A curated list of papers ordered by number of citations. Last updated 2020-05-28

#Title
Citations
1.Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security Gennaro, Rosario and Goldfeder, Steven and Narayanan, Arvind. 2016
102
2.Fast secure two-party ECDSA signing Lindell, Yehuda. 2017
54
3.Secure two-party threshold ECDSA from ECDSA assumptions Doerner, Jack and Kondi, Yashvanth and Lee, Eysa and Shelat, Abhi. 2018
36
4.Securing Bitcoin wallets via a new DSA/ECDSA threshold signature scheme Goldfeder, Steven and Gennaro, Rosario and Kalodner, Harry and Bonneau, Joseph and Kroll, Joshua A and Felten, Edward W and Narayanan, Arvind. 2015
35
5.Fast secure multiparty ecdsa with practical distributed key generation and applications to cryptocurrency custody Lindell, Yehuda and Nof, Ariel. 2018
34
6.Fast multiparty threshold ecdsa with fast trustless setup Gennaro, Rosario and Goldfeder, Steven. 2018
31
7.Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability Giulio Malavolta and Pedro Moreno-Sanchez and Clara Schneidewind and Aniket Kate and Matteo Maffei. 2019
28
8.Threshold ECDSA from ECDSA Assumptions: The Multiparty Case Doerner, Jack and Kondi, Yashvanth and Lee, Eysa and Shelat, Abhi. 2019
13
9.Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies Breitner, Joachim and Heninger, Nadia. 2019
11
10.Using level-1 homomorphic encryption to improve threshold dsa signatures for bitcoin wallet security Boneh, Dan and Gennaro, Rosario and Goldfeder, Steven. 2017
10
11.Two-party ECDSA from hash proof systems and efficient instantiations Castagnos, Guilhem and Catalano, Dario and Laguillaumie, Fabien and Savasta, Federico and Tucker, Ida. 2019
6
12.ShareLock: Mixing for Cryptocurrencies from Multiparty ECDSA Shlomovits, Omer and Seres, Istv\'an Andr\'as. 2019
2
13.Bandwidth-efficient threshold EC-DSA Guilhem Castagnos and Dario Catalano and Fabien Laguillaumie and Federico Savasta and Ida Tucker. 2020
2
14.A Formal Treatment of Deterministic Wallets Das, Poulami and Faust, Sebastian and Loss, Julian. 2019
1
15.A Tale of Three Signatures: practical attack of ECDSA with wNAF Gabrielle De Micheli and Rémi Piau and Cécile Pierrot. 2019
0
16.Refresh When You Wake Up: Proactive Threshold Wallets with Offline Devices Yashvanth Kondi and Bernardo Magri and Claudio Orlandi and Omer Shlomovits. 2019
0
17.An airdrop that preserves recipient privacy⋆ Wahby, Riad S and Boneh, Dan and Jeffrey, Christopher and Poon, Joseph. 2020
0
18.Fast Threshold ECDSA with Honest Majority Ivan Damgård and Thomas Pelle Jakobsen and Jesper Buus Nielsen and Jakob Illeborg Pagter and Michael Bæksvang Østergård. 2020
0
19.Threshold ECDSA for Decentralized Asset Custody Adam Gągol and Damian Straszak. 2020
0
20.UC Non-Interactive, Proactive, Threshold ECDSA Ran Canetti and Nikolaos Makriyannis and Udi Peled. 2020
0
21.One Round Threshold ECDSA with Identifiable Abort Rosario Gennaro and Steven Goldfeder. 2020
0
22.LadderLeak: Breaking ECDSA With Less Than One Bit Of Nonce Leakage Diego F. Aranha and Felipe Rodrigues Novaes and Akira Takahashi and Mehdi Tibouchi and Yuval Yarom. 2020
0