MoneroResearch.info

List Resources

Displaying 1 - 100 of 176 (Bibliography: WIKINDX Master Bibliography)
Parameters
List all
Order by:

Ascending
Descending
Use all checked: 
Use all displayed: 
Use all in list: 
Eagen, L. Li. E. 2022. Bulletproofs++. [Cryptology ePrint Archive, Report 2022/510].  
Last edited by: Rucknium 2023-03-29 18:24
Bunz, B., Bootle, J., Boneh, D., Poelstra, A., Wuille, P., & Maxwell, G. 2018, Bulletproofs: Short proofs for confidential transactions and more. Paper presented at 2018 IEEE Symposium on Security and Privacy (SP).  
Last edited by: Jack 2023-03-29 18:22
Chung, H., Han, K., Ju, C., Kim, M., & Seo, J. H. (2022). Bulletproofs+: Shorter proofs for a privacy-enhanced distributed ledger. IEEE Access, 10, 42067–42082.  
Last edited by: Jack 2023-03-29 18:12
Scala, E., & Mostarda, L. 2023, Range proofs with constant size and trustless setup. Paper presented at Advanced Information Networking and Applications: Proceedings of the 37th International Conference on Advanced Information Networking and Applications (AINA-2023), Volume 3.  
Last edited by: Jack 2023-03-29 18:12
Deng, C., You, L., Tang, X., Hu, G., & Gao, S. (2022). Cuproof: Range proof with constant size. Entropy, 24(3), 334.  
Last edited by: Jack 2023-03-28 21:58
Noether, S. Understanding ge fromfe frombytes vartime.  
Last edited by: Jack 2023-03-28 21:26
Esgin, M. F., Steinfeld, R., & Zhao, R. K. 2022, Matrict+: More efficient post-quantum private blockchain payments. Paper presented at 2022 IEEE Symposium on Security and Privacy (SP).  
Last edited by: Jack 2023-03-28 20:46
koe. seraphis: a privacy-preserving transaction protocol abstraction (wip).  
Added by: Jack 2023-03-08 22:33
Cremers, C., Loss, J., & Wagner, B. 2023. A holistic security analysis of monero transactions. [Cryptology ePrint Archive, Paper 2023/321].  
Last edited by: Jack 2023-03-08 18:11
Macchetti, M. 2023. A novel related nonce attack for ecdsa. [Cryptology ePrint Archive, Paper 2023/305].  
Last edited by: Jack 2023-03-06 22:35
Gligoroski, D. (2023). A transformation for lifting discrete logarithm based cryptography to post-quantum cryptography. Cryptology ePrint Archive,  
Last edited by: Jack 2023-03-06 22:32
Wicht, F.-X., Cachin, C., & Le, D. V. (2023). Blockchain privacy notions using the transaction graph model. , University of Fribourg.  
Last edited by: Jack 2023-03-06 22:29
Alonso, K. M. (2017). Monero-privacy in the blockchain. , Universitat Aut`onoma de Barcelona.  
Last edited by: Jack 2023-03-03 16:55
koe, Alonso, K. M., & Noether, S. (2020). Zero to monero: A technical guide to a private digital currency; for beginners, amateurs, and experts second ed. Second ed.  
Last edited by: Rucknium 2023-03-03 16:51
Gibson, A. From zero (knowledge) to bulletproofs.  
Last edited by: Jack 2023-03-03 16:18
Kappos, G. (2022). An empirical analysis of privacy in cryptocurrencies. Unpublished PhD thesis, UCL (University College London).  
Last edited by: Jack 2023-02-21 04:36
Amarasinghe, N. (2022). Systematic modelling of anonymity with application to cryptocurrencies. Unpublished PhD thesis, Queensland University of Technology.  
Last edited by: Jack 2023-02-21 04:34
Taneska, M., & Halimi, F. 2022, Anonymous blockchain based model for e-voting. Unpublished paper presented at The 19th International Conference on Informatics and Information Technologies – CIIT 2022.  
Last edited by: Jack 2023-02-21 04:30
Wijaya, D. A., Liu, J., Steinfeld, R., & Liu, D. 2018, Monero ring attack: Recreating zero mixin transaction effect. Paper presented at 2018 17th IEEE international conference on trust, security and privacy in computing and communications/12th IEEE international conference on big data science and engineering (TrustCom/BigDataSE).  
Added by: Jack 2023-01-20 18:34
Tram`er, F., Boneh, D., & Paterson, K. 2020, Remote Side-Channel attacks on anonymous transactions. Paper presented at 29th USENIX security symposium (USENIX security 20).  
Last edited by: Jack 2023-01-20 18:29
Purkovic, S., Mekic, E., Kuk, K., & Gostimirovic, L. (2021). Empirical analysis of silent mining operation in the monero system. Studies in Informatics and Control, 30(4), 99–108.  
Last edited by: Jack 2023-01-20 18:21
Liu, Q., Liu, Z., Long, Y., Liu, Z., Sui, Z., & Sun, S., et al. 2019, Making monero hard-to-trace and more efficient. Paper presented at 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).  
Last edited by: Jack 2023-01-20 18:12
Leevik, A., Beliaev, V., Stasenko, B., Davydov, V., & Bezzateev, S. 2020, Review and analysis of the classical and post-quantum ring signature algorithms. Paper presented at 2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT).  
Last edited by: Jack 2023-01-20 18:12
Gugger, J. 2020. Bitcoin-monero cross-chain atomic swap. [Cryptology ePrint Archive, Paper 2020/1126].  
Last edited by: Jack 2023-01-20 18:09
Chator, A., & Green, M. 2018, How to squeeze a crowd: Reducing bandwidth in mixing cryptocurrencies. Paper presented at 2018 IEEE European Symposium on Security and Privacy Workshops.  
Last edited by: Jack 2023-01-20 18:05
Bhambhwani, S., Delikouras, S., Korniotis, G. M., & others. 2019. Do fundamentals drive cryptocurrency prices?.  
Last edited by: Jack 2023-01-20 18:00
Azad, B. A. 2018. Evaluating the effectiveness of javascript crypto miner blocker browser extensions. StonyBrook University.  
Last edited by: Jack 2023-01-20 17:59
Goodell, B., Noether, S., & Blue, A. (2019). Concise linkable ring signatures and forgery against adversarial keys. Cryptology ePrint Archive, Paper 2019/654,  
Last edited by: Jack 2023-01-20 17:53
Fanti, G., Venkatakrishnan, S. B., Bakshi, S., Denby, B., Bhargava, S., & Miller, A., et al. (2018). Dandelion++ lightweight cryptocurrency networking with formal anonymity guarantees. Proceedings of the ACM on Measurement and Analysis of Computing Systems, 2(2), 1–35.  
Last edited by: Jack 2023-01-20 17:44
Estensen, H. A. 2018. A comparison of monero and zcash.  
Last edited by: Jack 2023-01-20 17:40
Erg"un, Z. C., & KARABIYIK, B. K. Forecasting monero prices with a machine learning algorithm. Eskic{s}ehir Osmangazi "Universitesi .Iktisadi ve .Idari Bilimler Dergisi, 16(3), 651–663.  
Last edited by: Jack 2023-01-20 17:38
Christensen, S. 2018. a comparative study of privacy-preserving cryptocurrencies: monero and zcash. University of Birmingham.  
Last edited by: Jack 2023-01-20 17:36
Rucknium, R. Fully specified estimation plan for optimal static parametric estimation of arbitrary distributions (ospead) public version. Monero Research Lab.  
Last edited by: Jack 2023-01-20 04:31
ACK-J, A.-J. 2022. Lord of the rings: an empirical analysis of monero’s ring signature resilience to artificially intelligent attacks. Multidisciplinary Academic Grants in Cryptocurrencies.  
Last edited by: Jack 2023-01-20 04:16
Open letter to fincen’s proposed amendment of the bsa.October 24 2020. FinCEN.  
Last edited by: Jack 2023-01-20 03:41
Usa v. lichtenstein et al.February 7 2022. US Dept. of Justice.  
Last edited by: Jack 2023-01-20 03:41
Vijayakumaran, S. 2021. Analysis of cryptonote transaction graphs using the dulmage-mendelsohn decomposition.  
Last edited by: Jack 2023-01-18 01:02
Seguias, B. E. K. 2018. Monero’s building blocks part 10 of 10--stealth addresses.  
Last edited by: Jack 2023-01-18 00:44
Seguias, B. E. K. 2018. Monero’s building blocks part 9 of 10--ringct and anatomy of monero transactions.  
Last edited by: Jack 2023-01-18 00:44
Seguias, B. E. K. 2018. Monero’s building blocks part 8 of 10--introduction to pedersen commitments and confidential transactions.  
Last edited by: Jack 2023-01-18 00:43
Seguias, B. E. K. 2018. Monero’s building blocks part 7 of 10--multilayered linkable spontaneous anonymous group (mlsag) signature scheme.  
Last edited by: Jack 2023-01-18 00:43
Seguias, B. E. K. 2018. Monero’s building blocks part 6 of 10--linkable spontaneous anonymous group (lsag) signature scheme.  
Last edited by: Jack 2023-01-18 00:42
Seguias, B. E. K. 2018. Monero’s building blocks part 5 of 10--cryptonote’s linkable ring signature scheme.  
Last edited by: Jack 2023-01-18 00:41
Seguias, B. E. K. 2018. Monero’s building blocks part 4 of 10--herranz & saez generic ring signature scheme [1].  
Last edited by: Jack 2023-01-18 00:40
Seguias, B. E. K. 2018. Monero’s building blocks part 3 of 10--introduction to ring signatures.  
Last edited by: Jack 2023-01-18 00:40
Seguias, B. E. K. 2018. Monero’s building blocks part 2 of 10--pointcheval & stern’s generic signature scheme.  
Last edited by: Jack 2023-01-18 00:39
Seguias, B. E. K. 2018. Monero’s building blocks part 1 of 10--prerequisites.  
Last edited by: Jack 2023-01-18 00:38
Aziz, A. B. A., Ngah, S. B., Dun, Y. T., & Bee, T. F. (2020). Coinhive’s monero drive-by crypto-jacking. IOP Conference Series: Materials Science and Engineering, 769(1), 12065.  
Last edited by: Jack 2023-01-18 00:05
Moreno-Sánchez, P., Blue, A., Le, D. V., Noether, S., Goodell, B., & Kate, A. 2020, Dlsag: Non-interactive refund transactions for interoperable payment channels in monero. Paper presented at Financial Cryptography and Data Security.  
Last edited by: Jack 2023-01-18 00:01
Syracuse, D., Boehm, J., & Lundgren, N. (2022). Anti-money laundering regulation of privacy enabling cryptocurrencies.  
Last edited by: Jack 2023-01-08 16:44
Macias, & Siabi, Y. E. Security analysis of monero’s peer-to-peer system.  
Last edited by: Jack 2023-01-08 14:45
Möser, M. (2022). Cryptocurrency privacy in practice. Unpublished Ph.D. Dissertation, Princeton University.  
Added by: Rucknium 2023-01-08 03:54
Biryukov, A., & Tikhomirov, S. (2019). Security and privacy of mobile wallet users in bitcoin, dash, monero, and zcash. Pervasive and Mobile Computing, 59, 101030.  
Last edited by: Jack 2023-01-08 03:27
Campanelli, M., Hall-Andersen, M., & Kamp, S. H. 2022. Curve trees: Practical and transparent zero-knowledge accumulators. [Cryptology ePrint Archive, Paper 2022/756].  
Last edited by: Rucknium 2022-12-29 16:41
Hoenisch, P., Mazumdar, S., Moreno-Sánchez, P., & Ruj, S. 2022. Lightswap: An atomic swap does not require timeouts at both blockchains. [Cryptology ePrint Archive, Paper 2022/1650].  
Last edited by: Rucknium 2022-12-13 19:02
Sharma, P. K., Gosain, D., & Diaz, C. 2022. On the anonymity of peer-to-peer network anonymity schemes used by cryptocurrencies. arXiv.  
Added by: Rucknium 2022-12-13 19:00
Cao, T., Yu, J., Decouchant, J., Luo, X., & Verissimo, P. 2020, Exploring the monero peer-to-peer network. Paper presented at Financial Cryptography and Data Security.  
Added by: Rucknium 2022-12-13 18:56
Grunspan, C., & Perez-Marco, R. 2022. Ping-pong swaps. arXiv.  
Added by: Rucknium 2022-12-02 16:36
Yi, X., Wu, D., Jiang, L., Fang, Y., Zhang, K., & Zhang, W. 2022, An empirical study of blockchain system vulnerabilities: Modules, types, and patterns. Paper presented at Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering.  
Added by: Rucknium 2022-12-02 16:31
Zhaolu, T., Wan, Z., & Wang, H. 2022. Division of regulatory power: Collaborative regulation for privacy-preserving blockchains. [Cryptology ePrint Archive, Paper 2022/1634].  
Added by: Rucknium 2022-12-02 16:10
Liao, Y.-C., Tso, R., Liu, Z.-Y., & Tseng, Y.-F. 2022, Blockchain-based confidential payment system with controllable regulation. Paper presented at Information Security Practice and Experience.  
Added by: Rucknium 2022-12-02 16:05
Teng, D., Yao, Y., Wang, Y., Zhou, L., & Huang, C. 2022, An sm2-based traceable ring signature scheme for smart grid privacy protection. Paper presented at Wireless Algorithms, Systems, and Applications.  
Added by: Rucknium 2022-12-02 16:03
Thyagarajan, S. A., Malavolta, G., Schmid, F., & Schröder, D. 2022, Verifiable timed linkable ring signatures for scalable payments for monero. Paper presented at Computer Security -- ESORICS 2022.  
Added by: Rucknium 2022-12-02 15:59
Fanti, G., Venkatakrishnan, S. B., Bakshi, S., Denby, B., Bhargava, S., & Miller, A., et al. (2018). Dandelion++: Lightweight cryptocurrency networking with formal anonymity guarantees. Proc. ACM Meas. Anal. Comput. Syst. 2(2).  
Added by: Rucknium 2022-10-22 20:53
Hou, C., Zhou, M., Ji, Y., Daian, P., Tram`er, F., & Fanti, G., et al. 2021, SquirRL: Automating attack analysis on blockchain incentive mechanisms with deep reinforcement learning. Paper presented at Proceedings 2021 Network and Distributed System Security Symposium.  
Added by: Rucknium 2022-10-22 20:50
Tang, W., Wang, W., Fanti, G., & Oh, S. (2020). Privacy-utility tradeoffs in routing cryptocurrency over payment channel networks. Proc. ACM Meas. Anal. Comput. Syst. 4(2).  
Last edited by: Rucknium 2022-10-22 20:37
Klinec, D., & Matyas, V. 2020, Privacy-friendly monero transaction signing on a hardware wallet. Paper presented at ICT Systems Security and Privacy Protection.  
Added by: Rucknium 2022-10-22 19:45
Meier, J. (2022). Diophantine satisfiability arguments for private blockchains. Unpublished masters thesis, ETH Zurich, Zurich.  
Added by: Rucknium 2022-10-22 19:40
Rinberg, R., & Agarwal, N. 2022. Privacy when everyone is watching: An sok on anonymity on the blockchain. [Cryptology ePrint Archive, Paper 2022/985].  
Added by: Rucknium 2022-10-22 17:21
Järvinen, S. (2022). Tax evasion with untraceable cryptocurrencies in OECD countries as a target of regulation. Unpublished masters thesis, Aalto University. School of Business.  
Added by: Rucknium 2022-10-22 17:17
Gomzin, S. (2022). How monero works. In Crypto Basics: A Nontechnical Introduction to Creating Your Own Money for Investors and Inventors (pp. 119–137). Berkeley, CA: Apress.  
Added by: Rucknium 2022-10-22 16:48
Butler, S. 2021, Cyber 9/11 will not take place: A user perspective of bitcoin and cryptocurrencies from underground and dark net forums. Paper presented at Socio-Technical Aspects in Security and Trust.  
Added by: Rucknium 2022-10-12 16:26
Wang, J., Cheng, J., Yuan, Y., Li, H., & Sheng, V. S. 2022, A survey on privacy protection of cross-chain. Paper presented at Advances in Artificial Intelligence and Security.  
Added by: Rucknium 2022-09-10 20:13
Hinteregger, A., & Haslhofer, B. 2019, Short paper: An empirical analysis of monero cross-chain traceability. Paper presented at Financial Cryptography and Data Security.  
Added by: Rucknium 2022-09-10 20:11
Taneska, M., Dobreva, J., & Dimitrova, V. (2022). Forensics investigation comparison of privacy-oriented cryptocurrencies. Security & Future, 6(1).  
Last edited by: Rucknium 2022-09-10 20:04
Wang, K., Liu, M., Wang, J., Wu, M., & Zhao, F. (2022). Bbarhs: Blockchain-based anonymous ride-hailing scheme for autonomous taxi network. Security and Communication Networks, 2022, 1–13.  
Added by: Rucknium 2022-09-10 19:57
Koerhuis, W., Kechadi, T., & Le-Khac, N.-A. (2020). Forensic analysis of privacy-oriented cryptocurrencies. Forensic Science International: Digital Investigation, 33, 200891.  
Added by: Rucknium 2022-09-10 19:55
Sarier, N. D. (2022). Privacy preserving biometric authentication on the blockchain for smart healthcare. Pervasive and Mobile Computing, 86, 101683.  
Added by: Rucknium 2022-09-10 19:55
Li, Y., Weng, J., Li, M., Wu, W., Weng, J., & Liu, J.-N., et al. (2022). Zerocross: A sidechain-based privacy-preserving cross-chain solution for monero. Journal of Parallel and Distributed Computing, 169, 301–316.  
Added by: Rucknium 2022-09-10 19:54
Quesnelle, J. 2017. On the linkability of zcash transactions. arXiv.  
Last edited by: Rucknium 2022-08-25 00:25
Chaum, D., & Heyst, E. V. 1991, Group signatures. Paper presented at Workshop on the Theory and Application of of Cryptographic Techniques.  
Last edited by: Jack 2022-08-08 02:40
Guo, Z., Shi, L., Xu, M., & Yin, H. (2021). Mrcc: A practical covert channel over monero with provable security. IEEE Access, 9, 31816–31825.  
Last edited by: Rucknium 2022-08-06 21:24
Park, S., & Sealfon, A. 2019. It wasn't me! repudiability and unclaimability of ring signatures. [Cryptology ePrint Archive, Paper 2019/135].  
Last edited by: endor 2022-08-02 13:38
Egger, C., Lai, R. W. F., Ronge, V., Woo, I. K. Y., & Yin, H. H. F. (2022). On defeating graph analysis of anonymous transactions. Proceedings on Privacy Enhancing Technologies, 2022(3).  
Last edited by: Rucknium 2022-07-05 17:03
Deuber, D., Ronge, V., & Rueckert, C. (2022). Sok: assumptions underlying cryptocurrency deanonymizations. Proceedings on Privacy Enhancing Technologies, 2022(3).  
Last edited by: Rucknium 2022-07-05 17:01
Yu, Z., Au, M. H., Yu, J., Yang, R., Xu, Q., & Lau, W. F. 2019, New empirical traceability analysis of cryptonote-style blockchains. Paper presented at Financial Cryptography and Data Security.  
Added by: Rucknium 2022-07-02 21:18
Li, J. (2022). Extending succinct zero knowledge proofs for set membership to ring signatures. Unpublished masters thesis, EECS Department, University of California, Berkeley.  
Last edited by: Rucknium 2022-07-01 18:05
Budish, E. (2022). The economic limits of bitcoin and anonymous, decentralized trust on the blockchain. Unpublished manuscript.  
Added by: Rucknium 2022-07-01 16:19
Alupotha, J., & Boyen, X. 2022. Practical uc-secure zero-knowledge smart contracts. [Cryptology ePrint Archive, Paper 2022/670].  
Last edited by: Rucknium 2022-07-01 16:11
Yu, J., Au, M. H. A., & Esteves-Verissimo, P. 2019, June Re-thinking untraceability in the cryptonote-style blockchain. Paper presented at 2019 IEEE 32nd Computer Security Foundations Symposium (CSF).  
Added by: Rucknium 2022-07-01 15:50
Li, Y., Yang, G., Susilo, W., Yu, Y., Au, M. H., & Liu, D. (2021). Traceable monero: Anonymous cryptocurrency with enhanced accountability. IEEE Transactions on Dependable and Secure Computing, 18(2), 679–691.  
Added by: Rucknium 2022-06-30 22:22
Sui, Z., Liu, J. K., Yu, J., & Qin, X. (2022). Monet: A fast payment channel network for scriptless cryptocurrency monero. Cryptology ePrint Archive,  
Added by: Jack 2022-06-23 04:11
Seres, I. A., Pejó, B., & Burcsi, P. 2022, May 2–6 The effect of false positives: why fuzzy message detection leads to fuzzy privacy guarantees?. Unpublished paper presented at Financial Cryptography and Data Security 2022.  
Added by: Rucknium 2022-05-05 22:38
Zhang, Y., & Xu, H. (2022). Accountable monero system with privacy protection. Security and Communication Networks, 2022, 7746341.  
Added by: Rucknium 2022-05-05 22:33
Kovalchuk, L., Oliynykov, R., Bespalov, Y., & Rodinko, M. (2022). Methods of ensuring privacy in a decentralized environment. In R. Oliynykov, O. Kuznetsov, O. Lemeshko & T. Radivilova (Eds), Information Security Technologies in the Decentralized Distributed Networks (pp. 1–32). Cham: Springer International Publishing.  
Added by: Rucknium 2022-05-05 22:29
Liang, M., Karantaidou, I., Baldimtsi, F., Gordon, D. S., & Varia, M. (2022). (∈, δ)-indistinguishable mixing for cryptocurrencies. Proceedings on Privacy Enhancing Technologies, 2022(1), 49–74.  
Last edited by: Rucknium 2022-05-05 22:24
Xu, M., Zhang, Y., & Zhong, S. 2022. Towards fair multiparty computation in scriptless distributed ledger systems. [Cryptology ePrint Archive, Report 2022/176].  
Last edited by: Rucknium 2022-05-05 22:11
Corradini, F., Mostarda, L., & Scala, E. 2022, Zeromt: Multi-transfer protocol for enabling privacy in off-chain payments. Paper presented at Advanced Information Networking and Applications.  
Added by: Rucknium 2022-05-05 21:43
Gailly, N., Maller, M., & Nitulescu, A. 2022, May 2–6 Snarkpack: practical snark aggregation. Unpublished paper presented at Financial Cryptography and Data Security 2022.  
Added by: Rucknium 2022-05-05 21:04
Gong, T., Minaei, M., Sun, W., & Kate, A. 2022, May 2–6 Towards overcoming the undercutting problem. Unpublished paper presented at Financial Cryptography and Data Security 2022.  
Added by: Rucknium 2022-05-05 21:01
1 - 100  |  101 - 176
WIKINDX 6.5.0 | Total resources: 176 | Username: -- | Bibliography: WIKINDX Master Bibliography | Style: American Psychological Association (APA)