Open letter to fincen’s proposed amendment of the bsa.October 24 2020. FinCEN. |
|
Last edited by: Jack 2023-01-20 03:41 |
|
Usa v. lichtenstein et al.February 7 2022. US Dept. of Justice. |
|
Last edited by: Jack 2023-01-20 03:41 |
|
Akbari, E., Zhao, W., Yang, S., & Luo, X. 2020, The impact of block parameters on the throughput and security of blockchains. Paper presented at Proceedings of the 2020 The 2nd International Conference on Blockchain Technology. |
|
Added by: endor 2022-04-17 21:05 |
|
Alupotha, J., & Boyen, X. 2022. Practical uc-secure zero-knowledge smart contracts. [Cryptology ePrint Archive, Paper 2022/670]. |
|
Last edited by: Rucknium 2022-07-01 16:11 |
|
Arnosti, N., & Weinberg, M. S. 2018, Bitcoin: A Natural Oligopoly. Paper presented at 10th Innovations in Theoretical Computer Science Conference (ITCS 2019). |
|
Last edited by: endor 2022-04-19 23:11 |
|
Aslam, S., Tošić, A., & Mrissa, M. (2021). Secure and privacy-aware blockchain design: Requirements, challenges and solutions. Journal of Cybersecurity and Privacy, 1(1), 164–194. |
|
Added by: Rucknium 2022-02-23 15:58 |
|
Aumayr, L., Thyagarajan, S. A., Malavolta, G., Monero-Sánchez, P., & Maffei, M. 2021. Sleepy channels: Bitcoin-compatible bi-directional payment channels without watchtowers. [Cryptology ePrint Archive, Report 2021/1445]. |
|
Last edited by: Rucknium 2022-04-20 15:56 |
|
Avarikioti, Z., Pietrzak, K., Salem, I., Schmid, S., Tiwari, S., & Yeo, M. 2022, May 2–6 Hide & seek: privacy-preserving rebalancing on payment channel networks. Unpublished paper presented at Financial Cryptography and Data Security 2022. |
|
Added by: Rucknium 2022-05-05 20:31 |
|
Bhambhwani, S., Delikouras, S., Korniotis, G. M., & others. 2019. Do fundamentals drive cryptocurrency prices?. |
|
Last edited by: Jack 2023-01-20 18:00 |
|
Biryukov, A., Naumenko, G., & Tikhomirov, S. 2022, May 2–6 Analysis and probing of parallel channels in the lightning network. Unpublished paper presented at Financial Cryptography and Data Security 2022. |
|
Last edited by: Rucknium 2022-05-05 20:31 |
|
Block, A. R., Garreta, A., Katz, J., Thaler, J., Tiwari, P. R., & Zajac, M. (2023). Fiat-shamir security of fri and related snarks. Cryptology ePrint Archive, |
|
Last edited by: Jack 2023-07-29 03:05 |
|
Bonneau, J. 2019, Hostile blockchain takeovers (short paper). Paper presented at Financial Cryptography and Data Security. |
|
Last edited by: endor 2022-04-17 22:47 |
|
Broniatowski, M. (2021). Minimum divergence estimators, maximum likelihood and the generalized bootstrap. Entropy, 23(2), 185. |
|
Last edited by: Rucknium 2022-03-12 04:40 |
|
Butler, S. 2021, Cyber 9/11 will not take place: A user perspective of bitcoin and cryptocurrencies from underground and dark net forums. Paper presented at Socio-Technical Aspects in Security and Trust. |
|
Added by: Rucknium 2022-10-12 16:26 |
|
Campanelli, M., Hall-Andersen, M., & Kamp, S. H. 2022. Curve trees: Practical and transparent zero-knowledge accumulators. [Cryptology ePrint Archive, Paper 2022/756]. |
|
Last edited by: Rucknium 2022-12-29 16:41 |
|
Carlsten, M., Kalodner, H., Weinberg, S., & Narayanan, A. 2016, On the instability of bitcoin without the block reward. |
|
Added by: endor 2022-04-17 23:28 |
|
Chen, J., Cheng, Y., Xu, Z., & Cao, Y. 2021, Evolutionary equilibrium analysis for decision on block size in blockchain systems. Paper presented at Combinatorial Optimization and Applications. |
|
Added by: endor 2022-04-17 22:41 |
|
Chepurnoy, A., Kharin, V., & Meshkov, D. 2019, A systematic approach to cryptocurrency fees. Paper presented at Financial Cryptography and Data Security. |
|
Added by: endor 2022-04-17 22:41 |
|
Corradini, F., Mostarda, L., & Scala, E. 2022, Zeromt: Multi-transfer protocol for enabling privacy in off-chain payments. Paper presented at Advanced Information Networking and Applications. |
|
Added by: Rucknium 2022-05-05 21:43 |
|
Deng, C., You, L., Tang, X., Hu, G., & Gao, S. (2022). Cuproof: Range proof with constant size. Entropy, 24(3), 334. |
|
Last edited by: Jack 2023-03-28 21:58 |
|
Fantazzini, D., & Kolodin, N. (2020). Does the hashrate affect the bitcoin price?. Journal of Risk and Financial Management, 13(11). |
|
Added by: endor 2022-04-17 21:15 |
|
Fanti, G., Venkatakrishnan, S. B., Bakshi, S., Denby, B., Bhargava, S., & Miller, A., et al. (2018). Dandelion++: Lightweight cryptocurrency networking with formal anonymity guarantees. Proc. ACM Meas. Anal. Comput. Syst. 2(2). |
|
Added by: Rucknium 2022-10-22 20:53 |
|
Garay, J., Kiayias, A., & Leonardos, N. 2015, The bitcoin backbone protocol: Analysis and applications. Paper presented at Advances in Cryptology - EUROCRYPT 2015. |
|
Added by: endor 2022-04-17 21:02 |
|
Gervais, A., Karame, G. O., W"ust, K., Glykantzis, V., Ritzdorf, H., & Capkun, S. 2016, On the security and performance of proof of work blockchains. Paper presented at Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. |
|
Last edited by: endor 2022-04-17 19:53 |
|
Gligoroski, D. (2023). A transformation for lifting discrete logarithm based cryptography to post-quantum cryptography. Cryptology ePrint Archive, |
|
Last edited by: Jack 2023-03-06 22:32 |
|
Goorha, P. Principles of natural resource economics for bitcoin. The Journal of The British Blockchain Association, 4(August). |
|
Last edited by: endor 2022-04-14 20:14 |
|
Grunspan, C., & Perez-Marco, R. (2018). Double spend races. Int. J. Theor. Appl. Finance, 21(8), 1850053. |
|
Last edited by: Rucknium 2023-08-23 16:52 |
|
Grunspan, C., & Perez-Marco, R. 2022. Ping-pong swaps. arXiv. |
|
Added by: Rucknium 2022-12-02 16:36 |
|
Hou, C., Zhou, M., Ji, Y., Daian, P., Tram`er, F., & Fanti, G., et al. 2021, SquirRL: Automating attack analysis on blockchain incentive mechanisms with deep reinforcement learning. Paper presented at Proceedings 2021 Network and Distributed System Security Symposium. |
|
Added by: Rucknium 2022-10-22 20:50 |
|
Huberman, G., Leshno, J. D., & Moallemi, C. (2021). Monopoly without a Monopolist: An Economic Analysis of the Bitcoin Payment System. The Review of Economic Studies, 88(6), 3011–3040. |
|
Last edited by: endor 2022-04-19 23:07 |
|
Järvinen, S. (2022). Tax evasion with untraceable cryptocurrencies in OECD countries as a target of regulation. Unpublished masters thesis, Aalto University. School of Business. |
|
Added by: Rucknium 2022-10-22 17:17 |
|
Karame, G. O., Androulaki, E., Roeschlin, M., Gervais, A., & vCapkun, S. (2015). Misbehavior in bitcoin: A study of double-spending and accountability. ACM Trans. Inf. Syst. Secur. 18(1). |
|
Last edited by: endor 2022-04-17 19:51 |
|
Kearney, J. J., & Perez-Delgado, C. A. (2021). Vulnerability of blockchain technologies to quantum attacks. Array, 10, 100065. |
|
Added by: Rucknium 2022-05-03 03:13 |
|
Koerhuis, W., Kechadi, T., & Le-Khac, N.-A. (2020). Forensic analysis of privacy-oriented cryptocurrencies. Forensic Science International: Digital Investigation, 33, 200891. |
|
Added by: Rucknium 2022-09-10 19:55 |
|
Leevik, A., Beliaev, V., Stasenko, B., Davydov, V., & Bezzateev, S. 2020, Review and analysis of the classical and post-quantum ring signature algorithms. Paper presented at 2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). |
|
Last edited by: Jack 2023-01-20 18:12 |
|
Li, J., Li, N., Peng, J., Cui, H., & Wu, Z. (2019). Energy consumption of cryptocurrency mining: A study of electricity consumption in mining cryptocurrencies. Energy, 168, 160–168. |
|
Added by: endor 2022-04-17 19:30 |
|
Li, S.-N., Yang, Z., & Tessone, C. J. 2020, Proof-of-work cryptocurrency mining: A statistical approach to fairness. Paper presented at 2020 IEEE/CIC International Conference on Communications in China (ICCC Workshops). |
|
Added by: endor 2022-04-03 18:53 |
|
Liang, M., Karantaidou, I., Baldimtsi, F., Gordon, D. S., & Varia, M. (2022). (∈, δ)-indistinguishable mixing for cryptocurrencies. Proceedings on Privacy Enhancing Technologies, 2022(1), 49–74. |
|
Last edited by: Rucknium 2022-05-05 22:24 |
|
Liao, Y.-C., Tso, R., Liu, Z.-Y., & Tseng, Y.-F. 2022, Blockchain-based confidential payment system with controllable regulation. Paper presented at Information Security Practice and Experience. |
|
Added by: Rucknium 2022-12-02 16:05 |
|
Macchetti, M. 2023. A novel related nonce attack for ecdsa. [Cryptology ePrint Archive, Paper 2023/305]. |
|
Last edited by: Jack 2023-03-06 22:35 |
|
Magaki, I., Khazraee, M., Gutierrez, L. V., & Taylor, M. B. 2016, June Asic clouds: Specializing the datacenter. Paper presented at 2016 ACM/IEEE 43rd Annual International Symposium on Computer Architecture (ISCA). |
|
Added by: endor 2022-04-17 19:40 |
|
McCloskey, D. N. (2016). Fungibility. In The New Palgrave Dictionary of Economics (pp. 1–1). London: Palgrave Macmillan UK. |
|
Last edited by: Rucknium 2022-03-09 21:31 |
|
Meier, J. (2022). Diophantine satisfiability arguments for private blockchains. Unpublished masters thesis, ETH Zurich, Zurich. |
|
Added by: Rucknium 2022-10-22 19:40 |
|
Miller, A., Kosba, A., Katz, J., & Shi, E. 2015, Nonoutsourceable scratch-off puzzles to discourage bitcoin mining coalitions. Paper presented at Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. |
|
Added by: Rucknium 2022-02-23 22:08 |
|
Mondschein, C. F. (2020). Browser-based crypto mining and eu data protection and privacy law: A critical assessment and possible opportunities for the monetisation of web services. The Journal of The British Blockchain Association, |
|
Last edited by: Rucknium 2022-05-03 12:53 |
|
Nakamoto, S. (2008). Bitcoin: a peer-to-peer electronic cash system. Unpublished manuscript. |
|
Last edited by: theadmin 2022-02-23 00:13 |
|
Nikzad, A., & Mehregan, M. (2022). Techno-economic, and environmental evaluations of a novel cogeneration system based on solar energy and cryptocurrency mining. Solar Energy, 232, 409–420. |
|
Added by: endor 2022-04-17 19:34 |
|
O'Dwyer, K. J., & Malone, D. 2014, June Bitcoin mining and its energy footprint. Paper presented at 25th IET Irish Signals Systems Conference 2014 and 2014 China-Ireland International Conference on Information and Communications Technologies (ISSC 2014/CIICT 2014). |
|
Added by: endor 2022-04-17 20:19 |
|
Pu, S., Thyagarajan, S. A., D"ottling, N., & Hanzlik, L. (2023). Post quantum fuzzy stealth signatures and applications. Cryptology ePrint Archive, |
|
Last edited by: Jack 2023-07-29 02:59 |
|
Quesnelle, J. 2017. On the linkability of zcash transactions. arXiv. |
|
Last edited by: Rucknium 2022-08-25 00:25 |
|
Rinberg, R., & Agarwal, N. 2022. Privacy when everyone is watching: An sok on anonymity on the blockchain. [Cryptology ePrint Archive, Paper 2022/985]. |
|
Added by: Rucknium 2022-10-22 17:21 |
|
Rosenfeld, M. 2014. Analysis of hashrate-based double spending. |
|
Last edited by: Rucknium 2023-08-23 16:48 |
|
Rueckert, C. (2019). Cryptocurrencies and fundamental rights. Journal of Cybersecurity, 5(1). |
|
Added by: Rucknium 2022-05-03 12:49 |
|
Sarier, N. D. (2022). Privacy preserving biometric authentication on the blockchain for smart healthcare. Pervasive and Mobile Computing, 86, 101683. |
|
Added by: Rucknium 2022-09-10 19:55 |
|
Scala, E., & Mostarda, L. 2023, Range proofs with constant size and trustless setup. Paper presented at Advanced Information Networking and Applications: Proceedings of the 37th International Conference on Advanced Information Networking and Applications (AINA-2023), Volume 3. |
|
Last edited by: Jack 2023-03-29 18:12 |
|
Taylor, M. B. 2013, Bitcoin and the age of bespoke silicon. Paper presented at Proceedings of the 2013 International Conference on Compilers, Architectures and Synthesis for Embedded Systems. |
|
Added by: endor 2022-04-17 20:23 |
|
Teng, D., Yao, Y., Wang, Y., Zhou, L., & Huang, C. 2022, An sm2-based traceable ring signature scheme for smart grid privacy protection. Paper presented at Wireless Algorithms, Systems, and Applications. |
|
Added by: Rucknium 2022-12-02 16:03 |
|
Vranken, H. (2017). Sustainability of bitcoin and blockchains. Current Opinion in Environmental Sustainability, 28, 1–9. |
|
Added by: endor 2022-04-17 19:32 |
|
Vries, A. D. (2020). Bitcoin’s energy consumption is underestimated: A market dynamics approach. Energy Research & Social Science, 70, 101721. |
|
Added by: endor 2022-04-17 19:32 |
|
Wahrst"atter, A., Solomon, M., DiFrancesco, B., Buterin, V., & Svetinovic, D. (2023). Basesap: Modular stealth address protocol for programmable blockchains. arXiv preprint arXiv:2306.14272, |
|
Last edited by: Jack 2023-07-29 03:09 |
|
Wang, K., Liu, M., Wang, J., Wu, M., & Zhao, F. (2022). Bbarhs: Blockchain-based anonymous ride-hailing scheme for autonomous taxi network. Security and Communication Networks, 2022, 1–13. |
|
Added by: Rucknium 2022-09-10 19:57 |
|
Wang, J., Cheng, J., Yuan, Y., Li, H., & Sheng, V. S. 2022, A survey on privacy protection of cross-chain. Paper presented at Advances in Artificial Intelligence and Security. |
|
Added by: Rucknium 2022-09-10 20:13 |
|
Zhaolu, T., Wan, Z., & Wang, H. 2022. Division of regulatory power: Collaborative regulation for privacy-preserving blockchains. [Cryptology ePrint Archive, Paper 2022/1634]. |
|
Added by: Rucknium 2022-12-02 16:10 |
|