MoneroResearch.info

MoneroResearch.info hosts a collection of research papers relevant to improving Monero, powered by the WIKINDX open source software.

Anyone can browse the papers. To create new entries, edit existing one, and add annotations, you must be a registered user. To register as a user, message Rucknium on Matrix at Rucknium:monero.social . At this time there is no guarantee of stability or security of this website.

Search word(s):

Hint
 Include attachments

Recent additions or edits (WIKINDX Master Bibliography)

Eagen, L. Li. E. 2022. Bulletproofs++. [Cryptology ePrint Archive, Report 2022/510].
Last edited by: Rucknium 4/5/24, 10:13 PM
Feickert, A. 2024. Bulletproofs++ review. Cypher Stack. [Peer review]
Added by: Rucknium 4/5/24, 10:08 PM
Abreu, A. S. (2023). Esquemas de privacidade nas moedas criptográficas monero e zcash. Unpublished Bacharelado Thesis, Universidade de São Paulo, São Paulo, Brazil.
Added by: Rucknium 4/5/24, 10:07 PM
Bobolz, J., Diaz, J., & Kohlweiss, M. 2024. Foundations of anonymous signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. [Cryptology ePrint Archive, Paper 2024/042].
Last edited by: Rucknium 4/5/24, 9:33 PM
Amrollahi, A., & Mofrad, M. A. 2023, Towards unraveling power dynamics in information systems research: A systematic literature review through the lens of activity theory. Paper presented at ACIS 2023.
Added by: Rucknium 4/5/24, 9:26 PM
Otávio Chervinski, J., Kreutz, D., & Yu, J. 2021, Analysis of transaction flooding attacks against monero. Paper presented at 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).
Last edited by: Rucknium 3/16/24, 1:00 PM
Duan, J., Zheng, S., Wang, W., Wang, L., Hu, X., & Gu, L. (2024). Concise ringct protocol based on linkable threshold ring signature. IEEE Transactions on Dependable and Secure Computing, (1), 1–15.
Last edited by: Jack 2/27/24, 1:42 PM
Scheid, E. J., Küng, S., Franco, M., & Stiller, B. 2023, Opening pandora's box: An analysis of the usage of the data field in blockchains. Paper presented at 2023 Fifth International Conference on Blockchain Computing and Applications (BCCA).
Last edited by: Rucknium 1/10/24, 4:59 PM
Vijayakumaran, S. 2023, Analysis of cryptonote transaction graphs using the dulmage-mendelsohn decomposition. Paper presented at 5th Conference on Advances in Financial Technologies (AFT 2023).
Last edited by: Rucknium 1/10/24, 4:22 PM
Pitu, F., & Gaitan, N. C. 2023, July Survey of security, performance, and profitability of monero: A browser-based cryptocurrency. Paper presented at 2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME).
Added by: Rucknium 1/6/24, 5:58 PM
Tiemann, T., Berndt, S., Eisenbarth, T., & Liśkiewicz, M. 2023, July “act natural!”: Exchanging private messages on public blockchains. Paper presented at 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P).
Added by: Rucknium 1/6/24, 5:53 PM
Zhang, T. (2023). Privacy evaluation of blockchain based privacy cryptocurrencies: A comparative analysis of dash, monero, verge, zcash, and grin. IEEE Transactions on Sustainable Computing, 8(4), 574–582.
Added by: Rucknium 1/6/24, 5:50 PM
Luo, M., Zhou, J., & Yang, P. (2023). Rats: A regulatory anonymous transaction system based on blockchain. Journal of Parallel and Distributed Computing, 182, 104751.
Added by: Rucknium 1/6/24, 5:44 PM
Barj, S., Ouaddah, A., & Mezrioui, A. 2023, A review of privacy-preserving cryptographic techniques used in blockchain platforms. Paper presented at Digital Technologies and Applications.
Added by: Rucknium 1/6/24, 5:36 PM
Yu, Q., Liao, S., Wang, L., Yu, Y., Zhang, L., & Zhao, Y. (2024). A regulated anonymous cryptocurrency with batch linkability. Computer Standards & Interfaces, 87, 103770.
Added by: Rucknium 1/6/24, 5:26 PM
Raikwar, M., Wu, S., & Gjosteen, K. 2023, Security model for privacy-preserving blockchain-based cryptocurrency systems. Paper presented at Network and System Security.
Added by: Rucknium 1/6/24, 5:22 PM
Wicht, F.-X., Wang, Z., Le, D. V., & Cachin, C. 2023. A transaction-level model for blockchain privacy. [Cryptology ePrint Archive, Paper 2023/1902].
Added by: Rucknium 1/6/24, 5:04 PM
Wang, X., Lin, C., Huang, X., & He, D. (2023). Anonymity-enhancing multi-hop locks for monero-enabled payment channel networks. IEEE Transactions on Information Forensics and Security, 1–1.
Added by: Rucknium 1/6/24, 4:59 PM
Zhang, J., Su, M., Liu, X., & Wang, G. 2024, May Springproofs: Efficient inner product arguments for vectors of arbitrary length. Paper presented at 2024 IEEE Symposium on Security and Privacy (SP).
Added by: Rucknium 1/6/24, 4:50 PM
Badertscher, C., Sedaghat, M., & Waldner, H. 2023. Fine-grained accountable privacy via unlinkable policy-compliant signatures. [Cryptology ePrint Archive, Paper 2023/1070].
Last edited by: Rucknium 1/5/24, 10:08 PM
Szalaty, Z. E. (2023). Privacy preserving blockchains and quantum safety. Unpublished Master's Thesis , Universitat Oberta de Catalunya.
Last edited by: Rucknium 1/5/24, 10:01 PM
Buccafurri, F., De Angelis, V., & Lazzaro, S. 2023, May 25–26 A traffic-analysis proof solution to allow k-anonymous payments in pseudonymous blockchains. Unpublished paper presented at 5th Distributed Ledger Technology Workshop.
Added by: Rucknium 1/5/24, 8:51 PM
Dijk, A., & Schröder, D. (2023). Proof of concept for a ethereum virtual machine on cryptonote. Unpublished manuscript.
Added by: Rucknium 1/5/24, 8:32 PM
Jin, R. (2023). The advance of ring confidential transactions. Highlights in Science, Engineering and Technology, 39, 1104–1110.
Last edited by: Rucknium 1/5/24, 7:46 PM
Zhang, T., Li, B., Zhu, Y., Han, T., & Wu, Q. (2023). Covert channels in blockchain and blockchain based covert communication: Overview, state-of-the-art, and future directions. Computer Communications, 205, 136–146.
Added by: Rucknium 1/5/24, 7:23 PM
Huang, K., Mu, Y., Rezaeibagha, F., Zhang, X., & Li, X. (2023). Monero with multi-grained redaction. IEEE Transactions on Dependable and Secure Computing, 1–13.
Added by: Rucknium 1/5/24, 7:16 PM
Movsowitz Davidow, D., Manevich, Y., & Toch, E. 2023, Privacy-Preserving Transactions with Verifiable Local Differential Privacy. Paper presented at 5th Conference on Advances in Financial Technologies (AFT 2023).
Added by: Rucknium 1/5/24, 7:14 PM
Su, W., & Ma, L. 2023, April A blockchain-based covert document communication system model. Paper presented at 2023 8th International Conference on Computer and Communication Systems (ICCCS).
Added by: Rucknium 1/5/24, 7:13 PM
Grunspan, C., & Perez-Marco, R. (2018). Double spend races. Int. J. Theor. Appl. Finance, 21(8), 1850053.
Last edited by: Rucknium 8/23/23, 4:52 PM
Rosenfeld, M. 2014. Analysis of hashrate-based double spending.
Last edited by: Rucknium 8/23/23, 4:48 PM
Wahrst"atter, A., Solomon, M., DiFrancesco, B., Buterin, V., & Svetinovic, D. (2023). Basesap: Modular stealth address protocol for programmable blockchains. arXiv preprint arXiv:2306.14272,
Last edited by: Jack 7/29/23, 3:09 AM
Naik, A., Yeniaras, E., Hellstern, G., Prasad, G., & Vishwakarma, S. K. L. P. (2023). From portfolio optimization to quantum blockchain and security: A systematic review of quantum computing in finance. arXiv preprint arXiv:2307.01155,
Last edited by: Jack 7/29/23, 3:07 AM
Block, A. R., Garreta, A., Katz, J., Thaler, J., Tiwari, P. R., & Zajac, M. (2023). Fiat-shamir security of fri and related snarks. Cryptology ePrint Archive,
Last edited by: Jack 7/29/23, 3:05 AM
af halo2 Protokollen, H. G. S., & Spitters, B. 2023. High assurance specification of the halo2 protocol.
Last edited by: Jack 7/29/23, 3:03 AM
Pu, S., Thyagarajan, S. A., D"ottling, N., & Hanzlik, L. (2023). Post quantum fuzzy stealth signatures and applications. Cryptology ePrint Archive,
Last edited by: Jack 7/29/23, 2:59 AM
Wang, X., Lin, L., & Wang, Y. (2023). Stealth address schemes with fast retrievability based on subgroup membership assumptions related to factoring. The Computer Journal, bxad056.
Last edited by: Jack 6/7/23, 12:27 PM
Chow, S. S., Egger, C., Lai, R. W. F., Ronge, V., & Woo, I. K. Y. (2023). On sustainable ring-based anonymous systems. Cryptology ePrint Archive,
Last edited by: Jack 6/6/23, 9:13 PM
Yu, G. (2020). Blockchain stealth address schemes. Cryptology ePrint Archive,
Last edited by: Jack 6/6/23, 9:04 PM
Fan, X. 2018, Faster dual-key stealth address for blockchain-based internet of things systems. Paper presented at Blockchain--ICBC 2018: First International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings 1.
Last edited by: Jack 6/6/23, 9:02 PM
Bunz, B., Bootle, J., Boneh, D., Poelstra, A., Wuille, P., & Maxwell, G. 2018, Bulletproofs: Short proofs for confidential transactions and more. Paper presented at 2018 IEEE Symposium on Security and Privacy (SP).
Last edited by: Jack 3/29/23, 6:22 PM
Chung, H., Han, K., Ju, C., Kim, M., & Seo, J. H. (2022). Bulletproofs+: Shorter proofs for a privacy-enhanced distributed ledger. IEEE Access, 10, 42067–42082.
Last edited by: Jack 3/29/23, 6:12 PM
Scala, E., & Mostarda, L. 2023, Range proofs with constant size and trustless setup. Paper presented at Advanced Information Networking and Applications: Proceedings of the 37th International Conference on Advanced Information Networking and Applications (AINA-2023), Volume 3.
Last edited by: Jack 3/29/23, 6:12 PM
Deng, C., You, L., Tang, X., Hu, G., & Gao, S. (2022). Cuproof: Range proof with constant size. Entropy, 24(3), 334.
Last edited by: Jack 3/28/23, 9:58 PM
Noether, S. Understanding ge fromfe frombytes vartime.
Last edited by: Jack 3/28/23, 9:26 PM
Esgin, M. F., Steinfeld, R., & Zhao, R. K. 2022, Matrict+: More efficient post-quantum private blockchain payments. Paper presented at 2022 IEEE Symposium on Security and Privacy (SP).
Last edited by: Jack 3/28/23, 8:46 PM
koe. seraphis: a privacy-preserving transaction protocol abstraction (wip).
Added by: Jack 3/8/23, 10:33 PM
Cremers, C., Loss, J., & Wagner, B. 2023. A holistic security analysis of monero transactions. [Cryptology ePrint Archive, Paper 2023/321].
Last edited by: Jack 3/8/23, 6:11 PM
Macchetti, M. 2023. A novel related nonce attack for ecdsa. [Cryptology ePrint Archive, Paper 2023/305].
Last edited by: Jack 3/6/23, 10:35 PM
Gligoroski, D. (2023). A transformation for lifting discrete logarithm based cryptography to post-quantum cryptography. Cryptology ePrint Archive,
Last edited by: Jack 3/6/23, 10:32 PM
Wicht, F.-X., Cachin, C., & Le, D. V. (2023). Blockchain privacy notions using the transaction graph model. , University of Fribourg.
Last edited by: Jack 3/6/23, 10:29 PM
WIKINDX 6.5.0 | Total resources: 210 | Username: -- | Bibliography: WIKINDX Master Bibliography | Style: American Psychological Association (APA)