Parker, L. (2024). FCMP++. Unpublished manuscript. |
|
Added by: Rucknium 09/08/2024, 17:45 |
|
Feickert, A. (2024). FCMP++ review. Unpublished manuscript. |
|
Added by: Rucknium 09/08/2024, 17:54 |
|
Block, A. R., Garreta, A., Katz, J., Thaler, J., Tiwari, P. R., & Zajac, M. (2023). Fiat-Shamir Security of FRI and Related SNARKs, Cryptology ePrint Archive. |
|
Added by: Jack Last edited by: Jack 29/07/2023, 03:05 |
|
Badertscher, C., Sedaghat, M., & Waldner, H. 2023. Fine-Grained Accountable Privacy via Unlinkable Policy-Compliant Signatures. [Cryptology ePrint Archive, Paper 2023/1070]. |
|
Added by: Rucknium Last edited by: Rucknium 05/01/2024, 22:08 |
|
Erg"un, Z. C., & KARABIYIK, B. K. Forecasting Monero Prices with a Machine Learning Algorithm, Eski{\c{s}}ehir Osmangazi {\"U}niversitesi {\.I}ktisadi ve {\.I}dari Bilimler Dergisi, 16(3), 651–663. |
|
Added by: Jack Last edited by: Jack 20/01/2023, 17:38 |
|
Koerhuis, W., Kechadi, T., & Le-Khac, N.-A. (2020). Forensic analysis of privacy-oriented cryptocurrencies, Forensic Science International: Digital Investigation, 33, 200891. |
|
Added by: Rucknium 10/09/2022, 19:55 |
|
Taneska, M., Dobreva, J., & Dimitrova, V. (2022). Forensics investigation comparison of privacy-oriented cryptocurrencies, Security & Future, 6(1). |
|
Added by: Rucknium Last edited by: Rucknium 10/09/2022, 20:04 |
|
Bobolz, J., Diaz, J., & Kohlweiss, M. 2024. Foundations of Anonymous Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions. [Cryptology ePrint Archive, Paper 2024/042]. |
|
Added by: Rucknium Last edited by: Rucknium 05/04/2024, 21:33 |
|
Ronge, V., Egger, C., Lai, R. W. F., Schröder, D., & Yin, H. H. F. (2021). Foundations of Ring Sampling, Proceedings on Privacy Enhancing Technologies, 2021(3), 265–288. |
|
Added by: Rucknium 23/02/2022, 16:13 |
|
Zheng, C., Meng, S., Junxian, D., & Liehuang, Z. 2024, From Ledger to P2P Network: De-anonymization on Bitcoin Using Cross-Layer Analysis. Paper presented at Advanced Parallel Processing Technologies. |
|
Added by: Rucknium 03/06/2025, 17:38 |
|
Naik, A., Yeniaras, E., Hellstern, G., Prasad, G., & Vishwakarma, S. K. L. P. (2023). From Portfolio Optimization to Quantum Blockchain and Security: A Systematic Review of Quantum Computing in Finance, arXiv preprint arXiv:2307.01155. |
|
Added by: Jack Last edited by: Jack 29/07/2023, 03:07 |
|
Gibson, A. From Zero (Knowledge) to Bulletproofs. |
|
Added by: Jack Last edited by: Jack 03/03/2023, 16:18 |
|
Babb, J., Goodell, B., Parker, L., Salazar, R., Slaughter, F., & Szramowski, L. (2025). FROSTLASS: Flexible Ring-Oriented Schnorr-like Thresholdized Linkably Anonymous Signature Scheme. Unpublished manuscript. |
|
Added by: Rucknium Last edited by: Rucknium 18/03/2025, 18:49 |
|
Rucknium, R. Fully Specified Estimation Plan for Optimal Static Parametric Estimation of Arbitrary Distributions (OSPEAD) Public Version. Monero Research Lab. |
|
Added by: Jack Last edited by: Jack 20/01/2023, 04:31 |
|
McCloskey, D. N. (2016). Fungibility. In The New Palgrave Dictionary of Economics (pp. 1–1). London: Palgrave Macmillan UK. (Original work published 1987). |
|
Added by: Rucknium Last edited by: Rucknium 09/03/2022, 21:31 |
|
Goodell, B., Salazar, R., Slaughter, F., & Szramowski, L. (2025). A Further Review of the DL Gadget Of Interest. Unpublished manuscript. |
|
Added by: Rucknium 27/05/2025, 22:17 |
|
Feickert, A. (2024). Generalized Bulletproofs. Unpublished manuscript. |
|
Added by: Rucknium Last edited by: Rucknium 09/08/2024, 17:41 |
|
Chaum, D., & Heyst, E. V. 1991, Group signatures. Paper presented at Workshop on the Theory and Application of of Cryptographic Techniques. |
|
Added by: Jack Last edited by: Jack 08/08/2022, 02:40 |
|
Avarikioti, Z., Pietrzak, K., Salem, I., Schmid, S., Tiwari, S., & Yeo, M. 2022, May 2–6, Hide & Seek: Privacy-Preserving Rebalancing on Payment Channel Networks. Unpublished paper presented at Financial Cryptography and Data Security 2022. |
|
Added by: Rucknium 05/05/2022, 20:31 |
|
af halo2 Protokollen, H. G. S., & Spitters, B. 2023. High Assurance Specification of the halo2 Protocol. |
|
Added by: Jack Last edited by: Jack 29/07/2023, 03:03 |
|
Goodell, B. (2024). History and state of Monero security analysis. Unpublished manuscript. |
|
Added by: opal 20/08/2024, 14:44 |
|
Bonneau, J. 2019, Hostile Blockchain Takeovers (Short Paper). Paper presented at Financial Cryptography and Data Security. |
|
Added by: endor Last edited by: endor 17/04/2022, 22:47 |
|
Gomzin, S. (2022). How Monero Works. In Crypto Basics: A Nontechnical Introduction to Creating Your Own Money for Investors and Inventors (pp. 119–137). Berkeley, CA: Apress. |
|
Added by: Rucknium 22/10/2022, 16:48 |
|
Chator, A., & Green, M. 2018, How to squeeze a crowd: reducing bandwidth in mixing cryptocurrencies. Paper presented at 2018 IEEE European Symposium on Security and Privacy Workshops. |
|
Added by: Jack Last edited by: Jack 20/01/2023, 18:05 |
|
Mackenzie, A., Noether, S., & Monero Core Team. (2015). Improving Obfuscation in the CryptoNote Protocol. Unpublished manuscript. |
|
Added by: Rucknium 22/02/2022, 17:33 |
|
Park, S., & Sealfon, A. 2019. It wasn't me! Repudiability and Unclaimability of Ring Signatures. [Cryptology ePrint Archive, Paper 2019/135]. |
|
Added by: endor Last edited by: endor 02/08/2022, 13:38 |
|
Buccafurri, F., De Angelis, V., & Lazzaro, S. 2024, October, K-Anonymous Payments in Pseudonymous Blockchains. Paper presented at 2024 20th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). |
|
Added by: Rucknium 16/04/2025, 15:07 |
|
Jivanyan, A., & Feickert, A. 2021. Lelantus Spark: Secure and Flexible Private Transactions. [Cryptology ePrint Archive, Report 2021/1173]. |
|
Added by: Rucknium Last edited by: Rucknium 24/02/2022, 22:47 |
|
Hoenisch, P., Mazumdar, S., Moreno-Sánchez, P., & Ruj, S. 2022. LightSwap: An Atomic Swap Does Not Require Timeouts At Both Blockchains. [Cryptology ePrint Archive, Paper 2022/1650]. |
|
Added by: Rucknium Last edited by: Rucknium 13/12/2022, 19:02 |
|
ACK-J, A.-J. 2022. LORD OF THE RINGS: AN EMPIRICAL ANALYSIS OF MONERO’S RING SIGNATURE RESILIENCE TO ARTIFICIALLY INTELLIGENT ATTACKS. Multidisciplinary Academic Grants in Cryptocurrencies. |
|
Added by: Jack Last edited by: Jack 15/04/2025, 14:14 |
|
Liu, Q., Liu, Z., Long, Y., Liu, Z., Sui, Z., & Sun, S., et al. 2019, Making Monero Hard-to-Trace and More Efficient. Paper presented at 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). |
|
Added by: Jack Last edited by: Jack 20/01/2023, 18:12 |
|
Esgin, M. F., Steinfeld, R., & Zhao, R. K. 2022, MatRiCT+: More efficient post-quantum private blockchain payments. Paper presented at 2022 IEEE Symposium on Security and Privacy (SP). |
|
Added by: Jack Last edited by: Jack 28/03/2023, 20:46 |
|
Yue, Z., Zhu, H., Chang, X., Mišić, J., Mišić, V. B., & Fan, J. 2024. MBCT: A Monero-Based Covert Transmission Approach with On-chain Dynamic Session Key Negotiation. |
|
Added by: Rucknium Last edited by: Rucknium 23/05/2024, 18:07 |
|
Howell, A., Saber, T., & Bendechache, M. (2023). Measuring node decentralisation in blockchain peer to peer networks, Blockchain: Research and Applications, 4(1), 100109. |
|
Added by: Rucknium 03/06/2025, 16:28 |
|
Dittrich, D., & Kenneally, E. (2012). The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research. U.S. Department of Homeland Security. |
|
Added by: Rucknium Last edited by: Rucknium 03/06/2025, 16:39 |
|
Kovalchuk, L., Oliynykov, R., Bespalov, Y., & Rodinko, M. (2022). Methods of Ensuring Privacy in a Decentralized Environment. In R. Oliynykov, O. Kuznetsov, O. Lemeshko & T. Radivilova (Eds), Information Security Technologies in the Decentralized Distributed Networks (pp. 1–32). Cham: Springer International Publishing. |
|
Added by: Rucknium 05/05/2022, 22:29 |
|
Broniatowski, M. (2021). Minimum Divergence Estimators, Maximum Likelihood and the Generalized Bootstrap, Entropy, 23(2), 185. |
|
Added by: Rucknium Last edited by: Rucknium 12/03/2022, 04:40 |
|
Karame, G. O., Androulaki, E., Roeschlin, M., Gervais, A., & vCapkun, S. (2015). Misbehavior in Bitcoin: A Study of Double-Spending and Accountability, ACM Trans. Inf. Syst. Secur. 18(1). |
|
Added by: endor Last edited by: endor 17/04/2022, 19:51 |
|
Noether, S., & Noether, S. (2014). Monero is Not That Mysterious. Unpublished manuscript. |
|
Added by: Rucknium 22/02/2022, 17:29 |
|
Feickert, A., & Isthmus. (2024). Monero output lock analysis. Unpublished manuscript. |
|
Added by: Rucknium 04/09/2024, 16:56 |
|
Gao, Y., Zhang, Y., Piškorec, M., & Tessone, C. J. 2025. Monero Peer-to-peer Network Topology Analysis. |
|
Added by: Rucknium Last edited by: Rucknium 03/06/2025, 17:59 |
|
Wijaya, D. A., Liu, J., Steinfeld, R., & Liu, D. 2018, Monero ring attack: Recreating zero mixin transaction effect. Paper presented at 2018 17th IEEE international conference on trust, security and privacy in computing and communications/12th IEEE international conference on big data science and engineering (TrustCom/BigDataSE). |
|
Added by: Jack 20/01/2023, 18:34 |
|
Hammad, N., & Victor, F. 2024. Monero Traceability Heuristics: Wallet Application Bugs and the Mordinal-P2Pool Perspective. |
|
Added by: opal 25/09/2024, 21:35 |
|
Huang, K., Mu, Y., Rezaeibagha, F., Zhang, X., & Li, X. (2023). Monero with Multi-Grained Redaction, IEEE Transactions on Dependable and Secure Computing, 1–13. |
|
Added by: Rucknium 05/01/2024, 19:16 |
|
Alonso, K. M. (2017). Monero-privacy in the blockchain. Universitat Aut`onoma de Barcelona. |
|
Added by: Jack Last edited by: Jack 03/03/2023, 16:55 |
|
Seguias, B. E. K. 2018. Monero’s Building Blocks Part 1 of 10--Prerequisites. |
|
Added by: Jack Last edited by: Jack 18/01/2023, 00:38 |
|
Seguias, B. E. K. 2018. Monero’s Building Blocks Part 10 of 10--Stealth addresses. |
|
Added by: Jack Last edited by: Jack 18/01/2023, 00:44 |
|
Seguias, B. E. K. 2018. Monero’s Building Blocks Part 2 of 10--Pointcheval & Stern’s Generic Signature Scheme. |
|
Added by: Jack Last edited by: Jack 18/01/2023, 00:39 |
|
Seguias, B. E. K. 2018. Monero’s Building Blocks Part 3 of 10--Introduction to Ring Signatures. |
|
Added by: Jack Last edited by: Jack 18/01/2023, 00:40 |
|
Seguias, B. E. K. 2018. Monero’s Building Blocks Part 4 of 10--Herranz & Saez Generic Ring Signature Scheme [1]. |
|
Added by: Jack Last edited by: Jack 18/01/2023, 00:40 |
|
Seguias, B. E. K. 2018. Monero’s Building Blocks Part 5 of 10--Cryptonote’s linkable ring signature scheme. |
|
Added by: Jack Last edited by: Jack 18/01/2023, 00:41 |
|
Seguias, B. E. K. 2018. Monero’s building blocks part 6 of 10--linkable spontaneous anonymous group (lsag) signature scheme. |
|
Added by: Jack Last edited by: Jack 18/01/2023, 00:42 |
|
Seguias, B. E. K. 2018. Monero’s Building Blocks Part 7 of 10--Multilayered Linkable Spontaneous Anonymous Group (MLSAG) signature scheme. |
|
Added by: Jack Last edited by: Jack 18/01/2023, 00:43 |
|
Seguias, B. E. K. 2018. Monero’s Building Blocks Part 8 of 10--Introduction to Pedersen Commitments and Confidential Transactions. |
|
Added by: Jack Last edited by: Jack 18/01/2023, 00:43 |
|
Seguias, B. E. K. 2018. Monero’s Building Blocks Part 9 of 10--RingCT and anatomy of Monero transactions. |
|
Added by: Jack Last edited by: Jack 18/01/2023, 00:44 |
|
Kopyciok, Y., Victor, F., & Schmid, S. 2025. Moneros Decentralized P2P Exchanges: Functionality, Adoption, and Privacy Risks. |
|
Added by: Rucknium Last edited by: Rucknium 03/06/2025, 16:15 |
|
Liyanage, S. G. H. (2018). MoneroSci: Linkability and Traceability Analysis of Monero Blockchain. Unpublished Undergraduate thesis University of Colombo. |
|
Added by: Rucknium 24/02/2022, 21:29 |
|
Sui, Z., Liu, J. K., Yu, J., & Qin, X. (2022). MoNet: A Fast Payment Channel Network for Scriptless Cryptocurrency Monero, Cryptology ePrint Archive. |
|
Added by: Jack 23/06/2022, 04:11 |
|
Huberman, G., Leshno, J. D., & Moallemi, C. (2021). Monopoly without a Monopolist: An Economic Analysis of the Bitcoin Payment System, The Review of Economic Studies, 88(6), 3011–3040. |
|
Added by: endor Last edited by: endor 19/04/2022, 23:07 |
|
Dutta, A., & Vijayakumaran, S. 2019, June, MProve: A Proof of Reserves Protocol for Monero Exchanges. Paper presented at 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). |
|
Added by: Rucknium 18/03/2025, 18:22 |
|
Dutta, A., Bagad, S., & Vijayakumaran, S. (2021). MProve+: Privacy Enhancing Proof of Reserves Protocol for Monero, IEEE Transactions on Information Forensics and Security, 16, 3900–3915. |
|
Added by: Rucknium Last edited by: Rucknium 24/02/2022, 19:18 |
|
Thakore, V., & Vijayakumaran, S. (2025). MProve-Nova: A Privacy-Preserving Proof of Reserves Protocol for Monero, Proceedings on Privacy Enhancing Technologies, 2025(2), 582–606. |
|
Added by: Rucknium 16/04/2025, 15:19 |
|
Guo, Z., Shi, L., Xu, M., & Yin, H. (2021). MRCC: A Practical Covert Channel Over Monero With Provable Security, IEEE Access, 9, 31816–31825. |
|
Added by: Rucknium Last edited by: Rucknium 06/08/2022, 21:24 |
|
Liu, L., Liu, L., Li, B., Zhong, Y., Liao, S., & Zhang, L. (2022). MSCCS: A Monero-based security-enhanced covert communication system, Computer Networks, 205, 108759. |
|
Added by: Rucknium 23/02/2022, 22:46 |
|
Aeeneh, S., Chervinski, J. O., Yu, J., & Zlatanov, N. 2021, May, New Attacks on the Untraceability of Transactions in CryptoNote-Style Blockchains. Paper presented at 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). |
|
Added by: Rucknium 04/03/2025, 19:18 |
|
Yu, Z., Au, M. H., Yu, J., Yang, R., Xu, Q., & Lau, W. F. 2019, New Empirical Traceability Analysis of CryptoNote-Style Blockchains. Paper presented at Financial Cryptography and Data Security. |
|
Added by: Rucknium 02/07/2022, 21:18 |
|
Miller, A., Kosba, A., Katz, J., & Shi, E. 2015, Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions. Paper presented at Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. |
|
Added by: Rucknium 23/02/2022, 22:08 |
|
Bonhomme, S., Jochmans, K., & Robin, J.-M. (2016). Non-parametric estimation of finite mixtures from repeated measurements, Journal of the Royal Statistical Society. Series B (Statistical Methodology), 78(1), 211–229. |
|
Added by: Rucknium 22/02/2025, 23:13 |
|
Egger, C., Lai, R. W. F., Ronge, V., Woo, I. K. Y., & Yin, H. H. F. (2022). On Defeating Graph Analysis of Anonymous Transactions, Proceedings on Privacy Enhancing Technologies, 2022(3). |
|
Added by: Rucknium Last edited by: Rucknium 05/07/2022, 17:03 |
|
Grunspan, C., & Perez-Marco, R. (2022). On Profitability of Nakamoto Double Spend, Probability in the Engineering and Informational Sciences, 36(3), 732–746. |
|
Added by: Rucknium Last edited by: Rucknium 14/09/2024, 14:08 |
|
Chow, S. S., Egger, C., Lai, R. W. F., Ronge, V., & Woo, I. K. Y. (2023). On sustainable ring-based anonymous systems, Cryptology ePrint Archive. |
|
Added by: Jack Last edited by: Jack 06/06/2023, 21:13 |
|
Sharma, P. K., Gosain, D., & Diaz, C. 2022. On the Anonymity of Peer-To-Peer Network Anonymity Schemes Used by Cryptocurrencies. arXiv. |
|
Added by: Rucknium 13/12/2022, 19:00 |
|
Acquisti, A., Dingledine, R., & Syverson, P. 2003, On the Economics of Anonymity. Paper presented at Financial Cryptography. |
|
Added by: Rucknium 16/04/2025, 13:54 |
|
Carlsten, M., Kalodner, H., Weinberg, S., & Narayanan, A. 2016, On the Instability of Bitcoin Without the Block Reward. |
|
Added by: endor 17/04/2022, 23:28 |
|
Quesnelle, J. 2017. On the linkability of Zcash transactions. arXiv. |
|
Added by: Rucknium Last edited by: Rucknium 25/08/2022, 00:25 |
|
Gervais, A., Karame, G. O., W"ust, K., Glykantzis, V., Ritzdorf, H., & Capkun, S. 2016, On the Security and Performance of Proof of Work Blockchains. Paper presented at Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. |
|
Added by: endor Last edited by: endor 17/04/2022, 19:53 |
|
Wijaya, D. A., Liu, J. K., Steinfeld, R., Liu, D., & Yu, J. 2019, On The Unforkability of Monero. Paper presented at Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. |
|
Added by: Rucknium 25/02/2022, 18:37 |
|
Bassa, A. (2024). On the Use of Logarithmic Derivatives in Eagen’s Proof of Sums of Points. Unpublished manuscript. |
|
Added by: Rucknium Last edited by: Rucknium 27/11/2024, 15:39 |
|
Tabatabaee, S. A., Nicer, C., Beschastnikh, I., & Feng, C. 2021. One Bad Apple Spoils the Bunch: Transaction DoS in MimbleWimble Blockchains. |
|
Added by: Rucknium Last edited by: Rucknium 03/06/2025, 17:23 |
|
Open Letter to FinCEN’s Proposed Amendment of the BSA. October 24 2020. FinCEN. |
|
Added by: Jack Last edited by: Jack 20/01/2023, 03:41 |
|
Scheid, E. J., Küng, S., Franco, M., & Stiller, B. 2023, Opening Pandora's Box: An Analysis of the Usage of the Data Field in Blockchains. Paper presented at 2023 Fifth International Conference on Blockchain Computing and Applications (BCCA). |
|
Added by: Rucknium Last edited by: Rucknium 10/01/2024, 16:59 |
|
Thyagarajan, S. A., Malavolta, G., Schmidt, F., & Schröder, D. PayMo: Payment Channels For Monero. [Cryptology ePrint Archive, Report 2020/1441]. |
|
Added by: coinstudent2048 Last edited by: coinstudent2048 05/03/2022, 18:04 |
|
Grunspan, C., & Perez-Marco, R. 2022. Ping-Pong Swaps. arXiv. |
|
Added by: Rucknium 02/12/2022, 16:36 |
|
Pu, S., Thyagarajan, S. A., D"ottling, N., & Hanzlik, L. (2023). Post Quantum Fuzzy Stealth Signatures and Applications, Cryptology ePrint Archive. |
|
Added by: Jack Last edited by: Jack 29/07/2023, 02:59 |
|
Mikic, M., Srbakoski, M., & Praska, S. 2025. Post-Quantum Stealth Address Protocols. |
|
Added by: Rucknium Last edited by: Rucknium 27/02/2025, 16:20 |
|
Chiang, J. H.-Y., Damgård, I., Duro, W. R., Engan, S., Kolby, S., & Scholl, P. 2025. Post-Quantum Threshold Ring Signature Applications from VOLE-in-the-Head. [Cryptology {ePrint} Archive, Paper 2025/113]. |
|
Added by: Rucknium Last edited by: Rucknium 27/02/2025, 17:15 |
|
Alupotha, J., & Boyen, X. 2022. Practical UC-Secure Zero-Knowledge Smart Contracts. [Cryptology ePrint Archive, Paper 2022/670]. |
|
Added by: Rucknium Last edited by: Rucknium 01/07/2022, 16:11 |
|
Goorha, P. Principles of Natural Resource Economics for Bitcoin, The Journal of The British Blockchain Association, 4(August). |
|
Added by: endor Last edited by: endor 14/04/2022, 20:14 |
|
Papadoulis, G. (2025). Privacy and auditability in decentralized payment systems. |
|
Added by: Jack Last edited by: Jack 17/01/2025, 17:28 |
|
Zhang, T. (2023). Privacy Evaluation of Blockchain Based Privacy Cryptocurrencies: A Comparative Analysis of Dash, Monero, Verge, Zcash, and Grin, IEEE Transactions on Sustainable Computing, 8(4), 574–582. |
|
Added by: Rucknium 06/01/2024, 17:50 |
|
Sarier, N. D. (2022). Privacy Preserving Biometric Authentication on the blockchain for smart healthcare, Pervasive and Mobile Computing, 86, 101683. |
|
Added by: Rucknium 10/09/2022, 19:55 |
|
Szalaty, Z. E. (2023). Privacy preserving blockchains and quantum safety. Unpublished Master's Thesis Universitat Oberta de Catalunya. |
|
Added by: Rucknium Last edited by: Rucknium 05/01/2024, 22:01 |
|
Rinberg, R., & Agarwal, N. 2022. Privacy when Everyone is Watching: An SOK on Anonymity on the Blockchain. [Cryptology ePrint Archive, Paper 2022/985]. |
|
Added by: Rucknium 22/10/2022, 17:21 |
|
Klinec, D., & Matyas, V. 2020, Privacy-Friendly Monero Transaction Signing on a Hardware Wallet. Paper presented at ICT Systems Security and Privacy Protection. |
|
Added by: Rucknium 22/10/2022, 19:45 |
|
Movsowitz Davidow, D., Manevich, Y., & Toch, E. 2023, Privacy-Preserving Transactions with Verifiable Local Differential Privacy. Paper presented at 5th Conference on Advances in Financial Technologies (AFT 2023). |
|
Added by: Rucknium 05/01/2024, 19:14 |
|
Tang, W., Wang, W., Fanti, G., & Oh, S. (2020). Privacy-Utility Tradeoffs in Routing Cryptocurrency over Payment Channel Networks, Proc. ACM Meas. Anal. Comput. Syst. 4(2). |
|
Added by: Rucknium Last edited by: Rucknium 22/10/2022, 20:37 |
|
Jiang, Y., & Zhang, J. (2024). Profitability Analysis of Time-Restricted Double-Spending Attack on PoW-Based Large Scale Blockchain With the Aid of Multiple Types of Attacks, IEEE Transactions on Information Forensics and Security, 19, 8155–8171. |
|
Added by: Jack Last edited by: Jack 19/09/2024, 22:59 |
|
Dijk, A., & Schröder, D. (2023). Proof of concept for a Ethereum Virtual Machine on Cryptonote. Unpublished manuscript. |
|
Added by: Rucknium 05/01/2024, 20:32 |
|
Li, S.-N., Yang, Z., & Tessone, C. J. 2020, Proof-of-Work cryptocurrency mining: a statistical approach to fairness. Paper presented at 2020 IEEE/CIC International Conference on Communications in China (ICCC Workshops). |
|
Added by: endor 03/04/2022, 18:53 |
|
Scala, E., & Mostarda, L. 2023, Range Proofs with Constant Size and Trustless Setup. Paper presented at Advanced Information Networking and Applications: Proceedings of the 37th International Conference on Advanced Information Networking and Applications (AINA-2023), Volume 3. |
|
Added by: Jack Last edited by: Jack 29/03/2023, 18:12 |
|