnoy, Alexander and Jansen, Marc. 2017 | |
73. | Anonymous alone? measuring Bitcoin’s second-generation anonymization techniques M\"oser, Malte and B\"ohme, Rainer. 2017 | |
74. | SABRE: Protecting Bitcoin against Routing Attacks Apostolaki, Maria and Marti, Gian and M\"uller, Jan and Vanbever, Laurent. 2018 | |
75. | eltoo: A simple layer2 protocol for bitcoin Decker, Christian and Russell, Rusty and Osuntokun, Olaoluwa. 2018 | |
76. | A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network Tran, Muoi and Choi, Inho and Moon, Gi Jun and Vu, Anh V and Kang, Min Suk. 2020 | |
77. | Refund attacks on Bitcoin’s payment protocol McCorry, Patrick and Shahandashti, Siamak F and Hao, Feng. 2016 | |
78. | Constant-deposit multiparty lotteries on Bitcoin Bartoletti, Massimo and Zunino, Roberto. 2017 | |
79. | Partitioning Attacks on Bitcoin: Colliding Space, Time and Logic Saad, Muhammad and Cook, Victor and Nguyen, Lan and Thai, My T and Mohaisen, Aziz. 2019 | |
80. | Committing to quantum resistance: A slow defence for Bitcoin against a fast quantum computing attack Stewart, Iain and Ilie, D and Zamyatin, Alexei and Werner, Sam and Torshizi, MF and Knottenbelt, William J. 2018 | |
81. | Tracing Transactions Across Cryptocurrency Ledgers Yousaf, Haaroon and Kappos, George and Meiklejohn, Sarah. 2018 | |
82. | Using level-1 homomorphic encryption to improve threshold dsa signatures for bitcoin wallet security Boneh, Dan and Gennaro, Rosario and Goldfeder, Steven. 2017 | |
83. | A Composable Security Treatment of the Lightning Network Aggelos Kiayias and Orfeas Stefanos Thyfronitis Litos. 2019 | |
84. | A Proof-of-Stake protocol for consensus on Bitcoin subchains Bartoletti, Massimo and Lande, Stefano and Podda, Alessandro Sebastian. 2017 | |
85. | Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management, Wallet and Cold Storage Solutions in Presence of Poor RNG Events. Courtois, Nicolas T and Valsorda, Filippo and Emirdag, Pinar. 2014 | |
86. | LockDown: Balance Availability Attack against Lightning Network Channels Cristina Pérez-Solà and Alejandro Ranchal-Pedrosa and Jordi Herrera-Joancomartí and Guillermo Navarro-Arribas and Joaquin Garcia-Alfaro. 2019 | |
87. | Hijacking Routes in Payment Channel Networks: A Predictability Tradeoff Saar Tochner and Stefan Schmid and Aviv Zohar. 2019 | |
88. | Cerberus Channels: Incentivizing Watchtowers for Bitcoin Georgia Avarikioti and Orfeas Stefanos Thyfronitis Litos and Roger Wattenhofer. 2019 | |
89. | Enhancing Bitcoin transactions with covenants O’Connor, Russell and Piekarska, Marta. 2017 | |
90. | A Quantitative Analysis of Security, Anonymity and Scalability for the Lightning Network Sergei Tikhomirov and Pedro Moreno-Sanchez and Matteo Maffei. 2020 | |
91. | Tight Consistency Bounds for Bitcoin Peter Gaži and Aggelos Kiayias and Alexander Russell. 2020 | |
92. | Flood \& Loot: A Systemic Attack On The Lightning Network Harris, Jona and Zohar, Aviv. 2020 | |
93. | Cascading Machine Learning to Attack Bitcoin Anonymity Zola, Francesco and Eguimendia, Maria and Bruse, Jan Lukas and Urrutia, Raul Orduna. 2019 | |
94. | Verifying liquidity of Bitcoin contracts Bartoletti, Massimo and Zunino, Roberto. 2018 | |
95. | Prism: Scaling Bitcoin by 10,000 x Yang, Lei and Bagaria, Vivek and Wang, Gerui and Alizadeh, Mohammad and Tse, David and Fanti, Giulia and Viswanath, Pramod. 2019 | |
96. | Developing secure Bitcoin contracts with BitML Atzei, Nicola and Bartoletti, Massimo and Lande, Stefano and Yoshida, Nobuko and Zunino, Roberto. 2019 | |
97. | Full Analysis of Nakamoto Consensus in Bounded-Delay Networks Juan Garay and Aggelos Kiayias and Nikos Leonardos. 2020 | |
98. | A Comprehensive Survey on Smart Contract Construction and Execution: Paradigms, Tools and Systems Hu, Bin and Zhang, Zongyang and Liu, Jianwei and Liu, Yizhong and Yin, Jiayuan and Lu, Rongxing and Lin, Xiaodong. 2020 | |
99. | Making bitcoin exchanges transparent Decker, Christian and Guthrie, James and Seidel, Jochen and Wattenhofer, Roger. 2015 | |
100. | A percolation model for the emergence of the Bitcoin Lightning Network Bartolucci, Silvia and Caccioli, Fabio and Vivo, Pierpaolo. 2019 | |
101. | Utreexo: A dynamic hash-based accumulator optimized for the Bitcoin UTXO set Dryja, Thaddeus. 2019 | |
102. | Ride the lightning: The game theory of payment channels Avarikioti, Zeta and Heimbach, Lioba and Wang, Yuyi and Wattenhofer, Roger. 2020 | |
103. | How to Charge Lightning Br\^anzei, Simina and Segal-Halevi, Erel and Zohar, Aviv. 2017 | |
104. | On the Necessity of a Prescribed Block Validity Consensus: Analyzing Bitcoin Unlimited Mining Protocol Ren Zhang and Bart Preneel. 2017 | |
105. | Fun with Bitcoin smart contracts Massimo Bartoletti and Tiziana Cimoli and Roberto Zunino. 2018 | |
106. | Bitcoin-Compatible Virtual Channels Lukas Aumayr and Oguzhan Ersoy and Andreas Erwig and Sebastian Faust and Kristina Hostáková and Matteo Maffei and Pedro Moreno-Sanchez and Siavash Riahi. 2020 | |
107. | TxChain: Efficient Cryptocurrency Light Clients via Contingent Transaction Aggregation Alexei Zamyatin and Zeta Avarikioti and Daniel Perez and William J. Knottenbelt. 2020 | |
108. | Splitting Payments Locally While Routing Interdimensionally Lisa Eckey and Sebastian Faust and Kristina Hostáková and Stefanie Roos. 2020 | |
109. | On Profitability of Nakamoto double spend Grunspan, Cyril and P\'erez-Marco, Ricardo. 2019 | |
110. | How perfect offline wallets can still leak bitcoin private keys Verb\"ucheln, Stephan. 2015 | |
111. | Bitcoin Transaction Networks: an overview of recent results Vallarano, Nicol\`o and Tessone, Claudio and Squartini, Tiziano. 2020 | |
112. | Blitz: Secure Multi-Hop Payments Without Two-Phase Commits Lukas Aumayr and Pedro Moreno-Sanchez and Aniket Kate and Matteo Maffei. 2021 | |
113. | Scalable lightning factories for Bitcoin Alejandro Ranchal Pedrosa and Maria Potop-Butucaru and Sara Tucci Piergiovanni. 2019 | |
114. | Lightning Factories Pedrosa, Alejandro Ranchal and Potop-Butucaru, Maria and Tucci-Piergiovanni, Sara. 2019 | |
115. | Blockchain with Varying Number of Players T-H. Hubert Chan and Naomi Ephraim and Antonio Marcedone and Andrew Morgan and Rafael Pass and Elaine Shi. 2020 | |
116. | Bitcoin-Monero Cross-chain Atomic Swap Joël Gugger. 2020 | |
117. | ShareLock: Mixing for Cryptocurrencies from Multiparty ECDSA Shlomovits, Omer and Seres, Istv\'an Andr\'as. 2019 | |
118. | Bitcoin covenants unchained Bartoletti, Massimo and Lande, Stefano and Zunino, Roberto. 2020 | |
119. | Bandwidth-Efficient Transaction Relay for Bitcoin Naumenko, Gleb and Maxwell, Gregory and Wuille, Pieter and Fedorova, Sasha and Beschastnikh, Ivan. 2019 | |
120. | Characterizing Orphan Transactions in the Bitcoin Network Imtiaz, Muhammad Anas and Starobinski, David and Trachtenberg, Ari. 2019 | |
121. | Paralysis Proofs: Safe Access-Structure Updates for Cryptocurrencies and More Fan Zhang and Philip Daian and Iddo Bentov and Ari Juels. 2018 | |
122. | A New Look at the Refund Mechanism in the Bitcoin Payment Protocol Avizheh, Sepideh and Safavi-Naini, Reihaneh and Shahandashti, Siamak F. 2018 | |
123. | The Bitcoin Backbone Protocol Against Quantum Adversaries Alexandru Cojocaru and Juan Garay and Aggelos Kiayias and Fang Song and Petros Wallden. 2019 | |
124. | Renegotiation and recursion in Bitcoin contracts Bartoletti, Massimo and Murgia, Maurizio and Zunino, Roberto. 2020 | |
125. | An empirical study of availability and reliability properties of the Bitcoin Lightning Network Waugh, Finnegan and Holz, Ralph. 2020 | |
126. | The Arwen Trading Protocols (Full Version) Ethan Heilman and Sebastien Lipmann and Sharon Goldberg. 2020 | |
127. | Bitcoin Crypto–Bounties for Quantum Capable Adversaries Dragos Ioan Ilie and Kostis Karantias and William J. Knottenbelt. 2020 | |
128. | The mathematics of Bitcoin Grunspan, Cyril and P\'erez-Marco, Ricardo. 2020 | |
129. | MoneyMorph: Censorship Resistant Rendezvous using Permissionless Cryptocurrencies Minaei, Mohsen and Moreno-Sanchez, Pedro and Kate, Aniket. 2020 | |
130. | Liquid: A Bitcoin Sidechain Nick, Jonas and Poelstra, Andrew and Sanders, Gregory. 2020 | |
131. | A Gas-Efficient Superlight Bitcoin Client in Solidity Stelios Daveas and Kostis Karantias and Aggelos Kiayias and Dionysis Zindros. 2020 | |
132. | Number of confirmation blocks for Bitcoin and GHOST consensus protocols on networks with delayed message delivery Kovalchuk, Lyudmila and Kaidalov, Dmytro and Nastenko, Andrii and Shevtsov, Oleksiy and Rodinko, Mariia and Oliynykov, Roman. 2018 | |
133. | Coalition-Safe Equilibria with Virtual Payoffs Kiayias, Aggelos and Stouka, Aikaterini-Panagiota. 2019 | |
134. | FPPW: A Fair and Privacy Preserving Watchtower For Bitcoin Arash Mirzaei and Amin Sakzad and Jiangshan Yu and Ron Steinfeld. 2021 | |
135. | Merkle Trees Optimized for Stateless Clients in Bitcoin Bailey, Bolton and Sankagiri, Suryanarayana. 2021 | |
136. | Bitcontracts: Adding Expressive Smart Contracts to Legacy Cryptocurrencies Karl Wüst and Loris Diana and Kari Kostiainen and Ghassan Karame and Sinisa Matetic and Srdjan Capkun. 2019 | |
137. | Formalizing Nakamoto-Style Proof of Stake Søren Eller Thomsen and Bas Spitters. 2020 | |
138. | Post-Quantum Security of the Bitcoin Backbone and Quantum Multi-Solution Bernoulli Search Cojocaru, Alexandru and Garay, Juan and Kiayias, Aggelos and Song, Fang and Wallden, Petros. 2020 | |
139. | Atomic Swaps between Bitcoin and Monero Hoenisch, Philipp and del Pino, Lucas Soriano. 2021 | |
140. | Analysis and Probing of Parallel Channels in the Lightning Network Alex Biryukov and Gleb Naumenko and Sergei Tikhomirov. 2021 | |
141. | Model Checking Bitcoin and other Proof-of-Work Consensus Protocols DiGiacomo-Castillo, Max and Liang, Yiyun and Pal, Advay and Mitchell, John C. 2020 | |
142. | Tracking Mixed Bitcoins Tironsakkul, Tin and Maarek, Manuel and Eross, Andrea and Just, Mike. 2020 | |
143. | On the Routing-Aware Peering against Network-Eclipse Attacks in Bitcoin Tran, Muoi and Shenoi, Akshaye and Kang, Min Suk. 2021 | |
144. | Contractvm: decentralized applications on Bitcoin Bartoletti, Massimo and Gessa, Davide and Podda, Alessandro Sebastian. 2018 | |
145. | Mimblewimble Poelstra, Andrew. 2016 | |
146. | Mixing Confidential Transactions: Comprehensive Transaction Privacy for Bitcoin. Ruffing, Tim and Moreno-Sanchez, Pedro. 2017 | |
147. | Rootstock: Bitcoin powered smart contracts Lerner, S Demian. 2015 | |
148. | Why buy when you can rent? bribery attacks on bitcoin consensus Bonneau, Joseph and Felten, Edward W and Goldfeder, Steven and Kroll, Joshua A and Narayanan, Arvind. 2016 | |
149. | 12 Angry Miners Eghbali, Aryaz and Wattenhofer, Roger. 2019 | |
150. | Committing to Quantum Resistance, Better: A Speed–and–Risk–Configurable Defence for Bitcoin against a Fast Quantum Computing Attack Dragos Ioan Ilie and William J. Knottenbelt and Iain Stewart. 2020 | |
151. | Generalized Bitcoin-Compatible Channels Lukas Aumayr and Oguzhan Ersoy and Andreas Erwig and Sebastian Faust and Kristina Hostakova and Matteo Maffei and Pedro Moreno-Sanchez and Siavash Riahi. 2020 | |
152. | Custody Protocols Using Bitcoin Vaults Swambo, Jacob and Hommel, Spencer and McElrath, Bob and Bishop, Bryan. 2020 | |
153. | Leveraging Weight Functions for Optimistic Responsiveness in Blockchains Simon Holmgaard Kamp and Bernardo Magri and Christian Matt and Jesper Buus Nielsen and Søren Eller Thomsen and Daniel Tschudi. 2020 | |
154. | Timelocked Bribes Majid Khabbazian and Tejaswi Nadahalli and Roger Wattenhofer. 2020 | |
155. | Verification of recursive Bitcoin contracts Bartoletti, Massimo and Lande, Stefano and Murgia, Maurizio and Zunino, Roberto. 2020 | |
156. | The Bitcoin Hunter: Detecting Bitcoin Traffic over Encrypted Channels Rezaei, Fatemeh and Naseri, Shahrzad and Eyal, Ittay and Houmansadr, Amir. 2020 | |
157. | The Bitcoin Cash Backbone Protocol Juan Garay and Yu Shen. 2021 | |
158. | Formal Modelling and Security Analysis of Bitcoin's Payment Protocol Modesti, Paolo and Shahandashti, Siamak F and McCorry, Patrick and Hao, Feng. 2021 | |
159. | Semantics and complexity of bitcoin script Reisenegger Butr\'on, Thomas. 2021 | |
160. | Bitcoin's Latency--Security Analysis Made Simple Guo, Dongning and Ren, Ling. 2022 |
Videos
–
Links
–