MoneroResearch.info hosts a collection of research papers relevant to improving Monero, powered by the WIKINDX open source software.
Anyone can browse the papers. To create new entries, edit existing one, and add annotations, you must be a registered user. To register as a user, message Rucknium on Matrix at Rucknium:monero.social . At this time there is no guarantee of stability or security of this website.
Recent additions or edits (WIKINDX Master Bibliography)
Salazar, R., Slaughter, F., & Szramowski, L. (2025). Veridise Logarithmic Derivative Review. Unpublished manuscript. |
|
Added by: Rucknium 3/18/25, 6:58 PM |
|
Babb, J., Goodell, B., Parker, L., Salazar, R., Slaughter, F., & Szramowski, L. (2025). FROSTLASS: Flexible Ring-Oriented Schnorr-like Thresholdized Linkably Anonymous Signature Scheme. Unpublished manuscript. |
|
Added by: Rucknium Last edited by: Rucknium 3/18/25, 6:49 PM |
|
Dutta, A., & Vijayakumaran, S. 2019, June, MProve: A Proof of Reserves Protocol for Monero Exchanges. Paper presented at 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). |
|
Added by: Rucknium 3/18/25, 6:22 PM |
|
Aeeneh, S., Chervinski, J. O., Yu, J., & Zlatanov, N. 2021, May, New Attacks on the Untraceability of Transactions in CryptoNote-Style Blockchains. Paper presented at 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). |
|
Added by: Rucknium 3/4/25, 7:18 PM |
|
Kumar, A., Fischer, C., Tople, S., & Saxena, P. 2017, September, A Traceability Analysis of Monero’s Blockchain. Paper presented at European Symposium on Research in Computer Security (ESORICS). |
|
Added by: Rucknium Last edited by: Rucknium 3/4/25, 7:08 PM |
|
Feickert, A. (2024). Zano d/v-CLSAG review. Unpublished manuscript. |
|
Added by: Rucknium 3/4/25, 4:05 PM |
|
Chiang, J. H.-Y., Damgård, I., Duro, W. R., Engan, S., Kolby, S., & Scholl, P. 2025. Post-Quantum Threshold Ring Signature Applications from VOLE-in-the-Head. [Cryptology {ePrint} Archive, Paper 2025/113]. |
|
Added by: Rucknium Last edited by: Rucknium 2/27/25, 5:15 PM |
|
Goodell, B., Salazar, R., & Slaughter, F. 2025. Uniformly Most Powerful Tests for Ad Hoc Transactions in Monero. [Cryptology {ePrint} Archive, Paper 2025/221]. |
|
Added by: Rucknium Last edited by: Rucknium 2/27/25, 4:32 PM |
|
Baseri, Y., Hafid, A., Shahsavari, Y., Makrakis, D., & Khodaiemehr, H. 2025. Blockchain Security Risk Assessment in Quantum Era, Migration Strategies and Proactive Defense. |
|
Added by: Rucknium Last edited by: Rucknium 2/27/25, 4:26 PM |
|
Nick, J., Eagen, L., & Linus, R. 2025. Shielded CSV: Private and Efficient Client-Side Validation. [Cryptology {ePrint} Archive, Paper 2025/068]. |
|
Added by: Rucknium Last edited by: Rucknium 2/27/25, 4:24 PM |
|
Mikic, M., Srbakoski, M., & Praska, S. 2025. Post-Quantum Stealth Address Protocols. |
|
Added by: Rucknium Last edited by: Rucknium 2/27/25, 4:20 PM |
|
Shi, R., Peng, Z., Lan, L., Ge, Y., Liu, P., & Wang, Q., et al. 2025, February 24–28, Eclipse Attacks on Monero’s Peer-to-Peer Network. Unpublished paper presented at Network and Distributed System Security (NDSS) Symposium 2025. |
|
Added by: Rucknium 2/27/25, 4:05 PM |
|
Bonhomme, S., Jochmans, K., & Robin, J.-M. (2016). Non-parametric estimation of finite mixtures from repeated measurements, Journal of the Royal Statistical Society. Series B (Statistical Methodology), 78(1), 211–229. |
|
Added by: Rucknium 2/22/25, 11:13 PM |
|
Patra, R. K., & Sen, B. (2016). Estimation of a two-component mixture model with applications to multiple testing, Journal of the Royal Statistical Society. Series B (Statistical Methodology), 78(4), 869–893. |
|
Added by: Rucknium 2/22/25, 11:11 PM |
|
Guo, S. 2024, Secure Monero on Corrupted Machines with Reverse Firewalls. Paper presented at International Conference on Data Security and Privacy Protection. |
|
Added by: Jack Last edited by: Jack 1/17/25, 5:31 PM |
|
Papadoulis, G. (2025). Privacy and auditability in decentralized payment systems. |
|
Added by: Jack Last edited by: Jack 1/17/25, 5:28 PM |
|
Goodell, B. (2024). Security Review - Generalized Bulletproofs. Unpublished manuscript. |
|
Added by: Rucknium 12/6/24, 5:56 PM |
|
Slaughter, F., Goodell, B., & Salazar, R. (2024). An Audit of the FCMP++ Addressing Protocol: CARROT. Unpublished manuscript. |
|
Added by: Rucknium 11/27/24, 3:40 PM |
|
Bassa, A. (2024). On the Use of Logarithmic Derivatives in Eagen’s Proof of Sums of Points. Unpublished manuscript. |
|
Added by: Rucknium Last edited by: Rucknium 11/27/24, 3:39 PM |
|
Hammad, N., & Victor, F. 2024. Monero Traceability Heuristics: Wallet Application Bugs and the Mordinal-P2Pool Perspective. |
|
Added by: opal 9/25/24, 9:35 PM |
|
Zheng, J., Huang, H., Li, C., Zheng, Z., & Guo, S. 2021, Revisiting Double-Spending Attacks on the Bitcoin Blockchain: New Findings. Paper presented at 2021 IEEE/ACM 29th International Symposium on Quality of Service (IWQOS). |
|
Added by: Jack Last edited by: Jack 9/25/24, 9:33 PM |
|
Jiang, Y., & Zhang, J. (2024). Profitability Analysis of Time-Restricted Double-Spending Attack on PoW-Based Large Scale Blockchain With the Aid of Multiple Types of Attacks, IEEE Transactions on Information Forensics and Security, 19, 8155–8171. |
|
Added by: Jack Last edited by: Jack 9/19/24, 10:59 PM |
|
Grunspan, C., & Perez-Marco, R. (2022). On Profitability of Nakamoto Double Spend, Probability in the Engineering and Informational Sciences, 36(3), 732–746. |
|
Added by: Rucknium Last edited by: Rucknium 9/14/24, 2:08 PM |
|
Grunspan, C., & Perez-Marco, R. 2017. Satoshi Risk Tables. |
|
Added by: Rucknium Last edited by: Rucknium 9/13/24, 1:39 PM |
|
Feickert, A., & Isthmus. (2024). Monero output lock analysis. Unpublished manuscript. |
|
Added by: Rucknium 9/4/24, 4:56 PM |
|
Goodell, B. (2024). History and state of Monero security analysis. Unpublished manuscript. |
|
Added by: opal 8/20/24, 2:44 PM |
|
Feickert, A. (2024). Salvium review. Unpublished manuscript. |
|
Added by: opal Last edited by: opal 8/20/24, 2:33 PM |
|
Franzoni, F., & Daza, V. (2022). SoK: Network-Level Attacks on the Bitcoin P2P Network, IEEE Access, 10, 94924–94962. |
|
Added by: Rucknium 8/9/24, 7:50 PM |
|
Franzoni, F., Salleras, X., & Daza, V. (2022). AToM: Active topology monitoring for the bitcoin peer-to-peer network, Peer-to-Peer Networking and Applications, 15(1), 408–425. |
|
Added by: Rucknium 8/9/24, 6:32 PM |
|
Feickert, A. (2024). Veridise divisor report review. Unpublished manuscript. |
|
Added by: Rucknium 8/9/24, 6:07 PM |
|
Bassa, A. (2024). Soundness Proof for Eagen’s Proof of Sums of Points. Unpublished manuscript. |
|
Added by: Rucknium 8/9/24, 6:02 PM |
|
Campanelli, M., Hall-Andersen, M., & Kamp, S. H. 2022. Curve Trees: Practical and Transparent Zero-Knowledge Accumulators. [Cryptology ePrint Archive, Paper 2022/756]. |
|
Added by: Rucknium Last edited by: Rucknium 8/9/24, 5:59 PM |
|
Feickert, A. (2024). FCMP++ review. Unpublished manuscript. |
|
Added by: Rucknium 8/9/24, 5:54 PM |
|
Parker, L. (2024). FCMP++. Unpublished manuscript. |
|
Added by: Rucknium 8/9/24, 5:45 PM |
|
Feickert, A. (2024). Generalized Bulletproofs. Unpublished manuscript. |
|
Added by: Rucknium Last edited by: Rucknium 8/9/24, 5:41 PM |
|
Fomenko, O., & Sokolov, M. (2024). Bulletproofs++. Construction and Examples. Unpublished manuscript. |
|
Added by: Rucknium 8/9/24, 5:33 PM |
|
Fanti, G., & Viswanath, P. 2017. Anonymity Properties of the Bitcoin P2P Network. |
|
Added by: Rucknium Last edited by: Rucknium 8/1/24, 4:27 PM |
|
Bojja Venkatakrishnan, S., Fanti, G., & Viswanath, P. (2017). Dandelion: Redesigning the Bitcoin Network for Anonymity, Proc. ACM Meas. Anal. Comput. Syst. 1(1). |
|
Added by: Rucknium 8/1/24, 4:22 PM |
|
Franzoni, F., & Daza, V. (2022). Clover: An anonymous transaction relay protocol for the bitcoin P2P network, Peer-to-Peer Networking and Applications, 15(1), 290–303. |
|
Added by: Rucknium 7/10/24, 4:09 PM |
|
Scala, E., & Mostarda, L. 2024, Efficient Inner-Product Argument from Compressed $Sigma$-Protocols and Applications. Paper presented at International Conference on Advanced Information Networking and Applications. |
|
Added by: Jack Last edited by: Jack 6/12/24, 12:50 PM |
|
Yue, Z., Zhu, H., Chang, X., Mišić, J., Mišić, V. B., & Fan, J. 2024. MBCT: A Monero-Based Covert Transmission Approach with On-chain Dynamic Session Key Negotiation. |
|
Added by: Rucknium Last edited by: Rucknium 5/23/24, 6:07 PM |
|
Jiang, P., Zhu, J., & Zhu, L. (2024). Balancing Privacy and Regulation of Cross-chain Transaction Systems via SoK-assisted Policy Enhancement, IEEE Transactions on Information Forensics and Security, 1–1. |
|
Added by: Rucknium Last edited by: Rucknium 5/23/24, 6:01 PM |
|
Shi, R., Ge, Y., Lan, L., Peng, Z., Lin, S., & Li, L. 2024, Deanonymizing Transactions Originating from Monero Tor Hidden Service Nodes. Paper presented at Companion Proceedings of the ACM on Web Conference 2024. |
|
Added by: Rucknium 5/23/24, 5:47 PM |
|
Eagen, L. Li. E. 2022. Bulletproofs++. [Cryptology ePrint Archive, Report 2022/510]. |
|
Added by: Plowsof Last edited by: Rucknium 4/5/24, 10:13 PM |
|
Feickert, A. 2024. Bulletproofs++ review. Cypher Stack. [Peer review] |
|
Added by: Rucknium 4/5/24, 10:08 PM |
|
Abreu, A. S. (2023). Esquemas de privacidade nas moedas criptográficas Monero e Zcash. Unpublished Bacharelado Thesis, Universidade de São Paulo, São Paulo, Brazil. |
|
Added by: Rucknium 4/5/24, 10:07 PM |
|
Bobolz, J., Diaz, J., & Kohlweiss, M. 2024. Foundations of Anonymous Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions. [Cryptology ePrint Archive, Paper 2024/042]. |
|
Added by: Rucknium Last edited by: Rucknium 4/5/24, 9:33 PM |
|
Amrollahi, A., & Mofrad, M. A. 2023, Towards unraveling power dynamics in Information Systems research: A systematic literature review through the lens of activity theory. Paper presented at ACIS 2023. |
|
Added by: Rucknium 4/5/24, 9:26 PM |
|
Otávio Chervinski, J., Kreutz, D., & Yu, J. 2021, Analysis of transaction flooding attacks against Monero. Paper presented at 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). |
|
Added by: Rucknium Last edited by: Rucknium 3/16/24, 1:00 PM |
|
Duan, J., Zheng, S., Wang, W., Wang, L., Hu, X., & Gu, L. (2024). Concise RingCT Protocol Based on Linkable Threshold Ring Signature, IEEE Transactions on Dependable and Secure Computing, (1), 1–15. |
|
Added by: Jack Last edited by: Jack 2/27/24, 1:42 PM |
|