Su, W., & Ma, L. 2023, April, A Blockchain-based Covert Document Communication System Model. Paper presented at 2023 8th International Conference on Computer and Communication Systems (ICCCS). |
|
Added by: Rucknium 1/5/24, 7:13 PM |
|
Zabka, P., Foerster, K.-T., Decker, C., & Schmid, S. 2022, May 2–6, A Centrality Analysis of the Lightning Network. Unpublished paper presented at Financial Cryptography and Data Security 2022. |
|
Added by: Rucknium 5/5/22, 8:36 PM |
|
Christensen, S. 2018. A Comparative Study of Privacy-Preserving Cryptocurrencies: Monero and ZCash. University of Birmingham. |
|
Added by: Jack Last edited by: Jack 1/20/23, 5:36 PM |
|
Estensen, H. A. 2018. A Comparison of Monero and Zcash. |
|
Added by: Jack Last edited by: Jack 1/20/23, 5:40 PM |
|
Cremers, C., Loss, J., & Wagner, B. 2023. A Holistic Security Analysis of Monero Transactions. [Cryptology ePrint Archive, Paper 2023/321]. |
|
Added by: Jack Last edited by: Jack 3/8/23, 6:11 PM |
|
Li, W., Lin, Z., & Chen, Q. (2022). A Hybrid Design of Linkable Ring Signature Scheme with Stealth Addresses, Security and Communication Networks, 2022. |
|
Added by: Rucknium 2/24/22, 3:44 PM |
|
Noether, S., Noether, S., & Mackenzie, A. (2014). A Note on Chain Reactions in Traceability in CryptoNote 2.0. Unpublished manuscript. |
|
Added by: Rucknium Last edited by: Rucknium 2/22/22, 5:19 PM |
|
Macchetti, M. 2023. A Novel Related Nonce Attack for ECDSA. [Cryptology ePrint Archive, Paper 2023/305]. |
|
Added by: Jack Last edited by: Jack 3/6/23, 10:35 PM |
|
Yu, Q., Liao, S., Wang, L., Yu, Y., Zhang, L., & Zhao, Y. (2024). A regulated anonymous cryptocurrency with batch linkability, Computer Standards & Interfaces, 87, 103770. |
|
Added by: Rucknium 1/6/24, 5:26 PM |
|
Barj, S., Ouaddah, A., & Mezrioui, A. 2023, A Review of Privacy-Preserving Cryptographic Techniques Used in Blockchain Platforms. Paper presented at Digital Technologies and Applications. |
|
Added by: Rucknium 1/6/24, 5:36 PM |
|
Perera, M. N. S., Nakamura, T., Hashimoto, M., Yokoyama, H., Cheng, C.-M., & Sakurai, K. (2022). A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity, Cryptography, 6(1). |
|
Added by: Rucknium 2/26/22, 10:36 PM |
|
Wang, J., Cheng, J., Yuan, Y., Li, H., & Sheng, V. S. 2022, A Survey on Privacy Protection of Cross-Chain. Paper presented at Advances in Artificial Intelligence and Security. |
|
Added by: Rucknium 9/10/22, 8:13 PM |
|
Chepurnoy, A., Kharin, V., & Meshkov, D. 2019, A Systematic Approach to Cryptocurrency Fees. Paper presented at Financial Cryptography and Data Security. |
|
Added by: endor 4/17/22, 10:41 PM |
|
Fischer Amrit Kumar, C., Tople, S., & Saxena, P. 2017, September, A Traceability Analysis of Monero’s Blockchain. Paper presented at European Symposium on Research in Computer Security (ESORICS). |
|
Added by: Rucknium Last edited by: Rucknium 2/23/22, 4:23 PM |
|
Buccafurri, F., De Angelis, V., & Lazzaro, S. 2023, May 25–26, A Traffic-Analysis Proof Solution to Allow K-Anonymous Payments in Pseudonymous Blockchains. Unpublished paper presented at 5th Distributed Ledger Technology Workshop. |
|
Added by: Rucknium 1/5/24, 8:51 PM |
|
Wicht, F.-X., Wang, Z., Le, D. V., & Cachin, C. 2023. A Transaction-Level Model for Blockchain Privacy. [Cryptology ePrint Archive, Paper 2023/1902]. |
|
Added by: Rucknium 1/6/24, 5:04 PM |
|
Gligoroski, D. (2023). A Transformation for Lifting Discrete Logarithm Based Cryptography to Post-Quantum Cryptography, Cryptology ePrint Archive. |
|
Added by: Jack Last edited by: Jack 3/6/23, 10:32 PM |
|
Zhang, Y., & Xu, H. (2022). Accountable Monero System with Privacy Protection, Security and Communication Networks, 2022, 7746341. |
|
Added by: Rucknium 5/5/22, 10:33 PM |
|
Tiemann, T., Berndt, S., Eisenbarth, T., & Liśkiewicz, M. 2023, July, “Act natural!”: Exchanging Private Messages on Public Blockchains. Paper presented at 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P). |
|
Added by: Rucknium 1/6/24, 5:53 PM |
|
Ye, C., Ojukwu, C., Hsu, A., & Hu, R. 2020. Alt-Coin Traceability. [Cryptology ePrint Archive, Report 2020/593]. |
|
Added by: Rucknium 2/23/22, 4:10 PM |
|
Noether, S., & Goodell, B. (2017). An Efficient Implementation of Monero Subaddresses. Unpublished manuscript. |
|
Added by: Rucknium Last edited by: Rucknium 2/24/22, 3:22 PM |
|
Kappos, G. (2022). An Empirical Analysis of Privacy in Cryptocurrencies. Unpublished PhD thesis, UCL (University College London). |
|
Added by: Jack Last edited by: Jack 2/21/23, 4:36 AM |
|
Möser, M., Soska, K., Heilman, E., Lee, K., Heffan, H., & Srivastava, S., et al. (2018). An Empirical Analysis of Traceability in the Monero Blockchain, Proceedings on Privacy Enhancing Technologies, 2018(3), 143–163. |
|
Added by: Rucknium 2/23/22, 4:14 PM |
|
Yi, X., Wu, D., Jiang, L., Fang, Y., Zhang, K., & Zhang, W. 2022, An Empirical Study of Blockchain System Vulnerabilities: Modules, Types, and Patterns. Paper presented at Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering. |
|
Added by: Rucknium 12/2/22, 4:31 PM |
|
Teng, D., Yao, Y., Wang, Y., Zhou, L., & Huang, C. 2022, An SM2-based Traceable Ring Signature Scheme for Smart Grid Privacy Protection. Paper presented at Wireless Algorithms, Systems, and Applications. |
|
Added by: Rucknium 12/2/22, 4:03 PM |
|
Biryukov, A., Naumenko, G., & Tikhomirov, S. 2022, May 2–6, Analysis and Probing of Parallel Channels in the Lightning Network. Unpublished paper presented at Financial Cryptography and Data Security 2022. |
|
Added by: Rucknium Last edited by: Rucknium 5/5/22, 8:31 PM |
|
Vijayakumaran, S. 2023, Analysis of CryptoNote Transaction Graphs using the Dulmage-Mendelsohn Decomposition. Paper presented at 5th Conference on Advances in Financial Technologies (AFT 2023). |
|
Added by: Rucknium Last edited by: Rucknium 1/10/24, 4:22 PM |
|
Rosenfeld, M. 2014. Analysis of Hashrate-Based Double Spending. |
|
Added by: Rucknium Last edited by: Rucknium 8/23/23, 4:48 PM |
|
Otávio Chervinski, J., Kreutz, D., & Yu, J. 2021, Analysis of transaction flooding attacks against Monero. Paper presented at 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). |
|
Added by: Rucknium Last edited by: Rucknium 3/16/24, 1:00 PM |
|
Fanti, G., & Viswanath, P. 2017. Anonymity Properties of the Bitcoin P2P Network. |
|
Added by: Rucknium Last edited by: Rucknium 8/1/24, 4:27 PM |
|
Wijaya, D. A., Liu, J. K., Steinfeld, R., Liu, D., & Yuen, T. H. 2018, Anonymity Reduction Attacks to Monero. Paper presented at Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers. |
|
Added by: Rucknium 2/23/22, 4:44 PM |
|
Wang, X., Lin, C., Huang, X., & He, D. (2023). Anonymity-Enhancing Multi-Hop Locks for Monero-Enabled Payment Channel Networks, IEEE Transactions on Information Forensics and Security, 1–1. |
|
Added by: Rucknium 1/6/24, 4:59 PM |
|
Taneska, M., & Halimi, F. 2022, Anonymous Blockchain based model for e-Voting. Unpublished paper presented at The 19th International Conference on Informatics and Information Technologies – CIIT 2022. |
|
Added by: Jack Last edited by: Jack 2/21/23, 4:30 AM |
|
Syracuse, D., Boehm, J., & Lundgren, N. (2022). Anti-Money Laundering Regulation of Privacy Enabling Cryptocurrencies. |
|
Added by: Jack Last edited by: Jack 1/8/23, 4:44 PM |
|
Magaki, I., Khazraee, M., Gutierrez, L. V., & Taylor, M. B. 2016, June, ASIC Clouds: Specializing the Datacenter. Paper presented at 2016 ACM/IEEE 43rd Annual International Symposium on Computer Architecture (ISCA). |
|
Added by: endor 4/17/22, 7:40 PM |
|
Franzoni, F., Salleras, X., & Daza, V. (2022). AToM: Active topology monitoring for the bitcoin peer-to-peer network, Peer-to-Peer Networking and Applications, 15(1), 408–425. |
|
Added by: Rucknium 8/9/24, 6:32 PM |
|
Hoenisch, P., & Pino, L. S. D. (2021). Atomic Swaps between Bitcoin and Monero, CoRR, abs/2101.12332. |
|
Added by: Rucknium Last edited by: Rucknium 2/24/22, 6:54 PM |
|
Sui, Z., Liu, J. K., Yu, J., Au, M. H., & Liu, J. 2022. AuxChannel: Enabling Efficient Bi-Directional Channel for Scriptless Blockchains. [Cryptology ePrint Archive, Report 2022/117]. |
|
Added by: Rucknium 2/23/22, 11:28 PM |
|
Jiang, P., Zhu, J., & Zhu, L. (2024). Balancing Privacy and Regulation of Cross-chain Transaction Systems via SoK-assisted Policy Enhancement, IEEE Transactions on Information Forensics and Security, 1–1. |
|
Added by: Rucknium Last edited by: Rucknium 5/23/24, 6:01 PM |
|
Wahrst"atter, A., Solomon, M., DiFrancesco, B., Buterin, V., & Svetinovic, D. (2023). BaseSAP: Modular Stealth Address Protocol for Programmable Blockchains, arXiv preprint arXiv:2306.14272. |
|
Added by: Jack Last edited by: Jack 7/29/23, 3:09 AM |
|
Wang, K., Liu, M., Wang, J., Wu, M., & Zhao, F. (2022). BBARHS: Blockchain-Based Anonymous Ride-Hailing Scheme for Autonomous Taxi Network, Security and Communication Networks, 2022, 1–13. |
|
Added by: Rucknium 9/10/22, 7:57 PM |
|
Arnosti, N., & Weinberg, M. S. 2018, Bitcoin: A Natural Oligopoly. Paper presented at 10th Innovations in Theoretical Computer Science Conference (ITCS 2019). |
|
Added by: endor Last edited by: endor 4/19/22, 11:11 PM |
|
Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. Unpublished manuscript. |
|
Added by: Rucknium Last edited by: theadmin 2/23/22, 12:13 AM |
|
Taylor, M. B. 2013, Bitcoin and the Age of Bespoke Silicon. Paper presented at Proceedings of the 2013 International Conference on Compilers, Architectures and Synthesis for Embedded Systems. |
|
Added by: endor 4/17/22, 8:23 PM |
|
O'Dwyer, K. J., & Malone, D. 2014, June, Bitcoin mining and its energy footprint. Paper presented at 25th IET Irish Signals Systems Conference 2014 and 2014 China-Ireland International Conference on Information and Communications Technologies (ISSC 2014/CIICT 2014). |
|
Added by: endor 4/17/22, 8:19 PM |
|
Gugger, J. 2020. Bitcoin-Monero Cross-chain Atomic Swap. [Cryptology ePrint Archive, Paper 2020/1126]. |
|
Added by: Jack Last edited by: Jack 1/20/23, 6:09 PM |
|
Vries, A. D. (2020). Bitcoin’s energy consumption is underestimated: A market dynamics approach, Energy Research & Social Science, 70, 101721. |
|
Added by: endor 4/17/22, 7:32 PM |
|
Akcora, C. G., Gel, Y. R., & Kantarcioglu, M. (2022). Blockchain networks: Data structures of Bitcoin, Monero, Zcash, Ethereum, Ripple, and Iota, WIREs Data Mining and Knowledge Discovery, 12(1), e1436. |
|
Added by: Rucknium 2/23/22, 10:27 PM |
|
Wicht, F.-X., Cachin, C., & Le, D. V. (2023). Blockchain Privacy Notions Using the Transaction Graph Model. University of Fribourg. |
|
Added by: Jack Last edited by: Jack 3/6/23, 10:29 PM |
|
Yu, G. (2020). Blockchain stealth address schemes, Cryptology ePrint Archive. |
|
Added by: Jack Last edited by: Jack 6/6/23, 9:04 PM |
|
Liao, Y.-C., Tso, R., Liu, Z.-Y., & Tseng, Y.-F. 2022, Blockchain-Based Confidential Payment System with Controllable Regulation. Paper presented at Information Security Practice and Experience. |
|
Added by: Rucknium 12/2/22, 4:05 PM |
|
Mondschein, C. F. (2020). Browser-based Crypto Mining and EU Data Protection and Privacy Law: A Critical Assessment and Possible Opportunities for the Monetisation of Web Services, The Journal of The British Blockchain Association. |
|
Added by: Rucknium Last edited by: Rucknium 5/3/22, 12:53 PM |
|
Eagen, L. Li. E. 2022. Bulletproofs++. [Cryptology ePrint Archive, Report 2022/510]. |
|
Added by: Plowsof Last edited by: Rucknium 4/5/24, 10:13 PM |
|
Fomenko, O., & Sokolov, M. (2024). Bulletproofs++. Construction and Examples. Unpublished manuscript. |
|
Added by: Rucknium 8/9/24, 5:33 PM |
|
Feickert, A. 2024. Bulletproofs++ review. Cypher Stack. [Peer review] |
|
Added by: Rucknium 4/5/24, 10:08 PM |
|
Bunz, B., Bootle, J., Boneh, D., Poelstra, A., Wuille, P., & Maxwell, G. 2018, Bulletproofs: Short proofs for confidential transactions and more. Paper presented at 2018 IEEE Symposium on Security and Privacy (SP). |
|
Added by: Jack Last edited by: Jack 3/29/23, 6:22 PM |
|
Chung, H., Han, K., Ju, C., Kim, M., & Seo, J. H. (2022). Bulletproofs+: Shorter Proofs for a Privacy-Enhanced Distributed Ledger, IEEE Access, 10, 42067–42082. |
|
Added by: Jack Last edited by: Jack 3/29/23, 6:12 PM |
|
Franzoni, F., & Daza, V. (2022). Clover: An anonymous transaction relay protocol for the bitcoin P2P network, Peer-to-Peer Networking and Applications, 15(1), 290–303. |
|
Added by: Rucknium 7/10/24, 4:09 PM |
|
Aziz, A. B. A., Ngah, S. B., Dun, Y. T., & Bee, T. F. (2020). Coinhive’s Monero Drive-by Crypto-jacking, IOP Conference Series: Materials Science and Engineering, 769(1), 12065. |
|
Added by: Jack Last edited by: Jack 1/18/23, 12:05 AM |
|
Goodell, B., Noether, S., & Blue, A. (2019). Concise Linkable Ring Signatures and Forgery Against Adversarial Keys, Cryptology ePrint Archive, Paper 2019/654. |
|
Added by: Jack Last edited by: Jack 1/20/23, 5:53 PM |
|
Duan, J., Zheng, S., Wang, W., Wang, L., Hu, X., & Gu, L. (2024). Concise RingCT Protocol Based on Linkable Threshold Ring Signature, IEEE Transactions on Dependable and Secure Computing, (1), 1–15. |
|
Added by: Jack Last edited by: Jack 2/27/24, 1:42 PM |
|
Borggren, N., & Yao, L. (2020). Correlations of multi-input Monero transactions, arXiv preprint arXiv:2001.04827. |
|
Added by: Jack Last edited by: Rucknium 4/20/22, 3:36 PM |
|
Aranha, D. F., Hall-Anderson, M., Nitulescu, A., Pagnin, E., & Yakoubov, S. 2021. Count me in! Extendability for Threshold Ring Signatures. [Cryptology ePrint Archive, Report 2021/1240] |
|
Added by: Plowsof Last edited by: Plowsof 3/9/22, 5:28 PM |
|
Macheta, J., Noether, S., Noether, S., & Smooth, J. (2014). Counterfeiting via Merkle Tree Exploits within Virtual Currencies Employing the CryptoNote Protocol. Unpublished manuscript. |
|
Added by: Rucknium Last edited by: Rucknium 2/22/22, 5:58 PM |
|
Zhang, T., Li, B., Zhu, Y., Han, T., & Wu, Q. (2023). Covert channels in blockchain and blockchain based covert communication: Overview, state-of-the-art, and future directions, Computer Communications, 205, 136–146. |
|
Added by: Rucknium 1/5/24, 7:23 PM |
|
Rueckert, C. (2019). Cryptocurrencies and fundamental rights, Journal of Cybersecurity, 5(1). |
|
Added by: Rucknium 5/3/22, 12:49 PM |
|
Möser, M. (2022). Cryptocurrency Privacy in Practice. Unpublished Ph.D. Dissertation, Princeton University. |
|
Added by: Rucknium 1/8/23, 3:54 AM |
|
van Saberhagen, N. (2013). CryptoNote v 2.0. Unpublished manuscript. |
|
Added by: Rucknium Last edited by: Rucknium 2/22/22, 5:20 PM |
|
Deng, C., You, L., Tang, X., Hu, G., & Gao, S. (2022). Cuproof: Range proof with constant size, Entropy, 24(3), 334. |
|
Added by: Jack Last edited by: Jack 3/28/23, 9:58 PM |
|
Campanelli, M., Hall-Andersen, M., & Kamp, S. H. 2022. Curve Trees: Practical and Transparent Zero-Knowledge Accumulators. [Cryptology ePrint Archive, Paper 2022/756]. |
|
Added by: Rucknium Last edited by: Rucknium 8/9/24, 5:59 PM |
|
Butler, S. 2021, Cyber 9/11 Will Not Take Place: A User Perspective of Bitcoin and Cryptocurrencies from Underground and Dark Net Forums. Paper presented at Socio-Technical Aspects in Security and Trust. |
|
Added by: Rucknium 10/12/22, 4:26 PM |
|
Fanti, G., Venkatakrishnan, S. B., Bakshi, S., Denby, B., Bhargava, S., & Miller, A., et al. (2018). Dandelion++: Lightweight Cryptocurrency Networking with Formal Anonymity Guarantees, Proc. ACM Meas. Anal. Comput. Syst. 2(2). |
|
Added by: Rucknium 10/22/22, 8:53 PM |
|
Bojja Venkatakrishnan, S., Fanti, G., & Viswanath, P. (2017). Dandelion: Redesigning the Bitcoin Network for Anonymity, Proc. ACM Meas. Anal. Comput. Syst. 1(1). |
|
Added by: Rucknium 8/1/24, 4:22 PM |
|
Shi, R., Ge, Y., Lan, L., Peng, Z., Lin, S., & Li, L. 2024, Deanonymizing Transactions Originating from Monero Tor Hidden Service Nodes. Paper presented at Companion Proceedings of the ACM on Web Conference 2024. |
|
Added by: Rucknium 5/23/24, 5:47 PM |
|
Meier, J. (2022). Diophantine Satisfiability Arguments for Private Blockchains. Unpublished masters thesis, ETH Zurich, Zurich. |
|
Added by: Rucknium 10/22/22, 7:40 PM |
|
Noether, S. (2018). Discrete Logarithm Equality Across Groups. Unpublished manuscript. |
|
Added by: Rucknium 2/22/22, 5:55 PM |
|
Zhaolu, T., Wan, Z., & Wang, H. 2022. Division of Regulatory Power: Collaborative Regulation for Privacy-Preserving Blockchains. [Cryptology ePrint Archive, Paper 2022/1634]. |
|
Added by: Rucknium 12/2/22, 4:10 PM |
|
Moreno-Sánchez, P., Blue, A., Le, D. V., Noether, S., Goodell, B., & Kate, A. 2020, DLSAG: Non-interactive Refund Transactions for Interoperable Payment Channels in Monero. Paper presented at Financial Cryptography and Data Security. |
|
Added by: Jack Last edited by: Jack 1/18/23, 12:01 AM |
|
Bhambhwani, S., Delikouras, S., Korniotis, G. M., & others. 2019. [i]Do fundamentals drive cryptocurrency prices? |
|
Added by: Jack Last edited by: Jack 1/20/23, 6:00 PM |
|
Fantazzini, D., & Kolodin, N. (2020). Does the Hashrate Affect the Bitcoin Price? Journal of Risk and Financial Management, [i]13(11). |
|
Added by: endor 4/17/22, 9:15 PM |
|
Grunspan, C., & Perez-Marco, R. (2018). Double spend races, Int. J. Theor. Appl. Finance, 21(8), 1850053. |
|
Added by: Rucknium Last edited by: Rucknium 8/23/23, 4:52 PM |
|
Noether, S., & Goodell, B. (2018). Dual Linkable Ring Signatures. Unpublished manuscript. |
|
Added by: Rucknium 2/22/22, 5:48 PM |
|
Scala, E., & Mostarda, L. 2024, Efficient Inner-Product Argument from Compressed $Sigma$-Protocols and Applications. Paper presented at International Conference on Advanced Information Networking and Applications. |
|
Added by: Jack Last edited by: Jack 6/12/24, 12:50 PM |
|
Purkovic, S., Mekic, E., Kuk, K., & Gostimirovic, L. (2021). Empirical Analysis of Silent Mining Operation in the Monero System, Studies in Informatics and Control, 30(4), 99–108. |
|
Added by: Jack Last edited by: Jack 1/20/23, 6:21 PM |
|
Li, J., Li, N., Peng, J., Cui, H., & Wu, Z. (2019). Energy consumption of cryptocurrency mining: A study of electricity consumption in mining cryptocurrencies, Energy, 168, 160–168. |
|
Added by: endor 4/17/22, 7:30 PM |
|
Abreu, A. S. (2023). Esquemas de privacidade nas moedas criptográficas Monero e Zcash. Unpublished Bacharelado Thesis, Universidade de São Paulo, São Paulo, Brazil. |
|
Added by: Rucknium 4/5/24, 10:07 PM |
|
Azad, B. A. 2018. Evaluating the Effectiveness of JavaScript Crypto Miner Blocker Browser Extensions. StonyBrook University. |
|
Added by: Jack Last edited by: Jack 1/20/23, 5:59 PM |
|
Chen, J., Cheng, Y., Xu, Z., & Cao, Y. 2021, Evolutionary Equilibrium Analysis for Decision on Block Size in Blockchain Systems. Paper presented at Combinatorial Optimization and Applications. |
|
Added by: endor 4/17/22, 10:41 PM |
|
Cao, T., Yu, J., Decouchant, J., Luo, X., & Verissimo, P. 2020, Exploring the Monero Peer-to-Peer Network. Paper presented at Financial Cryptography and Data Security. |
|
Added by: Rucknium 12/13/22, 6:56 PM |
|
Li, J. (2022). Extending Succinct Zero Knowledge Proofs for Set Membership to Ring Signatures. Unpublished masters thesis, EECS Department, University of California, Berkeley. |
|
Added by: Rucknium Last edited by: Rucknium 7/1/22, 6:05 PM |
|
Fan, X. 2018, Faster dual-key stealth address for blockchain-based internet of things systems. Paper presented at Blockchain--ICBC 2018: First International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings 1. |
|
Added by: Jack Last edited by: Jack 6/6/23, 9:02 PM |
|
Parker, L. (2024). FCMP++. Unpublished manuscript. |
|
Added by: Rucknium 8/9/24, 5:45 PM |
|
Feickert, A. (2024). FCMP++ review. Unpublished manuscript. |
|
Added by: Rucknium 8/9/24, 5:54 PM |
|
Block, A. R., Garreta, A., Katz, J., Thaler, J., Tiwari, P. R., & Zajac, M. (2023). Fiat-Shamir Security of FRI and Related SNARKs, Cryptology ePrint Archive. |
|
Added by: Jack Last edited by: Jack 7/29/23, 3:05 AM |
|
Badertscher, C., Sedaghat, M., & Waldner, H. 2023. Fine-Grained Accountable Privacy via Unlinkable Policy-Compliant Signatures. [Cryptology ePrint Archive, Paper 2023/1070]. |
|
Added by: Rucknium Last edited by: Rucknium 1/5/24, 10:08 PM |
|
Erg"un, Z. C., & KARABIYIK, B. K. Forecasting Monero Prices with a Machine Learning Algorithm, Eski{\c{s}}ehir Osmangazi {\"U}niversitesi {\.I}ktisadi ve {\.I}dari Bilimler Dergisi, 16(3), 651–663. |
|
Added by: Jack Last edited by: Jack 1/20/23, 5:38 PM |
|
Koerhuis, W., Kechadi, T., & Le-Khac, N.-A. (2020). Forensic analysis of privacy-oriented cryptocurrencies, Forensic Science International: Digital Investigation, 33, 200891. |
|
Added by: Rucknium 9/10/22, 7:55 PM |
|
Taneska, M., Dobreva, J., & Dimitrova, V. (2022). Forensics investigation comparison of privacy-oriented cryptocurrencies, Security & Future, 6(1). |
|
Added by: Rucknium Last edited by: Rucknium 9/10/22, 8:04 PM |
|
Bobolz, J., Diaz, J., & Kohlweiss, M. 2024. Foundations of Anonymous Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions. [Cryptology ePrint Archive, Paper 2024/042]. |
|
Added by: Rucknium Last edited by: Rucknium 4/5/24, 9:33 PM |
|
Ronge, V., Egger, C., Lai, R. W. F., Schröder, D., & Yin, H. H. F. (2021). Foundations of Ring Sampling, Proceedings on Privacy Enhancing Technologies, 2021(3), 265–288. |
|
Added by: Rucknium 2/23/22, 4:13 PM |
|