| Ziegler, M. H., Nowostawski, M., & Katt, B. (2025). A Systematic Literature Review of Information Privacy in Blockchain Systems. Journal of Cybersecurity and Privacy, 5(3), 65. |
|
| Added by: Jack Last edited by: Jack 04/11/2025, 16:09 |
|
| Yang, X., Xu, L., & Zhu, L. (2025). De-anonymizing Monero: A Maximum Weighted Matching-Based Approach. IEEE Transactions on Information Forensics and Security. |
|
| Added by: Jack Last edited by: Jack 15/04/2025, 14:25 |
|
| Wang, N., Wang, Q., Liu, D., Esgin, M. F., & Abuadbba, A. (2025). BulletCT: Towards More Scalable Ring Confidential Transactions With Transparent Setup. BulletCT: Towards More Scalable Ring Confidential Transactions With Transparent Setup. |
|
| Added by: Jack Last edited by: Jack 04/11/2025, 16:01 |
|
| Venturi, A., Jerico-Yoldi, I., Zola, F., & Orduna, R. (2025). ART: A Graph-based Framework for Investigating Illicit Activity in Monero via Address-Ring-Transaction Structures. |
|
| Added by: Rucknium Last edited by: Rucknium 09/12/2025, 22:30 |
|
| Tong, X., Zhou, J., Cao, Z., Dong, X., & Choo, K.-K. R. (2025). A Ring Signature With Aggregation for Ensuring Privacy in Blockchain Transactions. IEEE Internet of Things Journal, 12(12), 21001–21015. |
|
| Added by: Jack Last edited by: Jack 04/11/2025, 15:47 |
|
| Thakore, V., & Vijayakumaran, S. (2025). MProve-Nova: A Privacy-Preserving Proof of Reserves Protocol for Monero. Proceedings on Privacy Enhancing Technologies, 2025(2), 582–606. |
|
| Added by: Rucknium 16/04/2025, 15:19 |
|
| Švarcmajer, M., Köhler, M., Marinčić, J., & Perić, J. 2025, Utilizing Faculty Computers for Cryptocurrency Validation and Mining During Idle Time. Paper presented at 33rd International Conference on Organization and Technology of Maintenance (OTO 2024). |
|
| Added by: Rucknium 15/04/2025, 15:17 |
|
| Shi, R., Peng, Z., Lan, L., Ge, Y., Liu, P., & Wang, Q., et al. 2025, February 24–28, Eclipse Attacks on Monero’s Peer-to-Peer Network. Unpublished paper presented at Network and Distributed System Security (NDSS) Symposium 2025. |
|
| Added by: Rucknium 27/02/2025, 16:05 |
|
| Salazar, R., Slaughter, F., & Szramowski, L. (2025). Veridise Logarithmic Derivative Review. Unpublished manuscript. |
|
| Added by: Rucknium 27/05/2025, 22:11 |
|
| RostamkolaeiMotlagh, S., Pahl, C., Barzegar, H. R., & El Ioini, N. (2025). A Technology Review of Zero Knowledge Proof Techniques. A Technology Review of Zero Knowledge Proof Techniques. |
|
| Added by: Jack Last edited by: Rucknium 09/12/2025, 22:29 |
|
| Papadoulis, G. (2025). Privacy and auditability in decentralized payment systems. |
|
| Added by: Jack Last edited by: Jack 17/01/2025, 17:28 |
|
| Nick, J., Eagen, L., & Linus, R. (2025). Shielded CSV: Private and Efficient Client-Side Validation. [Cryptology {ePrint} Archive, Paper 2025/068]. |
|
| Added by: Rucknium Last edited by: Rucknium 27/02/2025, 16:24 |
|
| Mikic, M., Srbakoski, M., & Praska, S. (2025). Post-Quantum Stealth Address Protocols. |
|
| Added by: Rucknium Last edited by: Rucknium 27/02/2025, 16:20 |
|
| Lee, S., & Kim, H. (2025). Inside Qubic's Selfish Mining Campaign on Monero: Evidence, Tactics, and Limits. |
|
| Added by: Rucknium Last edited by: Rucknium 09/12/2025, 22:39 |
|
| Lee, J., Choi, G., Han, J., & Park, J. (2025). Advanced Monero wallet forensics: Demystifying off-chain artifacts to trace privacy-preserving cryptocurrency transactions. Forensic Science International: Digital Investigation, 54, 301988. |
|
| Added by: Jack Last edited by: Jack 06/11/2025, 16:29 |
|
| Kopyciok, Y., Victor, F., & Schmid, S. (2025). Moneros Decentralized P2P Exchanges: Functionality, Adoption, and Privacy Risks. |
|
| Added by: Rucknium Last edited by: Rucknium 03/06/2025, 16:15 |
|
| Kopyciok, Y., Schmid, S., & Victor, F. (2025). Friend or Foe? Identifying Anomalous Peers in Moneros P2P Network. |
|
| Added by: Rucknium 29/10/2025, 16:36 |
|
| Goodell, B., Salazar, R., Slaughter, F., & Szramowski, L. (2025). A Further Review of the DL Gadget Of Interest. Unpublished manuscript. |
|
| Added by: Rucknium 27/05/2025, 22:17 |
|
| Goodell, B., Salazar, R., & Slaughter, F. (2025). Uniformly Most Powerful Tests for Ad Hoc Transactions in Monero. [Cryptology {ePrint} Archive, Paper 2025/221]. |
|
| Added by: Rucknium Last edited by: Rucknium 27/02/2025, 16:32 |
|
| Gao, Y., Zhang, Y., Piškorec, M., & Tessone, C. J. (2025). Monero Peer-to-peer Network Topology Analysis. |
|
| Added by: Rucknium Last edited by: Rucknium 03/06/2025, 17:59 |
|
| Gao, Y., Piškorec, M., Zhang, Y., Vallarano, N., & Tessone, C. J. (2025). Charting the Uncharted: The Landscape of Monero Peer-to-Peer Network. |
|
| Added by: Rucknium Last edited by: Rucknium 29/04/2025, 21:18 |
|
| Duan, J., Wang, W., Wang, L., Gu, L., & Zhu, L. (2025). CRCT: Compact Ring Confidential Transactions Based on Sum Arguments. IEEE Transactions on Information Forensics and Security. |
|
| Added by: Jack Last edited by: Jack 03/11/2025, 19:46 |
|
| Duan, J., Wang, W., Wang, L., & Gu, L. (2025). Transitioning RingCT Accounts: From Classical to Post-Quantum Security. IEEE Internet of Things Journal, 12(2), 2090–2105. |
|
| Added by: Rucknium 16/04/2025, 15:10 |
|
| Chiang, J. H.-Y., Damgård, I., Duro, W. R., Engan, S., Kolby, S., & Scholl, P. (2025). Post-Quantum Threshold Ring Signature Applications from VOLE-in-the-Head. [Cryptology {ePrint} Archive, Paper 2025/113]. |
|
| Added by: Rucknium Last edited by: Rucknium 27/02/2025, 17:15 |
|
| Budish, E. (2025). Trust at Scale: The Economic Limits of Cryptocurrencies and Blockchains. The Quarterly Journal of Economics, 140(1), 1–62. |
|
| Added by: Rucknium Last edited by: Rucknium 30/07/2025, 00:12 |
|
| Bassa, A., & Sepanski, B. (2025). Security Assessment for the Helios–Selene Curve Cycle. Unpublished manuscript. |
|
| Added by: Rucknium Last edited by: Rucknium 09/12/2025, 21:59 |
|
| Bassa, A. (2025). Soundness Proof for an Interactive Protocol for the Discrete Logarithm Relation. Unpublished manuscript. |
|
| Added by: Rucknium 02/04/2025, 18:11 |
|
| Baseri, Y., Hafid, A., Shahsavari, Y., Makrakis, D., & Khodaiemehr, H. (2025). Blockchain Security Risk Assessment in Quantum Era, Migration Strategies and Proactive Defense. |
|
| Added by: Rucknium Last edited by: Rucknium 27/02/2025, 16:26 |
|
| Babb, J., Goodell, B., Parker, L., Salazar, R., Slaughter, F., & Szramowski, L. (2025). FROSTLASS: Flexible Ring-Oriented Schnorr-like Thresholdized Linkably Anonymous Signature Scheme. Unpublished manuscript. |
|
| Added by: Rucknium Last edited by: Rucknium 18/03/2025, 18:49 |
|
| Zheng, C., Meng, S., Junxian, D., & Liehuang, Z. 2024, From Ledger to P2P Network: De-anonymization on Bitcoin Using Cross-Layer Analysis. Paper presented at Advanced Parallel Processing Technologies. |
|
| Added by: Rucknium 03/06/2025, 17:38 |
|
| Zhang, J., Su, M., Liu, X., & Wang, G. 2024, May, Springproofs: Efficient Inner Product Arguments for Vectors of Arbitrary Length. Paper presented at 2024 IEEE Symposium on Security and Privacy (SP). |
|
| Added by: Rucknium 06/01/2024, 16:50 |
|
| Yue, Z., Zhu, H., Chang, X., Mišić, J., Mišić, V. B., & Fan, J. (2024). MBCT: A Monero-Based Covert Transmission Approach with On-chain Dynamic Session Key Negotiation. |
|
| Added by: Rucknium Last edited by: Rucknium 23/05/2024, 18:07 |
|
| Yu, Q., Liao, S., Wang, L., Yu, Y., Zhang, L., & Zhao, Y. (2024). A regulated anonymous cryptocurrency with batch linkability. Computer Standards & Interfaces, 87, 103770. |
|
| Added by: Rucknium 06/01/2024, 17:26 |
|
| Wang, N., & Liu, D. (2024). FlashSwift: A Configurable and More Efficient Range Proof With Transparent Setup. Proceedings on Privacy Enhancing Technologies. |
|
| Added by: Jack Last edited by: Jack 04/11/2025, 16:05 |
|
| Wang, N., Chau, S. C.-K., & Liu, D. 2024, SwiftRange: a short and efficient zero-knowledge range argument for confidential transactions and more. Paper presented at 2024 IEEE Symposium on Security and Privacy (SP). |
|
| Added by: Jack Last edited by: Jack 04/11/2025, 16:04 |
|
| Slaughter, F., Goodell, B., & Salazar, R. (2024). An Audit of the FCMP++ Addressing Protocol: CARROT. Unpublished manuscript. |
|
| Added by: Rucknium 27/11/2024, 15:40 |
|
| Shi, R., Ge, Y., Lan, L., Peng, Z., Lin, S., & Li, L. 2024, Deanonymizing Transactions Originating from Monero Tor Hidden Service Nodes. Paper presented at Companion Proceedings of the ACM on Web Conference 2024. |
|
| Added by: Rucknium 23/05/2024, 17:47 |
|
| Scala, E., & Mostarda, L. 2024, Efficient Inner-Product Argument from Compressed $Sigma$-Protocols and Applications. Paper presented at International Conference on Advanced Information Networking and Applications. |
|
| Added by: Jack Last edited by: Jack 12/06/2024, 12:50 |
|
| Parker, L. (2024). FCMP++. Unpublished manuscript. |
|
| Added by: Rucknium 09/08/2024, 17:45 |
|
| Jiang, P., Zhu, J., & Zhu, L. (2024). Balancing Privacy and Regulation of Cross-chain Transaction Systems via SoK-assisted Policy Enhancement. IEEE Transactions on Information Forensics and Security, 1–1. |
|
| Added by: Rucknium Last edited by: Rucknium 23/05/2024, 18:01 |
|
| Jiang, Y., & Zhang, J. (2024). Profitability Analysis of Time-Restricted Double-Spending Attack on PoW-Based Large Scale Blockchain With the Aid of Multiple Types of Attacks. IEEE Transactions on Information Forensics and Security, 19, 8155–8171. |
|
| Added by: Jack Last edited by: Jack 19/09/2024, 22:59 |
|
| Hammad, N., & Victor, F. (2024). Monero Traceability Heuristics: Wallet Application Bugs and the Mordinal-P2Pool Perspective. |
|
| Added by: opal 25/09/2024, 21:35 |
|
| Guo, S. 2024, Secure Monero on Corrupted Machines with Reverse Firewalls. Paper presented at International Conference on Data Security and Privacy Protection. |
|
| Added by: Jack Last edited by: Jack 17/01/2025, 17:31 |
|
| Goodell, B. (2024). Security Review - Generalized Bulletproofs. Unpublished manuscript. |
|
| Added by: Rucknium 06/12/2024, 17:56 |
|
| Goodell, B. (2024). History and state of Monero security analysis. Unpublished manuscript. |
|
| Added by: opal 20/08/2024, 14:44 |
|
| Fomenko, O., & Sokolov, M. (2024). Bulletproofs++. Construction and Examples. Unpublished manuscript. |
|
| Added by: Rucknium 09/08/2024, 17:33 |
|
| Feickert, A., & Isthmus. (2024). Monero output lock analysis. Unpublished manuscript. |
|
| Added by: Rucknium 04/09/2024, 16:56 |
|
| Feickert, A. (2024). Zano d/v-CLSAG review. Unpublished manuscript. |
|
| Added by: Rucknium 04/03/2025, 16:05 |
|
| Feickert, A. (2024). Veridise divisor report review. Unpublished manuscript. |
|
| Added by: Rucknium 09/08/2024, 18:07 |
|
| Feickert, A. (2024). Salvium review. Unpublished manuscript. |
|
| Added by: opal Last edited by: opal 20/08/2024, 14:33 |
|
| Feickert, A. (2024). Generalized Bulletproofs. Unpublished manuscript. |
|
| Added by: Rucknium Last edited by: Rucknium 09/08/2024, 17:41 |
|
| Feickert, A. (2024). FCMP++ review. Unpublished manuscript. |
|
| Added by: Rucknium 09/08/2024, 17:54 |
|
| Feickert, A. 2024. Bulletproofs++ review. Cypher Stack. [Peer review] |
|
| Added by: Rucknium 05/04/2024, 22:08 |
|
| Duan, J., Zheng, S., Wang, W., Wang, L., Hu, X., & Gu, L. (2024). Concise RingCT Protocol Based on Linkable Threshold Ring Signature. IEEE Transactions on Dependable and Secure Computing, (1), 1–15. |
|
| Added by: Jack Last edited by: Jack 27/02/2024, 13:42 |
|
| Buccafurri, F., De Angelis, V., & Lazzaro, S. 2024, October, K-Anonymous Payments in Pseudonymous Blockchains. Paper presented at 2024 20th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). |
|
| Added by: Rucknium 16/04/2025, 15:07 |
|
| Bobolz, J., Diaz, J., & Kohlweiss, M. (2024). Foundations of Anonymous Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions. [Cryptology ePrint Archive, Paper 2024/042]. |
|
| Added by: Rucknium Last edited by: Rucknium 05/04/2024, 21:33 |
|
| Bassa, A. (2024). Soundness Proof for Eagen’s Proof of Sums of Points. Unpublished manuscript. |
|
| Added by: Rucknium 09/08/2024, 18:02 |
|
| Bassa, A. (2024). On the Use of Logarithmic Derivatives in Eagen’s Proof of Sums of Points. Unpublished manuscript. |
|
| Added by: Rucknium Last edited by: Rucknium 27/11/2024, 15:39 |
|
| Zhang, T., Li, B., Zhu, Y., Han, T., & Wu, Q. (2023). Covert channels in blockchain and blockchain based covert communication: Overview, state-of-the-art, and future directions. Computer Communications, 205, 136–146. |
|
| Added by: Rucknium 05/01/2024, 19:23 |
|
| Zhang, T. (2023). Privacy Evaluation of Blockchain Based Privacy Cryptocurrencies: A Comparative Analysis of Dash, Monero, Verge, Zcash, and Grin. IEEE Transactions on Sustainable Computing, 8(4), 574–582. |
|
| Added by: Rucknium 06/01/2024, 17:50 |
|
| Wicht, F.-X., Wang, Z., Le, D. V., & Cachin, C. (2023). A Transaction-Level Model for Blockchain Privacy. [Cryptology ePrint Archive, Paper 2023/1902]. |
|
| Added by: Rucknium 06/01/2024, 17:04 |
|
| Wicht, F.-X., Cachin, C., & Le, D. V. (2023). Blockchain Privacy Notions Using the Transaction Graph Model. University of Fribourg. |
|
| Added by: Jack Last edited by: Jack 06/03/2023, 22:29 |
|
| Wang, X., Lin, L., & Wang, Y. (2023). Stealth Address Schemes With Fast Retrievability Based On Subgroup Membership Assumptions Related To Factoring. The Computer Journal, bxad056. |
|
| Added by: Jack Last edited by: Jack 07/06/2023, 12:27 |
|
| Wang, X., Lin, C., Huang, X., & He, D. (2023). Anonymity-Enhancing Multi-Hop Locks for Monero-Enabled Payment Channel Networks. IEEE Transactions on Information Forensics and Security, 1–1. |
|
| Added by: Rucknium 06/01/2024, 16:59 |
|
| Wahrst"atter, A., Solomon, M., DiFrancesco, B., Buterin, V., & Svetinovic, D. (2023). BaseSAP: Modular Stealth Address Protocol for Programmable Blockchains. arXiv preprint arXiv:2306.14272. |
|
| Added by: Jack Last edited by: Jack 29/07/2023, 03:09 |
|
| Tiemann, T., Berndt, S., Eisenbarth, T., & Liśkiewicz, M. 2023, July, “Act natural!”: Exchanging Private Messages on Public Blockchains. Paper presented at 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P). |
|
| Added by: Rucknium 06/01/2024, 17:53 |
|
| Szalaty, Z. E. (2023). Privacy preserving blockchains and quantum safety. Unpublished Master's Thesis Universitat Oberta de Catalunya. |
|
| Added by: Rucknium Last edited by: Rucknium 05/01/2024, 22:01 |
|
| Su, W., & Ma, L. 2023, April, A Blockchain-based Covert Document Communication System Model. Paper presented at 2023 8th International Conference on Computer and Communication Systems (ICCCS). |
|
| Added by: Rucknium 05/01/2024, 19:13 |
|
| Scheid, E. J., Küng, S., Franco, M., & Stiller, B. 2023, Opening Pandora's Box: An Analysis of the Usage of the Data Field in Blockchains. Paper presented at 2023 Fifth International Conference on Blockchain Computing and Applications (BCCA). |
|
| Added by: Rucknium Last edited by: Rucknium 10/01/2024, 16:59 |
|
| Scala, E., & Mostarda, L. 2023, Range Proofs with Constant Size and Trustless Setup. Paper presented at Advanced Information Networking and Applications: Proceedings of the 37th International Conference on Advanced Information Networking and Applications (AINA-2023), Volume 3. |
|
| Added by: Jack Last edited by: Jack 29/03/2023, 18:12 |
|
| Raikwar, M., Wu, S., & Gjosteen, K. 2023, Security Model for Privacy-Preserving Blockchain-Based Cryptocurrency Systems. Paper presented at Network and System Security. |
|
| Added by: Rucknium 06/01/2024, 17:22 |
|
| Pu, S., Thyagarajan, S. A., D"ottling, N., & Hanzlik, L. (2023). Post Quantum Fuzzy Stealth Signatures and Applications. Cryptology ePrint Archive. |
|
| Added by: Jack Last edited by: Jack 29/07/2023, 02:59 |
|
| Pitu, F., & Gaitan, N. C. 2023, July, Survey of security, performance, and profitability of Monero: a browser-based cryptocurrency. Paper presented at 2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME). |
|
| Added by: Rucknium 06/01/2024, 17:58 |
|
| Naik, A., Yeniaras, E., Hellstern, G., Prasad, G., & Vishwakarma, S. K. L. P. (2023). From Portfolio Optimization to Quantum Blockchain and Security: A Systematic Review of Quantum Computing in Finance. arXiv preprint arXiv:2307.01155. |
|
| Added by: Jack Last edited by: Jack 29/07/2023, 03:07 |
|
| Movsowitz Davidow, D., Manevich, Y., & Toch, E. 2023, Privacy-Preserving Transactions with Verifiable Local Differential Privacy. Paper presented at 5th Conference on Advances in Financial Technologies (AFT 2023). |
|
| Added by: Rucknium 05/01/2024, 19:14 |
|
| Macchetti, M. (2023). A Novel Related Nonce Attack for ECDSA. [Cryptology ePrint Archive, Paper 2023/305]. |
|
| Added by: Jack Last edited by: Jack 06/03/2023, 22:35 |
|
| Luo, M., Zhou, J., & Yang, P. (2023). RATS: A regulatory anonymous transaction system based on blockchain. Journal of Parallel and Distributed Computing, 182, 104751. |
|
| Added by: Rucknium 06/01/2024, 17:44 |
|
| Jin, R. (2023). The Advance of Ring Confidential Transactions. Highlights in Science, Engineering and Technology, 39, 1104–1110. |
|
| Added by: Rucknium Last edited by: Rucknium 05/01/2024, 19:46 |
|
| Huang, K., Mu, Y., Rezaeibagha, F., Zhang, X., & Li, X. (2023). Monero with Multi-Grained Redaction. IEEE Transactions on Dependable and Secure Computing, 1–13. |
|
| Added by: Rucknium 05/01/2024, 19:16 |
|
| Howell, A., Saber, T., & Bendechache, M. (2023). Measuring node decentralisation in blockchain peer to peer networks. Blockchain: Research and Applications, 4(1), 100109. |
|
| Added by: Rucknium 03/06/2025, 16:28 |
|
| Gligoroski, D. (2023). A Transformation for Lifting Discrete Logarithm Based Cryptography to Post-Quantum Cryptography. Cryptology ePrint Archive. |
|
| Added by: Jack Last edited by: Jack 06/03/2023, 22:32 |
|
| Dijk, A., & Schröder, D. (2023). Proof of concept for a Ethereum Virtual Machine on Cryptonote. Unpublished manuscript. |
|
| Added by: Rucknium 05/01/2024, 20:32 |
|
| Cremers, C., Loss, J., & Wagner, B. (2023). A Holistic Security Analysis of Monero Transactions. [Cryptology ePrint Archive, Paper 2023/321]. |
|
| Added by: Jack Last edited by: Jack 08/03/2023, 18:11 |
|
| Chow, S. S., Egger, C., Lai, R. W. F., Ronge, V., & Woo, I. K. Y. (2023). On sustainable ring-based anonymous systems. Cryptology ePrint Archive. |
|
| Added by: Jack Last edited by: Jack 06/06/2023, 21:13 |
|
| Buccafurri, F., De Angelis, V., & Lazzaro, S. 2023, May 25–26, A Traffic-Analysis Proof Solution to Allow K-Anonymous Payments in Pseudonymous Blockchains. Unpublished paper presented at 5th Distributed Ledger Technology Workshop. |
|
| Added by: Rucknium 05/01/2024, 20:51 |
|
| Block, A. R., Garreta, A., Katz, J., Thaler, J., Tiwari, P. R., & Zajac, M. (2023). Fiat-Shamir Security of FRI and Related SNARKs. Cryptology ePrint Archive. |
|
| Added by: Jack Last edited by: Jack 29/07/2023, 03:05 |
|
| Barj, S., Ouaddah, A., & Mezrioui, A. 2023, A Review of Privacy-Preserving Cryptographic Techniques Used in Blockchain Platforms. Paper presented at Digital Technologies and Applications. |
|
| Added by: Rucknium 06/01/2024, 17:36 |
|
| Badertscher, C., Sedaghat, M., & Waldner, H. (2023). Fine-Grained Accountable Privacy via Unlinkable Policy-Compliant Signatures. [Cryptology ePrint Archive, Paper 2023/1070]. |
|
| Added by: Rucknium Last edited by: Rucknium 05/01/2024, 22:08 |
|
| Amrollahi, A., & Mofrad, M. A. 2023, Towards unraveling power dynamics in Information Systems research: A systematic literature review through the lens of activity theory. Paper presented at ACIS 2023. |
|
| Added by: Rucknium 05/04/2024, 21:26 |
|
| af halo2 Protokollen, H. G. S., & Spitters, B. 2023. High Assurance Specification of the halo2 Protocol. |
|
| Added by: Jack Last edited by: Jack 29/07/2023, 03:03 |
|
| Abreu, A. S. (2023). Esquemas de privacidade nas moedas criptográficas Monero e Zcash. Unpublished Bacharelado Thesis, Universidade de São Paulo, São Paulo, Brazil. |
|
| Added by: Rucknium 05/04/2024, 22:07 |
|
| Zhaolu, T., Wan, Z., & Wang, H. (2022). Division of Regulatory Power: Collaborative Regulation for Privacy-Preserving Blockchains. [Cryptology ePrint Archive, Paper 2022/1634]. |
|
| Added by: Rucknium 02/12/2022, 16:10 |
|
| Zhang, Y., & Xu, H. (2022). Accountable Monero System with Privacy Protection. Security and Communication Networks, 2022, 7746341. |
|
| Added by: Rucknium 05/05/2022, 22:33 |
|
| Zabka, P., Foerster, K.-T., Decker, C., & Schmid, S. 2022, May 2–6, A Centrality Analysis of the Lightning Network. Unpublished paper presented at Financial Cryptography and Data Security 2022. |
|
| Added by: Rucknium 05/05/2022, 20:36 |
|
| Yi, X., Wu, D., Jiang, L., Fang, Y., Zhang, K., & Zhang, W. 2022, An Empirical Study of Blockchain System Vulnerabilities: Modules, Types, and Patterns. Paper presented at Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering. |
|
| Added by: Rucknium 02/12/2022, 16:31 |
|
| Xu, M., Zhang, Y., & Zhong, S. (2022). Towards Fair Multiparty Computation in Scriptless Distributed Ledger Systems. [Cryptology ePrint Archive, Report 2022/176]. |
|
| Added by: Rucknium Last edited by: Rucknium 05/05/2022, 22:11 |
|
| Wang, K., Liu, M., Wang, J., Wu, M., & Zhao, F. (2022). BBARHS: Blockchain-Based Anonymous Ride-Hailing Scheme for Autonomous Taxi Network. Security and Communication Networks, 2022, 1–13. |
|
| Added by: Rucknium 10/09/2022, 19:57 |
|
| Wang, J., Cheng, J., Yuan, Y., Li, H., & Sheng, V. S. 2022, A Survey on Privacy Protection of Cross-Chain. Paper presented at Advances in Artificial Intelligence and Security. |
|
| Added by: Rucknium 10/09/2022, 20:13 |
|
| Wang, N., & Chau, S. C.-K. 2022, Flashproofs: Efficient zero-knowledge arguments of range and polynomial evaluation with transparent setup. Paper presented at International Conference on the Theory and Application of Cryptology and Information Security. |
|
| Added by: Jack Last edited by: Jack 04/11/2025, 16:03 |
|
| USA v. LICHTENSTEIN et al. February 7 2022. US Dept. of Justice. |
|
| Added by: Jack Last edited by: Jack 20/01/2023, 03:41 |
|