Scheid, E. J., Küng, S., Franco, M., & Stiller, B. 2023, Opening pandora's box: An analysis of the usage of the data field in blockchains. Paper presented at 2023 Fifth International Conference on Blockchain Computing and Applications (BCCA). 

Last edited by: Rucknium 20240110 16:59 

Vijayakumaran, S. 2023, Analysis of cryptonote transaction graphs using the dulmagemendelsohn decomposition. Paper presented at 5th Conference on Advances in Financial Technologies (AFT 2023). 

Last edited by: Rucknium 20240110 16:22 

Pitu, F., & Gaitan, N. C. 2023, July Survey of security, performance, and profitability of monero: A browserbased cryptocurrency. Paper presented at 2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME). 

Added by: Rucknium 20240106 17:58 

Tiemann, T., Berndt, S., Eisenbarth, T., & Liśkiewicz, M. 2023, July “act natural!”: Exchanging private messages on public blockchains. Paper presented at 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P). 

Added by: Rucknium 20240106 17:53 

Zhang, T. (2023). Privacy evaluation of blockchain based privacy cryptocurrencies: A comparative analysis of dash, monero, verge, zcash, and grin. IEEE Transactions on Sustainable Computing, 8(4), 574–582. 

Added by: Rucknium 20240106 17:50 

Luo, M., Zhou, J., & Yang, P. (2023). Rats: A regulatory anonymous transaction system based on blockchain. Journal of Parallel and Distributed Computing, 182, 104751. 

Added by: Rucknium 20240106 17:44 

Barj, S., Ouaddah, A., & Mezrioui, A. 2023, A review of privacypreserving cryptographic techniques used in blockchain platforms. Paper presented at Digital Technologies and Applications. 

Added by: Rucknium 20240106 17:36 

Yu, Q., Liao, S., Wang, L., Yu, Y., Zhang, L., & Zhao, Y. (2024). A regulated anonymous cryptocurrency with batch linkability. Computer Standards & Interfaces, 87, 103770. 

Added by: Rucknium 20240106 17:26 

Raikwar, M., Wu, S., & Gjosteen, K. 2023, Security model for privacypreserving blockchainbased cryptocurrency systems. Paper presented at Network and System Security. 

Added by: Rucknium 20240106 17:22 

Wicht, F.X., Wang, Z., Le, D. V., & Cachin, C. 2023. A transactionlevel model for blockchain privacy. [Cryptology ePrint Archive, Paper 2023/1902]. 

Added by: Rucknium 20240106 17:04 

Wang, X., Lin, C., Huang, X., & He, D. (2023). Anonymityenhancing multihop locks for moneroenabled payment channel networks. IEEE Transactions on Information Forensics and Security, 1–1. 

Added by: Rucknium 20240106 16:59 

Zhang, J., Su, M., Liu, X., & Wang, G. 2024, May Springproofs: Efficient inner product arguments for vectors of arbitrary length. Paper presented at 2024 IEEE Symposium on Security and Privacy (SP). 

Added by: Rucknium 20240106 16:50 

Badertscher, C., Sedaghat, M., & Waldner, H. 2023. Finegrained accountable privacy via unlinkable policycompliant signatures. [Cryptology ePrint Archive, Paper 2023/1070]. 

Last edited by: Rucknium 20240105 22:08 

Szalaty, Z. E. (2023). Privacy preserving blockchains and quantum safety. Unpublished Master's Thesis , Universitat Oberta de Catalunya. 

Last edited by: Rucknium 20240105 22:01 

Buccafurri, F., De Angelis, V., & Lazzaro, S. 2023, May 25–26 A trafficanalysis proof solution to allow kanonymous payments in pseudonymous blockchains. Unpublished paper presented at 5th Distributed Ledger Technology Workshop. 

Added by: Rucknium 20240105 20:51 

Dijk, A., & Schröder, D. (2023). Proof of concept for a ethereum virtual machine on cryptonote. Unpublished manuscript. 

Added by: Rucknium 20240105 20:32 

Jin, R. (2023). The advance of ring confidential transactions. Highlights in Science, Engineering and Technology, 39, 1104–1110. 

Last edited by: Rucknium 20240105 19:46 

Zhang, T., Li, B., Zhu, Y., Han, T., & Wu, Q. (2023). Covert channels in blockchain and blockchain based covert communication: Overview, stateoftheart, and future directions. Computer Communications, 205, 136–146. 

Added by: Rucknium 20240105 19:23 

Huang, K., Mu, Y., Rezaeibagha, F., Zhang, X., & Li, X. (2023). Monero with multigrained redaction. IEEE Transactions on Dependable and Secure Computing, 1–13. 

Added by: Rucknium 20240105 19:16 

Movsowitz Davidow, D., Manevich, Y., & Toch, E. 2023, PrivacyPreserving Transactions with Verifiable Local Differential Privacy. Paper presented at 5th Conference on Advances in Financial Technologies (AFT 2023). 

Added by: Rucknium 20240105 19:14 

Su, W., & Ma, L. 2023, April A blockchainbased covert document communication system model. Paper presented at 2023 8th International Conference on Computer and Communication Systems (ICCCS). 

Added by: Rucknium 20240105 19:13 

Grunspan, C., & PerezMarco, R. (2018). Double spend races. Int. J. Theor. Appl. Finance, 21(8), 1850053. 

Last edited by: Rucknium 20230823 16:52 

Rosenfeld, M. 2014. Analysis of hashratebased double spending. 

Last edited by: Rucknium 20230823 16:48 

Wahrst"atter, A., Solomon, M., DiFrancesco, B., Buterin, V., & Svetinovic, D. (2023). Basesap: Modular stealth address protocol for programmable blockchains. arXiv preprint arXiv:2306.14272, 

Last edited by: Jack 20230729 03:09 

Naik, A., Yeniaras, E., Hellstern, G., Prasad, G., & Vishwakarma, S. K. L. P. (2023). From portfolio optimization to quantum blockchain and security: A systematic review of quantum computing in finance. arXiv preprint arXiv:2307.01155, 

Last edited by: Jack 20230729 03:07 

Block, A. R., Garreta, A., Katz, J., Thaler, J., Tiwari, P. R., & Zajac, M. (2023). Fiatshamir security of fri and related snarks. Cryptology ePrint Archive, 

Last edited by: Jack 20230729 03:05 

af halo2 Protokollen, H. G. S., & Spitters, B. 2023. High assurance specification of the halo2 protocol. 

Last edited by: Jack 20230729 03:03 

Pu, S., Thyagarajan, S. A., D"ottling, N., & Hanzlik, L. (2023). Post quantum fuzzy stealth signatures and applications. Cryptology ePrint Archive, 

Last edited by: Jack 20230729 02:59 

Eagen, L. Li. E. 2022. Bulletproofs++. [Cryptology ePrint Archive, Report 2022/510]. 

Last edited by: Rucknium 20230729 02:57 

Wang, X., Lin, L., & Wang, Y. (2023). Stealth address schemes with fast retrievability based on subgroup membership assumptions related to factoring. The Computer Journal, bxad056. 

Last edited by: Jack 20230607 12:27 

Chow, S. S., Egger, C., Lai, R. W. F., Ronge, V., & Woo, I. K. Y. (2023). On sustainable ringbased anonymous systems. Cryptology ePrint Archive, 

Last edited by: Jack 20230606 21:13 

Yu, G. (2020). Blockchain stealth address schemes. Cryptology ePrint Archive, 

Last edited by: Jack 20230606 21:04 

Fan, X. 2018, Faster dualkey stealth address for blockchainbased internet of things systems. Paper presented at BlockchainICBC 2018: First International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 2530, 2018, Proceedings 1. 

Last edited by: Jack 20230606 21:02 

Bunz, B., Bootle, J., Boneh, D., Poelstra, A., Wuille, P., & Maxwell, G. 2018, Bulletproofs: Short proofs for confidential transactions and more. Paper presented at 2018 IEEE Symposium on Security and Privacy (SP). 

Last edited by: Jack 20230329 18:22 

Chung, H., Han, K., Ju, C., Kim, M., & Seo, J. H. (2022). Bulletproofs+: Shorter proofs for a privacyenhanced distributed ledger. IEEE Access, 10, 42067–42082. 

Last edited by: Jack 20230329 18:12 

Scala, E., & Mostarda, L. 2023, Range proofs with constant size and trustless setup. Paper presented at Advanced Information Networking and Applications: Proceedings of the 37th International Conference on Advanced Information Networking and Applications (AINA2023), Volume 3. 

Last edited by: Jack 20230329 18:12 

Deng, C., You, L., Tang, X., Hu, G., & Gao, S. (2022). Cuproof: Range proof with constant size. Entropy, 24(3), 334. 

Last edited by: Jack 20230328 21:58 

Noether, S. Understanding ge fromfe frombytes vartime. 

Last edited by: Jack 20230328 21:26 

Esgin, M. F., Steinfeld, R., & Zhao, R. K. 2022, Matrict+: More efficient postquantum private blockchain payments. Paper presented at 2022 IEEE Symposium on Security and Privacy (SP). 

Last edited by: Jack 20230328 20:46 

koe. seraphis: a privacypreserving transaction protocol abstraction (wip). 

Added by: Jack 20230308 22:33 

Cremers, C., Loss, J., & Wagner, B. 2023. A holistic security analysis of monero transactions. [Cryptology ePrint Archive, Paper 2023/321]. 

Last edited by: Jack 20230308 18:11 

Macchetti, M. 2023. A novel related nonce attack for ecdsa. [Cryptology ePrint Archive, Paper 2023/305]. 

Last edited by: Jack 20230306 22:35 

Gligoroski, D. (2023). A transformation for lifting discrete logarithm based cryptography to postquantum cryptography. Cryptology ePrint Archive, 

Last edited by: Jack 20230306 22:32 

Wicht, F.X., Cachin, C., & Le, D. V. (2023). Blockchain privacy notions using the transaction graph model. , University of Fribourg. 

Last edited by: Jack 20230306 22:29 

Alonso, K. M. (2017). Moneroprivacy in the blockchain. , Universitat Aut`onoma de Barcelona. 

Last edited by: Jack 20230303 16:55 

koe, Alonso, K. M., & Noether, S. (2020). Zero to monero: A technical guide to a private digital currency; for beginners, amateurs, and experts second ed. Second ed. 

Last edited by: Rucknium 20230303 16:51 

Gibson, A. From zero (knowledge) to bulletproofs. 

Last edited by: Jack 20230303 16:18 

Kappos, G. (2022). An empirical analysis of privacy in cryptocurrencies. Unpublished PhD thesis, UCL (University College London). 

Last edited by: Jack 20230221 04:36 

Amarasinghe, N. (2022). Systematic modelling of anonymity with application to cryptocurrencies. Unpublished PhD thesis, Queensland University of Technology. 

Last edited by: Jack 20230221 04:34 

Taneska, M., & Halimi, F. 2022, Anonymous blockchain based model for evoting. Unpublished paper presented at The 19th International Conference on Informatics and Information Technologies – CIIT 2022. 

Last edited by: Jack 20230221 04:30 
