Zhang, J., Su, M., Liu, X., & Wang, G. 2024, May Springproofs: Efficient inner product arguments for vectors of arbitrary length. Paper presented at 2024 IEEE Symposium on Security and Privacy (SP). |
|
Added by: Rucknium 2024-01-06 16:50 |
|
Yu, Q., Liao, S., Wang, L., Yu, Y., Zhang, L., & Zhao, Y. (2024). A regulated anonymous cryptocurrency with batch linkability. Computer Standards & Interfaces, 87, 103770. |
|
Added by: Rucknium 2024-01-06 17:26 |
|
Duan, J., Zheng, S., Wang, W., Wang, L., Hu, X., & Gu, L. (2024). Concise ringct protocol based on linkable threshold ring signature. IEEE Transactions on Dependable and Secure Computing, (1), 1–15. |
|
Last edited by: Jack 2024-02-27 13:42 |
|
Zhang, T. (2023). Privacy evaluation of blockchain based privacy cryptocurrencies: A comparative analysis of dash, monero, verge, zcash, and grin. IEEE Transactions on Sustainable Computing, 8(4), 574–582. |
|
Added by: Rucknium 2024-01-06 17:50 |
|
Zhang, T., Li, B., Zhu, Y., Han, T., & Wu, Q. (2023). Covert channels in blockchain and blockchain based covert communication: Overview, state-of-the-art, and future directions. Computer Communications, 205, 136–146. |
|
Added by: Rucknium 2024-01-05 19:23 |
|
Wicht, F.-X., Wang, Z., Le, D. V., & Cachin, C. 2023. A transaction-level model for blockchain privacy. [Cryptology ePrint Archive, Paper 2023/1902]. |
|
Added by: Rucknium 2024-01-06 17:04 |
|
Wicht, F.-X., Cachin, C., & Le, D. V. (2023). Blockchain privacy notions using the transaction graph model. , University of Fribourg. |
|
Last edited by: Jack 2023-03-06 22:29 |
|
Wang, X., Lin, L., & Wang, Y. (2023). Stealth address schemes with fast retrievability based on subgroup membership assumptions related to factoring. The Computer Journal, bxad056. |
|
Last edited by: Jack 2023-06-07 12:27 |
|
Wang, X., Lin, C., Huang, X., & He, D. (2023). Anonymity-enhancing multi-hop locks for monero-enabled payment channel networks. IEEE Transactions on Information Forensics and Security, 1–1. |
|
Added by: Rucknium 2024-01-06 16:59 |
|
Wahrst"atter, A., Solomon, M., DiFrancesco, B., Buterin, V., & Svetinovic, D. (2023). Basesap: Modular stealth address protocol for programmable blockchains. arXiv preprint arXiv:2306.14272, |
|
Last edited by: Jack 2023-07-29 03:09 |
|
Tiemann, T., Berndt, S., Eisenbarth, T., & Liśkiewicz, M. 2023, July “act natural!”: Exchanging private messages on public blockchains. Paper presented at 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P). |
|
Added by: Rucknium 2024-01-06 17:53 |
|
Szalaty, Z. E. (2023). Privacy preserving blockchains and quantum safety. Unpublished Master's Thesis , Universitat Oberta de Catalunya. |
|
Last edited by: Rucknium 2024-01-05 22:01 |
|
Su, W., & Ma, L. 2023, April A blockchain-based covert document communication system model. Paper presented at 2023 8th International Conference on Computer and Communication Systems (ICCCS). |
|
Added by: Rucknium 2024-01-05 19:13 |
|
Scheid, E. J., Küng, S., Franco, M., & Stiller, B. 2023, Opening pandora's box: An analysis of the usage of the data field in blockchains. Paper presented at 2023 Fifth International Conference on Blockchain Computing and Applications (BCCA). |
|
Last edited by: Rucknium 2024-01-10 16:59 |
|
Scala, E., & Mostarda, L. 2023, Range proofs with constant size and trustless setup. Paper presented at Advanced Information Networking and Applications: Proceedings of the 37th International Conference on Advanced Information Networking and Applications (AINA-2023), Volume 3. |
|
Last edited by: Jack 2023-03-29 18:12 |
|
Raikwar, M., Wu, S., & Gjosteen, K. 2023, Security model for privacy-preserving blockchain-based cryptocurrency systems. Paper presented at Network and System Security. |
|
Added by: Rucknium 2024-01-06 17:22 |
|
Pu, S., Thyagarajan, S. A., D"ottling, N., & Hanzlik, L. (2023). Post quantum fuzzy stealth signatures and applications. Cryptology ePrint Archive, |
|
Last edited by: Jack 2023-07-29 02:59 |
|
Pitu, F., & Gaitan, N. C. 2023, July Survey of security, performance, and profitability of monero: A browser-based cryptocurrency. Paper presented at 2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME). |
|
Added by: Rucknium 2024-01-06 17:58 |
|
Naik, A., Yeniaras, E., Hellstern, G., Prasad, G., & Vishwakarma, S. K. L. P. (2023). From portfolio optimization to quantum blockchain and security: A systematic review of quantum computing in finance. arXiv preprint arXiv:2307.01155, |
|
Last edited by: Jack 2023-07-29 03:07 |
|
Movsowitz Davidow, D., Manevich, Y., & Toch, E. 2023, Privacy-Preserving Transactions with Verifiable Local Differential Privacy. Paper presented at 5th Conference on Advances in Financial Technologies (AFT 2023). |
|
Added by: Rucknium 2024-01-05 19:14 |
|
Macchetti, M. 2023. A novel related nonce attack for ecdsa. [Cryptology ePrint Archive, Paper 2023/305]. |
|
Last edited by: Jack 2023-03-06 22:35 |
|
Luo, M., Zhou, J., & Yang, P. (2023). Rats: A regulatory anonymous transaction system based on blockchain. Journal of Parallel and Distributed Computing, 182, 104751. |
|
Added by: Rucknium 2024-01-06 17:44 |
|
Jin, R. (2023). The advance of ring confidential transactions. Highlights in Science, Engineering and Technology, 39, 1104–1110. |
|
Last edited by: Rucknium 2024-01-05 19:46 |
|
Huang, K., Mu, Y., Rezaeibagha, F., Zhang, X., & Li, X. (2023). Monero with multi-grained redaction. IEEE Transactions on Dependable and Secure Computing, 1–13. |
|
Added by: Rucknium 2024-01-05 19:16 |
|
Gligoroski, D. (2023). A transformation for lifting discrete logarithm based cryptography to post-quantum cryptography. Cryptology ePrint Archive, |
|
Last edited by: Jack 2023-03-06 22:32 |
|
Dijk, A., & Schröder, D. (2023). Proof of concept for a ethereum virtual machine on cryptonote. Unpublished manuscript. |
|
Added by: Rucknium 2024-01-05 20:32 |
|
Cremers, C., Loss, J., & Wagner, B. 2023. A holistic security analysis of monero transactions. [Cryptology ePrint Archive, Paper 2023/321]. |
|
Last edited by: Jack 2023-03-08 18:11 |
|
Chow, S. S., Egger, C., Lai, R. W. F., Ronge, V., & Woo, I. K. Y. (2023). On sustainable ring-based anonymous systems. Cryptology ePrint Archive, |
|
Last edited by: Jack 2023-06-06 21:13 |
|
Buccafurri, F., De Angelis, V., & Lazzaro, S. 2023, May 25–26 A traffic-analysis proof solution to allow k-anonymous payments in pseudonymous blockchains. Unpublished paper presented at 5th Distributed Ledger Technology Workshop. |
|
Added by: Rucknium 2024-01-05 20:51 |
|
Block, A. R., Garreta, A., Katz, J., Thaler, J., Tiwari, P. R., & Zajac, M. (2023). Fiat-shamir security of fri and related snarks. Cryptology ePrint Archive, |
|
Last edited by: Jack 2023-07-29 03:05 |
|
Barj, S., Ouaddah, A., & Mezrioui, A. 2023, A review of privacy-preserving cryptographic techniques used in blockchain platforms. Paper presented at Digital Technologies and Applications. |
|
Added by: Rucknium 2024-01-06 17:36 |
|
Badertscher, C., Sedaghat, M., & Waldner, H. 2023. Fine-grained accountable privacy via unlinkable policy-compliant signatures. [Cryptology ePrint Archive, Paper 2023/1070]. |
|
Last edited by: Rucknium 2024-01-05 22:08 |
|
af halo2 Protokollen, H. G. S., & Spitters, B. 2023. High assurance specification of the halo2 protocol. |
|
Last edited by: Jack 2023-07-29 03:03 |
|
Zhaolu, T., Wan, Z., & Wang, H. 2022. Division of regulatory power: Collaborative regulation for privacy-preserving blockchains. [Cryptology ePrint Archive, Paper 2022/1634]. |
|
Added by: Rucknium 2022-12-02 16:10 |
|
Zhang, Y., & Xu, H. (2022). Accountable monero system with privacy protection. Security and Communication Networks, 2022, 7746341. |
|
Added by: Rucknium 2022-05-05 22:33 |
|
Zabka, P., Foerster, K.-T., Decker, C., & Schmid, S. 2022, May 2–6 A centrality analysis of the lightning network. Unpublished paper presented at Financial Cryptography and Data Security 2022. |
|
Added by: Rucknium 2022-05-05 20:36 |
|
Yi, X., Wu, D., Jiang, L., Fang, Y., Zhang, K., & Zhang, W. 2022, An empirical study of blockchain system vulnerabilities: Modules, types, and patterns. Paper presented at Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering. |
|
Added by: Rucknium 2022-12-02 16:31 |
|
Xu, M., Zhang, Y., & Zhong, S. 2022. Towards fair multiparty computation in scriptless distributed ledger systems. [Cryptology ePrint Archive, Report 2022/176]. |
|
Last edited by: Rucknium 2022-05-05 22:11 |
|
Wang, J., Cheng, J., Yuan, Y., Li, H., & Sheng, V. S. 2022, A survey on privacy protection of cross-chain. Paper presented at Advances in Artificial Intelligence and Security. |
|
Added by: Rucknium 2022-09-10 20:13 |
|
Wang, K., Liu, M., Wang, J., Wu, M., & Zhao, F. (2022). Bbarhs: Blockchain-based anonymous ride-hailing scheme for autonomous taxi network. Security and Communication Networks, 2022, 1–13. |
|
Added by: Rucknium 2022-09-10 19:57 |
|
Usa v. lichtenstein et al.February 7 2022. US Dept. of Justice. |
|
Last edited by: Jack 2023-01-20 03:41 |
|
Thyagarajan, S. A., Malavolta, G., Schmid, F., & Schröder, D. 2022, Verifiable timed linkable ring signatures for scalable payments for monero. Paper presented at Computer Security -- ESORICS 2022. |
|
Added by: Rucknium 2022-12-02 15:59 |
|
Teng, D., Yao, Y., Wang, Y., Zhou, L., & Huang, C. 2022, An sm2-based traceable ring signature scheme for smart grid privacy protection. Paper presented at Wireless Algorithms, Systems, and Applications. |
|
Added by: Rucknium 2022-12-02 16:03 |
|
Taneska, M., Dobreva, J., & Dimitrova, V. (2022). Forensics investigation comparison of privacy-oriented cryptocurrencies. Security & Future, 6(1). |
|
Last edited by: Rucknium 2022-09-10 20:04 |
|
Taneska, M., & Halimi, F. 2022, Anonymous blockchain based model for e-voting. Unpublished paper presented at The 19th International Conference on Informatics and Information Technologies – CIIT 2022. |
|
Last edited by: Jack 2023-02-21 04:30 |
|
Syracuse, D., Boehm, J., & Lundgren, N. (2022). Anti-money laundering regulation of privacy enabling cryptocurrencies. |
|
Last edited by: Jack 2023-01-08 16:44 |
|
Sui, Z., Liu, J. K., Yu, J., & Qin, X. (2022). Monet: A fast payment channel network for scriptless cryptocurrency monero. Cryptology ePrint Archive, |
|
Added by: Jack 2022-06-23 04:11 |
|
Sui, Z., Liu, J. K., Yu, J., Au, M. H., & Liu, J. 2022. Auxchannel: Enabling efficient bi-directional channel for scriptless blockchains. [Cryptology ePrint Archive, Report 2022/117]. |
|
Added by: Rucknium 2022-02-23 23:28 |
|
Sharma, P. K., Gosain, D., & Diaz, C. 2022. On the anonymity of peer-to-peer network anonymity schemes used by cryptocurrencies. arXiv. |
|
Added by: Rucknium 2022-12-13 19:00 |
|
Seres, I. A., Pejó, B., & Burcsi, P. 2022, May 2–6 The effect of false positives: why fuzzy message detection leads to fuzzy privacy guarantees?. Unpublished paper presented at Financial Cryptography and Data Security 2022. |
|
Added by: Rucknium 2022-05-05 22:38 |
|
Sarier, N. D. (2022). Privacy preserving biometric authentication on the blockchain for smart healthcare. Pervasive and Mobile Computing, 86, 101683. |
|
Added by: Rucknium 2022-09-10 19:55 |
|
Rinberg, R., & Agarwal, N. 2022. Privacy when everyone is watching: An sok on anonymity on the blockchain. [Cryptology ePrint Archive, Paper 2022/985]. |
|
Added by: Rucknium 2022-10-22 17:21 |
|
Perera, M. N. S., Nakamura, T., Hashimoto, M., Yokoyama, H., Cheng, C.-M., & Sakurai, K. (2022). A survey on group signatures and ring signatures: Traceability vs. anonymity. Cryptography, 6(1). |
|
Added by: Rucknium 2022-02-26 22:36 |
|
Nikzad, A., & Mehregan, M. (2022). Techno-economic, and environmental evaluations of a novel cogeneration system based on solar energy and cryptocurrency mining. Solar Energy, 232, 409–420. |
|
Added by: endor 2022-04-17 19:34 |
|
Möser, M. (2022). Cryptocurrency privacy in practice. Unpublished Ph.D. Dissertation, Princeton University. |
|
Added by: Rucknium 2023-01-08 03:54 |
|
Meier, J. (2022). Diophantine satisfiability arguments for private blockchains. Unpublished masters thesis, ETH Zurich, Zurich. |
|
Added by: Rucknium 2022-10-22 19:40 |
|
Liu, L., Liu, L., Li, B., Zhong, Y., Liao, S., & Zhang, L. (2022). Msccs: A monero-based security-enhanced covert communication system. Computer Networks, 205, 108759. |
|
Added by: Rucknium 2022-02-23 22:46 |
|
Lin, D., Yan, J., Ba, N., Fu, Z., & Jiang, H. (2022). Survey of anonymity and tracking technology in monero. Journal of Computer Applications, 42(1). |
|
Added by: Rucknium 2022-02-23 17:01 |
|
Lin, H., & Wang, M. (2022). Repudiable ring signature: Stronger security and logarithmic-size. Computer Standards & Interfaces, 80, 103562. |
|
Added by: Rucknium 2022-02-24 18:04 |
|
Liao, Y.-C., Tso, R., Liu, Z.-Y., & Tseng, Y.-F. 2022, Blockchain-based confidential payment system with controllable regulation. Paper presented at Information Security Practice and Experience. |
|
Added by: Rucknium 2022-12-02 16:05 |
|
Liang, M., Karantaidou, I., Baldimtsi, F., Gordon, D. S., & Varia, M. (2022). (∈, δ)-indistinguishable mixing for cryptocurrencies. Proceedings on Privacy Enhancing Technologies, 2022(1), 49–74. |
|
Last edited by: Rucknium 2022-05-05 22:24 |
|
Li, Y., Weng, J., Li, M., Wu, W., Weng, J., & Liu, J.-N., et al. (2022). Zerocross: A sidechain-based privacy-preserving cross-chain solution for monero. Journal of Parallel and Distributed Computing, 169, 301–316. |
|
Added by: Rucknium 2022-09-10 19:54 |
|
Li, W., Lin, Z., & Chen, Q. (2022). A hybrid design of linkable ring signature scheme with stealth addresses. Security and Communication Networks, 2022, |
|
Added by: Rucknium 2022-02-24 15:44 |
|
Li, J. (2022). Extending succinct zero knowledge proofs for set membership to ring signatures. Unpublished masters thesis, EECS Department, University of California, Berkeley. |
|
Last edited by: Rucknium 2022-07-01 18:05 |
|
Kovalchuk, L., Oliynykov, R., Bespalov, Y., & Rodinko, M. (2022). Methods of ensuring privacy in a decentralized environment. In R. Oliynykov, O. Kuznetsov, O. Lemeshko & T. Radivilova (Eds), Information Security Technologies in the Decentralized Distributed Networks (pp. 1–32). Cham: Springer International Publishing. |
|
Added by: Rucknium 2022-05-05 22:29 |
|
Kappos, G. (2022). An empirical analysis of privacy in cryptocurrencies. Unpublished PhD thesis, UCL (University College London). |
|
Last edited by: Jack 2023-02-21 04:36 |
|
Järvinen, S. (2022). Tax evasion with untraceable cryptocurrencies in OECD countries as a target of regulation. Unpublished masters thesis, Aalto University. School of Business. |
|
Added by: Rucknium 2022-10-22 17:17 |
|
Hoenisch, P., Mazumdar, S., Moreno-Sánchez, P., & Ruj, S. 2022. Lightswap: An atomic swap does not require timeouts at both blockchains. [Cryptology ePrint Archive, Paper 2022/1650]. |
|
Last edited by: Rucknium 2022-12-13 19:02 |
|
Grunspan, C., & Perez-Marco, R. 2022. Ping-pong swaps. arXiv. |
|
Added by: Rucknium 2022-12-02 16:36 |
|
Gong, T., Minaei, M., Sun, W., & Kate, A. 2022, May 2–6 Towards overcoming the undercutting problem. Unpublished paper presented at Financial Cryptography and Data Security 2022. |
|
Added by: Rucknium 2022-05-05 21:01 |
|
Gomzin, S. (2022). How monero works. In Crypto Basics: A Nontechnical Introduction to Creating Your Own Money for Investors and Inventors (pp. 119–137). Berkeley, CA: Apress. |
|
Added by: Rucknium 2022-10-22 16:48 |
|
Ghesmati, S., Fdhila, W., & Weippl, E. 2022. User-perceived privacy in blockchain. [Cryptology ePrint Archive, Report 2022/287]. |
|
Added by: endor 2022-04-17 20:59 |
|
Gailly, N., Maller, M., & Nitulescu, A. 2022, May 2–6 Snarkpack: practical snark aggregation. Unpublished paper presented at Financial Cryptography and Data Security 2022. |
|
Added by: Rucknium 2022-05-05 21:04 |
|
Esgin, M. F., Steinfeld, R., & Zhao, R. K. 2022, Matrict+: More efficient post-quantum private blockchain payments. Paper presented at 2022 IEEE Symposium on Security and Privacy (SP). |
|
Last edited by: Jack 2023-03-28 20:46 |
|
Egger, C., Lai, R. W. F., Ronge, V., Woo, I. K. Y., & Yin, H. H. F. (2022). On defeating graph analysis of anonymous transactions. Proceedings on Privacy Enhancing Technologies, 2022(3). |
|
Last edited by: Rucknium 2022-07-05 17:03 |
|
Eagen, L. Li. E. 2022. Bulletproofs++. [Cryptology ePrint Archive, Report 2022/510]. |
|
Last edited by: Rucknium 2023-07-29 02:57 |
|
Deuber, D., Ronge, V., & Rueckert, C. (2022). Sok: assumptions underlying cryptocurrency deanonymizations. Proceedings on Privacy Enhancing Technologies, 2022(3). |
|
Last edited by: Rucknium 2022-07-05 17:01 |
|
Deng, C., You, L., Tang, X., Hu, G., & Gao, S. (2022). Cuproof: Range proof with constant size. Entropy, 24(3), 334. |
|
Last edited by: Jack 2023-03-28 21:58 |
|
Corradini, F., Mostarda, L., & Scala, E. 2022, Zeromt: Multi-transfer protocol for enabling privacy in off-chain payments. Paper presented at Advanced Information Networking and Applications. |
|
Added by: Rucknium 2022-05-05 21:43 |
|
Chung, H., Han, K., Ju, C., Kim, M., & Seo, J. H. (2022). Bulletproofs+: Shorter proofs for a privacy-enhanced distributed ledger. IEEE Access, 10, 42067–42082. |
|
Last edited by: Jack 2023-03-29 18:12 |
|
Campanelli, M., Hall-Andersen, M., & Kamp, S. H. 2022. Curve trees: Practical and transparent zero-knowledge accumulators. [Cryptology ePrint Archive, Paper 2022/756]. |
|
Last edited by: Rucknium 2022-12-29 16:41 |
|
Budish, E. (2022). The economic limits of bitcoin and anonymous, decentralized trust on the blockchain. Unpublished manuscript. |
|
Added by: Rucknium 2022-07-01 16:19 |
|
Biryukov, A., Naumenko, G., & Tikhomirov, S. 2022, May 2–6 Analysis and probing of parallel channels in the lightning network. Unpublished paper presented at Financial Cryptography and Data Security 2022. |
|
Last edited by: Rucknium 2022-05-05 20:31 |
|
Avarikioti, Z., Pietrzak, K., Salem, I., Schmid, S., Tiwari, S., & Yeo, M. 2022, May 2–6 Hide & seek: privacy-preserving rebalancing on payment channel networks. Unpublished paper presented at Financial Cryptography and Data Security 2022. |
|
Added by: Rucknium 2022-05-05 20:31 |
|
Amarasinghe, N. (2022). Systematic modelling of anonymity with application to cryptocurrencies. Unpublished PhD thesis, Queensland University of Technology. |
|
Last edited by: Jack 2023-02-21 04:34 |
|
Alupotha, J., & Boyen, X. 2022. Practical uc-secure zero-knowledge smart contracts. [Cryptology ePrint Archive, Paper 2022/670]. |
|
Last edited by: Rucknium 2022-07-01 16:11 |
|
Akcora, C. G., Gel, Y. R., & Kantarcioglu, M. (2022). Blockchain networks: Data structures of bitcoin, monero, zcash, ethereum, ripple, and iota. WIREs Data Mining and Knowledge Discovery, 12(1), e1436. |
|
Added by: Rucknium 2022-02-23 22:27 |
|
ACK-J, A.-J. 2022. Lord of the rings: an empirical analysis of monero’s ring signature resilience to artificially intelligent attacks. Multidisciplinary Academic Grants in Cryptocurrencies. |
|
Last edited by: Jack 2023-01-20 04:16 |
|
Wijaya, D. A., Liu, J. K., Steinfeld, R., & Liu, D. 2021, Transparency or anonymity leak: Monero mining pools data publication. Paper presented at Information Security and Privacy - 26th Australasian Conference, ACISP 2021, Virtual Event, December 1-3, 2021, Proceedings. |
|
Last edited by: Rucknium 2022-02-24 19:54 |
|
Vijayakumaran, S. 2023, Analysis of cryptonote transaction graphs using the dulmage-mendelsohn decomposition. Paper presented at 5th Conference on Advances in Financial Technologies (AFT 2023). |
|
Last edited by: Rucknium 2024-01-10 16:22 |
|
Thyagarajan, S. A., Malavolta, G., & Moreno-Sánchez, P. 2021. Universal atomic swaps: Secure exchange of coins across all blockchains. [Cryptology ePrint Archive, Report 2021/1612]. |
|
Added by: Rucknium 2022-02-24 17:35 |
|
Ronge, V., Egger, C., Lai, R. W. F., Schröder, D., & Yin, H. H. F. (2021). Foundations of ring sampling. Proceedings on Privacy Enhancing Technologies, 2021(3), 265–288. |
|
Added by: Rucknium 2022-02-23 16:13 |
|
Renwick, R., & Gleasure, R. (2021). Those who control the code control the rules: How different perspectives of privacy are being written into the code of blockchain systems. Journal of Information Technology, 36(1), 16–38. |
|
Added by: Rucknium 2022-03-09 19:45 |
|
Rahalkar, C., & Virgaonkar, A. 2021. Summarizing and analyzing the privacy-preserving techniques in bitcoin and other cryptocurrencies. |
|
Last edited by: Rucknium 2022-02-24 22:15 |
|
Purkovic, S., Mekic, E., Kuk, K., & Gostimirovic, L. (2021). Empirical analysis of silent mining operation in the monero system. Studies in Informatics and Control, 30(4), 99–108. |
|
Last edited by: Jack 2023-01-20 18:21 |
|
Otávio Chervinski, J., Kreutz, D., & Yu, J. 2021, Analysis of transaction flooding attacks against monero. Paper presented at 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). |
|
Last edited by: Rucknium 2024-03-16 13:00 |
|
Ni, W., Cheng, P., Chen, L., & Lin, X. (2021). When the recursive diversity anonymity meets the ring signature. In Proceedings of the 2021 International Conference on Management of Data (pp. 1359–1371). New York, NY, USA: Association for Computing Machinery. |
|
Added by: Rucknium 2022-02-23 15:57 |
|
Li, Y., Yang, G., Susilo, W., Yu, Y., Au, M. H., & Liu, D. (2021). Traceable monero: Anonymous cryptocurrency with enhanced accountability. IEEE Transactions on Dependable and Secure Computing, 18(2), 679–691. |
|
Added by: Rucknium 2022-06-30 22:22 |
|
Kearney, J. J., & Perez-Delgado, C. A. (2021). Vulnerability of blockchain technologies to quantum attacks. Array, 10, 100065. |
|
Added by: Rucknium 2022-05-03 03:13 |
|
Kawaguchi, K., & Noda, S. (2021). Security-cost efficiency of competing proof-of-work cryptocurrencies. Unpublished manuscript. |
|
Added by: Rucknium 2022-02-23 21:55 |
|