Otávio Chervinski, J., Kreutz, D., & Yu, J. 2021, Analysis of transaction flooding attacks against monero. Paper presented at 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). |
|
Last edited by: Rucknium 3/16/24, 1:00 PM |
|
Duan, J., Zheng, S., Wang, W., Wang, L., Hu, X., & Gu, L. (2024). Concise ringct protocol based on linkable threshold ring signature. IEEE Transactions on Dependable and Secure Computing, (1), 1–15. |
|
Last edited by: Jack 2/27/24, 1:42 PM |
|
Scheid, E. J., Küng, S., Franco, M., & Stiller, B. 2023, Opening pandora's box: An analysis of the usage of the data field in blockchains. Paper presented at 2023 Fifth International Conference on Blockchain Computing and Applications (BCCA). |
|
Last edited by: Rucknium 1/10/24, 4:59 PM |
|
Vijayakumaran, S. 2023, Analysis of cryptonote transaction graphs using the dulmage-mendelsohn decomposition. Paper presented at 5th Conference on Advances in Financial Technologies (AFT 2023). |
|
Last edited by: Rucknium 1/10/24, 4:22 PM |
|
Pitu, F., & Gaitan, N. C. 2023, July Survey of security, performance, and profitability of monero: A browser-based cryptocurrency. Paper presented at 2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME). |
|
Added by: Rucknium 1/6/24, 5:58 PM |
|
Tiemann, T., Berndt, S., Eisenbarth, T., & Liśkiewicz, M. 2023, July “act natural!”: Exchanging private messages on public blockchains. Paper presented at 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P). |
|
Added by: Rucknium 1/6/24, 5:53 PM |
|
Zhang, T. (2023). Privacy evaluation of blockchain based privacy cryptocurrencies: A comparative analysis of dash, monero, verge, zcash, and grin. IEEE Transactions on Sustainable Computing, 8(4), 574–582. |
|
Added by: Rucknium 1/6/24, 5:50 PM |
|
Luo, M., Zhou, J., & Yang, P. (2023). Rats: A regulatory anonymous transaction system based on blockchain. Journal of Parallel and Distributed Computing, 182, 104751. |
|
Added by: Rucknium 1/6/24, 5:44 PM |
|
Barj, S., Ouaddah, A., & Mezrioui, A. 2023, A review of privacy-preserving cryptographic techniques used in blockchain platforms. Paper presented at Digital Technologies and Applications. |
|
Added by: Rucknium 1/6/24, 5:36 PM |
|
Yu, Q., Liao, S., Wang, L., Yu, Y., Zhang, L., & Zhao, Y. (2024). A regulated anonymous cryptocurrency with batch linkability. Computer Standards & Interfaces, 87, 103770. |
|
Added by: Rucknium 1/6/24, 5:26 PM |
|
Raikwar, M., Wu, S., & Gjosteen, K. 2023, Security model for privacy-preserving blockchain-based cryptocurrency systems. Paper presented at Network and System Security. |
|
Added by: Rucknium 1/6/24, 5:22 PM |
|
Wicht, F.-X., Wang, Z., Le, D. V., & Cachin, C. 2023. A transaction-level model for blockchain privacy. [Cryptology ePrint Archive, Paper 2023/1902]. |
|
Added by: Rucknium 1/6/24, 5:04 PM |
|
Wang, X., Lin, C., Huang, X., & He, D. (2023). Anonymity-enhancing multi-hop locks for monero-enabled payment channel networks. IEEE Transactions on Information Forensics and Security, 1–1. |
|
Added by: Rucknium 1/6/24, 4:59 PM |
|
Zhang, J., Su, M., Liu, X., & Wang, G. 2024, May Springproofs: Efficient inner product arguments for vectors of arbitrary length. Paper presented at 2024 IEEE Symposium on Security and Privacy (SP). |
|
Added by: Rucknium 1/6/24, 4:50 PM |
|
Badertscher, C., Sedaghat, M., & Waldner, H. 2023. Fine-grained accountable privacy via unlinkable policy-compliant signatures. [Cryptology ePrint Archive, Paper 2023/1070]. |
|
Last edited by: Rucknium 1/5/24, 10:08 PM |
|
Szalaty, Z. E. (2023). Privacy preserving blockchains and quantum safety. Unpublished Master's Thesis , Universitat Oberta de Catalunya. |
|
Last edited by: Rucknium 1/5/24, 10:01 PM |
|
Buccafurri, F., De Angelis, V., & Lazzaro, S. 2023, May 25–26 A traffic-analysis proof solution to allow k-anonymous payments in pseudonymous blockchains. Unpublished paper presented at 5th Distributed Ledger Technology Workshop. |
|
Added by: Rucknium 1/5/24, 8:51 PM |
|
Dijk, A., & Schröder, D. (2023). Proof of concept for a ethereum virtual machine on cryptonote. Unpublished manuscript. |
|
Added by: Rucknium 1/5/24, 8:32 PM |
|
Jin, R. (2023). The advance of ring confidential transactions. Highlights in Science, Engineering and Technology, 39, 1104–1110. |
|
Last edited by: Rucknium 1/5/24, 7:46 PM |
|
Zhang, T., Li, B., Zhu, Y., Han, T., & Wu, Q. (2023). Covert channels in blockchain and blockchain based covert communication: Overview, state-of-the-art, and future directions. Computer Communications, 205, 136–146. |
|
Added by: Rucknium 1/5/24, 7:23 PM |
|
Huang, K., Mu, Y., Rezaeibagha, F., Zhang, X., & Li, X. (2023). Monero with multi-grained redaction. IEEE Transactions on Dependable and Secure Computing, 1–13. |
|
Added by: Rucknium 1/5/24, 7:16 PM |
|
Movsowitz Davidow, D., Manevich, Y., & Toch, E. 2023, Privacy-Preserving Transactions with Verifiable Local Differential Privacy. Paper presented at 5th Conference on Advances in Financial Technologies (AFT 2023). |
|
Added by: Rucknium 1/5/24, 7:14 PM |
|
Su, W., & Ma, L. 2023, April A blockchain-based covert document communication system model. Paper presented at 2023 8th International Conference on Computer and Communication Systems (ICCCS). |
|
Added by: Rucknium 1/5/24, 7:13 PM |
|
Grunspan, C., & Perez-Marco, R. (2018). Double spend races. Int. J. Theor. Appl. Finance, 21(8), 1850053. |
|
Last edited by: Rucknium 8/23/23, 4:52 PM |
|
Rosenfeld, M. 2014. Analysis of hashrate-based double spending. |
|
Last edited by: Rucknium 8/23/23, 4:48 PM |
|
Wahrst"atter, A., Solomon, M., DiFrancesco, B., Buterin, V., & Svetinovic, D. (2023). Basesap: Modular stealth address protocol for programmable blockchains. arXiv preprint arXiv:2306.14272, |
|
Last edited by: Jack 7/29/23, 3:09 AM |
|
Naik, A., Yeniaras, E., Hellstern, G., Prasad, G., & Vishwakarma, S. K. L. P. (2023). From portfolio optimization to quantum blockchain and security: A systematic review of quantum computing in finance. arXiv preprint arXiv:2307.01155, |
|
Last edited by: Jack 7/29/23, 3:07 AM |
|
Block, A. R., Garreta, A., Katz, J., Thaler, J., Tiwari, P. R., & Zajac, M. (2023). Fiat-shamir security of fri and related snarks. Cryptology ePrint Archive, |
|
Last edited by: Jack 7/29/23, 3:05 AM |
|
af halo2 Protokollen, H. G. S., & Spitters, B. 2023. High assurance specification of the halo2 protocol. |
|
Last edited by: Jack 7/29/23, 3:03 AM |
|
Pu, S., Thyagarajan, S. A., D"ottling, N., & Hanzlik, L. (2023). Post quantum fuzzy stealth signatures and applications. Cryptology ePrint Archive, |
|
Last edited by: Jack 7/29/23, 2:59 AM |
|
Eagen, L. Li. E. 2022. Bulletproofs++. [Cryptology ePrint Archive, Report 2022/510]. |
|
Last edited by: Rucknium 7/29/23, 2:57 AM |
|
Wang, X., Lin, L., & Wang, Y. (2023). Stealth address schemes with fast retrievability based on subgroup membership assumptions related to factoring. The Computer Journal, bxad056. |
|
Last edited by: Jack 6/7/23, 12:27 PM |
|
Chow, S. S., Egger, C., Lai, R. W. F., Ronge, V., & Woo, I. K. Y. (2023). On sustainable ring-based anonymous systems. Cryptology ePrint Archive, |
|
Last edited by: Jack 6/6/23, 9:13 PM |
|
Yu, G. (2020). Blockchain stealth address schemes. Cryptology ePrint Archive, |
|
Last edited by: Jack 6/6/23, 9:04 PM |
|
Fan, X. 2018, Faster dual-key stealth address for blockchain-based internet of things systems. Paper presented at Blockchain--ICBC 2018: First International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings 1. |
|
Last edited by: Jack 6/6/23, 9:02 PM |
|
Bunz, B., Bootle, J., Boneh, D., Poelstra, A., Wuille, P., & Maxwell, G. 2018, Bulletproofs: Short proofs for confidential transactions and more. Paper presented at 2018 IEEE Symposium on Security and Privacy (SP). |
|
Last edited by: Jack 3/29/23, 6:22 PM |
|
Chung, H., Han, K., Ju, C., Kim, M., & Seo, J. H. (2022). Bulletproofs+: Shorter proofs for a privacy-enhanced distributed ledger. IEEE Access, 10, 42067–42082. |
|
Last edited by: Jack 3/29/23, 6:12 PM |
|
Scala, E., & Mostarda, L. 2023, Range proofs with constant size and trustless setup. Paper presented at Advanced Information Networking and Applications: Proceedings of the 37th International Conference on Advanced Information Networking and Applications (AINA-2023), Volume 3. |
|
Last edited by: Jack 3/29/23, 6:12 PM |
|
Deng, C., You, L., Tang, X., Hu, G., & Gao, S. (2022). Cuproof: Range proof with constant size. Entropy, 24(3), 334. |
|
Last edited by: Jack 3/28/23, 9:58 PM |
|
Noether, S. Understanding ge fromfe frombytes vartime. |
|
Last edited by: Jack 3/28/23, 9:26 PM |
|
Esgin, M. F., Steinfeld, R., & Zhao, R. K. 2022, Matrict+: More efficient post-quantum private blockchain payments. Paper presented at 2022 IEEE Symposium on Security and Privacy (SP). |
|
Last edited by: Jack 3/28/23, 8:46 PM |
|
koe. seraphis: a privacy-preserving transaction protocol abstraction (wip). |
|
Added by: Jack 3/8/23, 10:33 PM |
|
Cremers, C., Loss, J., & Wagner, B. 2023. A holistic security analysis of monero transactions. [Cryptology ePrint Archive, Paper 2023/321]. |
|
Last edited by: Jack 3/8/23, 6:11 PM |
|
Macchetti, M. 2023. A novel related nonce attack for ecdsa. [Cryptology ePrint Archive, Paper 2023/305]. |
|
Last edited by: Jack 3/6/23, 10:35 PM |
|
Gligoroski, D. (2023). A transformation for lifting discrete logarithm based cryptography to post-quantum cryptography. Cryptology ePrint Archive, |
|
Last edited by: Jack 3/6/23, 10:32 PM |
|
Wicht, F.-X., Cachin, C., & Le, D. V. (2023). Blockchain privacy notions using the transaction graph model. , University of Fribourg. |
|
Last edited by: Jack 3/6/23, 10:29 PM |
|
Alonso, K. M. (2017). Monero-privacy in the blockchain. , Universitat Aut`onoma de Barcelona. |
|
Last edited by: Jack 3/3/23, 4:55 PM |
|
koe, Alonso, K. M., & Noether, S. (2020). Zero to monero: A technical guide to a private digital currency; for beginners, amateurs, and experts second ed. Second ed. |
|
Last edited by: Rucknium 3/3/23, 4:51 PM |
|
Gibson, A. From zero (knowledge) to bulletproofs. |
|
Last edited by: Jack 3/3/23, 4:18 PM |
|
Kappos, G. (2022). An empirical analysis of privacy in cryptocurrencies. Unpublished PhD thesis, UCL (University College London). |
|
Last edited by: Jack 2/21/23, 4:36 AM |
|
Amarasinghe, N. (2022). Systematic modelling of anonymity with application to cryptocurrencies. Unpublished PhD thesis, Queensland University of Technology. |
|
Last edited by: Jack 2/21/23, 4:34 AM |
|
Taneska, M., & Halimi, F. 2022, Anonymous blockchain based model for e-voting. Unpublished paper presented at The 19th International Conference on Informatics and Information Technologies – CIIT 2022. |
|
Last edited by: Jack 2/21/23, 4:30 AM |
|
Wijaya, D. A., Liu, J., Steinfeld, R., & Liu, D. 2018, Monero ring attack: Recreating zero mixin transaction effect. Paper presented at 2018 17th IEEE international conference on trust, security and privacy in computing and communications/12th IEEE international conference on big data science and engineering (TrustCom/BigDataSE). |
|
Added by: Jack 1/20/23, 6:34 PM |
|
Tram`er, F., Boneh, D., & Paterson, K. 2020, Remote Side-Channel attacks on anonymous transactions. Paper presented at 29th USENIX security symposium (USENIX security 20). |
|
Last edited by: Jack 1/20/23, 6:29 PM |
|
Purkovic, S., Mekic, E., Kuk, K., & Gostimirovic, L. (2021). Empirical analysis of silent mining operation in the monero system. Studies in Informatics and Control, 30(4), 99–108. |
|
Last edited by: Jack 1/20/23, 6:21 PM |
|
Liu, Q., Liu, Z., Long, Y., Liu, Z., Sui, Z., & Sun, S., et al. 2019, Making monero hard-to-trace and more efficient. Paper presented at 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). |
|
Last edited by: Jack 1/20/23, 6:12 PM |
|
Leevik, A., Beliaev, V., Stasenko, B., Davydov, V., & Bezzateev, S. 2020, Review and analysis of the classical and post-quantum ring signature algorithms. Paper presented at 2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). |
|
Last edited by: Jack 1/20/23, 6:12 PM |
|
Gugger, J. 2020. Bitcoin-monero cross-chain atomic swap. [Cryptology ePrint Archive, Paper 2020/1126]. |
|
Last edited by: Jack 1/20/23, 6:09 PM |
|
Chator, A., & Green, M. 2018, How to squeeze a crowd: Reducing bandwidth in mixing cryptocurrencies. Paper presented at 2018 IEEE European Symposium on Security and Privacy Workshops. |
|
Last edited by: Jack 1/20/23, 6:05 PM |
|
Bhambhwani, S., Delikouras, S., Korniotis, G. M., & others. 2019. Do fundamentals drive cryptocurrency prices?. |
|
Last edited by: Jack 1/20/23, 6:00 PM |
|
Azad, B. A. 2018. Evaluating the effectiveness of javascript crypto miner blocker browser extensions. StonyBrook University. |
|
Last edited by: Jack 1/20/23, 5:59 PM |
|
Goodell, B., Noether, S., & Blue, A. (2019). Concise linkable ring signatures and forgery against adversarial keys. Cryptology ePrint Archive, Paper 2019/654, |
|
Last edited by: Jack 1/20/23, 5:53 PM |
|
Estensen, H. A. 2018. A comparison of monero and zcash. |
|
Last edited by: Jack 1/20/23, 5:40 PM |
|
Erg"un, Z. C., & KARABIYIK, B. K. Forecasting monero prices with a machine learning algorithm. Eskic{s}ehir Osmangazi "Universitesi .Iktisadi ve .Idari Bilimler Dergisi, 16(3), 651–663. |
|
Last edited by: Jack 1/20/23, 5:38 PM |
|
Christensen, S. 2018. a comparative study of privacy-preserving cryptocurrencies: monero and zcash. University of Birmingham. |
|
Last edited by: Jack 1/20/23, 5:36 PM |
|
Rucknium, R. Fully specified estimation plan for optimal static parametric estimation of arbitrary distributions (ospead) public version. Monero Research Lab. |
|
Last edited by: Jack 1/20/23, 4:31 AM |
|
ACK-J, A.-J. 2022. Lord of the rings: an empirical analysis of monero’s ring signature resilience to artificially intelligent attacks. Multidisciplinary Academic Grants in Cryptocurrencies. |
|
Last edited by: Jack 1/20/23, 4:16 AM |
|
Open letter to fincen’s proposed amendment of the bsa.October 24 2020. FinCEN. |
|
Last edited by: Jack 1/20/23, 3:41 AM |
|
Usa v. lichtenstein et al.February 7 2022. US Dept. of Justice. |
|
Last edited by: Jack 1/20/23, 3:41 AM |
|
Seguias, B. E. K. 2018. Monero’s building blocks part 10 of 10--stealth addresses. |
|
Last edited by: Jack 1/18/23, 12:44 AM |
|
Seguias, B. E. K. 2018. Monero’s building blocks part 9 of 10--ringct and anatomy of monero transactions. |
|
Last edited by: Jack 1/18/23, 12:44 AM |
|
Seguias, B. E. K. 2018. Monero’s building blocks part 8 of 10--introduction to pedersen commitments and confidential transactions. |
|
Last edited by: Jack 1/18/23, 12:43 AM |
|
Seguias, B. E. K. 2018. Monero’s building blocks part 7 of 10--multilayered linkable spontaneous anonymous group (mlsag) signature scheme. |
|
Last edited by: Jack 1/18/23, 12:43 AM |
|
Seguias, B. E. K. 2018. Monero’s building blocks part 6 of 10--linkable spontaneous anonymous group (lsag) signature scheme. |
|
Last edited by: Jack 1/18/23, 12:42 AM |
|
Seguias, B. E. K. 2018. Monero’s building blocks part 5 of 10--cryptonote’s linkable ring signature scheme. |
|
Last edited by: Jack 1/18/23, 12:41 AM |
|
Seguias, B. E. K. 2018. Monero’s building blocks part 4 of 10--herranz & saez generic ring signature scheme [1]. |
|
Last edited by: Jack 1/18/23, 12:40 AM |
|
Seguias, B. E. K. 2018. Monero’s building blocks part 3 of 10--introduction to ring signatures. |
|
Last edited by: Jack 1/18/23, 12:40 AM |
|
Seguias, B. E. K. 2018. Monero’s building blocks part 2 of 10--pointcheval & stern’s generic signature scheme. |
|
Last edited by: Jack 1/18/23, 12:39 AM |
|
Seguias, B. E. K. 2018. Monero’s building blocks part 1 of 10--prerequisites. |
|
Last edited by: Jack 1/18/23, 12:38 AM |
|
Aziz, A. B. A., Ngah, S. B., Dun, Y. T., & Bee, T. F. (2020). Coinhive’s monero drive-by crypto-jacking. IOP Conference Series: Materials Science and Engineering, 769(1), 12065. |
|
Last edited by: Jack 1/18/23, 12:05 AM |
|
Moreno-Sánchez, P., Blue, A., Le, D. V., Noether, S., Goodell, B., & Kate, A. 2020, Dlsag: Non-interactive refund transactions for interoperable payment channels in monero. Paper presented at Financial Cryptography and Data Security. |
|
Last edited by: Jack 1/18/23, 12:01 AM |
|
Syracuse, D., Boehm, J., & Lundgren, N. (2022). Anti-money laundering regulation of privacy enabling cryptocurrencies. |
|
Last edited by: Jack 1/8/23, 4:44 PM |
|
Macias, & Siabi, Y. E. Security analysis of monero’s peer-to-peer system. |
|
Last edited by: Jack 1/8/23, 2:45 PM |
|
Möser, M. (2022). Cryptocurrency privacy in practice. Unpublished Ph.D. Dissertation, Princeton University. |
|
Added by: Rucknium 1/8/23, 3:54 AM |
|
Biryukov, A., & Tikhomirov, S. (2019). Security and privacy of mobile wallet users in bitcoin, dash, monero, and zcash. Pervasive and Mobile Computing, 59, 101030. |
|
Last edited by: Jack 1/8/23, 3:27 AM |
|
Campanelli, M., Hall-Andersen, M., & Kamp, S. H. 2022. Curve trees: Practical and transparent zero-knowledge accumulators. [Cryptology ePrint Archive, Paper 2022/756]. |
|
Last edited by: Rucknium 12/29/22, 4:41 PM |
|
Hoenisch, P., Mazumdar, S., Moreno-Sánchez, P., & Ruj, S. 2022. Lightswap: An atomic swap does not require timeouts at both blockchains. [Cryptology ePrint Archive, Paper 2022/1650]. |
|
Last edited by: Rucknium 12/13/22, 7:02 PM |
|
Sharma, P. K., Gosain, D., & Diaz, C. 2022. On the anonymity of peer-to-peer network anonymity schemes used by cryptocurrencies. arXiv. |
|
Added by: Rucknium 12/13/22, 7:00 PM |
|
Cao, T., Yu, J., Decouchant, J., Luo, X., & Verissimo, P. 2020, Exploring the monero peer-to-peer network. Paper presented at Financial Cryptography and Data Security. |
|
Added by: Rucknium 12/13/22, 6:56 PM |
|
Grunspan, C., & Perez-Marco, R. 2022. Ping-pong swaps. arXiv. |
|
Added by: Rucknium 12/2/22, 4:36 PM |
|
Yi, X., Wu, D., Jiang, L., Fang, Y., Zhang, K., & Zhang, W. 2022, An empirical study of blockchain system vulnerabilities: Modules, types, and patterns. Paper presented at Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering. |
|
Added by: Rucknium 12/2/22, 4:31 PM |
|
Zhaolu, T., Wan, Z., & Wang, H. 2022. Division of regulatory power: Collaborative regulation for privacy-preserving blockchains. [Cryptology ePrint Archive, Paper 2022/1634]. |
|
Added by: Rucknium 12/2/22, 4:10 PM |
|
Liao, Y.-C., Tso, R., Liu, Z.-Y., & Tseng, Y.-F. 2022, Blockchain-based confidential payment system with controllable regulation. Paper presented at Information Security Practice and Experience. |
|
Added by: Rucknium 12/2/22, 4:05 PM |
|
Teng, D., Yao, Y., Wang, Y., Zhou, L., & Huang, C. 2022, An sm2-based traceable ring signature scheme for smart grid privacy protection. Paper presented at Wireless Algorithms, Systems, and Applications. |
|
Added by: Rucknium 12/2/22, 4:03 PM |
|
Thyagarajan, S. A., Malavolta, G., Schmid, F., & Schröder, D. 2022, Verifiable timed linkable ring signatures for scalable payments for monero. Paper presented at Computer Security -- ESORICS 2022. |
|
Added by: Rucknium 12/2/22, 3:59 PM |
|
Fanti, G., Venkatakrishnan, S. B., Bakshi, S., Denby, B., Bhargava, S., & Miller, A., et al. (2018). Dandelion++: Lightweight cryptocurrency networking with formal anonymity guarantees. Proc. ACM Meas. Anal. Comput. Syst. 2(2). |
|
Added by: Rucknium 10/22/22, 8:53 PM |
|
Hou, C., Zhou, M., Ji, Y., Daian, P., Tram`er, F., & Fanti, G., et al. 2021, SquirRL: Automating attack analysis on blockchain incentive mechanisms with deep reinforcement learning. Paper presented at Proceedings 2021 Network and Distributed System Security Symposium. |
|
Added by: Rucknium 10/22/22, 8:50 PM |
|
Tang, W., Wang, W., Fanti, G., & Oh, S. (2020). Privacy-utility tradeoffs in routing cryptocurrency over payment channel networks. Proc. ACM Meas. Anal. Comput. Syst. 4(2). |
|
Last edited by: Rucknium 10/22/22, 8:37 PM |
|
Klinec, D., & Matyas, V. 2020, Privacy-friendly monero transaction signing on a hardware wallet. Paper presented at ICT Systems Security and Privacy Protection. |
|
Added by: Rucknium 10/22/22, 7:45 PM |
|
Meier, J. (2022). Diophantine satisfiability arguments for private blockchains. Unpublished masters thesis, ETH Zurich, Zurich. |
|
Added by: Rucknium 10/22/22, 7:40 PM |
|