Aranha, D. F., Hall-Andersen, M., Nitulescu, A., Pagnin, E., & Yakoubov, S. 2021. Count me in! Extendability for Threshold Ring Signatures. [Cryptology ePrint Archive, Report 2021/1240] |
|
Added by: Plowsof Last edited by: Rucknium 03/06/2025, 20:06 |
|
Gao, Y., Zhang, Y., Piškorec, M., & Tessone, C. J. 2025. Monero Peer-to-peer Network Topology Analysis. |
|
Added by: Rucknium Last edited by: Rucknium 03/06/2025, 17:59 |
|
Biryukov, A., & Tikhomirov, S. 2019, Deanonymization and Linkability of Cryptocurrency Transactions Based on Network Analysis. Paper presented at 2019 IEEE European Symposium on Security and Privacy (EuroS&P). |
|
Added by: Rucknium Last edited by: Rucknium 03/06/2025, 17:56 |
|
Zheng, C., Meng, S., Junxian, D., & Liehuang, Z. 2024, From Ledger to P2P Network: De-anonymization on Bitcoin Using Cross-Layer Analysis. Paper presented at Advanced Parallel Processing Technologies. |
|
Added by: Rucknium 03/06/2025, 17:38 |
|
Keller, P., Florian, M., & Böhme, R. 2021, Collaborative Deanonymization. Paper presented at Financial Cryptography and Data Security. FC 2021 International Workshops. |
|
Added by: Rucknium 03/06/2025, 17:31 |
|
Tabatabaee, S. A., Nicer, C., Beschastnikh, I., & Feng, C. 2021. One Bad Apple Spoils the Bunch: Transaction DoS in MimbleWimble Blockchains. |
|
Added by: Rucknium Last edited by: Rucknium 03/06/2025, 17:23 |
|
Dittrich, D., Bailey, M., & Kenneally, E. (2013). Applying Ethical Principles to Information and Communication Technology Research: A Companion to the Menlo Report. U.S. Department of Homeland Security. |
|
Added by: Rucknium Last edited by: Rucknium 03/06/2025, 16:42 |
|
Dittrich, D., & Kenneally, E. (2012). The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research. U.S. Department of Homeland Security. |
|
Added by: Rucknium Last edited by: Rucknium 03/06/2025, 16:39 |
|
Howell, A., Saber, T., & Bendechache, M. (2023). Measuring node decentralisation in blockchain peer to peer networks, Blockchain: Research and Applications, 4(1), 100109. |
|
Added by: Rucknium 03/06/2025, 16:28 |
|
Kopyciok, Y., Victor, F., & Schmid, S. 2025. Moneros Decentralized P2P Exchanges: Functionality, Adoption, and Privacy Risks. |
|
Added by: Rucknium Last edited by: Rucknium 03/06/2025, 16:15 |
|
Eagen, L. 2022. Zero Knowledge Proofs of Elliptic Curve Inner Products from Principal Divisors and Weil Reciprocity. [Cryptology {ePrint} Archive, Paper 2022/596]. |
|
Added by: Rucknium Last edited by: Rucknium 27/05/2025, 22:24 |
|
Goodell, B., Salazar, R., Slaughter, F., & Szramowski, L. (2025). A Further Review of the DL Gadget Of Interest. Unpublished manuscript. |
|
Added by: Rucknium 27/05/2025, 22:17 |
|
Salazar, R., Slaughter, F., & Szramowski, L. (2025). Veridise Logarithmic Derivative Review. Unpublished manuscript. |
|
Added by: Rucknium 27/05/2025, 22:11 |
|
Gao, Y., Piškorec, M., Zhang, Y., Vallarano, N., & Tessone, C. J. 2025. Charting the Uncharted: The Landscape of Monero Peer-to-Peer Network. |
|
Added by: Rucknium Last edited by: Rucknium 29/04/2025, 21:18 |
|
Thakore, V., & Vijayakumaran, S. (2025). MProve-Nova: A Privacy-Preserving Proof of Reserves Protocol for Monero, Proceedings on Privacy Enhancing Technologies, 2025(2), 582–606. |
|
Added by: Rucknium 16/04/2025, 15:19 |
|
Duan, J., Wang, W., Wang, L., & Gu, L. (2025). Transitioning RingCT Accounts: From Classical to Post-Quantum Security, IEEE Internet of Things Journal, 12(2), 2090–2105. |
|
Added by: Rucknium 16/04/2025, 15:10 |
|
Buccafurri, F., De Angelis, V., & Lazzaro, S. 2024, October, K-Anonymous Payments in Pseudonymous Blockchains. Paper presented at 2024 20th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). |
|
Added by: Rucknium 16/04/2025, 15:07 |
|
Dingledine, R., & Mathewson, N. (2005). Anonymity Loves Company: Usability and the Network Effect. In Designing Security Systems That People Can Use (pp. 547–559). O'Reilly.. |
|
Added by: Rucknium 16/04/2025, 14:59 |
|
Acquisti, A., Dingledine, R., & Syverson, P. 2003, On the Economics of Anonymity. Paper presented at Financial Cryptography. |
|
Added by: Rucknium 16/04/2025, 13:54 |
|
Švarcmajer, M., Köhler, M., Marinčić, J., & Perić, J. 2025, Utilizing Faculty Computers for Cryptocurrency Validation and Mining During Idle Time. Paper presented at 33rd International Conference on Organization and Technology of Maintenance (OTO 2024). |
|
Added by: Rucknium 15/04/2025, 15:17 |
|
Yang, X., Xu, L., & Zhu, L. (2025). De-anonymizing Monero: A Maximum Weighted Matching-Based Approach, IEEE Transactions on Information Forensics and Security. |
|
Added by: Jack Last edited by: Jack 15/04/2025, 14:25 |
|
ACK-J, A.-J. 2022. LORD OF THE RINGS: AN EMPIRICAL ANALYSIS OF MONERO’S RING SIGNATURE RESILIENCE TO ARTIFICIALLY INTELLIGENT ATTACKS. Multidisciplinary Academic Grants in Cryptocurrencies. |
|
Added by: Jack Last edited by: Jack 15/04/2025, 14:14 |
|
Bassa, A. (2025). Soundness Proof for an Interactive Protocol for the Discrete Logarithm Relation. Unpublished manuscript. |
|
Added by: Rucknium 02/04/2025, 18:11 |
|
Babb, J., Goodell, B., Parker, L., Salazar, R., Slaughter, F., & Szramowski, L. (2025). FROSTLASS: Flexible Ring-Oriented Schnorr-like Thresholdized Linkably Anonymous Signature Scheme. Unpublished manuscript. |
|
Added by: Rucknium Last edited by: Rucknium 18/03/2025, 18:49 |
|
Dutta, A., & Vijayakumaran, S. 2019, June, MProve: A Proof of Reserves Protocol for Monero Exchanges. Paper presented at 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). |
|
Added by: Rucknium 18/03/2025, 18:22 |
|
Aeeneh, S., Chervinski, J. O., Yu, J., & Zlatanov, N. 2021, May, New Attacks on the Untraceability of Transactions in CryptoNote-Style Blockchains. Paper presented at 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). |
|
Added by: Rucknium 04/03/2025, 19:18 |
|
Kumar, A., Fischer, C., Tople, S., & Saxena, P. 2017, September, A Traceability Analysis of Monero’s Blockchain. Paper presented at European Symposium on Research in Computer Security (ESORICS). |
|
Added by: Rucknium Last edited by: Rucknium 04/03/2025, 19:08 |
|
Feickert, A. (2024). Zano d/v-CLSAG review. Unpublished manuscript. |
|
Added by: Rucknium 04/03/2025, 16:05 |
|
Chiang, J. H.-Y., Damgård, I., Duro, W. R., Engan, S., Kolby, S., & Scholl, P. 2025. Post-Quantum Threshold Ring Signature Applications from VOLE-in-the-Head. [Cryptology {ePrint} Archive, Paper 2025/113]. |
|
Added by: Rucknium Last edited by: Rucknium 27/02/2025, 17:15 |
|
Goodell, B., Salazar, R., & Slaughter, F. 2025. Uniformly Most Powerful Tests for Ad Hoc Transactions in Monero. [Cryptology {ePrint} Archive, Paper 2025/221]. |
|
Added by: Rucknium Last edited by: Rucknium 27/02/2025, 16:32 |
|
Baseri, Y., Hafid, A., Shahsavari, Y., Makrakis, D., & Khodaiemehr, H. 2025. Blockchain Security Risk Assessment in Quantum Era, Migration Strategies and Proactive Defense. |
|
Added by: Rucknium Last edited by: Rucknium 27/02/2025, 16:26 |
|
Nick, J., Eagen, L., & Linus, R. 2025. Shielded CSV: Private and Efficient Client-Side Validation. [Cryptology {ePrint} Archive, Paper 2025/068]. |
|
Added by: Rucknium Last edited by: Rucknium 27/02/2025, 16:24 |
|
Mikic, M., Srbakoski, M., & Praska, S. 2025. Post-Quantum Stealth Address Protocols. |
|
Added by: Rucknium Last edited by: Rucknium 27/02/2025, 16:20 |
|
Shi, R., Peng, Z., Lan, L., Ge, Y., Liu, P., & Wang, Q., et al. 2025, February 24–28, Eclipse Attacks on Monero’s Peer-to-Peer Network. Unpublished paper presented at Network and Distributed System Security (NDSS) Symposium 2025. |
|
Added by: Rucknium 27/02/2025, 16:05 |
|
Bonhomme, S., Jochmans, K., & Robin, J.-M. (2016). Non-parametric estimation of finite mixtures from repeated measurements, Journal of the Royal Statistical Society. Series B (Statistical Methodology), 78(1), 211–229. |
|
Added by: Rucknium 22/02/2025, 23:13 |
|
Patra, R. K., & Sen, B. (2016). Estimation of a two-component mixture model with applications to multiple testing, Journal of the Royal Statistical Society. Series B (Statistical Methodology), 78(4), 869–893. |
|
Added by: Rucknium 22/02/2025, 23:11 |
|
Guo, S. 2024, Secure Monero on Corrupted Machines with Reverse Firewalls. Paper presented at International Conference on Data Security and Privacy Protection. |
|
Added by: Jack Last edited by: Jack 17/01/2025, 17:31 |
|
Papadoulis, G. (2025). Privacy and auditability in decentralized payment systems. |
|
Added by: Jack Last edited by: Jack 17/01/2025, 17:28 |
|
Goodell, B. (2024). Security Review - Generalized Bulletproofs. Unpublished manuscript. |
|
Added by: Rucknium 06/12/2024, 17:56 |
|
Slaughter, F., Goodell, B., & Salazar, R. (2024). An Audit of the FCMP++ Addressing Protocol: CARROT. Unpublished manuscript. |
|
Added by: Rucknium 27/11/2024, 15:40 |
|
Bassa, A. (2024). On the Use of Logarithmic Derivatives in Eagen’s Proof of Sums of Points. Unpublished manuscript. |
|
Added by: Rucknium Last edited by: Rucknium 27/11/2024, 15:39 |
|
Hammad, N., & Victor, F. 2024. Monero Traceability Heuristics: Wallet Application Bugs and the Mordinal-P2Pool Perspective. |
|
Added by: opal 25/09/2024, 21:35 |
|
Zheng, J., Huang, H., Li, C., Zheng, Z., & Guo, S. 2021, Revisiting Double-Spending Attacks on the Bitcoin Blockchain: New Findings. Paper presented at 2021 IEEE/ACM 29th International Symposium on Quality of Service (IWQOS). |
|
Added by: Jack Last edited by: Jack 25/09/2024, 21:33 |
|
Jiang, Y., & Zhang, J. (2024). Profitability Analysis of Time-Restricted Double-Spending Attack on PoW-Based Large Scale Blockchain With the Aid of Multiple Types of Attacks, IEEE Transactions on Information Forensics and Security, 19, 8155–8171. |
|
Added by: Jack Last edited by: Jack 19/09/2024, 22:59 |
|
Grunspan, C., & Perez-Marco, R. (2022). On Profitability of Nakamoto Double Spend, Probability in the Engineering and Informational Sciences, 36(3), 732–746. |
|
Added by: Rucknium Last edited by: Rucknium 14/09/2024, 14:08 |
|
Grunspan, C., & Perez-Marco, R. 2017. Satoshi Risk Tables. |
|
Added by: Rucknium Last edited by: Rucknium 13/09/2024, 13:39 |
|
Feickert, A., & Isthmus. (2024). Monero output lock analysis. Unpublished manuscript. |
|
Added by: Rucknium 04/09/2024, 16:56 |
|
Goodell, B. (2024). History and state of Monero security analysis. Unpublished manuscript. |
|
Added by: opal 20/08/2024, 14:44 |
|
Feickert, A. (2024). Salvium review. Unpublished manuscript. |
|
Added by: opal Last edited by: opal 20/08/2024, 14:33 |
|
Franzoni, F., & Daza, V. (2022). SoK: Network-Level Attacks on the Bitcoin P2P Network, IEEE Access, 10, 94924–94962. |
|
Added by: Rucknium 09/08/2024, 19:50 |
|