Thakore, V., & Vijayakumaran, S. (2025). MProve-Nova: A Privacy-Preserving Proof of Reserves Protocol for Monero, Proceedings on Privacy Enhancing Technologies, 2025(2), 582–606. |
|
Added by: Rucknium 4/16/25, 3:19 PM |
|
Duan, J., Wang, W., Wang, L., & Gu, L. (2025). Transitioning RingCT Accounts: From Classical to Post-Quantum Security, IEEE Internet of Things Journal, 12(2), 2090–2105. |
|
Added by: Rucknium 4/16/25, 3:10 PM |
|
Buccafurri, F., De Angelis, V., & Lazzaro, S. 2024, October, K-Anonymous Payments in Pseudonymous Blockchains. Paper presented at 2024 20th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). |
|
Added by: Rucknium 4/16/25, 3:07 PM |
|
Dingledine, R., & Mathewson, N. (2005). Anonymity Loves Company: Usability and the Network Effect. In Designing Security Systems That People Can Use (pp. 547–559). O'Reilly.. |
|
Added by: Rucknium 4/16/25, 2:59 PM |
|
Acquisti, A., Dingledine, R., & Syverson, P. 2003, On the Economics of Anonymity. Paper presented at Financial Cryptography. |
|
Added by: Rucknium 4/16/25, 1:54 PM |
|
Švarcmajer, M., Köhler, M., Marinčić, J., & Perić, J. 2025, Utilizing Faculty Computers for Cryptocurrency Validation and Mining During Idle Time. Paper presented at 33rd International Conference on Organization and Technology of Maintenance (OTO 2024). |
|
Added by: Rucknium 4/15/25, 3:17 PM |
|
Yang, X., Xu, L., & Zhu, L. (2025). De-anonymizing Monero: A Maximum Weighted Matching-Based Approach, IEEE Transactions on Information Forensics and Security. |
|
Added by: Jack Last edited by: Jack 4/15/25, 2:25 PM |
|
Bassa, A. (2025). Soundness Proof for an Interactive Protocol for the Discrete Logarithm Relation. Unpublished manuscript. |
|
Added by: Rucknium 4/2/25, 6:11 PM |
|
Salazar, R., Slaughter, F., & Szramowski, L. (2025). Veridise Logarithmic Derivative Review. Unpublished manuscript. |
|
Added by: Rucknium 3/18/25, 6:58 PM |
|
Babb, J., Goodell, B., Parker, L., Salazar, R., Slaughter, F., & Szramowski, L. (2025). FROSTLASS: Flexible Ring-Oriented Schnorr-like Thresholdized Linkably Anonymous Signature Scheme. Unpublished manuscript. |
|
Added by: Rucknium Last edited by: Rucknium 3/18/25, 6:49 PM |
|
Dutta, A., & Vijayakumaran, S. 2019, June, MProve: A Proof of Reserves Protocol for Monero Exchanges. Paper presented at 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). |
|
Added by: Rucknium 3/18/25, 6:22 PM |
|
Aeeneh, S., Chervinski, J. O., Yu, J., & Zlatanov, N. 2021, May, New Attacks on the Untraceability of Transactions in CryptoNote-Style Blockchains. Paper presented at 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). |
|
Added by: Rucknium 3/4/25, 7:18 PM |
|
Feickert, A. (2024). Zano d/v-CLSAG review. Unpublished manuscript. |
|
Added by: Rucknium 3/4/25, 4:05 PM |
|
Goodell, B., Salazar, R., & Slaughter, F. 2025. Uniformly Most Powerful Tests for Ad Hoc Transactions in Monero. [Cryptology {ePrint} Archive, Paper 2025/221]. |
|
Added by: Rucknium Last edited by: Rucknium 2/27/25, 4:32 PM |
|
Baseri, Y., Hafid, A., Shahsavari, Y., Makrakis, D., & Khodaiemehr, H. 2025. Blockchain Security Risk Assessment in Quantum Era, Migration Strategies and Proactive Defense. |
|
Added by: Rucknium Last edited by: Rucknium 2/27/25, 4:26 PM |
|
Nick, J., Eagen, L., & Linus, R. 2025. Shielded CSV: Private and Efficient Client-Side Validation. [Cryptology {ePrint} Archive, Paper 2025/068]. |
|
Added by: Rucknium Last edited by: Rucknium 2/27/25, 4:24 PM |
|
Mikic, M., Srbakoski, M., & Praska, S. 2025. Post-Quantum Stealth Address Protocols. |
|
Added by: Rucknium Last edited by: Rucknium 2/27/25, 4:20 PM |
|
Chiang, J. H.-Y., Damgård, I., Duro, W. R., Engan, S., Kolby, S., & Scholl, P. 2025. Post-Quantum Threshold Ring Signature Applications from VOLE-in-the-Head. [Cryptology {ePrint} Archive, Paper 2025/113]. |
|
Added by: Rucknium Last edited by: Rucknium 2/27/25, 5:15 PM |
|
Shi, R., Peng, Z., Lan, L., Ge, Y., Liu, P., & Wang, Q., et al. 2025, February 24–28, Eclipse Attacks on Monero’s Peer-to-Peer Network. Unpublished paper presented at Network and Distributed System Security (NDSS) Symposium 2025. |
|
Added by: Rucknium 2/27/25, 4:05 PM |
|
Bonhomme, S., Jochmans, K., & Robin, J.-M. (2016). Non-parametric estimation of finite mixtures from repeated measurements, Journal of the Royal Statistical Society. Series B (Statistical Methodology), 78(1), 211–229. |
|
Added by: Rucknium 2/22/25, 11:13 PM |
|
Patra, R. K., & Sen, B. (2016). Estimation of a two-component mixture model with applications to multiple testing, Journal of the Royal Statistical Society. Series B (Statistical Methodology), 78(4), 869–893. |
|
Added by: Rucknium 2/22/25, 11:11 PM |
|
Guo, S. 2024, Secure Monero on Corrupted Machines with Reverse Firewalls. Paper presented at International Conference on Data Security and Privacy Protection. |
|
Added by: Jack Last edited by: Jack 1/17/25, 5:31 PM |
|
Papadoulis, G. (2025). Privacy and auditability in decentralized payment systems. |
|
Added by: Jack Last edited by: Jack 1/17/25, 5:28 PM |
|
Goodell, B. (2024). Security Review - Generalized Bulletproofs. Unpublished manuscript. |
|
Added by: Rucknium 12/6/24, 5:56 PM |
|
Slaughter, F., Goodell, B., & Salazar, R. (2024). An Audit of the FCMP++ Addressing Protocol: CARROT. Unpublished manuscript. |
|
Added by: Rucknium 11/27/24, 3:40 PM |
|
Bassa, A. (2024). On the Use of Logarithmic Derivatives in Eagen’s Proof of Sums of Points. Unpublished manuscript. |
|
Added by: Rucknium Last edited by: Rucknium 11/27/24, 3:39 PM |
|
Zheng, J., Huang, H., Li, C., Zheng, Z., & Guo, S. 2021, Revisiting Double-Spending Attacks on the Bitcoin Blockchain: New Findings. Paper presented at 2021 IEEE/ACM 29th International Symposium on Quality of Service (IWQOS). |
|
Added by: Jack Last edited by: Jack 9/25/24, 9:33 PM |
|
Jiang, Y., & Zhang, J. (2024). Profitability Analysis of Time-Restricted Double-Spending Attack on PoW-Based Large Scale Blockchain With the Aid of Multiple Types of Attacks, IEEE Transactions on Information Forensics and Security, 19, 8155–8171. |
|
Added by: Jack Last edited by: Jack 9/19/24, 10:59 PM |
|
Grunspan, C., & Perez-Marco, R. (2022). On Profitability of Nakamoto Double Spend, Probability in the Engineering and Informational Sciences, 36(3), 732–746. |
|
Added by: Rucknium Last edited by: Rucknium 9/14/24, 2:08 PM |
|
Grunspan, C., & Perez-Marco, R. 2017. Satoshi Risk Tables. |
|
Added by: Rucknium Last edited by: Rucknium 9/13/24, 1:39 PM |
|
Feickert, A., & Isthmus. (2024). Monero output lock analysis. Unpublished manuscript. |
|
Added by: Rucknium 9/4/24, 4:56 PM |
|
Goodell, B. (2024). History and state of Monero security analysis. Unpublished manuscript. |
|
Added by: opal 8/20/24, 2:44 PM |
|
Feickert, A. (2024). Salvium review. Unpublished manuscript. |
|
Added by: opal Last edited by: opal 8/20/24, 2:33 PM |
|
Hammad, N., & Victor, F. 2024. Monero Traceability Heuristics: Wallet Application Bugs and the Mordinal-P2Pool Perspective. |
|
Added by: opal 9/25/24, 9:35 PM |
|
Franzoni, F., & Daza, V. (2022). SoK: Network-Level Attacks on the Bitcoin P2P Network, IEEE Access, 10, 94924–94962. |
|
Added by: Rucknium 8/9/24, 7:50 PM |
|
Franzoni, F., Salleras, X., & Daza, V. (2022). AToM: Active topology monitoring for the bitcoin peer-to-peer network, Peer-to-Peer Networking and Applications, 15(1), 408–425. |
|
Added by: Rucknium 8/9/24, 6:32 PM |
|
Feickert, A. (2024). Veridise divisor report review. Unpublished manuscript. |
|
Added by: Rucknium 8/9/24, 6:07 PM |
|
Bassa, A. (2024). Soundness Proof for Eagen’s Proof of Sums of Points. Unpublished manuscript. |
|
Added by: Rucknium 8/9/24, 6:02 PM |
|
Feickert, A. (2024). FCMP++ review. Unpublished manuscript. |
|
Added by: Rucknium 8/9/24, 5:54 PM |
|
Parker, L. (2024). FCMP++. Unpublished manuscript. |
|
Added by: Rucknium 8/9/24, 5:45 PM |
|
Feickert, A. (2024). Generalized Bulletproofs. Unpublished manuscript. |
|
Added by: Rucknium Last edited by: Rucknium 8/9/24, 5:41 PM |
|
Fomenko, O., & Sokolov, M. (2024). Bulletproofs++. Construction and Examples. Unpublished manuscript. |
|
Added by: Rucknium 8/9/24, 5:33 PM |
|
Fanti, G., & Viswanath, P. 2017. Anonymity Properties of the Bitcoin P2P Network. |
|
Added by: Rucknium Last edited by: Rucknium 8/1/24, 4:27 PM |
|
Bojja Venkatakrishnan, S., Fanti, G., & Viswanath, P. (2017). Dandelion: Redesigning the Bitcoin Network for Anonymity, Proc. ACM Meas. Anal. Comput. Syst. 1(1). |
|
Added by: Rucknium 8/1/24, 4:22 PM |
|
Franzoni, F., & Daza, V. (2022). Clover: An anonymous transaction relay protocol for the bitcoin P2P network, Peer-to-Peer Networking and Applications, 15(1), 290–303. |
|
Added by: Rucknium 7/10/24, 4:09 PM |
|
Scala, E., & Mostarda, L. 2024, Efficient Inner-Product Argument from Compressed $Sigma$-Protocols and Applications. Paper presented at International Conference on Advanced Information Networking and Applications. |
|
Added by: Jack Last edited by: Jack 6/12/24, 12:50 PM |
|
Yue, Z., Zhu, H., Chang, X., Mišić, J., Mišić, V. B., & Fan, J. 2024. MBCT: A Monero-Based Covert Transmission Approach with On-chain Dynamic Session Key Negotiation. |
|
Added by: Rucknium Last edited by: Rucknium 5/23/24, 6:07 PM |
|
Jiang, P., Zhu, J., & Zhu, L. (2024). Balancing Privacy and Regulation of Cross-chain Transaction Systems via SoK-assisted Policy Enhancement, IEEE Transactions on Information Forensics and Security, 1–1. |
|
Added by: Rucknium Last edited by: Rucknium 5/23/24, 6:01 PM |
|
Shi, R., Ge, Y., Lan, L., Peng, Z., Lin, S., & Li, L. 2024, Deanonymizing Transactions Originating from Monero Tor Hidden Service Nodes. Paper presented at Companion Proceedings of the ACM on Web Conference 2024. |
|
Added by: Rucknium 5/23/24, 5:47 PM |
|
Feickert, A. 2024. Bulletproofs++ review. Cypher Stack. [Peer review] |
|
Added by: Rucknium 4/5/24, 10:08 PM |
|
Abreu, A. S. (2023). Esquemas de privacidade nas moedas criptográficas Monero e Zcash. Unpublished Bacharelado Thesis, Universidade de São Paulo, São Paulo, Brazil. |
|
Added by: Rucknium 4/5/24, 10:07 PM |
|
Bobolz, J., Diaz, J., & Kohlweiss, M. 2024. Foundations of Anonymous Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions. [Cryptology ePrint Archive, Paper 2024/042]. |
|
Added by: Rucknium Last edited by: Rucknium 4/5/24, 9:33 PM |
|
Amrollahi, A., & Mofrad, M. A. 2023, Towards unraveling power dynamics in Information Systems research: A systematic literature review through the lens of activity theory. Paper presented at ACIS 2023. |
|
Added by: Rucknium 4/5/24, 9:26 PM |
|
Duan, J., Zheng, S., Wang, W., Wang, L., Hu, X., & Gu, L. (2024). Concise RingCT Protocol Based on Linkable Threshold Ring Signature, IEEE Transactions on Dependable and Secure Computing, (1), 1–15. |
|
Added by: Jack Last edited by: Jack 2/27/24, 1:42 PM |
|
Scheid, E. J., Küng, S., Franco, M., & Stiller, B. 2023, Opening Pandora's Box: An Analysis of the Usage of the Data Field in Blockchains. Paper presented at 2023 Fifth International Conference on Blockchain Computing and Applications (BCCA). |
|
Added by: Rucknium Last edited by: Rucknium 1/10/24, 4:59 PM |
|
Pitu, F., & Gaitan, N. C. 2023, July, Survey of security, performance, and profitability of Monero: a browser-based cryptocurrency. Paper presented at 2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME). |
|
Added by: Rucknium 1/6/24, 5:58 PM |
|
Tiemann, T., Berndt, S., Eisenbarth, T., & Liśkiewicz, M. 2023, July, “Act natural!”: Exchanging Private Messages on Public Blockchains. Paper presented at 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P). |
|
Added by: Rucknium 1/6/24, 5:53 PM |
|
Zhang, T. (2023). Privacy Evaluation of Blockchain Based Privacy Cryptocurrencies: A Comparative Analysis of Dash, Monero, Verge, Zcash, and Grin, IEEE Transactions on Sustainable Computing, 8(4), 574–582. |
|
Added by: Rucknium 1/6/24, 5:50 PM |
|
Luo, M., Zhou, J., & Yang, P. (2023). RATS: A regulatory anonymous transaction system based on blockchain, Journal of Parallel and Distributed Computing, 182, 104751. |
|
Added by: Rucknium 1/6/24, 5:44 PM |
|
Barj, S., Ouaddah, A., & Mezrioui, A. 2023, A Review of Privacy-Preserving Cryptographic Techniques Used in Blockchain Platforms. Paper presented at Digital Technologies and Applications. |
|
Added by: Rucknium 1/6/24, 5:36 PM |
|
Yu, Q., Liao, S., Wang, L., Yu, Y., Zhang, L., & Zhao, Y. (2024). A regulated anonymous cryptocurrency with batch linkability, Computer Standards & Interfaces, 87, 103770. |
|
Added by: Rucknium 1/6/24, 5:26 PM |
|
Raikwar, M., Wu, S., & Gjosteen, K. 2023, Security Model for Privacy-Preserving Blockchain-Based Cryptocurrency Systems. Paper presented at Network and System Security. |
|
Added by: Rucknium 1/6/24, 5:22 PM |
|
Wicht, F.-X., Wang, Z., Le, D. V., & Cachin, C. 2023. A Transaction-Level Model for Blockchain Privacy. [Cryptology ePrint Archive, Paper 2023/1902]. |
|
Added by: Rucknium 1/6/24, 5:04 PM |
|
Wang, X., Lin, C., Huang, X., & He, D. (2023). Anonymity-Enhancing Multi-Hop Locks for Monero-Enabled Payment Channel Networks, IEEE Transactions on Information Forensics and Security, 1–1. |
|
Added by: Rucknium 1/6/24, 4:59 PM |
|
Zhang, J., Su, M., Liu, X., & Wang, G. 2024, May, Springproofs: Efficient Inner Product Arguments for Vectors of Arbitrary Length. Paper presented at 2024 IEEE Symposium on Security and Privacy (SP). |
|
Added by: Rucknium 1/6/24, 4:50 PM |
|
Badertscher, C., Sedaghat, M., & Waldner, H. 2023. Fine-Grained Accountable Privacy via Unlinkable Policy-Compliant Signatures. [Cryptology ePrint Archive, Paper 2023/1070]. |
|
Added by: Rucknium Last edited by: Rucknium 1/5/24, 10:08 PM |
|
Szalaty, Z. E. (2023). Privacy preserving blockchains and quantum safety. Unpublished Master's Thesis Universitat Oberta de Catalunya. |
|
Added by: Rucknium Last edited by: Rucknium 1/5/24, 10:01 PM |
|
Buccafurri, F., De Angelis, V., & Lazzaro, S. 2023, May 25–26, A Traffic-Analysis Proof Solution to Allow K-Anonymous Payments in Pseudonymous Blockchains. Unpublished paper presented at 5th Distributed Ledger Technology Workshop. |
|
Added by: Rucknium 1/5/24, 8:51 PM |
|
Dijk, A., & Schröder, D. (2023). Proof of concept for a Ethereum Virtual Machine on Cryptonote. Unpublished manuscript. |
|
Added by: Rucknium 1/5/24, 8:32 PM |
|
Jin, R. (2023). The Advance of Ring Confidential Transactions, Highlights in Science, Engineering and Technology, 39, 1104–1110. |
|
Added by: Rucknium Last edited by: Rucknium 1/5/24, 7:46 PM |
|
Zhang, T., Li, B., Zhu, Y., Han, T., & Wu, Q. (2023). Covert channels in blockchain and blockchain based covert communication: Overview, state-of-the-art, and future directions, Computer Communications, 205, 136–146. |
|
Added by: Rucknium 1/5/24, 7:23 PM |
|
Su, W., & Ma, L. 2023, April, A Blockchain-based Covert Document Communication System Model. Paper presented at 2023 8th International Conference on Computer and Communication Systems (ICCCS). |
|
Added by: Rucknium 1/5/24, 7:13 PM |
|
Movsowitz Davidow, D., Manevich, Y., & Toch, E. 2023, Privacy-Preserving Transactions with Verifiable Local Differential Privacy. Paper presented at 5th Conference on Advances in Financial Technologies (AFT 2023). |
|
Added by: Rucknium 1/5/24, 7:14 PM |
|
Huang, K., Mu, Y., Rezaeibagha, F., Zhang, X., & Li, X. (2023). Monero with Multi-Grained Redaction, IEEE Transactions on Dependable and Secure Computing, 1–13. |
|
Added by: Rucknium 1/5/24, 7:16 PM |
|
Grunspan, C., & Perez-Marco, R. (2018). Double spend races, Int. J. Theor. Appl. Finance, 21(8), 1850053. |
|
Added by: Rucknium Last edited by: Rucknium 8/23/23, 4:52 PM |
|
Rosenfeld, M. 2014. Analysis of Hashrate-Based Double Spending. |
|
Added by: Rucknium Last edited by: Rucknium 8/23/23, 4:48 PM |
|
Wahrst"atter, A., Solomon, M., DiFrancesco, B., Buterin, V., & Svetinovic, D. (2023). BaseSAP: Modular Stealth Address Protocol for Programmable Blockchains, arXiv preprint arXiv:2306.14272. |
|
Added by: Jack Last edited by: Jack 7/29/23, 3:09 AM |
|
Naik, A., Yeniaras, E., Hellstern, G., Prasad, G., & Vishwakarma, S. K. L. P. (2023). From Portfolio Optimization to Quantum Blockchain and Security: A Systematic Review of Quantum Computing in Finance, arXiv preprint arXiv:2307.01155. |
|
Added by: Jack Last edited by: Jack 7/29/23, 3:07 AM |
|
Block, A. R., Garreta, A., Katz, J., Thaler, J., Tiwari, P. R., & Zajac, M. (2023). Fiat-Shamir Security of FRI and Related SNARKs, Cryptology ePrint Archive. |
|
Added by: Jack Last edited by: Jack 7/29/23, 3:05 AM |
|
af halo2 Protokollen, H. G. S., & Spitters, B. 2023. High Assurance Specification of the halo2 Protocol. |
|
Added by: Jack Last edited by: Jack 7/29/23, 3:03 AM |
|
Pu, S., Thyagarajan, S. A., D"ottling, N., & Hanzlik, L. (2023). Post Quantum Fuzzy Stealth Signatures and Applications, Cryptology ePrint Archive. |
|
Added by: Jack Last edited by: Jack 7/29/23, 2:59 AM |
|
Wang, X., Lin, L., & Wang, Y. (2023). Stealth Address Schemes With Fast Retrievability Based On Subgroup Membership Assumptions Related To Factoring, The Computer Journal, bxad056. |
|
Added by: Jack Last edited by: Jack 6/7/23, 12:27 PM |
|
Chow, S. S., Egger, C., Lai, R. W. F., Ronge, V., & Woo, I. K. Y. (2023). On sustainable ring-based anonymous systems, Cryptology ePrint Archive. |
|
Added by: Jack Last edited by: Jack 6/6/23, 9:13 PM |
|
Yu, G. (2020). Blockchain stealth address schemes, Cryptology ePrint Archive. |
|
Added by: Jack Last edited by: Jack 6/6/23, 9:04 PM |
|
Fan, X. 2018, Faster dual-key stealth address for blockchain-based internet of things systems. Paper presented at Blockchain--ICBC 2018: First International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings 1. |
|
Added by: Jack Last edited by: Jack 6/6/23, 9:02 PM |
|
Chung, H., Han, K., Ju, C., Kim, M., & Seo, J. H. (2022). Bulletproofs+: Shorter Proofs for a Privacy-Enhanced Distributed Ledger, IEEE Access, 10, 42067–42082. |
|
Added by: Jack Last edited by: Jack 3/29/23, 6:12 PM |
|
Deng, C., You, L., Tang, X., Hu, G., & Gao, S. (2022). Cuproof: Range proof with constant size, Entropy, 24(3), 334. |
|
Added by: Jack Last edited by: Jack 3/28/23, 9:58 PM |
|
Scala, E., & Mostarda, L. 2023, Range Proofs with Constant Size and Trustless Setup. Paper presented at Advanced Information Networking and Applications: Proceedings of the 37th International Conference on Advanced Information Networking and Applications (AINA-2023), Volume 3. |
|
Added by: Jack Last edited by: Jack 3/29/23, 6:12 PM |
|
Noether, S. UNDERSTANDING GE FROMFE FROMBYTES VARTIME. |
|
Added by: Jack Last edited by: Jack 3/28/23, 9:26 PM |
|
Esgin, M. F., Steinfeld, R., & Zhao, R. K. 2022, MatRiCT+: More efficient post-quantum private blockchain payments. Paper presented at 2022 IEEE Symposium on Security and Privacy (SP). |
|
Added by: Jack Last edited by: Jack 3/28/23, 8:46 PM |
|
koe. Seraphis: A Privacy-Preserving Transaction Protocol Abstraction (WIP). |
|
Added by: Jack 3/8/23, 10:33 PM |
|
Macchetti, M. 2023. A Novel Related Nonce Attack for ECDSA. [Cryptology ePrint Archive, Paper 2023/305]. |
|
Added by: Jack Last edited by: Jack 3/6/23, 10:35 PM |
|
Gligoroski, D. (2023). A Transformation for Lifting Discrete Logarithm Based Cryptography to Post-Quantum Cryptography, Cryptology ePrint Archive. |
|
Added by: Jack Last edited by: Jack 3/6/23, 10:32 PM |
|
Wicht, F.-X., Cachin, C., & Le, D. V. (2023). Blockchain Privacy Notions Using the Transaction Graph Model. University of Fribourg. |
|
Added by: Jack Last edited by: Jack 3/6/23, 10:29 PM |
|
Cremers, C., Loss, J., & Wagner, B. 2023. A Holistic Security Analysis of Monero Transactions. [Cryptology ePrint Archive, Paper 2023/321]. |
|
Added by: Jack Last edited by: Jack 3/8/23, 6:11 PM |
|
Alonso, K. M. (2017). Monero-privacy in the blockchain. Universitat Aut`onoma de Barcelona. |
|
Added by: Jack Last edited by: Jack 3/3/23, 4:55 PM |
|
Gibson, A. From Zero (Knowledge) to Bulletproofs. |
|
Added by: Jack Last edited by: Jack 3/3/23, 4:18 PM |
|
Kappos, G. (2022). An Empirical Analysis of Privacy in Cryptocurrencies. Unpublished PhD thesis, UCL (University College London). |
|
Added by: Jack Last edited by: Jack 2/21/23, 4:36 AM |
|
Amarasinghe, N. (2022). Systematic Modelling of Anonymity with Application to Cryptocurrencies. Unpublished PhD thesis, Queensland University of Technology. |
|
Added by: Jack Last edited by: Jack 2/21/23, 4:34 AM |
|
Taneska, M., & Halimi, F. 2022, Anonymous Blockchain based model for e-Voting. Unpublished paper presented at The 19th International Conference on Informatics and Information Technologies – CIIT 2022. |
|
Added by: Jack Last edited by: Jack 2/21/23, 4:30 AM |
|