Noether, S. UNDERSTANDING GE FROMFE FROMBYTES VARTIME. |
|
Added by: Jack Last edited by: Jack 28/03/2023, 21:26 |
|
Nikzad, A., & Mehregan, M. (2022). Techno-economic, and environmental evaluations of a novel cogeneration system based on solar energy and cryptocurrency mining, Solar Energy, 232, 409–420. |
|
Added by: endor 17/04/2022, 19:34 |
|
Nick, J., Eagen, L., & Linus, R. 2025. Shielded CSV: Private and Efficient Client-Side Validation. [Cryptology {ePrint} Archive, Paper 2025/068]. |
|
Added by: Rucknium Last edited by: Rucknium 27/02/2025, 16:24 |
|
Ni, W., Cheng, P., Chen, L., & Lin, X. (2021). When the Recursive Diversity Anonymity Meets the Ring Signature. In Proceedings of the 2021 International Conference on Management of Data (pp. 1359–1371). New York, NY, USA: Association for Computing Machinery. |
|
Added by: Rucknium 23/02/2022, 15:57 |
|
Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. Unpublished manuscript. |
|
Added by: Rucknium Last edited by: theadmin 23/02/2022, 00:13 |
|
Naik, A., Yeniaras, E., Hellstern, G., Prasad, G., & Vishwakarma, S. K. L. P. (2023). From Portfolio Optimization to Quantum Blockchain and Security: A Systematic Review of Quantum Computing in Finance, arXiv preprint arXiv:2307.01155. |
|
Added by: Jack Last edited by: Jack 29/07/2023, 03:07 |
|
Movsowitz Davidow, D., Manevich, Y., & Toch, E. 2023, Privacy-Preserving Transactions with Verifiable Local Differential Privacy. Paper presented at 5th Conference on Advances in Financial Technologies (AFT 2023). |
|
Added by: Rucknium 05/01/2024, 19:14 |
|
Möser, M., Soska, K., Heilman, E., Lee, K., Heffan, H., & Srivastava, S., et al. (2018). An Empirical Analysis of Traceability in the Monero Blockchain, Proceedings on Privacy Enhancing Technologies, 2018(3), 143–163. |
|
Added by: Rucknium 23/02/2022, 16:14 |
|
Möser, M. (2022). Cryptocurrency Privacy in Practice. Unpublished Ph.D. Dissertation, Princeton University. |
|
Added by: Rucknium 08/01/2023, 03:54 |
|
Moreno-Sánchez, P., Blue, A., Le, D. V., Noether, S., Goodell, B., & Kate, A. 2020, DLSAG: Non-interactive Refund Transactions for Interoperable Payment Channels in Monero. Paper presented at Financial Cryptography and Data Security. |
|
Added by: Jack Last edited by: Jack 18/01/2023, 00:01 |
|
Mondschein, C. F. (2020). Browser-based Crypto Mining and EU Data Protection and Privacy Law: A Critical Assessment and Possible Opportunities for the Monetisation of Web Services, The Journal of The British Blockchain Association. |
|
Added by: Rucknium Last edited by: Rucknium 03/05/2022, 12:53 |
|
Miller, A., Kosba, A., Katz, J., & Shi, E. 2015, Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions. Paper presented at Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. |
|
Added by: Rucknium 23/02/2022, 22:08 |
|
Mikic, M., Srbakoski, M., & Praska, S. 2025. Post-Quantum Stealth Address Protocols. |
|
Added by: Rucknium Last edited by: Rucknium 27/02/2025, 16:20 |
|
Meier, J. (2022). Diophantine Satisfiability Arguments for Private Blockchains. Unpublished masters thesis, ETH Zurich, Zurich. |
|
Added by: Rucknium 22/10/2022, 19:40 |
|
McCloskey, D. N. (2016). Fungibility. In The New Palgrave Dictionary of Economics (pp. 1–1). London: Palgrave Macmillan UK. (Original work published 1987). |
|
Added by: Rucknium Last edited by: Rucknium 09/03/2022, 21:31 |
|
Magaki, I., Khazraee, M., Gutierrez, L. V., & Taylor, M. B. 2016, June, ASIC Clouds: Specializing the Datacenter. Paper presented at 2016 ACM/IEEE 43rd Annual International Symposium on Computer Architecture (ISCA). |
|
Added by: endor 17/04/2022, 19:40 |
|
Mackenzie, A., Noether, S., & Monero Core Team. (2015). Improving Obfuscation in the CryptoNote Protocol. Unpublished manuscript. |
|
Added by: Rucknium 22/02/2022, 17:33 |
|
Macias, & Siabi, Y. E. Security Analysis of Monero’s Peer-to-Peer System. |
|
Added by: Jack Last edited by: Jack 08/01/2023, 14:45 |
|
Macheta, J., Noether, S., Noether, S., & Smooth, J. (2014). Counterfeiting via Merkle Tree Exploits within Virtual Currencies Employing the CryptoNote Protocol. Unpublished manuscript. |
|
Added by: Rucknium Last edited by: Rucknium 22/02/2022, 17:58 |
|
Macchetti, M. 2023. A Novel Related Nonce Attack for ECDSA. [Cryptology ePrint Archive, Paper 2023/305]. |
|
Added by: Jack Last edited by: Jack 06/03/2023, 22:35 |
|
Luo, M., Zhou, J., & Yang, P. (2023). RATS: A regulatory anonymous transaction system based on blockchain, Journal of Parallel and Distributed Computing, 182, 104751. |
|
Added by: Rucknium 06/01/2024, 17:44 |
|
Liyanage, S. G. H. (2018). MoneroSci: Linkability and Traceability Analysis of Monero Blockchain. Unpublished Undergraduate thesis University of Colombo. |
|
Added by: Rucknium 24/02/2022, 21:29 |
|
Liu, Q., Liu, Z., Long, Y., Liu, Z., Sui, Z., & Sun, S., et al. 2019, Making Monero Hard-to-Trace and More Efficient. Paper presented at 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). |
|
Added by: Jack Last edited by: Jack 20/01/2023, 18:12 |
|
Liu, L., Liu, L., Li, B., Zhong, Y., Liao, S., & Zhang, L. (2022). MSCCS: A Monero-based security-enhanced covert communication system, Computer Networks, 205, 108759. |
|
Added by: Rucknium 23/02/2022, 22:46 |
|
Lin, D., Yan, J., Ba, N., Fu, Z., & Jiang, H. (2022). Survey of anonymity and tracking technology in Monero, Journal of Computer Applications, 42(1). |
|
Added by: Rucknium 23/02/2022, 17:01 |
|
Lin, H., & Wang, M. (2022). Repudiable ring signature: Stronger security and logarithmic-size, Computer Standards & Interfaces, 80, 103562. |
|
Added by: Rucknium 24/02/2022, 18:04 |
|
Liao, Y.-C., Tso, R., Liu, Z.-Y., & Tseng, Y.-F. 2022, Blockchain-Based Confidential Payment System with Controllable Regulation. Paper presented at Information Security Practice and Experience. |
|
Added by: Rucknium 02/12/2022, 16:05 |
|
Liang, M., Karantaidou, I., Baldimtsi, F., Gordon, D. S., & Varia, M. (2022). (∈, δ)-Indistinguishable Mixing for Cryptocurrencies, Proceedings on Privacy Enhancing Technologies, 2022(1), 49–74. |
|
Added by: Rucknium Last edited by: Rucknium 05/05/2022, 22:24 |
|
Li, S.-N., Yang, Z., & Tessone, C. J. 2020, Proof-of-Work cryptocurrency mining: a statistical approach to fairness. Paper presented at 2020 IEEE/CIC International Conference on Communications in China (ICCC Workshops). |
|
Added by: endor 03/04/2022, 18:53 |
|
Li, Y., Yang, G., Susilo, W., Yu, Y., Au, M. H., & Liu, D. (2021). Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability, IEEE Transactions on Dependable and Secure Computing, 18(2), 679–691. |
|
Added by: Rucknium 30/06/2022, 22:22 |
|
Li, Y., Weng, J., Li, M., Wu, W., Weng, J., & Liu, J.-N., et al. (2022). ZeroCross: A sidechain-based privacy-preserving Cross-chain solution for Monero, Journal of Parallel and Distributed Computing, 169, 301–316. |
|
Added by: Rucknium 10/09/2022, 19:54 |
|
Li, W., Lin, Z., & Chen, Q. (2022). A Hybrid Design of Linkable Ring Signature Scheme with Stealth Addresses, Security and Communication Networks, 2022. |
|
Added by: Rucknium 24/02/2022, 15:44 |
|
Li, J., Li, N., Peng, J., Cui, H., & Wu, Z. (2019). Energy consumption of cryptocurrency mining: A study of electricity consumption in mining cryptocurrencies, Energy, 168, 160–168. |
|
Added by: endor 17/04/2022, 19:30 |
|
Li, J. (2022). Extending Succinct Zero Knowledge Proofs for Set Membership to Ring Signatures. Unpublished masters thesis, EECS Department, University of California, Berkeley. |
|
Added by: Rucknium Last edited by: Rucknium 01/07/2022, 18:05 |
|
Leevik, A., Beliaev, V., Stasenko, B., Davydov, V., & Bezzateev, S. 2020, Review and Analysis of the Classical and Post-Quantum Ring Signature Algorithms. Paper presented at 2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). |
|
Added by: Jack Last edited by: Jack 20/01/2023, 18:12 |
|
Kumar, A., Fischer, C., Tople, S., & Saxena, P. 2017, September, A Traceability Analysis of Monero’s Blockchain. Paper presented at European Symposium on Research in Computer Security (ESORICS). |
|
Added by: Rucknium Last edited by: Rucknium 04/03/2025, 19:08 |
|
Kovalchuk, L., Oliynykov, R., Bespalov, Y., & Rodinko, M. (2022). Methods of Ensuring Privacy in a Decentralized Environment. In R. Oliynykov, O. Kuznetsov, O. Lemeshko & T. Radivilova (Eds), Information Security Technologies in the Decentralized Distributed Networks (pp. 1–32). Cham: Springer International Publishing. |
|
Added by: Rucknium 05/05/2022, 22:29 |
|
Kopyciok, Y., Victor, F., & Schmid, S. 2025. Moneros Decentralized P2P Exchanges: Functionality, Adoption, and Privacy Risks. |
|
Added by: Rucknium Last edited by: Rucknium 03/06/2025, 16:15 |
|
Koerhuis, W., Kechadi, T., & Le-Khac, N.-A. (2020). Forensic analysis of privacy-oriented cryptocurrencies, Forensic Science International: Digital Investigation, 33, 200891. |
|
Added by: Rucknium 10/09/2022, 19:55 |
|
koe, Alonso, K. M., & Noether, S. (2020). [i]Zero to Monero: A technical guide to a private digital currency; for beginners, amateurs, and experts Second ed. Second ed. |
|
Added by: Rucknium Last edited by: Rucknium 03/03/2023, 16:51 |
|
koe. Seraphis: A Privacy-Preserving Transaction Protocol Abstraction (WIP). |
|
Added by: Jack 08/03/2023, 22:33 |
|
Klinec, D., & Matyas, V. 2020, Privacy-Friendly Monero Transaction Signing on a Hardware Wallet. Paper presented at ICT Systems Security and Privacy Protection. |
|
Added by: Rucknium 22/10/2022, 19:45 |
|
Keller, P., Florian, M., & Böhme, R. 2021, Collaborative Deanonymization. Paper presented at Financial Cryptography and Data Security. FC 2021 International Workshops. |
|
Added by: Rucknium 03/06/2025, 17:31 |
|
Kearney, J. J., & Perez-Delgado, C. A. (2021). Vulnerability of blockchain technologies to quantum attacks, Array, 10, 100065. |
|
Added by: Rucknium 03/05/2022, 03:13 |
|
Kawaguchi, K., & Noda, S. (2021). Security-Cost Efficiency of Competing Proof-of-Work Cryptocurrencies. Unpublished manuscript. |
|
Added by: Rucknium 23/02/2022, 21:55 |
|
Karame, G. O., Androulaki, E., Roeschlin, M., Gervais, A., & vCapkun, S. (2015). Misbehavior in Bitcoin: A Study of Double-Spending and Accountability, ACM Trans. Inf. Syst. Secur. 18(1). |
|
Added by: endor Last edited by: endor 17/04/2022, 19:51 |
|
Kappos, G. (2022). An Empirical Analysis of Privacy in Cryptocurrencies. Unpublished PhD thesis, UCL (University College London). |
|
Added by: Jack Last edited by: Jack 21/02/2023, 04:36 |
|
Jivanyan, A., & Feickert, A. 2021. Lelantus Spark: Secure and Flexible Private Transactions. [Cryptology ePrint Archive, Report 2021/1173]. |
|
Added by: Rucknium Last edited by: Rucknium 24/02/2022, 22:47 |
|
Jin, R. (2023). The Advance of Ring Confidential Transactions, Highlights in Science, Engineering and Technology, 39, 1104–1110. |
|
Added by: Rucknium Last edited by: Rucknium 05/01/2024, 19:46 |
|
Jiang, P., Zhu, J., & Zhu, L. (2024). Balancing Privacy and Regulation of Cross-chain Transaction Systems via SoK-assisted Policy Enhancement, IEEE Transactions on Information Forensics and Security, 1–1. |
|
Added by: Rucknium Last edited by: Rucknium 23/05/2024, 18:01 |
|
Jiang, Y., & Zhang, J. (2024). Profitability Analysis of Time-Restricted Double-Spending Attack on PoW-Based Large Scale Blockchain With the Aid of Multiple Types of Attacks, IEEE Transactions on Information Forensics and Security, 19, 8155–8171. |
|
Added by: Jack Last edited by: Jack 19/09/2024, 22:59 |
|
Järvinen, S. (2022). Tax evasion with untraceable cryptocurrencies in OECD countries as a target of regulation. Unpublished masters thesis, Aalto University. School of Business. |
|
Added by: Rucknium 22/10/2022, 17:17 |
|
Huberman, G., Leshno, J. D., & Moallemi, C. (2021). Monopoly without a Monopolist: An Economic Analysis of the Bitcoin Payment System, The Review of Economic Studies, 88(6), 3011–3040. |
|
Added by: endor Last edited by: endor 19/04/2022, 23:07 |
|
Huang, K., Mu, Y., Rezaeibagha, F., Zhang, X., & Li, X. (2023). Monero with Multi-Grained Redaction, IEEE Transactions on Dependable and Secure Computing, 1–13. |
|
Added by: Rucknium 05/01/2024, 19:16 |
|
Howell, A., Saber, T., & Bendechache, M. (2023). Measuring node decentralisation in blockchain peer to peer networks, Blockchain: Research and Applications, 4(1), 100109. |
|
Added by: Rucknium 03/06/2025, 16:28 |
|
Hou, C., Zhou, M., Ji, Y., Daian, P., Tram`er, F., & Fanti, G., et al. 2021, SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Reinforcement Learning. Paper presented at Proceedings 2021 Network and Distributed System Security Symposium. |
|
Added by: Rucknium 22/10/2022, 20:50 |
|
Hoenisch, P., & Pino, L. S. D. (2021). Atomic Swaps between Bitcoin and Monero, CoRR, abs/2101.12332. |
|
Added by: Rucknium Last edited by: Rucknium 24/02/2022, 18:54 |
|
Hoenisch, P., Mazumdar, S., Moreno-Sánchez, P., & Ruj, S. 2022. LightSwap: An Atomic Swap Does Not Require Timeouts At Both Blockchains. [Cryptology ePrint Archive, Paper 2022/1650]. |
|
Added by: Rucknium Last edited by: Rucknium 13/12/2022, 19:02 |
|
Hinteregger, A., & Haslhofer, B. 2019, Short Paper: An Empirical Analysis of Monero Cross-chain Traceability. Paper presented at Financial Cryptography and Data Security. |
|
Added by: Rucknium 10/09/2022, 20:11 |
|
Herrera Sufán, R. (2021). Speeding up Monero’s balance computation. Unpublished M.S. Thesis, Pontificia Universidad Católica de Chile. |
|
Added by: Rucknium 24/02/2022, 22:40 |
|
Hammad, N., & Victor, F. 2024. Monero Traceability Heuristics: Wallet Application Bugs and the Mordinal-P2Pool Perspective. |
|
Added by: opal 25/09/2024, 21:35 |
|
Guo, Z., Shi, L., Xu, M., & Yin, H. (2021). MRCC: A Practical Covert Channel Over Monero With Provable Security, IEEE Access, 9, 31816–31825. |
|
Added by: Rucknium Last edited by: Rucknium 06/08/2022, 21:24 |
|
Guo, S. 2024, Secure Monero on Corrupted Machines with Reverse Firewalls. Paper presented at International Conference on Data Security and Privacy Protection. |
|
Added by: Jack Last edited by: Jack 17/01/2025, 17:31 |
|
Gugger, J. 2020. Bitcoin-Monero Cross-chain Atomic Swap. [Cryptology ePrint Archive, Paper 2020/1126]. |
|
Added by: Jack Last edited by: Jack 20/01/2023, 18:09 |
|
Grunspan, C., & Perez-Marco, R. 2022. Ping-Pong Swaps. arXiv. |
|
Added by: Rucknium 02/12/2022, 16:36 |
|
Grunspan, C., & Perez-Marco, R. (2022). On Profitability of Nakamoto Double Spend, Probability in the Engineering and Informational Sciences, 36(3), 732–746. |
|
Added by: Rucknium Last edited by: Rucknium 14/09/2024, 14:08 |
|
Grunspan, C., & Perez-Marco, R. (2018). Double spend races, Int. J. Theor. Appl. Finance, 21(8), 1850053. |
|
Added by: Rucknium Last edited by: Rucknium 23/08/2023, 16:52 |
|
Grunspan, C., & Perez-Marco, R. 2017. Satoshi Risk Tables. |
|
Added by: Rucknium Last edited by: Rucknium 13/09/2024, 13:39 |
|
Goorha, P. Principles of Natural Resource Economics for Bitcoin, The Journal of The British Blockchain Association, 4(August). |
|
Added by: endor Last edited by: endor 14/04/2022, 20:14 |
|
Goodell, B., Salazar, R., Slaughter, F., & Szramowski, L. (2025). A Further Review of the DL Gadget Of Interest. Unpublished manuscript. |
|
Added by: Rucknium 27/05/2025, 22:17 |
|
Goodell, B., Salazar, R., & Slaughter, F. 2025. Uniformly Most Powerful Tests for Ad Hoc Transactions in Monero. [Cryptology {ePrint} Archive, Paper 2025/221]. |
|
Added by: Rucknium Last edited by: Rucknium 27/02/2025, 16:32 |
|
Goodell, B., Noether, S., & Blue, A. (2019). Concise Linkable Ring Signatures and Forgery Against Adversarial Keys, Cryptology ePrint Archive, Paper 2019/654. |
|
Added by: Jack Last edited by: Jack 20/01/2023, 17:53 |
|
Goodell, B., & Noether, S. (2018). Thring Signatures and their Applications to Spender-Ambiguous Digital Currencies. Unpublished manuscript. |
|
Added by: Rucknium 22/02/2022, 17:51 |
|
Goodell, B. (2024). Security Review - Generalized Bulletproofs. Unpublished manuscript. |
|
Added by: Rucknium 06/12/2024, 17:56 |
|
Goodell, B. (2024). History and state of Monero security analysis. Unpublished manuscript. |
|
Added by: opal 20/08/2024, 14:44 |
|
Gong, T., Minaei, M., Sun, W., & Kate, A. 2022, May 2–6, Towards Overcoming the Undercutting Problem. Unpublished paper presented at Financial Cryptography and Data Security 2022. |
|
Added by: Rucknium 05/05/2022, 21:01 |
|
Gomzin, S. (2022). How Monero Works. In Crypto Basics: A Nontechnical Introduction to Creating Your Own Money for Investors and Inventors (pp. 119–137). Berkeley, CA: Apress. |
|
Added by: Rucknium 22/10/2022, 16:48 |
|
Gligoroski, D. (2023). A Transformation for Lifting Discrete Logarithm Based Cryptography to Post-Quantum Cryptography, Cryptology ePrint Archive. |
|
Added by: Jack Last edited by: Jack 06/03/2023, 22:32 |
|
Gibson, A. From Zero (Knowledge) to Bulletproofs. |
|
Added by: Jack Last edited by: Jack 03/03/2023, 16:18 |
|
Ghesmati, S., Fdhila, W., & Weippl, E. 2022. User-Perceived Privacy in Blockchain. [Cryptology ePrint Archive, Report 2022/287]. |
|
Added by: endor 17/04/2022, 20:59 |
|
Gervais, A., Karame, G. O., W"ust, K., Glykantzis, V., Ritzdorf, H., & Capkun, S. 2016, On the Security and Performance of Proof of Work Blockchains. Paper presented at Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. |
|
Added by: endor Last edited by: endor 17/04/2022, 19:53 |
|
Garay, J., Kiayias, A., & Leonardos, N. 2015, The Bitcoin Backbone Protocol: Analysis and Applications. Paper presented at Advances in Cryptology - EUROCRYPT 2015. |
|
Added by: endor 17/04/2022, 21:02 |
|
Gao, Y., Zhang, Y., Piškorec, M., & Tessone, C. J. 2025. Monero Peer-to-peer Network Topology Analysis. |
|
Added by: Rucknium Last edited by: Rucknium 03/06/2025, 17:59 |
|
Gao, Y., Piškorec, M., Zhang, Y., Vallarano, N., & Tessone, C. J. 2025. Charting the Uncharted: The Landscape of Monero Peer-to-Peer Network. |
|
Added by: Rucknium Last edited by: Rucknium 29/04/2025, 21:18 |
|
Gailly, N., Maller, M., & Nitulescu, A. 2022, May 2–6, SnarkPack: Practical SNARK Aggregation. Unpublished paper presented at Financial Cryptography and Data Security 2022. |
|
Added by: Rucknium 05/05/2022, 21:04 |
|
Franzoni, F., Salleras, X., & Daza, V. (2022). AToM: Active topology monitoring for the bitcoin peer-to-peer network, Peer-to-Peer Networking and Applications, 15(1), 408–425. |
|
Added by: Rucknium 09/08/2024, 18:32 |
|
Franzoni, F., & Daza, V. (2022). SoK: Network-Level Attacks on the Bitcoin P2P Network, IEEE Access, 10, 94924–94962. |
|
Added by: Rucknium 09/08/2024, 19:50 |
|
Franzoni, F., & Daza, V. (2022). Clover: An anonymous transaction relay protocol for the bitcoin P2P network, Peer-to-Peer Networking and Applications, 15(1), 290–303. |
|
Added by: Rucknium 10/07/2024, 16:09 |
|
Fomenko, O., & Sokolov, M. (2024). Bulletproofs++. Construction and Examples. Unpublished manuscript. |
|
Added by: Rucknium 09/08/2024, 17:33 |
|
Feickert, A., & Isthmus. (2024). Monero output lock analysis. Unpublished manuscript. |
|
Added by: Rucknium 04/09/2024, 16:56 |
|
Feickert, A. (2024). Zano d/v-CLSAG review. Unpublished manuscript. |
|
Added by: Rucknium 04/03/2025, 16:05 |
|
Feickert, A. (2024). Veridise divisor report review. Unpublished manuscript. |
|
Added by: Rucknium 09/08/2024, 18:07 |
|
Feickert, A. (2024). Salvium review. Unpublished manuscript. |
|
Added by: opal Last edited by: opal 20/08/2024, 14:33 |
|
Feickert, A. (2024). Generalized Bulletproofs. Unpublished manuscript. |
|
Added by: Rucknium Last edited by: Rucknium 09/08/2024, 17:41 |
|
Feickert, A. (2024). FCMP++ review. Unpublished manuscript. |
|
Added by: Rucknium 09/08/2024, 17:54 |
|
Feickert, A. 2024. Bulletproofs++ review. Cypher Stack. [Peer review] |
|
Added by: Rucknium 05/04/2024, 22:08 |
|
Fanti, G., & Viswanath, P. 2017. Anonymity Properties of the Bitcoin P2P Network. |
|
Added by: Rucknium Last edited by: Rucknium 01/08/2024, 16:27 |
|
Fanti, G., Venkatakrishnan, S. B., Bakshi, S., Denby, B., Bhargava, S., & Miller, A., et al. (2018). Dandelion++: Lightweight Cryptocurrency Networking with Formal Anonymity Guarantees, Proc. ACM Meas. Anal. Comput. Syst. 2(2). |
|
Added by: Rucknium 22/10/2022, 20:53 |
|
Fantazzini, D., & Kolodin, N. (2020). Does the Hashrate Affect the Bitcoin Price? Journal of Risk and Financial Management, [i]13(11). |
|
Added by: endor 17/04/2022, 21:15 |
|
Fan, X. 2018, Faster dual-key stealth address for blockchain-based internet of things systems. Paper presented at Blockchain--ICBC 2018: First International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings 1. |
|
Added by: Jack Last edited by: Jack 06/06/2023, 21:02 |
|