MoneroResearch.info hosts a collection of research papers relevant to improving Monero, powered by the WIKINDX open source software.
Anyone can browse the papers. To create new entries, edit existing one, and add annotations, you must be a registered user. To register as a user, message Rucknium on Matrix at Rucknium:monero.social . At this time there is no guarantee of stability or security of this website.
Recent additions or edits (WIKINDX Master Bibliography)
Aranha, D. F., Hall-Andersen, M., Nitulescu, A., Pagnin, E., & Yakoubov, S. 2021. Count me in! Extendability for Threshold Ring Signatures. [Cryptology ePrint Archive, Report 2021/1240] |
|
Added by: Plowsof Last edited by: Rucknium 6/3/25, 8:06 PM |
|
Gao, Y., Zhang, Y., Piškorec, M., & Tessone, C. J. 2025. Monero Peer-to-peer Network Topology Analysis. |
|
Added by: Rucknium Last edited by: Rucknium 6/3/25, 5:59 PM |
|
Biryukov, A., & Tikhomirov, S. 2019, Deanonymization and Linkability of Cryptocurrency Transactions Based on Network Analysis. Paper presented at 2019 IEEE European Symposium on Security and Privacy (EuroS&P). |
|
Added by: Rucknium Last edited by: Rucknium 6/3/25, 5:56 PM |
|
Zheng, C., Meng, S., Junxian, D., & Liehuang, Z. 2024, From Ledger to P2P Network: De-anonymization on Bitcoin Using Cross-Layer Analysis. Paper presented at Advanced Parallel Processing Technologies. |
|
Added by: Rucknium 6/3/25, 5:38 PM |
|
Keller, P., Florian, M., & Böhme, R. 2021, Collaborative Deanonymization. Paper presented at Financial Cryptography and Data Security. FC 2021 International Workshops. |
|
Added by: Rucknium 6/3/25, 5:31 PM |
|
Tabatabaee, S. A., Nicer, C., Beschastnikh, I., & Feng, C. 2021. One Bad Apple Spoils the Bunch: Transaction DoS in MimbleWimble Blockchains. |
|
Added by: Rucknium Last edited by: Rucknium 6/3/25, 5:23 PM |
|
Dittrich, D., Bailey, M., & Kenneally, E. (2013). Applying Ethical Principles to Information and Communication Technology Research: A Companion to the Menlo Report. U.S. Department of Homeland Security. |
|
Added by: Rucknium Last edited by: Rucknium 6/3/25, 4:42 PM |
|
Dittrich, D., & Kenneally, E. (2012). The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research. U.S. Department of Homeland Security. |
|
Added by: Rucknium Last edited by: Rucknium 6/3/25, 4:39 PM |
|
Howell, A., Saber, T., & Bendechache, M. (2023). Measuring node decentralisation in blockchain peer to peer networks, Blockchain: Research and Applications, 4(1), 100109. |
|
Added by: Rucknium 6/3/25, 4:28 PM |
|
Kopyciok, Y., Victor, F., & Schmid, S. 2025. Moneros Decentralized P2P Exchanges: Functionality, Adoption, and Privacy Risks. |
|
Added by: Rucknium Last edited by: Rucknium 6/3/25, 4:15 PM |
|
Eagen, L. 2022. Zero Knowledge Proofs of Elliptic Curve Inner Products from Principal Divisors and Weil Reciprocity. [Cryptology {ePrint} Archive, Paper 2022/596]. |
|
Added by: Rucknium Last edited by: Rucknium 5/27/25, 10:24 PM |
|
Goodell, B., Salazar, R., Slaughter, F., & Szramowski, L. (2025). A Further Review of the DL Gadget Of Interest. Unpublished manuscript. |
|
Added by: Rucknium 5/27/25, 10:17 PM |
|
Salazar, R., Slaughter, F., & Szramowski, L. (2025). Veridise Logarithmic Derivative Review. Unpublished manuscript. |
|
Added by: Rucknium 5/27/25, 10:11 PM |
|
Gao, Y., Piškorec, M., Zhang, Y., Vallarano, N., & Tessone, C. J. 2025. Charting the Uncharted: The Landscape of Monero Peer-to-Peer Network. |
|
Added by: Rucknium Last edited by: Rucknium 4/29/25, 9:18 PM |
|
Thakore, V., & Vijayakumaran, S. (2025). MProve-Nova: A Privacy-Preserving Proof of Reserves Protocol for Monero, Proceedings on Privacy Enhancing Technologies, 2025(2), 582–606. |
|
Added by: Rucknium 4/16/25, 3:19 PM |
|
Duan, J., Wang, W., Wang, L., & Gu, L. (2025). Transitioning RingCT Accounts: From Classical to Post-Quantum Security, IEEE Internet of Things Journal, 12(2), 2090–2105. |
|
Added by: Rucknium 4/16/25, 3:10 PM |
|
Buccafurri, F., De Angelis, V., & Lazzaro, S. 2024, October, K-Anonymous Payments in Pseudonymous Blockchains. Paper presented at 2024 20th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). |
|
Added by: Rucknium 4/16/25, 3:07 PM |
|
Dingledine, R., & Mathewson, N. (2005). Anonymity Loves Company: Usability and the Network Effect. In Designing Security Systems That People Can Use (pp. 547–559). O'Reilly.. |
|
Added by: Rucknium 4/16/25, 2:59 PM |
|
Acquisti, A., Dingledine, R., & Syverson, P. 2003, On the Economics of Anonymity. Paper presented at Financial Cryptography. |
|
Added by: Rucknium 4/16/25, 1:54 PM |
|
Švarcmajer, M., Köhler, M., Marinčić, J., & Perić, J. 2025, Utilizing Faculty Computers for Cryptocurrency Validation and Mining During Idle Time. Paper presented at 33rd International Conference on Organization and Technology of Maintenance (OTO 2024). |
|
Added by: Rucknium 4/15/25, 3:17 PM |
|
Yang, X., Xu, L., & Zhu, L. (2025). De-anonymizing Monero: A Maximum Weighted Matching-Based Approach, IEEE Transactions on Information Forensics and Security. |
|
Added by: Jack Last edited by: Jack 4/15/25, 2:25 PM |
|
ACK-J, A.-J. 2022. LORD OF THE RINGS: AN EMPIRICAL ANALYSIS OF MONERO’S RING SIGNATURE RESILIENCE TO ARTIFICIALLY INTELLIGENT ATTACKS. Multidisciplinary Academic Grants in Cryptocurrencies. |
|
Added by: Jack Last edited by: Jack 4/15/25, 2:14 PM |
|
Bassa, A. (2025). Soundness Proof for an Interactive Protocol for the Discrete Logarithm Relation. Unpublished manuscript. |
|
Added by: Rucknium 4/2/25, 6:11 PM |
|
Babb, J., Goodell, B., Parker, L., Salazar, R., Slaughter, F., & Szramowski, L. (2025). FROSTLASS: Flexible Ring-Oriented Schnorr-like Thresholdized Linkably Anonymous Signature Scheme. Unpublished manuscript. |
|
Added by: Rucknium Last edited by: Rucknium 3/18/25, 6:49 PM |
|
Dutta, A., & Vijayakumaran, S. 2019, June, MProve: A Proof of Reserves Protocol for Monero Exchanges. Paper presented at 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). |
|
Added by: Rucknium 3/18/25, 6:22 PM |
|
Aeeneh, S., Chervinski, J. O., Yu, J., & Zlatanov, N. 2021, May, New Attacks on the Untraceability of Transactions in CryptoNote-Style Blockchains. Paper presented at 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). |
|
Added by: Rucknium 3/4/25, 7:18 PM |
|
Kumar, A., Fischer, C., Tople, S., & Saxena, P. 2017, September, A Traceability Analysis of Monero’s Blockchain. Paper presented at European Symposium on Research in Computer Security (ESORICS). |
|
Added by: Rucknium Last edited by: Rucknium 3/4/25, 7:08 PM |
|
Feickert, A. (2024). Zano d/v-CLSAG review. Unpublished manuscript. |
|
Added by: Rucknium 3/4/25, 4:05 PM |
|
Chiang, J. H.-Y., Damgård, I., Duro, W. R., Engan, S., Kolby, S., & Scholl, P. 2025. Post-Quantum Threshold Ring Signature Applications from VOLE-in-the-Head. [Cryptology {ePrint} Archive, Paper 2025/113]. |
|
Added by: Rucknium Last edited by: Rucknium 2/27/25, 5:15 PM |
|
Goodell, B., Salazar, R., & Slaughter, F. 2025. Uniformly Most Powerful Tests for Ad Hoc Transactions in Monero. [Cryptology {ePrint} Archive, Paper 2025/221]. |
|
Added by: Rucknium Last edited by: Rucknium 2/27/25, 4:32 PM |
|
Baseri, Y., Hafid, A., Shahsavari, Y., Makrakis, D., & Khodaiemehr, H. 2025. Blockchain Security Risk Assessment in Quantum Era, Migration Strategies and Proactive Defense. |
|
Added by: Rucknium Last edited by: Rucknium 2/27/25, 4:26 PM |
|
Nick, J., Eagen, L., & Linus, R. 2025. Shielded CSV: Private and Efficient Client-Side Validation. [Cryptology {ePrint} Archive, Paper 2025/068]. |
|
Added by: Rucknium Last edited by: Rucknium 2/27/25, 4:24 PM |
|
Mikic, M., Srbakoski, M., & Praska, S. 2025. Post-Quantum Stealth Address Protocols. |
|
Added by: Rucknium Last edited by: Rucknium 2/27/25, 4:20 PM |
|
Shi, R., Peng, Z., Lan, L., Ge, Y., Liu, P., & Wang, Q., et al. 2025, February 24–28, Eclipse Attacks on Monero’s Peer-to-Peer Network. Unpublished paper presented at Network and Distributed System Security (NDSS) Symposium 2025. |
|
Added by: Rucknium 2/27/25, 4:05 PM |
|
Bonhomme, S., Jochmans, K., & Robin, J.-M. (2016). Non-parametric estimation of finite mixtures from repeated measurements, Journal of the Royal Statistical Society. Series B (Statistical Methodology), 78(1), 211–229. |
|
Added by: Rucknium 2/22/25, 11:13 PM |
|
Patra, R. K., & Sen, B. (2016). Estimation of a two-component mixture model with applications to multiple testing, Journal of the Royal Statistical Society. Series B (Statistical Methodology), 78(4), 869–893. |
|
Added by: Rucknium 2/22/25, 11:11 PM |
|
Guo, S. 2024, Secure Monero on Corrupted Machines with Reverse Firewalls. Paper presented at International Conference on Data Security and Privacy Protection. |
|
Added by: Jack Last edited by: Jack 1/17/25, 5:31 PM |
|
Papadoulis, G. (2025). Privacy and auditability in decentralized payment systems. |
|
Added by: Jack Last edited by: Jack 1/17/25, 5:28 PM |
|
Goodell, B. (2024). Security Review - Generalized Bulletproofs. Unpublished manuscript. |
|
Added by: Rucknium 12/6/24, 5:56 PM |
|
Slaughter, F., Goodell, B., & Salazar, R. (2024). An Audit of the FCMP++ Addressing Protocol: CARROT. Unpublished manuscript. |
|
Added by: Rucknium 11/27/24, 3:40 PM |
|
Bassa, A. (2024). On the Use of Logarithmic Derivatives in Eagen’s Proof of Sums of Points. Unpublished manuscript. |
|
Added by: Rucknium Last edited by: Rucknium 11/27/24, 3:39 PM |
|
Hammad, N., & Victor, F. 2024. Monero Traceability Heuristics: Wallet Application Bugs and the Mordinal-P2Pool Perspective. |
|
Added by: opal 9/25/24, 9:35 PM |
|
Zheng, J., Huang, H., Li, C., Zheng, Z., & Guo, S. 2021, Revisiting Double-Spending Attacks on the Bitcoin Blockchain: New Findings. Paper presented at 2021 IEEE/ACM 29th International Symposium on Quality of Service (IWQOS). |
|
Added by: Jack Last edited by: Jack 9/25/24, 9:33 PM |
|
Jiang, Y., & Zhang, J. (2024). Profitability Analysis of Time-Restricted Double-Spending Attack on PoW-Based Large Scale Blockchain With the Aid of Multiple Types of Attacks, IEEE Transactions on Information Forensics and Security, 19, 8155–8171. |
|
Added by: Jack Last edited by: Jack 9/19/24, 10:59 PM |
|
Grunspan, C., & Perez-Marco, R. (2022). On Profitability of Nakamoto Double Spend, Probability in the Engineering and Informational Sciences, 36(3), 732–746. |
|
Added by: Rucknium Last edited by: Rucknium 9/14/24, 2:08 PM |
|
Grunspan, C., & Perez-Marco, R. 2017. Satoshi Risk Tables. |
|
Added by: Rucknium Last edited by: Rucknium 9/13/24, 1:39 PM |
|
Feickert, A., & Isthmus. (2024). Monero output lock analysis. Unpublished manuscript. |
|
Added by: Rucknium 9/4/24, 4:56 PM |
|
Goodell, B. (2024). History and state of Monero security analysis. Unpublished manuscript. |
|
Added by: opal 8/20/24, 2:44 PM |
|
Feickert, A. (2024). Salvium review. Unpublished manuscript. |
|
Added by: opal Last edited by: opal 8/20/24, 2:33 PM |
|
Franzoni, F., & Daza, V. (2022). SoK: Network-Level Attacks on the Bitcoin P2P Network, IEEE Access, 10, 94924–94962. |
|
Added by: Rucknium 8/9/24, 7:50 PM |
|