A curated list of papers ordered by number of citations. Last updated 2019-11-11

#Title
Citations
1.Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security Gennaro, Rosario and Goldfeder, Steven and Narayanan, Arvind. 2016
78
2.Simple schnorr multi-signatures with applications to bitcoin Maxwell, Gregory and Poelstra, Andrew and Seurin, Yannick and Wuille, Pieter. 2018
37
3.Fast secure two-party ECDSA signing Lindell, Yehuda. 2017
32
4.Securing Bitcoin wallets via a new DSA/ECDSA threshold signature scheme Goldfeder, Steven and Gennaro, Rosario and Kalodner, Harry and Bonneau, Joseph and Kroll, Joshua A and Felten, Edward W and Narayanan, Arvind. 2015
28
5.Hierarchical deterministic Bitcoin wallets that tolerate key leakage Gutoski, Gus and Stebila, Douglas. 2015
21
6.Secure two-party threshold ECDSA from ECDSA assumptions Doerner, Jack and Kondi, Yashvanth and Lee, Eysa and Shelat, Abhi. 2018
19
7.Calypso: Auditable sharing of private data over blockchains Kokoris-Kogias, Eleftherios and Alp, Enis Ceyhun and Siby, Sandra Deepthy and Gailly, Nicolas and Gasser, Linus and Jovanovic, Philipp and Syta, Ewa and Ford, Bryan. 2018
17
8.Fast secure multiparty ecdsa with practical distributed key generation and applications to cryptocurrency custody Lindell, Yehuda and Nof, Ariel. 2018
14
9.Fast multiparty threshold ecdsa with fast trustless setup Gennaro, Rosario and Goldfeder, Steven. 2018
12
10.Using level-1 homomorphic encryption to improve threshold dsa signatures for bitcoin wallet security Boneh, Dan and Gennaro, Rosario and Goldfeder, Steven. 2017
5
11.BeatCoin: Leaking Private Keys from Air-Gapped Cryptocurrency Wallets Guri, Mordechai. 2018
4
12.Threshold ECDSA from ECDSA Assumptions: The Multiparty Case Doerner, Jack and Kondi, Yashvanth and Lee, Eysa and Shelat, Abhi. 2019
3
13.Paralysis Proofs: Safe Access-Structure Updates for Cryptocurrencies and More Fan Zhang and Philip Daian and Iddo Bentov and Ari Juels. 2018
2
14.CHURP: Dynamic-Committee Proactive Secret Sharing. Maram, Sai Krishna Deepak and Zhang, Fan and Wang, Lun and Low, Andrew and Zhang, Yupeng and Juels, Ari and Song, Dawn. 2019
1
15.Two-party ECDSA from hash proof systems and efficient instantiations Castagnos, Guilhem and Catalano, Dario and Laguillaumie, Fabien and Savasta, Federico and Tucker, Ida. 2019
0