ACK-J, A.-J. 2022. Lord of the rings: an empirical analysis of monero’s ring signature resilience to artificially intelligent attacks. Multidisciplinary Academic Grants in Cryptocurrencies. |
|
Last edited by: Jack 1/20/23, 4:16 AM |
|
af halo2 Protokollen, H. G. S., & Spitters, B. 2023. High assurance specification of the halo2 protocol. |
|
Last edited by: Jack 7/29/23, 3:03 AM |
|
Akcora, C. G., Gel, Y. R., & Kantarcioglu, M. (2022). Blockchain networks: Data structures of bitcoin, monero, zcash, ethereum, ripple, and iota. WIREs Data Mining and Knowledge Discovery, 12(1), e1436. |
|
Added by: Rucknium 2/23/22, 10:27 PM |
|
Alonso, K. M. (2017). Monero-privacy in the blockchain. , Universitat Aut`onoma de Barcelona. |
|
Last edited by: Jack 3/3/23, 4:55 PM |
|
Amarasinghe, N. (2022). Systematic modelling of anonymity with application to cryptocurrencies. Unpublished PhD thesis, Queensland University of Technology. |
|
Last edited by: Jack 2/21/23, 4:34 AM |
|
Aranha, D. F., Hall-Anderson, M., Nitulescu, A., Pagnin, E., & Yakoubov, S. 2021. Count me in! : Extendability for threshold ring signatures. [Cryptology ePrint Archive, Report 2021/1240] |
|
Last edited by: Plowsof 3/9/22, 5:28 PM |
|
Azad, B. A. 2018. Evaluating the effectiveness of javascript crypto miner blocker browser extensions. StonyBrook University. |
|
Last edited by: Jack 1/20/23, 5:59 PM |
|
Aziz, A. B. A., Ngah, S. B., Dun, Y. T., & Bee, T. F. (2020). Coinhive’s monero drive-by crypto-jacking. IOP Conference Series: Materials Science and Engineering, 769(1), 12065. |
|
Last edited by: Jack 1/18/23, 12:05 AM |
|
Barj, S., Ouaddah, A., & Mezrioui, A. 2023, A review of privacy-preserving cryptographic techniques used in blockchain platforms. Paper presented at Digital Technologies and Applications. |
|
Added by: Rucknium 1/6/24, 5:36 PM |
|
Biryukov, A., & Tikhomirov, S. (2019). Security and privacy of mobile wallet users in bitcoin, dash, monero, and zcash. Pervasive and Mobile Computing, 59, 101030. |
|
Last edited by: Jack 1/8/23, 3:27 AM |
|
Borggren, N., & Yao, L. (2020). Correlations of multi-input monero transactions. arXiv preprint arXiv:2001.04827, |
|
Last edited by: Rucknium 4/20/22, 3:36 PM |
|
Borggren, N., Kim, H.-Y., Yao, L., & Koplik, G. (2020). Simulated blockchains for machine learning traceability and transaction values in the monero network. arXiv preprint arXiv:2001.03937, |
|
Last edited by: Jack 4/1/22, 6:46 PM |
|
Buccafurri, F., De Angelis, V., & Lazzaro, S. 2023, May 25–26 A traffic-analysis proof solution to allow k-anonymous payments in pseudonymous blockchains. Unpublished paper presented at 5th Distributed Ledger Technology Workshop. |
|
Added by: Rucknium 1/5/24, 8:51 PM |
|
Budish, E. (2022). The economic limits of bitcoin and anonymous, decentralized trust on the blockchain. Unpublished manuscript. |
|
Added by: Rucknium 7/1/22, 4:19 PM |
|
Bunz, B., Bootle, J., Boneh, D., Poelstra, A., Wuille, P., & Maxwell, G. 2018, Bulletproofs: Short proofs for confidential transactions and more. Paper presented at 2018 IEEE Symposium on Security and Privacy (SP). |
|
Last edited by: Jack 3/29/23, 6:22 PM |
|
Cao, T., Yu, J., Decouchant, J., Luo, X., & Verissimo, P. 2020, Exploring the monero peer-to-peer network. Paper presented at Financial Cryptography and Data Security. |
|
Added by: Rucknium 12/13/22, 6:56 PM |
|
Chator, A., & Green, M. 2018, How to squeeze a crowd: Reducing bandwidth in mixing cryptocurrencies. Paper presented at 2018 IEEE European Symposium on Security and Privacy Workshops. |
|
Last edited by: Jack 1/20/23, 6:05 PM |
|
Chaum, D., & Heyst, E. V. 1991, Group signatures. Paper presented at Workshop on the Theory and Application of of Cryptographic Techniques. |
|
Last edited by: Jack 8/8/22, 2:40 AM |
|
Chow, S. S., Egger, C., Lai, R. W. F., Ronge, V., & Woo, I. K. Y. (2023). On sustainable ring-based anonymous systems. Cryptology ePrint Archive, |
|
Last edited by: Jack 6/6/23, 9:13 PM |
|
Christensen, S. 2018. a comparative study of privacy-preserving cryptocurrencies: monero and zcash. University of Birmingham. |
|
Last edited by: Jack 1/20/23, 5:36 PM |
|
Chung, H., Han, K., Ju, C., Kim, M., & Seo, J. H. (2022). Bulletproofs+: Shorter proofs for a privacy-enhanced distributed ledger. IEEE Access, 10, 42067–42082. |
|
Last edited by: Jack 3/29/23, 6:12 PM |
|
Cremers, C., Loss, J., & Wagner, B. 2023. A holistic security analysis of monero transactions. [Cryptology ePrint Archive, Paper 2023/321]. |
|
Last edited by: Jack 3/8/23, 6:11 PM |
|
Deuber, D., Ronge, V., & Rueckert, C. (2022). Sok: assumptions underlying cryptocurrency deanonymizations. Proceedings on Privacy Enhancing Technologies, 2022(3). |
|
Last edited by: Rucknium 7/5/22, 5:01 PM |
|
Dijk, A., & Schröder, D. (2023). Proof of concept for a ethereum virtual machine on cryptonote. Unpublished manuscript. |
|
Added by: Rucknium 1/5/24, 8:32 PM |
|
Duan, J., Zheng, S., Wang, W., Wang, L., Hu, X., & Gu, L. (2024). Concise ringct protocol based on linkable threshold ring signature. IEEE Transactions on Dependable and Secure Computing, (1), 1–15. |
|
Last edited by: Jack 2/27/24, 1:42 PM |
|
Dutta, A., Bagad, S., & Vijayakumaran, S. (2021). Mprove+: Privacy enhancing proof of reserves protocol for monero. IEEE Transactions on Information Forensics and Security, 16, 3900–3915. |
|
Last edited by: Rucknium 2/24/22, 7:18 PM |
|
Eagen, L. Li. E. 2022. Bulletproofs++. [Cryptology ePrint Archive, Report 2022/510]. |
|
Last edited by: Rucknium 7/29/23, 2:57 AM |
|
Egger, C., Lai, R. W. F., Ronge, V., Woo, I. K. Y., & Yin, H. H. F. (2022). On defeating graph analysis of anonymous transactions. Proceedings on Privacy Enhancing Technologies, 2022(3). |
|
Last edited by: Rucknium 7/5/22, 5:03 PM |
|
Erg"un, Z. C., & KARABIYIK, B. K. Forecasting monero prices with a machine learning algorithm. Eskic{s}ehir Osmangazi "Universitesi .Iktisadi ve .Idari Bilimler Dergisi, 16(3), 651–663. |
|
Last edited by: Jack 1/20/23, 5:38 PM |
|
Esgin, M. F., Steinfeld, R., & Zhao, R. K. 2022, Matrict+: More efficient post-quantum private blockchain payments. Paper presented at 2022 IEEE Symposium on Security and Privacy (SP). |
|
Last edited by: Jack 3/28/23, 8:46 PM |
|
Estensen, H. A. 2018. A comparison of monero and zcash. |
|
Last edited by: Jack 1/20/23, 5:40 PM |
|
Fan, X. 2018, Faster dual-key stealth address for blockchain-based internet of things systems. Paper presented at Blockchain--ICBC 2018: First International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings 1. |
|
Last edited by: Jack 6/6/23, 9:02 PM |
|
Fischer Amrit Kumar, C., Tople, S., & Saxena, P. 2017, September A traceability analysis of monero’s blockchain. Paper presented at European Symposium on Research in Computer Security (ESORICS). |
|
Last edited by: Rucknium 2/23/22, 4:23 PM |
|
Gailly, N., Maller, M., & Nitulescu, A. 2022, May 2–6 Snarkpack: practical snark aggregation. Unpublished paper presented at Financial Cryptography and Data Security 2022. |
|
Added by: Rucknium 5/5/22, 9:04 PM |
|
Ghesmati, S., Fdhila, W., & Weippl, E. 2022. User-perceived privacy in blockchain. [Cryptology ePrint Archive, Report 2022/287]. |
|
Added by: endor 4/17/22, 8:59 PM |
|
Gibson, A. From zero (knowledge) to bulletproofs. |
|
Last edited by: Jack 3/3/23, 4:18 PM |
|
Gomzin, S. (2022). How monero works. In Crypto Basics: A Nontechnical Introduction to Creating Your Own Money for Investors and Inventors (pp. 119–137). Berkeley, CA: Apress. |
|
Added by: Rucknium 10/22/22, 4:48 PM |
|
Gong, T., Minaei, M., Sun, W., & Kate, A. 2022, May 2–6 Towards overcoming the undercutting problem. Unpublished paper presented at Financial Cryptography and Data Security 2022. |
|
Added by: Rucknium 5/5/22, 9:01 PM |
|
Goodell, B., Noether, S., & Blue, A. (2019). Concise linkable ring signatures and forgery against adversarial keys. Cryptology ePrint Archive, Paper 2019/654, |
|
Last edited by: Jack 1/20/23, 5:53 PM |
|
Goodell, B., & Noether, S. (2018). Thring signatures and their applications to spender-ambiguous digital currencies. Unpublished manuscript. |
|
Added by: Rucknium 2/22/22, 5:51 PM |
|
Gugger, J. 2020. Bitcoin-monero cross-chain atomic swap. [Cryptology ePrint Archive, Paper 2020/1126]. |
|
Last edited by: Jack 1/20/23, 6:09 PM |
|
Guo, Z., Shi, L., Xu, M., & Yin, H. (2021). Mrcc: A practical covert channel over monero with provable security. IEEE Access, 9, 31816–31825. |
|
Last edited by: Rucknium 8/6/22, 9:24 PM |
|
Herrera Sufán, R. (2021). Speeding up monero’s balance computation. Unpublished M.S. Thesis, Pontificia Universidad Católica de Chile. |
|
Added by: Rucknium 2/24/22, 10:40 PM |
|
Hinteregger, A., & Haslhofer, B. 2019, Short paper: An empirical analysis of monero cross-chain traceability. Paper presented at Financial Cryptography and Data Security. |
|
Added by: Rucknium 9/10/22, 8:11 PM |
|
Hoenisch, P., & Pino, L. S. D. (2021). Atomic swaps between bitcoin and monero. CoRR, abs/2101.12332, |
|
Last edited by: Rucknium 2/24/22, 6:54 PM |
|
Hoenisch, P., Mazumdar, S., Moreno-Sánchez, P., & Ruj, S. 2022. Lightswap: An atomic swap does not require timeouts at both blockchains. [Cryptology ePrint Archive, Paper 2022/1650]. |
|
Last edited by: Rucknium 12/13/22, 7:02 PM |
|
Huang, K., Mu, Y., Rezaeibagha, F., Zhang, X., & Li, X. (2023). Monero with multi-grained redaction. IEEE Transactions on Dependable and Secure Computing, 1–13. |
|
Added by: Rucknium 1/5/24, 7:16 PM |
|
Jin, R. (2023). The advance of ring confidential transactions. Highlights in Science, Engineering and Technology, 39, 1104–1110. |
|
Last edited by: Rucknium 1/5/24, 7:46 PM |
|
Jivanyan, A., & Feickert, A. 2021. Lelantus spark: Secure and flexible private transactions. [Cryptology ePrint Archive, Report 2021/1173]. |
|
Last edited by: Rucknium 2/24/22, 10:47 PM |
|
Kappos, G. (2022). An empirical analysis of privacy in cryptocurrencies. Unpublished PhD thesis, UCL (University College London). |
|
Last edited by: Jack 2/21/23, 4:36 AM |
|
Kawaguchi, K., & Noda, S. (2021). Security-cost efficiency of competing proof-of-work cryptocurrencies. Unpublished manuscript. |
|
Added by: Rucknium 2/23/22, 9:55 PM |
|
Klinec, D., & Matyas, V. 2020, Privacy-friendly monero transaction signing on a hardware wallet. Paper presented at ICT Systems Security and Privacy Protection. |
|
Added by: Rucknium 10/22/22, 7:45 PM |
|
koe. seraphis: a privacy-preserving transaction protocol abstraction (wip). |
|
Added by: Jack 3/8/23, 10:33 PM |
|
koe, Alonso, K. M., & Noether, S. (2020). Zero to monero: A technical guide to a private digital currency; for beginners, amateurs, and experts second ed. Second ed. |
|
Last edited by: Rucknium 3/3/23, 4:51 PM |
|
Kovalchuk, L., Oliynykov, R., Bespalov, Y., & Rodinko, M. (2022). Methods of ensuring privacy in a decentralized environment. In R. Oliynykov, O. Kuznetsov, O. Lemeshko & T. Radivilova (Eds), Information Security Technologies in the Decentralized Distributed Networks (pp. 1–32). Cham: Springer International Publishing. |
|
Added by: Rucknium 5/5/22, 10:29 PM |
|
Li, J. (2022). Extending succinct zero knowledge proofs for set membership to ring signatures. Unpublished masters thesis, EECS Department, University of California, Berkeley. |
|
Last edited by: Rucknium 7/1/22, 6:05 PM |
|
Li, W., Lin, Z., & Chen, Q. (2022). A hybrid design of linkable ring signature scheme with stealth addresses. Security and Communication Networks, 2022, |
|
Added by: Rucknium 2/24/22, 3:44 PM |
|
Li, Y., Yang, G., Susilo, W., Yu, Y., Au, M. H., & Liu, D. (2021). Traceable monero: Anonymous cryptocurrency with enhanced accountability. IEEE Transactions on Dependable and Secure Computing, 18(2), 679–691. |
|
Added by: Rucknium 6/30/22, 10:22 PM |
|
Li, Y., Weng, J., Li, M., Wu, W., Weng, J., & Liu, J.-N., et al. (2022). Zerocross: A sidechain-based privacy-preserving cross-chain solution for monero. Journal of Parallel and Distributed Computing, 169, 301–316. |
|
Added by: Rucknium 9/10/22, 7:54 PM |
|
Lin, H., & Wang, M. (2022). Repudiable ring signature: Stronger security and logarithmic-size. Computer Standards & Interfaces, 80, 103562. |
|
Added by: Rucknium 2/24/22, 6:04 PM |
|
Lin, D., Yan, J., Ba, N., Fu, Z., & Jiang, H. (2022). Survey of anonymity and tracking technology in monero. Journal of Computer Applications, 42(1). |
|
Added by: Rucknium 2/23/22, 5:01 PM |
|
Liu, Q., Liu, Z., Long, Y., Liu, Z., Sui, Z., & Sun, S., et al. 2019, Making monero hard-to-trace and more efficient. Paper presented at 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). |
|
Last edited by: Jack 1/20/23, 6:12 PM |
|
Liu, L., Liu, L., Li, B., Zhong, Y., Liao, S., & Zhang, L. (2022). Msccs: A monero-based security-enhanced covert communication system. Computer Networks, 205, 108759. |
|
Added by: Rucknium 2/23/22, 10:46 PM |
|
Liyanage, S. G. H. (2018). Monerosci: linkability and traceability analysis of monero blockchain. Unpublished Undergraduate thesis , University of Colombo. |
|
Added by: Rucknium 2/24/22, 9:29 PM |
|
Macheta, J., Noether, S., Noether, S., & Smooth, J. (2014). Counterfeiting via merkle tree exploits within virtual currencies employing the cryptonote protocol. Unpublished manuscript. |
|
Last edited by: Rucknium 2/22/22, 5:58 PM |
|
Macias, & Siabi, Y. E. Security analysis of monero’s peer-to-peer system. |
|
Last edited by: Jack 1/8/23, 2:45 PM |
|
Mackenzie, A., Noether, S., & Monero Core Team. (2015). Improving obfuscation in the cryptonote protocol. Unpublished manuscript. |
|
Added by: Rucknium 2/22/22, 5:33 PM |
|
Moreno-Sánchez, P., Blue, A., Le, D. V., Noether, S., Goodell, B., & Kate, A. 2020, Dlsag: Non-interactive refund transactions for interoperable payment channels in monero. Paper presented at Financial Cryptography and Data Security. |
|
Last edited by: Jack 1/18/23, 12:01 AM |
|
Möser, M. (2022). Cryptocurrency privacy in practice. Unpublished Ph.D. Dissertation, Princeton University. |
|
Added by: Rucknium 1/8/23, 3:54 AM |
|
Möser, M., Soska, K., Heilman, E., Lee, K., Heffan, H., & Srivastava, S., et al. (2018). An empirical analysis of traceability in the monero blockchain. Proceedings on Privacy Enhancing Technologies, 2018(3), 143–163. |
|
Added by: Rucknium 2/23/22, 4:14 PM |
|
Naik, A., Yeniaras, E., Hellstern, G., Prasad, G., & Vishwakarma, S. K. L. P. (2023). From portfolio optimization to quantum blockchain and security: A systematic review of quantum computing in finance. arXiv preprint arXiv:2307.01155, |
|
Last edited by: Jack 7/29/23, 3:07 AM |
|
Ni, W., Cheng, P., Chen, L., & Lin, X. (2021). When the recursive diversity anonymity meets the ring signature. In Proceedings of the 2021 International Conference on Management of Data (pp. 1359–1371). New York, NY, USA: Association for Computing Machinery. |
|
Added by: Rucknium 2/23/22, 3:57 PM |
|
Noether, S. (2018). Discrete logarithm equality across groups. Unpublished manuscript. |
|
Added by: Rucknium 2/22/22, 5:55 PM |
|
Noether, S., & Goodell, B. (2018). Dual linkable ring signatures. Unpublished manuscript. |
|
Added by: Rucknium 2/22/22, 5:48 PM |
|
Noether, S., & Goodell, B. (2017). An efficient implementation of monero subaddresses. Unpublished manuscript. |
|
Last edited by: Rucknium 2/24/22, 3:22 PM |
|
Noether, S., & Noether, S. (2014). Monero is not that mysterious. Unpublished manuscript. |
|
Added by: Rucknium 2/22/22, 5:29 PM |
|
Noether, S., Noether, S., & Mackenzie, A. (2014). A note on chain reactions in traceability in cryptonote 2.0. Unpublished manuscript. |
|
Last edited by: Rucknium 2/22/22, 5:19 PM |
|
Noether, S., Mackenzie, A., & Monero Core Team. (2016). Ring confidential transactions. Unpublished manuscript. |
|
Added by: Rucknium 2/22/22, 5:36 PM |
|
Noether, S. (2018). Sets of spent outputs. Unpublished manuscript. |
|
Added by: Rucknium 2/22/22, 5:45 PM |
|
Noether, S. Understanding ge fromfe frombytes vartime. |
|
Last edited by: Jack 3/28/23, 9:26 PM |
|
Otávio Chervinski, J., Kreutz, D., & Yu, J. 2021, Analysis of transaction flooding attacks against monero. Paper presented at 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). |
|
Last edited by: Rucknium 3/16/24, 1:00 PM |
|
Park, S., & Sealfon, A. 2019. It wasn't me! repudiability and unclaimability of ring signatures. [Cryptology ePrint Archive, Paper 2019/135]. |
|
Last edited by: endor 8/2/22, 1:38 PM |
|
Perera, M. N. S., Nakamura, T., Hashimoto, M., Yokoyama, H., Cheng, C.-M., & Sakurai, K. (2022). A survey on group signatures and ring signatures: Traceability vs. anonymity. Cryptography, 6(1). |
|
Added by: Rucknium 2/26/22, 10:36 PM |
|
Pitu, F., & Gaitan, N. C. 2023, July Survey of security, performance, and profitability of monero: A browser-based cryptocurrency. Paper presented at 2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME). |
|
Added by: Rucknium 1/6/24, 5:58 PM |
|
Purkovic, S., Mekic, E., Kuk, K., & Gostimirovic, L. (2021). Empirical analysis of silent mining operation in the monero system. Studies in Informatics and Control, 30(4), 99–108. |
|
Last edited by: Jack 1/20/23, 6:21 PM |
|
Rahalkar, C., & Virgaonkar, A. 2021. Summarizing and analyzing the privacy-preserving techniques in bitcoin and other cryptocurrencies. |
|
Last edited by: Rucknium 2/24/22, 10:15 PM |
|
Raikwar, M., Wu, S., & Gjosteen, K. 2023, Security model for privacy-preserving blockchain-based cryptocurrency systems. Paper presented at Network and System Security. |
|
Added by: Rucknium 1/6/24, 5:22 PM |
|
Renwick, R., & Gleasure, R. (2021). Those who control the code control the rules: How different perspectives of privacy are being written into the code of blockchain systems. Journal of Information Technology, 36(1), 16–38. |
|
Added by: Rucknium 3/9/22, 7:45 PM |
|
Ronge, V., Egger, C., Lai, R. W. F., Schröder, D., & Yin, H. H. F. (2021). Foundations of ring sampling. Proceedings on Privacy Enhancing Technologies, 2021(3), 265–288. |
|
Added by: Rucknium 2/23/22, 4:13 PM |
|
Rucknium, R. Fully specified estimation plan for optimal static parametric estimation of arbitrary distributions (ospead) public version. Monero Research Lab. |
|
Last edited by: Jack 1/20/23, 4:31 AM |
|
van Saberhagen, N. (2013). Cryptonote v 2.0. Unpublished manuscript. |
|
Last edited by: Rucknium 2/22/22, 5:20 PM |
|
Scheid, E. J., Küng, S., Franco, M., & Stiller, B. 2023, Opening pandora's box: An analysis of the usage of the data field in blockchains. Paper presented at 2023 Fifth International Conference on Blockchain Computing and Applications (BCCA). |
|
Last edited by: Rucknium 1/10/24, 4:59 PM |
|
Seguias, B. E. K. 2018. Monero’s building blocks part 1 of 10--prerequisites. |
|
Last edited by: Jack 1/18/23, 12:38 AM |
|
Seguias, B. E. K. 2018. Monero’s building blocks part 10 of 10--stealth addresses. |
|
Last edited by: Jack 1/18/23, 12:44 AM |
|
Seguias, B. E. K. 2018. Monero’s building blocks part 2 of 10--pointcheval & stern’s generic signature scheme. |
|
Last edited by: Jack 1/18/23, 12:39 AM |
|
Seguias, B. E. K. 2018. Monero’s building blocks part 3 of 10--introduction to ring signatures. |
|
Last edited by: Jack 1/18/23, 12:40 AM |
|
Seguias, B. E. K. 2018. Monero’s building blocks part 4 of 10--herranz & saez generic ring signature scheme [1]. |
|
Last edited by: Jack 1/18/23, 12:40 AM |
|
Seguias, B. E. K. 2018. Monero’s building blocks part 5 of 10--cryptonote’s linkable ring signature scheme. |
|
Last edited by: Jack 1/18/23, 12:41 AM |
|
Seguias, B. E. K. 2018. Monero’s building blocks part 6 of 10--linkable spontaneous anonymous group (lsag) signature scheme. |
|
Last edited by: Jack 1/18/23, 12:42 AM |
|
Seguias, B. E. K. 2018. Monero’s building blocks part 7 of 10--multilayered linkable spontaneous anonymous group (mlsag) signature scheme. |
|
Last edited by: Jack 1/18/23, 12:43 AM |
|