hosts a collection of research papers relevant to improving Monero, powered by the WIKINDX open source software.

Anyone can browse the papers. To create new entries, edit existing one, and add annotations, you must be a registered user. To register as a user, message Rucknium on Matrix at . At this time there is no guarantee of stability or security of this website.

Search word(s):

 Include attachments

Recent additions or edits (WIKINDX Master Bibliography)

Eagen, L. Li. E. 2022. Bulletproofs++. [Cryptology ePrint Archive, Report 2022/510].
Last edited by: Rucknium 2024-04-05 22:13
Feickert, A. 2024. Bulletproofs++ review. Cypher Stack. [Peer review]
Added by: Rucknium 2024-04-05 22:08
Abreu, A. S. (2023). Esquemas de privacidade nas moedas criptográficas monero e zcash. Unpublished Bacharelado Thesis, Universidade de São Paulo, São Paulo, Brazil.
Added by: Rucknium 2024-04-05 22:07
Bobolz, J., Diaz, J., & Kohlweiss, M. 2024. Foundations of anonymous signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. [Cryptology ePrint Archive, Paper 2024/042].
Last edited by: Rucknium 2024-04-05 21:33
Amrollahi, A., & Mofrad, M. A. 2023, Towards unraveling power dynamics in information systems research: A systematic literature review through the lens of activity theory. Paper presented at ACIS 2023.
Added by: Rucknium 2024-04-05 21:26
Otávio Chervinski, J., Kreutz, D., & Yu, J. 2021, Analysis of transaction flooding attacks against monero. Paper presented at 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).
Last edited by: Rucknium 2024-03-16 13:00
Duan, J., Zheng, S., Wang, W., Wang, L., Hu, X., & Gu, L. (2024). Concise ringct protocol based on linkable threshold ring signature. IEEE Transactions on Dependable and Secure Computing, (1), 1–15.
Last edited by: Jack 2024-02-27 13:42
Scheid, E. J., Küng, S., Franco, M., & Stiller, B. 2023, Opening pandora's box: An analysis of the usage of the data field in blockchains. Paper presented at 2023 Fifth International Conference on Blockchain Computing and Applications (BCCA).
Last edited by: Rucknium 2024-01-10 16:59
Vijayakumaran, S. 2023, Analysis of cryptonote transaction graphs using the dulmage-mendelsohn decomposition. Paper presented at 5th Conference on Advances in Financial Technologies (AFT 2023).
Last edited by: Rucknium 2024-01-10 16:22
Pitu, F., & Gaitan, N. C. 2023, July Survey of security, performance, and profitability of monero: A browser-based cryptocurrency. Paper presented at 2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME).
Added by: Rucknium 2024-01-06 17:58
Tiemann, T., Berndt, S., Eisenbarth, T., & Liśkiewicz, M. 2023, July “act natural!”: Exchanging private messages on public blockchains. Paper presented at 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P).
Added by: Rucknium 2024-01-06 17:53
Zhang, T. (2023). Privacy evaluation of blockchain based privacy cryptocurrencies: A comparative analysis of dash, monero, verge, zcash, and grin. IEEE Transactions on Sustainable Computing, 8(4), 574–582.
Added by: Rucknium 2024-01-06 17:50
Luo, M., Zhou, J., & Yang, P. (2023). Rats: A regulatory anonymous transaction system based on blockchain. Journal of Parallel and Distributed Computing, 182, 104751.
Added by: Rucknium 2024-01-06 17:44
Barj, S., Ouaddah, A., & Mezrioui, A. 2023, A review of privacy-preserving cryptographic techniques used in blockchain platforms. Paper presented at Digital Technologies and Applications.
Added by: Rucknium 2024-01-06 17:36
Yu, Q., Liao, S., Wang, L., Yu, Y., Zhang, L., & Zhao, Y. (2024). A regulated anonymous cryptocurrency with batch linkability. Computer Standards & Interfaces, 87, 103770.
Added by: Rucknium 2024-01-06 17:26
Raikwar, M., Wu, S., & Gjosteen, K. 2023, Security model for privacy-preserving blockchain-based cryptocurrency systems. Paper presented at Network and System Security.
Added by: Rucknium 2024-01-06 17:22
Wicht, F.-X., Wang, Z., Le, D. V., & Cachin, C. 2023. A transaction-level model for blockchain privacy. [Cryptology ePrint Archive, Paper 2023/1902].
Added by: Rucknium 2024-01-06 17:04
Wang, X., Lin, C., Huang, X., & He, D. (2023). Anonymity-enhancing multi-hop locks for monero-enabled payment channel networks. IEEE Transactions on Information Forensics and Security, 1–1.
Added by: Rucknium 2024-01-06 16:59
Zhang, J., Su, M., Liu, X., & Wang, G. 2024, May Springproofs: Efficient inner product arguments for vectors of arbitrary length. Paper presented at 2024 IEEE Symposium on Security and Privacy (SP).
Added by: Rucknium 2024-01-06 16:50
Badertscher, C., Sedaghat, M., & Waldner, H. 2023. Fine-grained accountable privacy via unlinkable policy-compliant signatures. [Cryptology ePrint Archive, Paper 2023/1070].
Last edited by: Rucknium 2024-01-05 22:08
Szalaty, Z. E. (2023). Privacy preserving blockchains and quantum safety. Unpublished Master's Thesis , Universitat Oberta de Catalunya.
Last edited by: Rucknium 2024-01-05 22:01
Buccafurri, F., De Angelis, V., & Lazzaro, S. 2023, May 25–26 A traffic-analysis proof solution to allow k-anonymous payments in pseudonymous blockchains. Unpublished paper presented at 5th Distributed Ledger Technology Workshop.
Added by: Rucknium 2024-01-05 20:51
Dijk, A., & Schröder, D. (2023). Proof of concept for a ethereum virtual machine on cryptonote. Unpublished manuscript.
Added by: Rucknium 2024-01-05 20:32
Jin, R. (2023). The advance of ring confidential transactions. Highlights in Science, Engineering and Technology, 39, 1104–1110.
Last edited by: Rucknium 2024-01-05 19:46
Zhang, T., Li, B., Zhu, Y., Han, T., & Wu, Q. (2023). Covert channels in blockchain and blockchain based covert communication: Overview, state-of-the-art, and future directions. Computer Communications, 205, 136–146.
Added by: Rucknium 2024-01-05 19:23
Huang, K., Mu, Y., Rezaeibagha, F., Zhang, X., & Li, X. (2023). Monero with multi-grained redaction. IEEE Transactions on Dependable and Secure Computing, 1–13.
Added by: Rucknium 2024-01-05 19:16
Movsowitz Davidow, D., Manevich, Y., & Toch, E. 2023, Privacy-Preserving Transactions with Verifiable Local Differential Privacy. Paper presented at 5th Conference on Advances in Financial Technologies (AFT 2023).
Added by: Rucknium 2024-01-05 19:14
Su, W., & Ma, L. 2023, April A blockchain-based covert document communication system model. Paper presented at 2023 8th International Conference on Computer and Communication Systems (ICCCS).
Added by: Rucknium 2024-01-05 19:13
Grunspan, C., & Perez-Marco, R. (2018). Double spend races. Int. J. Theor. Appl. Finance, 21(8), 1850053.
Last edited by: Rucknium 2023-08-23 16:52
Rosenfeld, M. 2014. Analysis of hashrate-based double spending.
Last edited by: Rucknium 2023-08-23 16:48
Wahrst"atter, A., Solomon, M., DiFrancesco, B., Buterin, V., & Svetinovic, D. (2023). Basesap: Modular stealth address protocol for programmable blockchains. arXiv preprint arXiv:2306.14272,
Last edited by: Jack 2023-07-29 03:09
Naik, A., Yeniaras, E., Hellstern, G., Prasad, G., & Vishwakarma, S. K. L. P. (2023). From portfolio optimization to quantum blockchain and security: A systematic review of quantum computing in finance. arXiv preprint arXiv:2307.01155,
Last edited by: Jack 2023-07-29 03:07
Block, A. R., Garreta, A., Katz, J., Thaler, J., Tiwari, P. R., & Zajac, M. (2023). Fiat-shamir security of fri and related snarks. Cryptology ePrint Archive,
Last edited by: Jack 2023-07-29 03:05
af halo2 Protokollen, H. G. S., & Spitters, B. 2023. High assurance specification of the halo2 protocol.
Last edited by: Jack 2023-07-29 03:03
Pu, S., Thyagarajan, S. A., D"ottling, N., & Hanzlik, L. (2023). Post quantum fuzzy stealth signatures and applications. Cryptology ePrint Archive,
Last edited by: Jack 2023-07-29 02:59
Wang, X., Lin, L., & Wang, Y. (2023). Stealth address schemes with fast retrievability based on subgroup membership assumptions related to factoring. The Computer Journal, bxad056.
Last edited by: Jack 2023-06-07 12:27
Chow, S. S., Egger, C., Lai, R. W. F., Ronge, V., & Woo, I. K. Y. (2023). On sustainable ring-based anonymous systems. Cryptology ePrint Archive,
Last edited by: Jack 2023-06-06 21:13
Yu, G. (2020). Blockchain stealth address schemes. Cryptology ePrint Archive,
Last edited by: Jack 2023-06-06 21:04
Fan, X. 2018, Faster dual-key stealth address for blockchain-based internet of things systems. Paper presented at Blockchain--ICBC 2018: First International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings 1.
Last edited by: Jack 2023-06-06 21:02
Bunz, B., Bootle, J., Boneh, D., Poelstra, A., Wuille, P., & Maxwell, G. 2018, Bulletproofs: Short proofs for confidential transactions and more. Paper presented at 2018 IEEE Symposium on Security and Privacy (SP).
Last edited by: Jack 2023-03-29 18:22
Chung, H., Han, K., Ju, C., Kim, M., & Seo, J. H. (2022). Bulletproofs+: Shorter proofs for a privacy-enhanced distributed ledger. IEEE Access, 10, 42067–42082.
Last edited by: Jack 2023-03-29 18:12
Scala, E., & Mostarda, L. 2023, Range proofs with constant size and trustless setup. Paper presented at Advanced Information Networking and Applications: Proceedings of the 37th International Conference on Advanced Information Networking and Applications (AINA-2023), Volume 3.
Last edited by: Jack 2023-03-29 18:12
Deng, C., You, L., Tang, X., Hu, G., & Gao, S. (2022). Cuproof: Range proof with constant size. Entropy, 24(3), 334.
Last edited by: Jack 2023-03-28 21:58
Noether, S. Understanding ge fromfe frombytes vartime.
Last edited by: Jack 2023-03-28 21:26
Esgin, M. F., Steinfeld, R., & Zhao, R. K. 2022, Matrict+: More efficient post-quantum private blockchain payments. Paper presented at 2022 IEEE Symposium on Security and Privacy (SP).
Last edited by: Jack 2023-03-28 20:46
koe. seraphis: a privacy-preserving transaction protocol abstraction (wip).
Added by: Jack 2023-03-08 22:33
Cremers, C., Loss, J., & Wagner, B. 2023. A holistic security analysis of monero transactions. [Cryptology ePrint Archive, Paper 2023/321].
Last edited by: Jack 2023-03-08 18:11
Macchetti, M. 2023. A novel related nonce attack for ecdsa. [Cryptology ePrint Archive, Paper 2023/305].
Last edited by: Jack 2023-03-06 22:35
Gligoroski, D. (2023). A transformation for lifting discrete logarithm based cryptography to post-quantum cryptography. Cryptology ePrint Archive,
Last edited by: Jack 2023-03-06 22:32
Wicht, F.-X., Cachin, C., & Le, D. V. (2023). Blockchain privacy notions using the transaction graph model. , University of Fribourg.
Last edited by: Jack 2023-03-06 22:29
WIKINDX 6.5.0 | Total resources: 210 | Username: -- | Bibliography: WIKINDX Master Bibliography | Style: American Psychological Association (APA)