MoneroResearch.info

List Resources

Displaying 101 - 200  of 271 (Bibliography: WIKINDX Master Bibliography)
Parameters
Order by

Ascending
Descending
Use all checked: 
Use all displayed: 
Use all in list: 
Noether, S. UNDERSTANDING GE FROMFE FROMBYTES VARTIME.   
Added by: Jack   Last edited by: Jack 28/03/2023, 21:26
Nikzad, A., & Mehregan, M. (2022). Techno-economic, and environmental evaluations of a novel cogeneration system based on solar energy and cryptocurrency mining, Solar Energy, 232, 409–420.   
Added by: endor 17/04/2022, 19:34
Nick, J., Eagen, L., & Linus, R. 2025. Shielded CSV: Private and Efficient Client-Side Validation. [Cryptology {ePrint} Archive, Paper 2025/068].   
Added by: Rucknium   Last edited by: Rucknium 27/02/2025, 16:24
Ni, W., Cheng, P., Chen, L., & Lin, X. (2021). When the Recursive Diversity Anonymity Meets the Ring Signature. In Proceedings of the 2021 International Conference on Management of Data (pp. 1359–1371). New York, NY, USA: Association for Computing Machinery.   
Added by: Rucknium 23/02/2022, 15:57
Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. Unpublished manuscript.   
Added by: Rucknium   Last edited by: theadmin 23/02/2022, 00:13
Naik, A., Yeniaras, E., Hellstern, G., Prasad, G., & Vishwakarma, S. K. L. P. (2023). From Portfolio Optimization to Quantum Blockchain and Security: A Systematic Review of Quantum Computing in Finance, arXiv preprint arXiv:2307.01155.   
Added by: Jack   Last edited by: Jack 29/07/2023, 03:07
Movsowitz Davidow, D., Manevich, Y., & Toch, E. 2023, Privacy-Preserving Transactions with Verifiable Local Differential Privacy. Paper presented at 5th Conference on Advances in Financial Technologies (AFT 2023).   
Added by: Rucknium 05/01/2024, 19:14
Möser, M., Soska, K., Heilman, E., Lee, K., Heffan, H., & Srivastava, S., et al. (2018). An Empirical Analysis of Traceability in the Monero Blockchain, Proceedings on Privacy Enhancing Technologies, 2018(3), 143–163.   
Added by: Rucknium 23/02/2022, 16:14
Möser, M. (2022). Cryptocurrency Privacy in Practice. Unpublished Ph.D. Dissertation, Princeton University.   
Added by: Rucknium 08/01/2023, 03:54
Moreno-Sánchez, P., Blue, A., Le, D. V., Noether, S., Goodell, B., & Kate, A. 2020, DLSAG: Non-interactive Refund Transactions for Interoperable Payment Channels in Monero. Paper presented at Financial Cryptography and Data Security.   
Added by: Jack   Last edited by: Jack 18/01/2023, 00:01
Mondschein, C. F. (2020). Browser-based Crypto Mining and EU Data Protection and Privacy Law: A Critical Assessment and Possible Opportunities for the Monetisation of Web Services, The Journal of The British Blockchain Association.   
Added by: Rucknium   Last edited by: Rucknium 03/05/2022, 12:53
Miller, A., Kosba, A., Katz, J., & Shi, E. 2015, Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions. Paper presented at Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security.   
Added by: Rucknium 23/02/2022, 22:08
Mikic, M., Srbakoski, M., & Praska, S. 2025. Post-Quantum Stealth Address Protocols.   
Added by: Rucknium   Last edited by: Rucknium 27/02/2025, 16:20
Meier, J. (2022). Diophantine Satisfiability Arguments for Private Blockchains. Unpublished masters thesis, ETH Zurich, Zurich.   
Added by: Rucknium 22/10/2022, 19:40
McCloskey, D. N. (2016). Fungibility. In The New Palgrave Dictionary of Economics (pp. 1–1). London: Palgrave Macmillan UK. (Original work published 1987).   
Added by: Rucknium   Last edited by: Rucknium 09/03/2022, 21:31
Magaki, I., Khazraee, M., Gutierrez, L. V., & Taylor, M. B. 2016, June, ASIC Clouds: Specializing the Datacenter. Paper presented at 2016 ACM/IEEE 43rd Annual International Symposium on Computer Architecture (ISCA).   
Added by: endor 17/04/2022, 19:40
Mackenzie, A., Noether, S., & Monero Core Team. (2015). Improving Obfuscation in the CryptoNote Protocol. Unpublished manuscript.   
Added by: Rucknium 22/02/2022, 17:33
Macias, & Siabi, Y. E. Security Analysis of Monero’s Peer-to-Peer System.   
Added by: Jack   Last edited by: Jack 08/01/2023, 14:45
Macheta, J., Noether, S., Noether, S., & Smooth, J. (2014). Counterfeiting via Merkle Tree Exploits within Virtual Currencies Employing the CryptoNote Protocol. Unpublished manuscript.   
Added by: Rucknium   Last edited by: Rucknium 22/02/2022, 17:58
Macchetti, M. 2023. A Novel Related Nonce Attack for ECDSA. [Cryptology ePrint Archive, Paper 2023/305].   
Added by: Jack   Last edited by: Jack 06/03/2023, 22:35
Luo, M., Zhou, J., & Yang, P. (2023). RATS: A regulatory anonymous transaction system based on blockchain, Journal of Parallel and Distributed Computing, 182, 104751.   
Added by: Rucknium 06/01/2024, 17:44
Liyanage, S. G. H. (2018). MoneroSci: Linkability and Traceability Analysis of Monero Blockchain. Unpublished Undergraduate thesis University of Colombo.   
Added by: Rucknium 24/02/2022, 21:29
Liu, Q., Liu, Z., Long, Y., Liu, Z., Sui, Z., & Sun, S., et al. 2019, Making Monero Hard-to-Trace and More Efficient. Paper presented at 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).   
Added by: Jack   Last edited by: Jack 20/01/2023, 18:12
Liu, L., Liu, L., Li, B., Zhong, Y., Liao, S., & Zhang, L. (2022). MSCCS: A Monero-based security-enhanced covert communication system, Computer Networks, 205, 108759.   
Added by: Rucknium 23/02/2022, 22:46
Lin, D., Yan, J., Ba, N., Fu, Z., & Jiang, H. (2022). Survey of anonymity and tracking technology in Monero, Journal of Computer Applications, 42(1).   
Added by: Rucknium 23/02/2022, 17:01
Lin, H., & Wang, M. (2022). Repudiable ring signature: Stronger security and logarithmic-size, Computer Standards & Interfaces, 80, 103562.   
Added by: Rucknium 24/02/2022, 18:04
Liao, Y.-C., Tso, R., Liu, Z.-Y., & Tseng, Y.-F. 2022, Blockchain-Based Confidential Payment System with Controllable Regulation. Paper presented at Information Security Practice and Experience.   
Added by: Rucknium 02/12/2022, 16:05
Liang, M., Karantaidou, I., Baldimtsi, F., Gordon, D. S., & Varia, M. (2022). (∈, δ)-Indistinguishable Mixing for Cryptocurrencies, Proceedings on Privacy Enhancing Technologies, 2022(1), 49–74.   
Added by: Rucknium   Last edited by: Rucknium 05/05/2022, 22:24
Li, S.-N., Yang, Z., & Tessone, C. J. 2020, Proof-of-Work cryptocurrency mining: a statistical approach to fairness. Paper presented at 2020 IEEE/CIC International Conference on Communications in China (ICCC Workshops).   
Added by: endor 03/04/2022, 18:53
Li, Y., Yang, G., Susilo, W., Yu, Y., Au, M. H., & Liu, D. (2021). Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability, IEEE Transactions on Dependable and Secure Computing, 18(2), 679–691.   
Added by: Rucknium 30/06/2022, 22:22
Li, Y., Weng, J., Li, M., Wu, W., Weng, J., & Liu, J.-N., et al. (2022). ZeroCross: A sidechain-based privacy-preserving Cross-chain solution for Monero, Journal of Parallel and Distributed Computing, 169, 301–316.   
Added by: Rucknium 10/09/2022, 19:54
Li, W., Lin, Z., & Chen, Q. (2022). A Hybrid Design of Linkable Ring Signature Scheme with Stealth Addresses, Security and Communication Networks, 2022.   
Added by: Rucknium 24/02/2022, 15:44
Li, J., Li, N., Peng, J., Cui, H., & Wu, Z. (2019). Energy consumption of cryptocurrency mining: A study of electricity consumption in mining cryptocurrencies, Energy, 168, 160–168.   
Added by: endor 17/04/2022, 19:30
Li, J. (2022). Extending Succinct Zero Knowledge Proofs for Set Membership to Ring Signatures. Unpublished masters thesis, EECS Department, University of California, Berkeley.   
Added by: Rucknium   Last edited by: Rucknium 01/07/2022, 18:05
Leevik, A., Beliaev, V., Stasenko, B., Davydov, V., & Bezzateev, S. 2020, Review and Analysis of the Classical and Post-Quantum Ring Signature Algorithms. Paper presented at 2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT).   
Added by: Jack   Last edited by: Jack 20/01/2023, 18:12
Kumar, A., Fischer, C., Tople, S., & Saxena, P. 2017, September, A Traceability Analysis of Monero’s Blockchain. Paper presented at European Symposium on Research in Computer Security (ESORICS).   
Added by: Rucknium   Last edited by: Rucknium 04/03/2025, 19:08
Kovalchuk, L., Oliynykov, R., Bespalov, Y., & Rodinko, M. (2022). Methods of Ensuring Privacy in a Decentralized Environment. In R. Oliynykov, O. Kuznetsov, O. Lemeshko & T. Radivilova (Eds), Information Security Technologies in the Decentralized Distributed Networks (pp. 1–32). Cham: Springer International Publishing.   
Added by: Rucknium 05/05/2022, 22:29
Kopyciok, Y., Victor, F., & Schmid, S. 2025. Moneros Decentralized P2P Exchanges: Functionality, Adoption, and Privacy Risks.   
Added by: Rucknium   Last edited by: Rucknium 03/06/2025, 16:15
Koerhuis, W., Kechadi, T., & Le-Khac, N.-A. (2020). Forensic analysis of privacy-oriented cryptocurrencies, Forensic Science International: Digital Investigation, 33, 200891.   
Added by: Rucknium 10/09/2022, 19:55
koe, Alonso, K. M., & Noether, S. (2020). [i]Zero to Monero: A technical guide to a private digital currency; for beginners, amateurs, and experts Second ed. Second ed.   
Added by: Rucknium   Last edited by: Rucknium 03/03/2023, 16:51
koe. Seraphis: A Privacy-Preserving Transaction Protocol Abstraction (WIP).   
Added by: Jack 08/03/2023, 22:33
Klinec, D., & Matyas, V. 2020, Privacy-Friendly Monero Transaction Signing on a Hardware Wallet. Paper presented at ICT Systems Security and Privacy Protection.   
Added by: Rucknium 22/10/2022, 19:45
Keller, P., Florian, M., & Böhme, R. 2021, Collaborative Deanonymization. Paper presented at Financial Cryptography and Data Security. FC 2021 International Workshops.   
Added by: Rucknium 03/06/2025, 17:31
Kearney, J. J., & Perez-Delgado, C. A. (2021). Vulnerability of blockchain technologies to quantum attacks, Array, 10, 100065.   
Added by: Rucknium 03/05/2022, 03:13
Kawaguchi, K., & Noda, S. (2021). Security-Cost Efficiency of Competing Proof-of-Work Cryptocurrencies. Unpublished manuscript.   
Added by: Rucknium 23/02/2022, 21:55
Karame, G. O., Androulaki, E., Roeschlin, M., Gervais, A., & vCapkun, S. (2015). Misbehavior in Bitcoin: A Study of Double-Spending and Accountability, ACM Trans. Inf. Syst. Secur. 18(1).   
Added by: endor   Last edited by: endor 17/04/2022, 19:51
Kappos, G. (2022). An Empirical Analysis of Privacy in Cryptocurrencies. Unpublished PhD thesis, UCL (University College London).   
Added by: Jack   Last edited by: Jack 21/02/2023, 04:36
Jivanyan, A., & Feickert, A. 2021. Lelantus Spark: Secure and Flexible Private Transactions. [Cryptology ePrint Archive, Report 2021/1173].   
Added by: Rucknium   Last edited by: Rucknium 24/02/2022, 22:47
Jin, R. (2023). The Advance of Ring Confidential Transactions, Highlights in Science, Engineering and Technology, 39, 1104–1110.   
Added by: Rucknium   Last edited by: Rucknium 05/01/2024, 19:46
Jiang, P., Zhu, J., & Zhu, L. (2024). Balancing Privacy and Regulation of Cross-chain Transaction Systems via SoK-assisted Policy Enhancement, IEEE Transactions on Information Forensics and Security, 1–1.   
Added by: Rucknium   Last edited by: Rucknium 23/05/2024, 18:01
Jiang, Y., & Zhang, J. (2024). Profitability Analysis of Time-Restricted Double-Spending Attack on PoW-Based Large Scale Blockchain With the Aid of Multiple Types of Attacks, IEEE Transactions on Information Forensics and Security, 19, 8155–8171.   
Added by: Jack   Last edited by: Jack 19/09/2024, 22:59
Järvinen, S. (2022). Tax evasion with untraceable cryptocurrencies in OECD countries as a target of regulation. Unpublished masters thesis, Aalto University. School of Business.   
Added by: Rucknium 22/10/2022, 17:17
Huberman, G., Leshno, J. D., & Moallemi, C. (2021). Monopoly without a Monopolist: An Economic Analysis of the Bitcoin Payment System, The Review of Economic Studies, 88(6), 3011–3040.   
Added by: endor   Last edited by: endor 19/04/2022, 23:07
Huang, K., Mu, Y., Rezaeibagha, F., Zhang, X., & Li, X. (2023). Monero with Multi-Grained Redaction, IEEE Transactions on Dependable and Secure Computing, 1–13.   
Added by: Rucknium 05/01/2024, 19:16
Howell, A., Saber, T., & Bendechache, M. (2023). Measuring node decentralisation in blockchain peer to peer networks, Blockchain: Research and Applications, 4(1), 100109.   
Added by: Rucknium 03/06/2025, 16:28
Hou, C., Zhou, M., Ji, Y., Daian, P., Tram`er, F., & Fanti, G., et al. 2021, SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Reinforcement Learning. Paper presented at Proceedings 2021 Network and Distributed System Security Symposium.   
Added by: Rucknium 22/10/2022, 20:50
Hoenisch, P., & Pino, L. S. D. (2021). Atomic Swaps between Bitcoin and Monero, CoRR, abs/2101.12332.   
Added by: Rucknium   Last edited by: Rucknium 24/02/2022, 18:54
Hoenisch, P., Mazumdar, S., Moreno-Sánchez, P., & Ruj, S. 2022. LightSwap: An Atomic Swap Does Not Require Timeouts At Both Blockchains. [Cryptology ePrint Archive, Paper 2022/1650].   
Added by: Rucknium   Last edited by: Rucknium 13/12/2022, 19:02
Hinteregger, A., & Haslhofer, B. 2019, Short Paper: An Empirical Analysis of Monero Cross-chain Traceability. Paper presented at Financial Cryptography and Data Security.   
Added by: Rucknium 10/09/2022, 20:11
Herrera Sufán, R. (2021). Speeding up Monero’s balance computation. Unpublished M.S. Thesis, Pontificia Universidad Católica de Chile.   
Added by: Rucknium 24/02/2022, 22:40
Hammad, N., & Victor, F. 2024. Monero Traceability Heuristics: Wallet Application Bugs and the Mordinal-P2Pool Perspective.   
Added by: opal 25/09/2024, 21:35
Guo, Z., Shi, L., Xu, M., & Yin, H. (2021). MRCC: A Practical Covert Channel Over Monero With Provable Security, IEEE Access, 9, 31816–31825.   
Added by: Rucknium   Last edited by: Rucknium 06/08/2022, 21:24
Guo, S. 2024, Secure Monero on Corrupted Machines with Reverse Firewalls. Paper presented at International Conference on Data Security and Privacy Protection.   
Added by: Jack   Last edited by: Jack 17/01/2025, 17:31
Gugger, J. 2020. Bitcoin-Monero Cross-chain Atomic Swap. [Cryptology ePrint Archive, Paper 2020/1126].   
Added by: Jack   Last edited by: Jack 20/01/2023, 18:09
Grunspan, C., & Perez-Marco, R. 2022. Ping-Pong Swaps. arXiv.   
Added by: Rucknium 02/12/2022, 16:36
Grunspan, C., & Perez-Marco, R. (2022). On Profitability of Nakamoto Double Spend, Probability in the Engineering and Informational Sciences, 36(3), 732–746.   
Added by: Rucknium   Last edited by: Rucknium 14/09/2024, 14:08
Grunspan, C., & Perez-Marco, R. (2018). Double spend races, Int. J. Theor. Appl. Finance, 21(8), 1850053.   
Added by: Rucknium   Last edited by: Rucknium 23/08/2023, 16:52
Grunspan, C., & Perez-Marco, R. 2017. Satoshi Risk Tables.   
Added by: Rucknium   Last edited by: Rucknium 13/09/2024, 13:39
Goorha, P. Principles of Natural Resource Economics for Bitcoin, The Journal of The British Blockchain Association, 4(August).   
Added by: endor   Last edited by: endor 14/04/2022, 20:14
Goodell, B., Salazar, R., Slaughter, F., & Szramowski, L. (2025). A Further Review of the DL Gadget Of Interest. Unpublished manuscript.   
Added by: Rucknium 27/05/2025, 22:17
Goodell, B., Salazar, R., & Slaughter, F. 2025. Uniformly Most Powerful Tests for Ad Hoc Transactions in Monero. [Cryptology {ePrint} Archive, Paper 2025/221].   
Added by: Rucknium   Last edited by: Rucknium 27/02/2025, 16:32
Goodell, B., Noether, S., & Blue, A. (2019). Concise Linkable Ring Signatures and Forgery Against Adversarial Keys, Cryptology ePrint Archive, Paper 2019/654.   
Added by: Jack   Last edited by: Jack 20/01/2023, 17:53
Goodell, B., & Noether, S. (2018). Thring Signatures and their Applications to Spender-Ambiguous Digital Currencies. Unpublished manuscript.   
Added by: Rucknium 22/02/2022, 17:51
Goodell, B. (2024). Security Review - Generalized Bulletproofs. Unpublished manuscript.   
Added by: Rucknium 06/12/2024, 17:56
Goodell, B. (2024). History and state of Monero security analysis. Unpublished manuscript.   
Added by: opal 20/08/2024, 14:44
Gong, T., Minaei, M., Sun, W., & Kate, A. 2022, May 2–6, Towards Overcoming the Undercutting Problem. Unpublished paper presented at Financial Cryptography and Data Security 2022.   
Added by: Rucknium 05/05/2022, 21:01
Gomzin, S. (2022). How Monero Works. In Crypto Basics: A Nontechnical Introduction to Creating Your Own Money for Investors and Inventors (pp. 119–137). Berkeley, CA: Apress.   
Added by: Rucknium 22/10/2022, 16:48
Gligoroski, D. (2023). A Transformation for Lifting Discrete Logarithm Based Cryptography to Post-Quantum Cryptography, Cryptology ePrint Archive.   
Added by: Jack   Last edited by: Jack 06/03/2023, 22:32
Gibson, A. From Zero (Knowledge) to Bulletproofs.   
Added by: Jack   Last edited by: Jack 03/03/2023, 16:18
Ghesmati, S., Fdhila, W., & Weippl, E. 2022. User-Perceived Privacy in Blockchain. [Cryptology ePrint Archive, Report 2022/287].   
Added by: endor 17/04/2022, 20:59
Gervais, A., Karame, G. O., W"ust, K., Glykantzis, V., Ritzdorf, H., & Capkun, S. 2016, On the Security and Performance of Proof of Work Blockchains. Paper presented at Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security.   
Added by: endor   Last edited by: endor 17/04/2022, 19:53
Garay, J., Kiayias, A., & Leonardos, N. 2015, The Bitcoin Backbone Protocol: Analysis and Applications. Paper presented at Advances in Cryptology - EUROCRYPT 2015.   
Added by: endor 17/04/2022, 21:02
Gao, Y., Zhang, Y., Piškorec, M., & Tessone, C. J. 2025. Monero Peer-to-peer Network Topology Analysis.   
Added by: Rucknium   Last edited by: Rucknium 03/06/2025, 17:59
Gao, Y., Piškorec, M., Zhang, Y., Vallarano, N., & Tessone, C. J. 2025. Charting the Uncharted: The Landscape of Monero Peer-to-Peer Network.   
Added by: Rucknium   Last edited by: Rucknium 29/04/2025, 21:18
Gailly, N., Maller, M., & Nitulescu, A. 2022, May 2–6, SnarkPack: Practical SNARK Aggregation. Unpublished paper presented at Financial Cryptography and Data Security 2022.   
Added by: Rucknium 05/05/2022, 21:04
Franzoni, F., Salleras, X., & Daza, V. (2022). AToM: Active topology monitoring for the bitcoin peer-to-peer network, Peer-to-Peer Networking and Applications, 15(1), 408–425.   
Added by: Rucknium 09/08/2024, 18:32
Franzoni, F., & Daza, V. (2022). SoK: Network-Level Attacks on the Bitcoin P2P Network, IEEE Access, 10, 94924–94962.   
Added by: Rucknium 09/08/2024, 19:50
Franzoni, F., & Daza, V. (2022). Clover: An anonymous transaction relay protocol for the bitcoin P2P network, Peer-to-Peer Networking and Applications, 15(1), 290–303.   
Added by: Rucknium 10/07/2024, 16:09
Fomenko, O., & Sokolov, M. (2024). Bulletproofs++. Construction and Examples. Unpublished manuscript.   
Added by: Rucknium 09/08/2024, 17:33
Feickert, A., & Isthmus. (2024). Monero output lock analysis. Unpublished manuscript.   
Added by: Rucknium 04/09/2024, 16:56
Feickert, A. (2024). Zano d/v-CLSAG review. Unpublished manuscript.   
Added by: Rucknium 04/03/2025, 16:05
Feickert, A. (2024). Veridise divisor report review. Unpublished manuscript.   
Added by: Rucknium 09/08/2024, 18:07
Feickert, A. (2024). Salvium review. Unpublished manuscript.   
Added by: opal   Last edited by: opal 20/08/2024, 14:33
Feickert, A. (2024). Generalized Bulletproofs. Unpublished manuscript.   
Added by: Rucknium   Last edited by: Rucknium 09/08/2024, 17:41
Feickert, A. (2024). FCMP++ review. Unpublished manuscript.   
Added by: Rucknium 09/08/2024, 17:54
Feickert, A. 2024. Bulletproofs++ review. Cypher Stack. [Peer review]   
Added by: Rucknium 05/04/2024, 22:08
Fanti, G., & Viswanath, P. 2017. Anonymity Properties of the Bitcoin P2P Network.   
Added by: Rucknium   Last edited by: Rucknium 01/08/2024, 16:27
Fanti, G., Venkatakrishnan, S. B., Bakshi, S., Denby, B., Bhargava, S., & Miller, A., et al. (2018). Dandelion++: Lightweight Cryptocurrency Networking with Formal Anonymity Guarantees, Proc. ACM Meas. Anal. Comput. Syst. 2(2).   
Added by: Rucknium 22/10/2022, 20:53
Fantazzini, D., & Kolodin, N. (2020). Does the Hashrate Affect the Bitcoin Price? Journal of Risk and Financial Management, [i]13(11).   
Added by: endor 17/04/2022, 21:15
Fan, X. 2018, Faster dual-key stealth address for blockchain-based internet of things systems. Paper presented at Blockchain--ICBC 2018: First International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings 1.   
Added by: Jack   Last edited by: Jack 06/06/2023, 21:02
1 - 100  |  101 - 200  |  201 - 271
WIKINDX 6.10.2 | Total resources: 271 | Username: -- | Bibliography: WIKINDX Master Bibliography | Style: APA Enhanced