A curated list of papers ordered by number of citations. Last updated 2020-02-25

1.The ring of gyges: Investigating the future of criminal smart contracts Juels, Ari and Kosba, Ahmed and Shi, Elaine. 2016
2.How did dread pirate roberts acquire and protect his bitcoin wealth? Ron, Dorit and Shamir, Adi. 2014
3.ZombieCoin: powering next-generation botnets with bitcoin Ali, Syed Taha and McCorry, Patrick and Lee, Peter Hyun-Jeen and Hao, Feng. 2015
4.Managing Secrets with Consensus Networks: Fairness, Ransomware and Access Control. Kaptchuk, Gabriel and Miers, Ian and Green, Matthew. 2017
5.Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies Aljosha Judmayer and Nicholas Stifter and Alexei Zamyatin and Itay Tsabary and Ittay Eyal and Peter Gazi and Sarah Meiklejohn and Edgar Weippl. 2019
6.Effective Cryptocurrency Regulation Through Blacklisting M\"oser, Malte and Narayanan, Arvind. 2019
7.Just the Tip of the Iceberg: Internet-Scale Exploitation of Routers for Cryptojacking Bijmans, Hugo LJ and Booij, Tim M and Doerr, Christian. 2019