| Babb, J., Goodell, B., Parker, L., Salazar, R., Slaughter, F., & Szramowski, L. (2025). FROSTLASS: Flexible Ring-Oriented Schnorr-like Thresholdized Linkably Anonymous Signature Scheme. Unpublished manuscript. |
|
| Added by: Rucknium Last edited by: Rucknium 3/18/25, 6:49 PM |
|
| Baseri, Y., Hafid, A., Shahsavari, Y., Makrakis, D., & Khodaiemehr, H. (2025). Blockchain Security Risk Assessment in Quantum Era, Migration Strategies and Proactive Defense. |
|
| Added by: Rucknium Last edited by: Rucknium 2/27/25, 4:26 PM |
|
| Bassa, A. (2025). Soundness Proof for an Interactive Protocol for the Discrete Logarithm Relation. Unpublished manuscript. |
|
| Added by: Rucknium 4/2/25, 6:11 PM |
|
| Bassa, A., & Sepanski, B. (2025). Security Assessment for the Helios–Selene Curve Cycle. Unpublished manuscript. |
|
| Added by: Rucknium Last edited by: Rucknium 12/9/25, 9:59 PM |
|
| Budish, E. (2025). Trust at Scale: The Economic Limits of Cryptocurrencies and Blockchains. The Quarterly Journal of Economics, 140(1), 1–62. |
|
| Added by: Rucknium Last edited by: Rucknium 7/30/25, 12:12 AM |
|
| Chiang, J. H.-Y., Damgård, I., Duro, W. R., Engan, S., Kolby, S., & Scholl, P. (2025). Post-Quantum Threshold Ring Signature Applications from VOLE-in-the-Head. [Cryptology {ePrint} Archive, Paper 2025/113]. |
|
| Added by: Rucknium Last edited by: Rucknium 2/27/25, 5:15 PM |
|
| Duan, J., Wang, W., Wang, L., & Gu, L. (2025). Transitioning RingCT Accounts: From Classical to Post-Quantum Security. IEEE Internet of Things Journal, 12(2), 2090–2105. |
|
| Added by: Rucknium 4/16/25, 3:10 PM |
|
| Duan, J., Wang, W., Wang, L., Gu, L., & Zhu, L. (2025). CRCT: Compact Ring Confidential Transactions Based on Sum Arguments. IEEE Transactions on Information Forensics and Security. |
|
| Added by: Jack Last edited by: Jack 11/3/25, 7:46 PM |
|
| Gao, Y., Piškorec, M., Zhang, Y., Vallarano, N., & Tessone, C. J. (2025). Charting the Uncharted: The Landscape of Monero Peer-to-Peer Network. |
|
| Added by: Rucknium Last edited by: Rucknium 4/29/25, 9:18 PM |
|
| Gao, Y., Zhang, Y., Piškorec, M., & Tessone, C. J. (2025). Monero Peer-to-peer Network Topology Analysis. |
|
| Added by: Rucknium Last edited by: Rucknium 6/3/25, 5:59 PM |
|
| Goodell, B., Salazar, R., & Slaughter, F. (2025). Uniformly Most Powerful Tests for Ad Hoc Transactions in Monero. [Cryptology {ePrint} Archive, Paper 2025/221]. |
|
| Added by: Rucknium Last edited by: Rucknium 2/27/25, 4:32 PM |
|
| Goodell, B., Salazar, R., Slaughter, F., & Szramowski, L. (2025). A Further Review of the DL Gadget Of Interest. Unpublished manuscript. |
|
| Added by: Rucknium 5/27/25, 10:17 PM |
|
| Kopyciok, Y., Schmid, S., & Victor, F. (2025). Friend or Foe? Identifying Anomalous Peers in Moneros P2P Network. |
|
| Added by: Rucknium 10/29/25, 4:36 PM |
|
| Kopyciok, Y., Victor, F., & Schmid, S. (2025). Moneros Decentralized P2P Exchanges: Functionality, Adoption, and Privacy Risks. |
|
| Added by: Rucknium Last edited by: Rucknium 6/3/25, 4:15 PM |
|
| Lee, J., Choi, G., Han, J., & Park, J. (2025). Advanced Monero wallet forensics: Demystifying off-chain artifacts to trace privacy-preserving cryptocurrency transactions. Forensic Science International: Digital Investigation, 54, 301988. |
|
| Added by: Jack Last edited by: Jack 11/6/25, 4:29 PM |
|
| Lee, S., & Kim, H. (2025). Inside Qubic's Selfish Mining Campaign on Monero: Evidence, Tactics, and Limits. |
|
| Added by: Rucknium Last edited by: Rucknium 12/9/25, 10:39 PM |
|
| Mikic, M., Srbakoski, M., & Praska, S. (2025). Post-Quantum Stealth Address Protocols. |
|
| Added by: Rucknium Last edited by: Rucknium 2/27/25, 4:20 PM |
|
| Nick, J., Eagen, L., & Linus, R. (2025). Shielded CSV: Private and Efficient Client-Side Validation. [Cryptology {ePrint} Archive, Paper 2025/068]. |
|
| Added by: Rucknium Last edited by: Rucknium 2/27/25, 4:24 PM |
|
| Papadoulis, G. (2025). Privacy and auditability in decentralized payment systems. |
|
| Added by: Jack Last edited by: Jack 1/17/25, 5:28 PM |
|
| RostamkolaeiMotlagh, S., Pahl, C., Barzegar, H. R., & El Ioini, N. (2025). A Technology Review of Zero Knowledge Proof Techniques. A Technology Review of Zero Knowledge Proof Techniques. |
|
| Added by: Jack Last edited by: Rucknium 12/9/25, 10:29 PM |
|
| Salazar, R., Slaughter, F., & Szramowski, L. (2025). Veridise Logarithmic Derivative Review. Unpublished manuscript. |
|
| Added by: Rucknium 5/27/25, 10:11 PM |
|
| Thakore, V., & Vijayakumaran, S. (2025). MProve-Nova: A Privacy-Preserving Proof of Reserves Protocol for Monero. Proceedings on Privacy Enhancing Technologies, 2025(2), 582–606. |
|
| Added by: Rucknium 4/16/25, 3:19 PM |
|
| Tong, X., Zhou, J., Cao, Z., Dong, X., & Choo, K.-K. R. (2025). A Ring Signature With Aggregation for Ensuring Privacy in Blockchain Transactions. IEEE Internet of Things Journal, 12(12), 21001–21015. |
|
| Added by: Jack Last edited by: Jack 11/4/25, 3:47 PM |
|
| Venturi, A., Jerico-Yoldi, I., Zola, F., & Orduna, R. (2025). ART: A Graph-based Framework for Investigating Illicit Activity in Monero via Address-Ring-Transaction Structures. |
|
| Added by: Rucknium Last edited by: Rucknium 12/9/25, 10:30 PM |
|
| Wang, N., Wang, Q., Liu, D., Esgin, M. F., & Abuadbba, A. (2025). BulletCT: Towards More Scalable Ring Confidential Transactions With Transparent Setup. BulletCT: Towards More Scalable Ring Confidential Transactions With Transparent Setup. |
|
| Added by: Jack Last edited by: Jack 11/4/25, 4:01 PM |
|
| Yang, X., Xu, L., & Zhu, L. (2025). De-anonymizing Monero: A Maximum Weighted Matching-Based Approach. IEEE Transactions on Information Forensics and Security. |
|
| Added by: Jack Last edited by: Jack 4/15/25, 2:25 PM |
|
| Ziegler, M. H., Nowostawski, M., & Katt, B. (2025). A Systematic Literature Review of Information Privacy in Blockchain Systems. Journal of Cybersecurity and Privacy, 5(3), 65. |
|
| Added by: Jack Last edited by: Jack 11/4/25, 4:09 PM |
|