| Goodell, B., & Noether, S. (2018). Thring Signatures and their Applications to Spender-Ambiguous Digital Currencies. Unpublished manuscript. |
|
| Added by: Rucknium 2/22/22, 5:51 PM |
|
| Goodell, B., Noether, S., & Blue, A. (2019). Concise Linkable Ring Signatures and Forgery Against Adversarial Keys. Cryptology ePrint Archive, Paper 2019/654. |
|
| Added by: Jack Last edited by: Jack 1/20/23, 5:53 PM |
|
| Goodell, B., Salazar, R., & Slaughter, F. (2025). Uniformly Most Powerful Tests for Ad Hoc Transactions in Monero. [Cryptology {ePrint} Archive, Paper 2025/221]. |
|
| Added by: Rucknium Last edited by: Rucknium 2/27/25, 4:32 PM |
|
| Goodell, B., Salazar, R., Slaughter, F., & Szramowski, L. (2025). A Further Review of the DL Gadget Of Interest. Unpublished manuscript. |
|
| Added by: Rucknium 5/27/25, 10:17 PM |
|
| Goorha, P. Principles of Natural Resource Economics for Bitcoin. The Journal of The British Blockchain Association, 4(August). |
|
| Added by: endor Last edited by: endor 4/14/22, 8:14 PM |
|
| Grunspan, C., & Perez-Marco, R. (2017). Satoshi Risk Tables. |
|
| Added by: Rucknium Last edited by: Rucknium 9/13/24, 1:39 PM |
|
| Grunspan, C., & Perez-Marco, R. (2018). Double spend races. Int. J. Theor. Appl. Finance, 21(8), 1850053. |
|
| Added by: Rucknium Last edited by: Rucknium 8/23/23, 4:52 PM |
|
| Grunspan, C., & Perez-Marco, R. (2022). On Profitability of Nakamoto Double Spend. Probability in the Engineering and Informational Sciences, 36(3), 732–746. |
|
| Added by: Rucknium Last edited by: Rucknium 9/14/24, 2:08 PM |
|
| Grunspan, C., & Perez-Marco, R. (2022). Ping-Pong Swaps. arXiv. |
|
| Added by: Rucknium 12/2/22, 4:36 PM |
|
| Gugger, J. (2020). Bitcoin-Monero Cross-chain Atomic Swap. [Cryptology ePrint Archive, Paper 2020/1126]. |
|
| Added by: Jack Last edited by: Jack 1/20/23, 6:09 PM |
|
| Guo, S. 2024, Secure Monero on Corrupted Machines with Reverse Firewalls. Paper presented at International Conference on Data Security and Privacy Protection. |
|
| Added by: Jack Last edited by: Jack 1/17/25, 5:31 PM |
|
| Guo, Z., Shi, L., Xu, M., & Yin, H. (2021). MRCC: A Practical Covert Channel Over Monero With Provable Security. IEEE Access, 9, 31816–31825. |
|
| Added by: Rucknium Last edited by: Rucknium 8/6/22, 9:24 PM |
|
| Hammad, N., & Victor, F. (2024). Monero Traceability Heuristics: Wallet Application Bugs and the Mordinal-P2Pool Perspective. |
|
| Added by: opal 9/25/24, 9:35 PM |
|
| Herrera Sufán, R. (2021). Speeding up Monero’s balance computation. Unpublished M.S. Thesis, Pontificia Universidad Católica de Chile. |
|
| Added by: Rucknium 2/24/22, 10:40 PM |
|
| Hinteregger, A., & Haslhofer, B. 2019, Short Paper: An Empirical Analysis of Monero Cross-chain Traceability. Paper presented at Financial Cryptography and Data Security. |
|
| Added by: Rucknium 9/10/22, 8:11 PM |
|
| Hoenisch, P., Mazumdar, S., Moreno-Sánchez, P., & Ruj, S. (2022). LightSwap: An Atomic Swap Does Not Require Timeouts At Both Blockchains. [Cryptology ePrint Archive, Paper 2022/1650]. |
|
| Added by: Rucknium Last edited by: Rucknium 12/13/22, 7:02 PM |
|
| Hoenisch, P., & Pino, L. S. D. (2021). Atomic Swaps between Bitcoin and Monero. CoRR, abs/2101.12332. |
|
| Added by: Rucknium Last edited by: Rucknium 2/24/22, 6:54 PM |
|
| Hou, C., Zhou, M., Ji, Y., Daian, P., Tram`er, F., & Fanti, G., et al. 2021, SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Reinforcement Learning. Paper presented at Proceedings 2021 Network and Distributed System Security Symposium. |
|
| Added by: Rucknium 10/22/22, 8:50 PM |
|
| Howell, A., Saber, T., & Bendechache, M. (2023). Measuring node decentralisation in blockchain peer to peer networks. Blockchain: Research and Applications, 4(1), 100109. |
|
| Added by: Rucknium 6/3/25, 4:28 PM |
|
| Huang, K., Mu, Y., Rezaeibagha, F., Zhang, X., & Li, X. (2023). Monero with Multi-Grained Redaction. IEEE Transactions on Dependable and Secure Computing, 1–13. |
|
| Added by: Rucknium 1/5/24, 7:16 PM |
|
| Huberman, G., Leshno, J. D., & Moallemi, C. (2021). Monopoly without a Monopolist: An Economic Analysis of the Bitcoin Payment System. The Review of Economic Studies, 88(6), 3011–3040. |
|
| Added by: endor Last edited by: endor 4/19/22, 11:07 PM |
|
| Järvinen, S. (2022). Tax evasion with untraceable cryptocurrencies in OECD countries as a target of regulation. Unpublished masters thesis, Aalto University. School of Business. |
|
| Added by: Rucknium 10/22/22, 5:17 PM |
|
| Jiang, Y., & Zhang, J. (2024). Profitability Analysis of Time-Restricted Double-Spending Attack on PoW-Based Large Scale Blockchain With the Aid of Multiple Types of Attacks. IEEE Transactions on Information Forensics and Security, 19, 8155–8171. |
|
| Added by: Jack Last edited by: Jack 9/19/24, 10:59 PM |
|
| Jiang, P., Zhu, J., & Zhu, L. (2024). Balancing Privacy and Regulation of Cross-chain Transaction Systems via SoK-assisted Policy Enhancement. IEEE Transactions on Information Forensics and Security, 1–1. |
|
| Added by: Rucknium Last edited by: Rucknium 5/23/24, 6:01 PM |
|
| Jin, R. (2023). The Advance of Ring Confidential Transactions. Highlights in Science, Engineering and Technology, 39, 1104–1110. |
|
| Added by: Rucknium Last edited by: Rucknium 1/5/24, 7:46 PM |
|
| Jivanyan, A., & Feickert, A. (2021). Lelantus Spark: Secure and Flexible Private Transactions. [Cryptology ePrint Archive, Report 2021/1173]. |
|
| Added by: Rucknium Last edited by: Rucknium 2/24/22, 10:47 PM |
|
| Kappos, G. (2022). An Empirical Analysis of Privacy in Cryptocurrencies. Unpublished PhD thesis, UCL (University College London). |
|
| Added by: Jack Last edited by: Jack 2/21/23, 4:36 AM |
|
| Karame, G. O., Androulaki, E., Roeschlin, M., Gervais, A., & vCapkun, S. (2015). Misbehavior in Bitcoin: A Study of Double-Spending and Accountability. ACM Trans. Inf. Syst. Secur. 18(1). |
|
| Added by: endor Last edited by: endor 4/17/22, 7:51 PM |
|
| Kawaguchi, K., & Noda, S. (2021). Security-Cost Efficiency of Competing Proof-of-Work Cryptocurrencies. Unpublished manuscript. |
|
| Added by: Rucknium 2/23/22, 9:55 PM |
|
| Kearney, J. J., & Perez-Delgado, C. A. (2021). Vulnerability of blockchain technologies to quantum attacks. Array, 10, 100065. |
|
| Added by: Rucknium 5/3/22, 3:13 AM |
|
| Keller, P., Florian, M., & Böhme, R. 2021, Collaborative Deanonymization. Paper presented at Financial Cryptography and Data Security. FC 2021 International Workshops. |
|
| Added by: Rucknium 6/3/25, 5:31 PM |
|
| Klinec, D., & Matyas, V. 2020, Privacy-Friendly Monero Transaction Signing on a Hardware Wallet. Paper presented at ICT Systems Security and Privacy Protection. |
|
| Added by: Rucknium 10/22/22, 7:45 PM |
|
| koe. Seraphis: A Privacy-Preserving Transaction Protocol Abstraction (WIP). |
|
| Added by: Jack 3/8/23, 10:33 PM |
|
| koe, Alonso, K. M., & Noether, S. (2020). Zero to Monero: A technical guide to a private digital currency; for beginners, amateurs, and experts Second ed. Second ed. |
|
| Added by: Rucknium Last edited by: Rucknium 3/3/23, 4:51 PM |
|
| Koerhuis, W., Kechadi, T., & Le-Khac, N.-A. (2020). Forensic analysis of privacy-oriented cryptocurrencies. Forensic Science International: Digital Investigation, 33, 200891. |
|
| Added by: Rucknium 9/10/22, 7:55 PM |
|
| Kopyciok, Y., Schmid, S., & Victor, F. (2025). Friend or Foe? Identifying Anomalous Peers in Moneros P2P Network. |
|
| Added by: Rucknium 10/29/25, 4:36 PM |
|
| Kopyciok, Y., Victor, F., & Schmid, S. (2025). Moneros Decentralized P2P Exchanges: Functionality, Adoption, and Privacy Risks. |
|
| Added by: Rucknium Last edited by: Rucknium 6/3/25, 4:15 PM |
|
| Kovalchuk, L., Oliynykov, R., Bespalov, Y., & Rodinko, M. (2022). Methods of Ensuring Privacy in a Decentralized Environment. In R. Oliynykov, O. Kuznetsov, O. Lemeshko & T. Radivilova (Eds.), Information Security Technologies in the Decentralized Distributed Networks. (pp. 1–32). Cham: Springer International Publishing. |
|
| Added by: Rucknium 5/5/22, 10:29 PM |
|
| Kumar, A., Fischer, C., Tople, S., & Saxena, P. 2017, September, A Traceability Analysis of Monero’s Blockchain. Paper presented at European Symposium on Research in Computer Security (ESORICS). |
|
| Added by: Rucknium Last edited by: Rucknium 3/4/25, 7:08 PM |
|
| Lee, J., Choi, G., Han, J., & Park, J. (2025). Advanced Monero wallet forensics: Demystifying off-chain artifacts to trace privacy-preserving cryptocurrency transactions. Forensic Science International: Digital Investigation, 54, 301988. |
|
| Added by: Jack Last edited by: Jack 11/6/25, 4:29 PM |
|
| Lee, S., & Kim, H. (2025). Inside Qubic's Selfish Mining Campaign on Monero: Evidence, Tactics, and Limits. |
|
| Added by: Rucknium Last edited by: Rucknium 12/9/25, 10:39 PM |
|
| Leevik, A., Beliaev, V., Stasenko, B., Davydov, V., & Bezzateev, S. 2020, Review and Analysis of the Classical and Post-Quantum Ring Signature Algorithms. Paper presented at 2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). |
|
| Added by: Jack Last edited by: Jack 1/20/23, 6:12 PM |
|
| Li, J. (2022). Extending Succinct Zero Knowledge Proofs for Set Membership to Ring Signatures. Unpublished masters thesis, EECS Department, University of California, Berkeley. |
|
| Added by: Rucknium Last edited by: Rucknium 7/1/22, 6:05 PM |
|
| Li, J., Li, N., Peng, J., Cui, H., & Wu, Z. (2019). Energy consumption of cryptocurrency mining: A study of electricity consumption in mining cryptocurrencies. Energy, 168, 160–168. |
|
| Added by: endor 4/17/22, 7:30 PM |
|
| Li, W., Lin, Z., & Chen, Q. (2022). A Hybrid Design of Linkable Ring Signature Scheme with Stealth Addresses. Security and Communication Networks, 2022. |
|
| Added by: Rucknium 2/24/22, 3:44 PM |
|
| Li, Y., Weng, J., Li, M., Wu, W., Weng, J., & Liu, J.-N., et al. (2022). ZeroCross: A sidechain-based privacy-preserving Cross-chain solution for Monero. Journal of Parallel and Distributed Computing, 169, 301–316. |
|
| Added by: Rucknium 9/10/22, 7:54 PM |
|
| Li, Y., Yang, G., Susilo, W., Yu, Y., Au, M. H., & Liu, D. (2021). Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability. IEEE Transactions on Dependable and Secure Computing, 18(2), 679–691. |
|
| Added by: Rucknium 6/30/22, 10:22 PM |
|
| Li, S.-N., Yang, Z., & Tessone, C. J. 2020, Proof-of-Work cryptocurrency mining: a statistical approach to fairness. Paper presented at 2020 IEEE/CIC International Conference on Communications in China (ICCC Workshops). |
|
| Added by: endor 4/3/22, 6:53 PM |
|
| Liang, M., Karantaidou, I., Baldimtsi, F., Gordon, D. S., & Varia, M. (2022). (∈, δ)-Indistinguishable Mixing for Cryptocurrencies. Proceedings on Privacy Enhancing Technologies, 2022(1), 49–74. |
|
| Added by: Rucknium Last edited by: Rucknium 5/5/22, 10:24 PM |
|
| Liao, Y.-C., Tso, R., Liu, Z.-Y., & Tseng, Y.-F. 2022, Blockchain-Based Confidential Payment System with Controllable Regulation. Paper presented at Information Security Practice and Experience. |
|
| Added by: Rucknium 12/2/22, 4:05 PM |
|
| Lin, H., & Wang, M. (2022). Repudiable ring signature: Stronger security and logarithmic-size. Computer Standards & Interfaces, 80, 103562. |
|
| Added by: Rucknium 2/24/22, 6:04 PM |
|
| Lin, D., Yan, J., Ba, N., Fu, Z., & Jiang, H. (2022). Survey of anonymity and tracking technology in Monero. Journal of Computer Applications, 42(1). |
|
| Added by: Rucknium 2/23/22, 5:01 PM |
|
| Liu, L., Liu, L., Li, B., Zhong, Y., Liao, S., & Zhang, L. (2022). MSCCS: A Monero-based security-enhanced covert communication system. Computer Networks, 205, 108759. |
|
| Added by: Rucknium 2/23/22, 10:46 PM |
|
| Liu, Q., Liu, Z., Long, Y., Liu, Z., Sui, Z., & Sun, S., et al. 2019, Making Monero Hard-to-Trace and More Efficient. Paper presented at 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). |
|
| Added by: Jack Last edited by: Jack 1/20/23, 6:12 PM |
|
| Liyanage, S. G. H. (2018). MoneroSci: Linkability and Traceability Analysis of Monero Blockchain. Unpublished Undergraduate thesis University of Colombo. |
|
| Added by: Rucknium 2/24/22, 9:29 PM |
|
| Luo, M., Zhou, J., & Yang, P. (2023). RATS: A regulatory anonymous transaction system based on blockchain. Journal of Parallel and Distributed Computing, 182, 104751. |
|
| Added by: Rucknium 1/6/24, 5:44 PM |
|
| Macchetti, M. (2023). A Novel Related Nonce Attack for ECDSA. [Cryptology ePrint Archive, Paper 2023/305]. |
|
| Added by: Jack Last edited by: Jack 3/6/23, 10:35 PM |
|
| Macheta, J., Noether, S., Noether, S., & Smooth, J. (2014). Counterfeiting via Merkle Tree Exploits within Virtual Currencies Employing the CryptoNote Protocol. Unpublished manuscript. |
|
| Added by: Rucknium Last edited by: Rucknium 2/22/22, 5:58 PM |
|
| Macias, & Siabi, Y. E. Security Analysis of Monero’s Peer-to-Peer System. |
|
| Added by: Jack Last edited by: Jack 1/8/23, 2:45 PM |
|
| Mackenzie, A., Noether, S., & Monero Core Team. (2015). Improving Obfuscation in the CryptoNote Protocol. Unpublished manuscript. |
|
| Added by: Rucknium 2/22/22, 5:33 PM |
|
| Magaki, I., Khazraee, M., Gutierrez, L. V., & Taylor, M. B. 2016, June, ASIC Clouds: Specializing the Datacenter. Paper presented at 2016 ACM/IEEE 43rd Annual International Symposium on Computer Architecture (ISCA). |
|
| Added by: endor 4/17/22, 7:40 PM |
|
| McCloskey, D. N. (2016). Fungibility. In The New Palgrave Dictionary of Economics. (pp. 1–1). London: Palgrave Macmillan UK. (Original work published 1987). |
|
| Added by: Rucknium Last edited by: Rucknium 3/9/22, 9:31 PM |
|
| Meier, J. (2022). Diophantine Satisfiability Arguments for Private Blockchains. Unpublished masters thesis, ETH Zurich, Zurich. |
|
| Added by: Rucknium 10/22/22, 7:40 PM |
|
| Mikic, M., Srbakoski, M., & Praska, S. (2025). Post-Quantum Stealth Address Protocols. |
|
| Added by: Rucknium Last edited by: Rucknium 2/27/25, 4:20 PM |
|
| Miller, A., Kosba, A., Katz, J., & Shi, E. 2015, Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions. Paper presented at Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. |
|
| Added by: Rucknium 2/23/22, 10:08 PM |
|
| Mondschein, C. F. (2020). Browser-based Crypto Mining and EU Data Protection and Privacy Law: A Critical Assessment and Possible Opportunities for the Monetisation of Web Services. The Journal of The British Blockchain Association. |
|
| Added by: Rucknium Last edited by: Rucknium 5/3/22, 12:53 PM |
|
| Moreno-Sánchez, P., Blue, A., Le, D. V., Noether, S., Goodell, B., & Kate, A. 2020, DLSAG: Non-interactive Refund Transactions for Interoperable Payment Channels in Monero. Paper presented at Financial Cryptography and Data Security. |
|
| Added by: Jack Last edited by: Jack 1/18/23, 12:01 AM |
|
| Möser, M. (2022). Cryptocurrency Privacy in Practice. Unpublished Ph.D. Dissertation, Princeton University. |
|
| Added by: Rucknium 1/8/23, 3:54 AM |
|
| Möser, M., Soska, K., Heilman, E., Lee, K., Heffan, H., & Srivastava, S., et al. (2018). An Empirical Analysis of Traceability in the Monero Blockchain. Proceedings on Privacy Enhancing Technologies, 2018(3), 143–163. |
|
| Added by: Rucknium 2/23/22, 4:14 PM |
|
| Movsowitz Davidow, D., Manevich, Y., & Toch, E. 2023, Privacy-Preserving Transactions with Verifiable Local Differential Privacy. Paper presented at 5th Conference on Advances in Financial Technologies (AFT 2023). |
|
| Added by: Rucknium 1/5/24, 7:14 PM |
|
| Naik, A., Yeniaras, E., Hellstern, G., Prasad, G., & Vishwakarma, S. K. L. P. (2023). From Portfolio Optimization to Quantum Blockchain and Security: A Systematic Review of Quantum Computing in Finance. arXiv preprint arXiv:2307.01155. |
|
| Added by: Jack Last edited by: Jack 7/29/23, 3:07 AM |
|
| Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. Unpublished manuscript. |
|
| Added by: Rucknium Last edited by: theadmin 2/23/22, 12:13 AM |
|
| Ni, W., Cheng, P., Chen, L., & Lin, X. (2021). When the Recursive Diversity Anonymity Meets the Ring Signature. In Proceedings of the 2021 International Conference on Management of Data. (pp. 1359–1371). New York, NY, USA: Association for Computing Machinery. |
|
| Added by: Rucknium 2/23/22, 3:57 PM |
|
| Nick, J., Eagen, L., & Linus, R. (2025). Shielded CSV: Private and Efficient Client-Side Validation. [Cryptology {ePrint} Archive, Paper 2025/068]. |
|
| Added by: Rucknium Last edited by: Rucknium 2/27/25, 4:24 PM |
|
| Nikzad, A., & Mehregan, M. (2022). Techno-economic, and environmental evaluations of a novel cogeneration system based on solar energy and cryptocurrency mining. Solar Energy, 232, 409–420. |
|
| Added by: endor 4/17/22, 7:34 PM |
|
| Noether, S. UNDERSTANDING GE FROMFE FROMBYTES VARTIME. |
|
| Added by: Jack Last edited by: Jack 3/28/23, 9:26 PM |
|
| Noether, S. (2018). Discrete Logarithm Equality Across Groups. Unpublished manuscript. |
|
| Added by: Rucknium 2/22/22, 5:55 PM |
|
| Noether, S. (2018). Sets of Spent Outputs. Unpublished manuscript. |
|
| Added by: Rucknium 2/22/22, 5:45 PM |
|
| Noether, S., & Goodell, B. (2017). An Efficient Implementation of Monero Subaddresses. Unpublished manuscript. |
|
| Added by: Rucknium Last edited by: Rucknium 2/24/22, 3:22 PM |
|
| Noether, S., & Goodell, B. (2018). Dual Linkable Ring Signatures. Unpublished manuscript. |
|
| Added by: Rucknium 2/22/22, 5:48 PM |
|
| Noether, S., Mackenzie, A., & Monero Core Team. (2016). Ring Confidential Transactions. Unpublished manuscript. |
|
| Added by: Rucknium 2/22/22, 5:36 PM |
|
| Noether, S., & Noether, S. (2014). Monero is Not That Mysterious. Unpublished manuscript. |
|
| Added by: Rucknium 2/22/22, 5:29 PM |
|
| Noether, S., Noether, S., & Mackenzie, A. (2014). A Note on Chain Reactions in Traceability in CryptoNote 2.0. Unpublished manuscript. |
|
| Added by: Rucknium Last edited by: Rucknium 2/22/22, 5:19 PM |
|
| O'Dwyer, K. J., & Malone, D. 2014, June, Bitcoin mining and its energy footprint. Paper presented at 25th IET Irish Signals Systems Conference 2014 and 2014 China-Ireland International Conference on Information and Communications Technologies (ISSC 2014/CIICT 2014). |
|
| Added by: endor 4/17/22, 8:19 PM |
|
| Open Letter to FinCEN’s Proposed Amendment of the BSA. October 24 2020. FinCEN. |
|
| Added by: Jack Last edited by: Jack 1/20/23, 3:41 AM |
|
| Otávio Chervinski, J., Kreutz, D., & Yu, J. 2021, Analysis of transaction flooding attacks against Monero. Paper presented at 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). |
|
| Added by: Rucknium Last edited by: Rucknium 3/16/24, 1:00 PM |
|
| Papadoulis, G. (2025). Privacy and auditability in decentralized payment systems. |
|
| Added by: Jack Last edited by: Jack 1/17/25, 5:28 PM |
|
| Park, S., & Sealfon, A. (2019). It wasn't me! Repudiability and Unclaimability of Ring Signatures. [Cryptology ePrint Archive, Paper 2019/135]. |
|
| Added by: endor Last edited by: endor 8/2/22, 1:38 PM |
|
| Parker, L. (2024). FCMP++. Unpublished manuscript. |
|
| Added by: Rucknium 8/9/24, 5:45 PM |
|
| Patra, R. K., & Sen, B. (2016). Estimation of a two-component mixture model with applications to multiple testing. Journal of the Royal Statistical Society. Series B (Statistical Methodology), 78(4), 869–893. |
|
| Added by: Rucknium 2/22/25, 11:11 PM |
|
| Perera, M. N. S., Nakamura, T., Hashimoto, M., Yokoyama, H., Cheng, C.-M., & Sakurai, K. (2022). A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity. Cryptography, 6(1). |
|
| Added by: Rucknium 2/26/22, 10:36 PM |
|
| Pitu, F., & Gaitan, N. C. 2023, July, Survey of security, performance, and profitability of Monero: a browser-based cryptocurrency. Paper presented at 2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME). |
|
| Added by: Rucknium 1/6/24, 5:58 PM |
|
| Pu, S., Thyagarajan, S. A., D"ottling, N., & Hanzlik, L. (2023). Post Quantum Fuzzy Stealth Signatures and Applications. Cryptology ePrint Archive. |
|
| Added by: Jack Last edited by: Jack 7/29/23, 2:59 AM |
|
| Purkovic, S., Mekic, E., Kuk, K., & Gostimirovic, L. (2021). Empirical Analysis of Silent Mining Operation in the Monero System. Studies in Informatics and Control, 30(4), 99–108. |
|
| Added by: Jack Last edited by: Jack 1/20/23, 6:21 PM |
|
| Quesnelle, J. (2017). On the linkability of Zcash transactions. arXiv. |
|
| Added by: Rucknium Last edited by: Rucknium 8/25/22, 12:25 AM |
|
| Rahalkar, C., & Virgaonkar, A. (2021). Summarizing and Analyzing the Privacy-Preserving Techniques in Bitcoin and other Cryptocurrencies. |
|
| Added by: Rucknium Last edited by: Rucknium 2/24/22, 10:15 PM |
|
| Raikwar, M., Wu, S., & Gjosteen, K. 2023, Security Model for Privacy-Preserving Blockchain-Based Cryptocurrency Systems. Paper presented at Network and System Security. |
|
| Added by: Rucknium 1/6/24, 5:22 PM |
|
| Renwick, R., & Gleasure, R. (2021). Those who control the code control the rules: How different perspectives of privacy are being written into the code of blockchain systems. Journal of Information Technology, 36(1), 16–38. |
|
| Added by: Rucknium 3/9/22, 7:45 PM |
|
| Rinberg, R., & Agarwal, N. (2022). Privacy when Everyone is Watching: An SOK on Anonymity on the Blockchain. [Cryptology ePrint Archive, Paper 2022/985]. |
|
| Added by: Rucknium 10/22/22, 5:21 PM |
|
| Ronge, V., Egger, C., Lai, R. W. F., Schröder, D., & Yin, H. H. F. (2021). Foundations of Ring Sampling. Proceedings on Privacy Enhancing Technologies, 2021(3), 265–288. |
|
| Added by: Rucknium 2/23/22, 4:13 PM |
|