MoneroResearch.info hosts a collection of research papers relevant to improving Monero, powered by the WIKINDX open source software.
Anyone can browse the papers. To create new entries, edit existing one, and add annotations, you must be a registered user. To register as a user, message Rucknium on Matrix at Rucknium:monero.social . At this time there is no guarantee of stability or security of this website.
Recent additions or edits (WIKINDX Master Bibliography)
Thakore, V., & Vijayakumaran, S. (2025). MProve-Nova: A Privacy-Preserving Proof of Reserves Protocol for Monero, Proceedings on Privacy Enhancing Technologies, 2025(2), 582–606. |
|
Added by: Rucknium 16/04/2025, 15:19 |
|
Duan, J., Wang, W., Wang, L., & Gu, L. (2025). Transitioning RingCT Accounts: From Classical to Post-Quantum Security, IEEE Internet of Things Journal, 12(2), 2090–2105. |
|
Added by: Rucknium 16/04/2025, 15:10 |
|
Buccafurri, F., De Angelis, V., & Lazzaro, S. 2024, October, K-Anonymous Payments in Pseudonymous Blockchains. Paper presented at 2024 20th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). |
|
Added by: Rucknium 16/04/2025, 15:07 |
|
Dingledine, R., & Mathewson, N. (2005). Anonymity Loves Company: Usability and the Network Effect. In Designing Security Systems That People Can Use (pp. 547–559). O'Reilly.. |
|
Added by: Rucknium 16/04/2025, 14:59 |
|
Acquisti, A., Dingledine, R., & Syverson, P. 2003, On the Economics of Anonymity. Paper presented at Financial Cryptography. |
|
Added by: Rucknium 16/04/2025, 13:54 |
|
Švarcmajer, M., Köhler, M., Marinčić, J., & Perić, J. 2025, Utilizing Faculty Computers for Cryptocurrency Validation and Mining During Idle Time. Paper presented at 33rd International Conference on Organization and Technology of Maintenance (OTO 2024). |
|
Added by: Rucknium 15/04/2025, 15:17 |
|
Yang, X., Xu, L., & Zhu, L. (2025). De-anonymizing Monero: A Maximum Weighted Matching-Based Approach, IEEE Transactions on Information Forensics and Security. |
|
Added by: Jack Last edited by: Jack 15/04/2025, 14:25 |
|
ACK-J, A.-J. 2022. LORD OF THE RINGS: AN EMPIRICAL ANALYSIS OF MONERO’S RING SIGNATURE RESILIENCE TO ARTIFICIALLY INTELLIGENT ATTACKS. Multidisciplinary Academic Grants in Cryptocurrencies. |
|
Added by: Jack Last edited by: Jack 15/04/2025, 14:14 |
|
Bassa, A. (2025). Soundness Proof for an Interactive Protocol for the Discrete Logarithm Relation. Unpublished manuscript. |
|
Added by: Rucknium 02/04/2025, 18:11 |
|
Salazar, R., Slaughter, F., & Szramowski, L. (2025). Veridise Logarithmic Derivative Review. Unpublished manuscript. |
|
Added by: Rucknium 18/03/2025, 18:58 |
|
Babb, J., Goodell, B., Parker, L., Salazar, R., Slaughter, F., & Szramowski, L. (2025). FROSTLASS: Flexible Ring-Oriented Schnorr-like Thresholdized Linkably Anonymous Signature Scheme. Unpublished manuscript. |
|
Added by: Rucknium Last edited by: Rucknium 18/03/2025, 18:49 |
|
Dutta, A., & Vijayakumaran, S. 2019, June, MProve: A Proof of Reserves Protocol for Monero Exchanges. Paper presented at 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). |
|
Added by: Rucknium 18/03/2025, 18:22 |
|
Aeeneh, S., Chervinski, J. O., Yu, J., & Zlatanov, N. 2021, May, New Attacks on the Untraceability of Transactions in CryptoNote-Style Blockchains. Paper presented at 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). |
|
Added by: Rucknium 04/03/2025, 19:18 |
|
Kumar, A., Fischer, C., Tople, S., & Saxena, P. 2017, September, A Traceability Analysis of Monero’s Blockchain. Paper presented at European Symposium on Research in Computer Security (ESORICS). |
|
Added by: Rucknium Last edited by: Rucknium 04/03/2025, 19:08 |
|
Feickert, A. (2024). Zano d/v-CLSAG review. Unpublished manuscript. |
|
Added by: Rucknium 04/03/2025, 16:05 |
|
Chiang, J. H.-Y., Damgård, I., Duro, W. R., Engan, S., Kolby, S., & Scholl, P. 2025. Post-Quantum Threshold Ring Signature Applications from VOLE-in-the-Head. [Cryptology {ePrint} Archive, Paper 2025/113]. |
|
Added by: Rucknium Last edited by: Rucknium 27/02/2025, 17:15 |
|
Goodell, B., Salazar, R., & Slaughter, F. 2025. Uniformly Most Powerful Tests for Ad Hoc Transactions in Monero. [Cryptology {ePrint} Archive, Paper 2025/221]. |
|
Added by: Rucknium Last edited by: Rucknium 27/02/2025, 16:32 |
|
Baseri, Y., Hafid, A., Shahsavari, Y., Makrakis, D., & Khodaiemehr, H. 2025. Blockchain Security Risk Assessment in Quantum Era, Migration Strategies and Proactive Defense. |
|
Added by: Rucknium Last edited by: Rucknium 27/02/2025, 16:26 |
|
Nick, J., Eagen, L., & Linus, R. 2025. Shielded CSV: Private and Efficient Client-Side Validation. [Cryptology {ePrint} Archive, Paper 2025/068]. |
|
Added by: Rucknium Last edited by: Rucknium 27/02/2025, 16:24 |
|
Mikic, M., Srbakoski, M., & Praska, S. 2025. Post-Quantum Stealth Address Protocols. |
|
Added by: Rucknium Last edited by: Rucknium 27/02/2025, 16:20 |
|
Shi, R., Peng, Z., Lan, L., Ge, Y., Liu, P., & Wang, Q., et al. 2025, February 24–28, Eclipse Attacks on Monero’s Peer-to-Peer Network. Unpublished paper presented at Network and Distributed System Security (NDSS) Symposium 2025. |
|
Added by: Rucknium 27/02/2025, 16:05 |
|
Bonhomme, S., Jochmans, K., & Robin, J.-M. (2016). Non-parametric estimation of finite mixtures from repeated measurements, Journal of the Royal Statistical Society. Series B (Statistical Methodology), 78(1), 211–229. |
|
Added by: Rucknium 22/02/2025, 23:13 |
|
Patra, R. K., & Sen, B. (2016). Estimation of a two-component mixture model with applications to multiple testing, Journal of the Royal Statistical Society. Series B (Statistical Methodology), 78(4), 869–893. |
|
Added by: Rucknium 22/02/2025, 23:11 |
|
Guo, S. 2024, Secure Monero on Corrupted Machines with Reverse Firewalls. Paper presented at International Conference on Data Security and Privacy Protection. |
|
Added by: Jack Last edited by: Jack 17/01/2025, 17:31 |
|
Papadoulis, G. (2025). Privacy and auditability in decentralized payment systems. |
|
Added by: Jack Last edited by: Jack 17/01/2025, 17:28 |
|
Goodell, B. (2024). Security Review - Generalized Bulletproofs. Unpublished manuscript. |
|
Added by: Rucknium 06/12/2024, 17:56 |
|
Slaughter, F., Goodell, B., & Salazar, R. (2024). An Audit of the FCMP++ Addressing Protocol: CARROT. Unpublished manuscript. |
|
Added by: Rucknium 27/11/2024, 15:40 |
|
Bassa, A. (2024). On the Use of Logarithmic Derivatives in Eagen’s Proof of Sums of Points. Unpublished manuscript. |
|
Added by: Rucknium Last edited by: Rucknium 27/11/2024, 15:39 |
|
Hammad, N., & Victor, F. 2024. Monero Traceability Heuristics: Wallet Application Bugs and the Mordinal-P2Pool Perspective. |
|
Added by: opal 25/09/2024, 21:35 |
|
Zheng, J., Huang, H., Li, C., Zheng, Z., & Guo, S. 2021, Revisiting Double-Spending Attacks on the Bitcoin Blockchain: New Findings. Paper presented at 2021 IEEE/ACM 29th International Symposium on Quality of Service (IWQOS). |
|
Added by: Jack Last edited by: Jack 25/09/2024, 21:33 |
|
Jiang, Y., & Zhang, J. (2024). Profitability Analysis of Time-Restricted Double-Spending Attack on PoW-Based Large Scale Blockchain With the Aid of Multiple Types of Attacks, IEEE Transactions on Information Forensics and Security, 19, 8155–8171. |
|
Added by: Jack Last edited by: Jack 19/09/2024, 22:59 |
|
Grunspan, C., & Perez-Marco, R. (2022). On Profitability of Nakamoto Double Spend, Probability in the Engineering and Informational Sciences, 36(3), 732–746. |
|
Added by: Rucknium Last edited by: Rucknium 14/09/2024, 14:08 |
|
Grunspan, C., & Perez-Marco, R. 2017. Satoshi Risk Tables. |
|
Added by: Rucknium Last edited by: Rucknium 13/09/2024, 13:39 |
|
Feickert, A., & Isthmus. (2024). Monero output lock analysis. Unpublished manuscript. |
|
Added by: Rucknium 04/09/2024, 16:56 |
|
Goodell, B. (2024). History and state of Monero security analysis. Unpublished manuscript. |
|
Added by: opal 20/08/2024, 14:44 |
|
Feickert, A. (2024). Salvium review. Unpublished manuscript. |
|
Added by: opal Last edited by: opal 20/08/2024, 14:33 |
|
Franzoni, F., & Daza, V. (2022). SoK: Network-Level Attacks on the Bitcoin P2P Network, IEEE Access, 10, 94924–94962. |
|
Added by: Rucknium 09/08/2024, 19:50 |
|
Franzoni, F., Salleras, X., & Daza, V. (2022). AToM: Active topology monitoring for the bitcoin peer-to-peer network, Peer-to-Peer Networking and Applications, 15(1), 408–425. |
|
Added by: Rucknium 09/08/2024, 18:32 |
|
Feickert, A. (2024). Veridise divisor report review. Unpublished manuscript. |
|
Added by: Rucknium 09/08/2024, 18:07 |
|
Bassa, A. (2024). Soundness Proof for Eagen’s Proof of Sums of Points. Unpublished manuscript. |
|
Added by: Rucknium 09/08/2024, 18:02 |
|
Campanelli, M., Hall-Andersen, M., & Kamp, S. H. 2022. Curve Trees: Practical and Transparent Zero-Knowledge Accumulators. [Cryptology ePrint Archive, Paper 2022/756]. |
|
Added by: Rucknium Last edited by: Rucknium 09/08/2024, 17:59 |
|
Feickert, A. (2024). FCMP++ review. Unpublished manuscript. |
|
Added by: Rucknium 09/08/2024, 17:54 |
|
Parker, L. (2024). FCMP++. Unpublished manuscript. |
|
Added by: Rucknium 09/08/2024, 17:45 |
|
Feickert, A. (2024). Generalized Bulletproofs. Unpublished manuscript. |
|
Added by: Rucknium Last edited by: Rucknium 09/08/2024, 17:41 |
|
Fomenko, O., & Sokolov, M. (2024). Bulletproofs++. Construction and Examples. Unpublished manuscript. |
|
Added by: Rucknium 09/08/2024, 17:33 |
|
Fanti, G., & Viswanath, P. 2017. Anonymity Properties of the Bitcoin P2P Network. |
|
Added by: Rucknium Last edited by: Rucknium 01/08/2024, 16:27 |
|
Bojja Venkatakrishnan, S., Fanti, G., & Viswanath, P. (2017). Dandelion: Redesigning the Bitcoin Network for Anonymity, Proc. ACM Meas. Anal. Comput. Syst. 1(1). |
|
Added by: Rucknium 01/08/2024, 16:22 |
|
Franzoni, F., & Daza, V. (2022). Clover: An anonymous transaction relay protocol for the bitcoin P2P network, Peer-to-Peer Networking and Applications, 15(1), 290–303. |
|
Added by: Rucknium 10/07/2024, 16:09 |
|
Scala, E., & Mostarda, L. 2024, Efficient Inner-Product Argument from Compressed $Sigma$-Protocols and Applications. Paper presented at International Conference on Advanced Information Networking and Applications. |
|
Added by: Jack Last edited by: Jack 12/06/2024, 12:50 |
|
Yue, Z., Zhu, H., Chang, X., Mišić, J., Mišić, V. B., & Fan, J. 2024. MBCT: A Monero-Based Covert Transmission Approach with On-chain Dynamic Session Key Negotiation. |
|
Added by: Rucknium Last edited by: Rucknium 23/05/2024, 18:07 |
|