MoneroResearch.info hosts a collection of research papers relevant to improving Monero, powered by the WIKINDX open source software.
Anyone can browse the papers. To create new entries, edit existing one, and add annotations, you must be a registered user. To register as a user, message Rucknium on Matrix at Rucknium:monero.social . At this time there is no guarantee of stability or security of this website.
Recent additions or edits (WIKINDX Master Bibliography)
| Lee, J., Choi, G., Han, J., & Park, J. (2025). Advanced Monero wallet forensics: Demystifying off-chain artifacts to trace privacy-preserving cryptocurrency transactions, Forensic Science International: Digital Investigation, 54, 301988. |
|
| Added by: Jack Last edited by: Jack 11/6/25, 4:29 PM |
|
| Ziegler, M. H., Nowostawski, M., & Katt, B. (2025). A Systematic Literature Review of Information Privacy in Blockchain Systems, Journal of Cybersecurity and Privacy, 5(3), 65. |
|
| Added by: Jack Last edited by: Jack 11/4/25, 4:09 PM |
|
| Wang, N., & Liu, D. (2024). FlashSwift: A Configurable and More Efficient Range Proof With Transparent Setup, Proceedings on Privacy Enhancing Technologies. |
|
| Added by: Jack Last edited by: Jack 11/4/25, 4:05 PM |
|
| Wang, N., Chau, S. C.-K., & Liu, D. 2024, SwiftRange: a short and efficient zero-knowledge range argument for confidential transactions and more. Paper presented at 2024 IEEE Symposium on Security and Privacy (SP). |
|
| Added by: Jack Last edited by: Jack 11/4/25, 4:04 PM |
|
| Wang, N., & Chau, S. C.-K. 2022, Flashproofs: Efficient zero-knowledge arguments of range and polynomial evaluation with transparent setup. Paper presented at International Conference on the Theory and Application of Cryptology and Information Security. |
|
| Added by: Jack Last edited by: Jack 11/4/25, 4:03 PM |
|
| Wang, N., Wang, Q., Liu, D., Esgin, M. F., & Abuadbba, A. (2025). BulletCT: Towards More Scalable Ring Confidential Transactions With Transparent Setup, BulletCT: Towards More Scalable Ring Confidential Transactions With Transparent Setup. |
|
| Added by: Jack Last edited by: Jack 11/4/25, 4:01 PM |
|
| Kopyciok, Y., Victor, F., & Schmid, S. (2025). Moneros Decentralized P2P Exchanges: Functionality, Adoption, and Privacy Risks, arXiv preprint arXiv:2505.02392. |
|
| Added by: Jack Last edited by: Jack 11/4/25, 3:51 PM |
|
| RostamkolaeiMotlagh, S., Pahl, C., Barzegar, H. R., & El Ioini, N. A Technology Review of Zero Knowledge Proof Techniques, A Technology Review of Zero Knowledge Proof Techniques. |
|
| Added by: Jack Last edited by: Jack 11/4/25, 3:50 PM |
|
| Tong, X., Zhou, J., Cao, Z., Dong, X., & Choo, K.-K. R. (2025). A Ring Signature With Aggregation for Ensuring Privacy in Blockchain Transactions, IEEE Internet of Things Journal, 12(12), 21001–21015. |
|
| Added by: Jack Last edited by: Jack 11/4/25, 3:47 PM |
|
| Duan, J., Wang, W., Wang, L., Gu, L., & Zhu, L. (2025). CRCT: Compact Ring Confidential Transactions Based on Sum Arguments, IEEE Transactions on Information Forensics and Security. |
|
| Added by: Jack Last edited by: Jack 11/3/25, 7:46 PM |
|
| Kopyciok, Y., Schmid, S., & Victor, F. 2025. Friend or Foe? Identifying Anomalous Peers in Moneros P2P Network. |
|
| Added by: Rucknium 10/29/25, 4:36 PM |
|
| Bassa, A., & Sepanski, B. (2025). Security Assessment for the Helios–Selene Curve Cycle. Unpublished manuscript. |
|
| Added by: Rucknium Last edited by: Rucknium 10/29/25, 3:16 PM |
|
| Budish, E. (2025). Trust at Scale: The Economic Limits of Cryptocurrencies and Blockchains, The Quarterly Journal of Economics, 140(1), 1–62. |
|
| Added by: Rucknium Last edited by: Rucknium 7/30/25, 12:12 AM |
|
| Aranha, D. F., Hall-Andersen, M., Nitulescu, A., Pagnin, E., & Yakoubov, S. 2021. Count me in! Extendability for Threshold Ring Signatures. [Cryptology ePrint Archive, Report 2021/1240] |
|
| Added by: Plowsof Last edited by: Rucknium 6/3/25, 8:06 PM |
|
| Gao, Y., Zhang, Y., Piškorec, M., & Tessone, C. J. 2025. Monero Peer-to-peer Network Topology Analysis. |
|
| Added by: Rucknium Last edited by: Rucknium 6/3/25, 5:59 PM |
|
| Biryukov, A., & Tikhomirov, S. 2019, Deanonymization and Linkability of Cryptocurrency Transactions Based on Network Analysis. Paper presented at 2019 IEEE European Symposium on Security and Privacy (EuroS&P). |
|
| Added by: Rucknium Last edited by: Rucknium 6/3/25, 5:56 PM |
|
| Zheng, C., Meng, S., Junxian, D., & Liehuang, Z. 2024, From Ledger to P2P Network: De-anonymization on Bitcoin Using Cross-Layer Analysis. Paper presented at Advanced Parallel Processing Technologies. |
|
| Added by: Rucknium 6/3/25, 5:38 PM |
|
| Keller, P., Florian, M., & Böhme, R. 2021, Collaborative Deanonymization. Paper presented at Financial Cryptography and Data Security. FC 2021 International Workshops. |
|
| Added by: Rucknium 6/3/25, 5:31 PM |
|
| Tabatabaee, S. A., Nicer, C., Beschastnikh, I., & Feng, C. 2021. One Bad Apple Spoils the Bunch: Transaction DoS in MimbleWimble Blockchains. |
|
| Added by: Rucknium Last edited by: Rucknium 6/3/25, 5:23 PM |
|
| Dittrich, D., Bailey, M., & Kenneally, E. (2013). Applying Ethical Principles to Information and Communication Technology Research: A Companion to the Menlo Report. U.S. Department of Homeland Security. |
|
| Added by: Rucknium Last edited by: Rucknium 6/3/25, 4:42 PM |
|
| Dittrich, D., & Kenneally, E. (2012). The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research. U.S. Department of Homeland Security. |
|
| Added by: Rucknium Last edited by: Rucknium 6/3/25, 4:39 PM |
|
| Howell, A., Saber, T., & Bendechache, M. (2023). Measuring node decentralisation in blockchain peer to peer networks, Blockchain: Research and Applications, 4(1), 100109. |
|
| Added by: Rucknium 6/3/25, 4:28 PM |
|
| Kopyciok, Y., Victor, F., & Schmid, S. 2025. Moneros Decentralized P2P Exchanges: Functionality, Adoption, and Privacy Risks. |
|
| Added by: Rucknium Last edited by: Rucknium 6/3/25, 4:15 PM |
|
| Eagen, L. 2022. Zero Knowledge Proofs of Elliptic Curve Inner Products from Principal Divisors and Weil Reciprocity. [Cryptology {ePrint} Archive, Paper 2022/596]. |
|
| Added by: Rucknium Last edited by: Rucknium 5/27/25, 10:24 PM |
|
| Goodell, B., Salazar, R., Slaughter, F., & Szramowski, L. (2025). A Further Review of the DL Gadget Of Interest. Unpublished manuscript. |
|
| Added by: Rucknium 5/27/25, 10:17 PM |
|
| Salazar, R., Slaughter, F., & Szramowski, L. (2025). Veridise Logarithmic Derivative Review. Unpublished manuscript. |
|
| Added by: Rucknium 5/27/25, 10:11 PM |
|
| Gao, Y., Piškorec, M., Zhang, Y., Vallarano, N., & Tessone, C. J. 2025. Charting the Uncharted: The Landscape of Monero Peer-to-Peer Network. |
|
| Added by: Rucknium Last edited by: Rucknium 4/29/25, 9:18 PM |
|
| Thakore, V., & Vijayakumaran, S. (2025). MProve-Nova: A Privacy-Preserving Proof of Reserves Protocol for Monero, Proceedings on Privacy Enhancing Technologies, 2025(2), 582–606. |
|
| Added by: Rucknium 4/16/25, 3:19 PM |
|
| Duan, J., Wang, W., Wang, L., & Gu, L. (2025). Transitioning RingCT Accounts: From Classical to Post-Quantum Security, IEEE Internet of Things Journal, 12(2), 2090–2105. |
|
| Added by: Rucknium 4/16/25, 3:10 PM |
|
| Buccafurri, F., De Angelis, V., & Lazzaro, S. 2024, October, K-Anonymous Payments in Pseudonymous Blockchains. Paper presented at 2024 20th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). |
|
| Added by: Rucknium 4/16/25, 3:07 PM |
|
| Dingledine, R., & Mathewson, N. (2005). Anonymity Loves Company: Usability and the Network Effect. In Designing Security Systems That People Can Use (pp. 547–559). O'Reilly.. |
|
| Added by: Rucknium 4/16/25, 2:59 PM |
|
| Acquisti, A., Dingledine, R., & Syverson, P. 2003, On the Economics of Anonymity. Paper presented at Financial Cryptography. |
|
| Added by: Rucknium 4/16/25, 1:54 PM |
|
| Švarcmajer, M., Köhler, M., Marinčić, J., & Perić, J. 2025, Utilizing Faculty Computers for Cryptocurrency Validation and Mining During Idle Time. Paper presented at 33rd International Conference on Organization and Technology of Maintenance (OTO 2024). |
|
| Added by: Rucknium 4/15/25, 3:17 PM |
|
| Yang, X., Xu, L., & Zhu, L. (2025). De-anonymizing Monero: A Maximum Weighted Matching-Based Approach, IEEE Transactions on Information Forensics and Security. |
|
| Added by: Jack Last edited by: Jack 4/15/25, 2:25 PM |
|
| ACK-J, A.-J. 2022. LORD OF THE RINGS: AN EMPIRICAL ANALYSIS OF MONERO’S RING SIGNATURE RESILIENCE TO ARTIFICIALLY INTELLIGENT ATTACKS. Multidisciplinary Academic Grants in Cryptocurrencies. |
|
| Added by: Jack Last edited by: Jack 4/15/25, 2:14 PM |
|
| Bassa, A. (2025). Soundness Proof for an Interactive Protocol for the Discrete Logarithm Relation. Unpublished manuscript. |
|
| Added by: Rucknium 4/2/25, 6:11 PM |
|
| Babb, J., Goodell, B., Parker, L., Salazar, R., Slaughter, F., & Szramowski, L. (2025). FROSTLASS: Flexible Ring-Oriented Schnorr-like Thresholdized Linkably Anonymous Signature Scheme. Unpublished manuscript. |
|
| Added by: Rucknium Last edited by: Rucknium 3/18/25, 6:49 PM |
|
| Dutta, A., & Vijayakumaran, S. 2019, June, MProve: A Proof of Reserves Protocol for Monero Exchanges. Paper presented at 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). |
|
| Added by: Rucknium 3/18/25, 6:22 PM |
|
| Aeeneh, S., Chervinski, J. O., Yu, J., & Zlatanov, N. 2021, May, New Attacks on the Untraceability of Transactions in CryptoNote-Style Blockchains. Paper presented at 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). |
|
| Added by: Rucknium 3/4/25, 7:18 PM |
|
| Kumar, A., Fischer, C., Tople, S., & Saxena, P. 2017, September, A Traceability Analysis of Monero’s Blockchain. Paper presented at European Symposium on Research in Computer Security (ESORICS). |
|
| Added by: Rucknium Last edited by: Rucknium 3/4/25, 7:08 PM |
|
| Feickert, A. (2024). Zano d/v-CLSAG review. Unpublished manuscript. |
|
| Added by: Rucknium 3/4/25, 4:05 PM |
|
| Chiang, J. H.-Y., Damgård, I., Duro, W. R., Engan, S., Kolby, S., & Scholl, P. 2025. Post-Quantum Threshold Ring Signature Applications from VOLE-in-the-Head. [Cryptology {ePrint} Archive, Paper 2025/113]. |
|
| Added by: Rucknium Last edited by: Rucknium 2/27/25, 5:15 PM |
|
| Goodell, B., Salazar, R., & Slaughter, F. 2025. Uniformly Most Powerful Tests for Ad Hoc Transactions in Monero. [Cryptology {ePrint} Archive, Paper 2025/221]. |
|
| Added by: Rucknium Last edited by: Rucknium 2/27/25, 4:32 PM |
|
| Baseri, Y., Hafid, A., Shahsavari, Y., Makrakis, D., & Khodaiemehr, H. 2025. Blockchain Security Risk Assessment in Quantum Era, Migration Strategies and Proactive Defense. |
|
| Added by: Rucknium Last edited by: Rucknium 2/27/25, 4:26 PM |
|
| Nick, J., Eagen, L., & Linus, R. 2025. Shielded CSV: Private and Efficient Client-Side Validation. [Cryptology {ePrint} Archive, Paper 2025/068]. |
|
| Added by: Rucknium Last edited by: Rucknium 2/27/25, 4:24 PM |
|
| Mikic, M., Srbakoski, M., & Praska, S. 2025. Post-Quantum Stealth Address Protocols. |
|
| Added by: Rucknium Last edited by: Rucknium 2/27/25, 4:20 PM |
|
| Shi, R., Peng, Z., Lan, L., Ge, Y., Liu, P., & Wang, Q., et al. 2025, February 24–28, Eclipse Attacks on Monero’s Peer-to-Peer Network. Unpublished paper presented at Network and Distributed System Security (NDSS) Symposium 2025. |
|
| Added by: Rucknium 2/27/25, 4:05 PM |
|
| Bonhomme, S., Jochmans, K., & Robin, J.-M. (2016). Non-parametric estimation of finite mixtures from repeated measurements, Journal of the Royal Statistical Society. Series B (Statistical Methodology), 78(1), 211–229. |
|
| Added by: Rucknium 2/22/25, 11:13 PM |
|
| Patra, R. K., & Sen, B. (2016). Estimation of a two-component mixture model with applications to multiple testing, Journal of the Royal Statistical Society. Series B (Statistical Methodology), 78(4), 869–893. |
|
| Added by: Rucknium 2/22/25, 11:11 PM |
|
| Guo, S. 2024, Secure Monero on Corrupted Machines with Reverse Firewalls. Paper presented at International Conference on Data Security and Privacy Protection. |
|
| Added by: Jack Last edited by: Jack 1/17/25, 5:31 PM |
|