MoneroResearch.info

MoneroResearch.info hosts a collection of research papers relevant to improving Monero, powered by the WIKINDX open source software.

Anyone can browse the papers. To create new entries, edit existing one, and add annotations, you must be a registered user. To register as a user, message Rucknium on Matrix at Rucknium:monero.social . At this time there is no guarantee of stability or security of this website.

Search word(s):

Hint
 Include attachments

Recent additions or edits (WIKINDX Master Bibliography)

Li, J. (2022). Extending succinct zero knowledge proofs for set membership to ring signatures. Unpublished masters thesis, EECS Department, University of California, Berkeley.
Last edited by: Rucknium 2022-07-01 18:05
Budish, E. (2022). The economic limits of bitcoin and anonymous, decentralized trust on the blockchain. Unpublished manuscript.
Added by: Rucknium 2022-07-01 16:19
Alupotha, J., & Boyen, X. 2022. Practical uc-secure zero-knowledge smart contracts. [Cryptology ePrint Archive, Paper 2022/670].
Last edited by: Rucknium 2022-07-01 16:11
Cao, T., Yu, J., Decouchant, J., Luo, X., & Verissimo, P. 2020, Exploring the monero peer-to-peer network. Paper presented at Financial Cryptography and Data Security.
Added by: Rucknium 2022-07-01 16:03
Yu, J., Au, M. H. A., & Esteves-Verissimo, P. 2019, June Re-thinking untraceability in the cryptonote-style blockchain. Paper presented at 2019 IEEE 32nd Computer Security Foundations Symposium (CSF).
Added by: Rucknium 2022-07-01 15:50
Deuber, D., Ronge, V., & Rueckert, C. (2022). Sok: assumptions underlying cryptocurrency deanonymizations. Proceedings on Privacy Enhancing Technologies, 3,
Added by: Rucknium 2022-06-30 23:10
Li, Y., Yang, G., Susilo, W., Yu, Y., Au, M. H., & Liu, D. (2021). Traceable monero: Anonymous cryptocurrency with enhanced accountability. IEEE Transactions on Dependable and Secure Computing, 18(2), 679–691.
Added by: Rucknium 2022-06-30 22:22
Sui, Z., Liu, J. K., Yu, J., & Qin, X. (2022). Monet: A fast payment channel network for scriptless cryptocurrency monero. Cryptology ePrint Archive,
Added by: Jack 2022-06-23 04:11
Seres, I. A., Pejó, B., & Burcsi, P. 2022, May 2–6 The effect of false positives: why fuzzy message detection leads to fuzzy privacy guarantees?. Unpublished paper presented at Financial Cryptography and Data Security 2022.
Added by: Rucknium 2022-05-05 22:38
Zhang, Y., & Xu, H. (2022). Accountable monero system with privacy protection. Security and Communication Networks, 2022, 7746341.
Added by: Rucknium 2022-05-05 22:33
Kovalchuk, L., Oliynykov, R., Bespalov, Y., & Rodinko, M. (2022). Methods of ensuring privacy in a decentralized environment. In R. Oliynykov, O. Kuznetsov, O. Lemeshko & T. Radivilova (Eds), Information Security Technologies in the Decentralized Distributed Networks (pp. 1–32). Cham: Springer International Publishing.
Added by: Rucknium 2022-05-05 22:29
Liang, M., Karantaidou, I., Baldimtsi, F., Gordon, D. S., & Varia, M. (2022). (∈, δ)-indistinguishable mixing for cryptocurrencies. Proceedings on Privacy Enhancing Technologies, 2022(1), 49–74.
Last edited by: Rucknium 2022-05-05 22:24
Xu, M., Zhang, Y., & Zhong, S. 2022. Towards fair multiparty computation in scriptless distributed ledger systems. [Cryptology ePrint Archive, Report 2022/176].
Last edited by: Rucknium 2022-05-05 22:11
Corradini, F., Mostarda, L., & Scala, E. 2022, Zeromt: Multi-transfer protocol for enabling privacy in off-chain payments. Paper presented at Advanced Information Networking and Applications.
Added by: Rucknium 2022-05-05 21:43
Gailly, N., Maller, M., & Nitulescu, A. 2022, May 2–6 Snarkpack: practical snark aggregation. Unpublished paper presented at Financial Cryptography and Data Security 2022.
Added by: Rucknium 2022-05-05 21:04
Gong, T., Minaei, M., Sun, W., & Kate, A. 2022, May 2–6 Towards overcoming the undercutting problem. Unpublished paper presented at Financial Cryptography and Data Security 2022.
Added by: Rucknium 2022-05-05 21:01
Zabka, P., Foerster, K.-T., Decker, C., & Schmid, S. 2022, May 2–6 A centrality analysis of the lightning network. Unpublished paper presented at Financial Cryptography and Data Security 2022.
Added by: Rucknium 2022-05-05 20:36
Biryukov, A., Naumenko, G., & Tikhomirov, S. 2022, May 2–6 Analysis and probing of parallel channels in the lightning network. Unpublished paper presented at Financial Cryptography and Data Security 2022.
Last edited by: Rucknium 2022-05-05 20:31
Avarikioti, Z., Pietrzak, K., Salem, I., Schmid, S., Tiwari, S., & Yeo, M. 2022, May 2–6 Hide & seek: privacy-preserving rebalancing on payment channel networks. Unpublished paper presented at Financial Cryptography and Data Security 2022.
Added by: Rucknium 2022-05-05 20:31
Eagen, L. Li. E. 2022. Bulletproofs++. [Cryptology ePrint Archive, Report 2022/510].
Last edited by: Rucknium 2022-05-05 14:03
Mondschein, C. F. (2020). Browser-based crypto mining and eu data protection and privacy law: A critical assessment and possible opportunities for the monetisation of web services. The Journal of The British Blockchain Association,
Last edited by: Rucknium 2022-05-03 12:53
Rueckert, C. (2019). Cryptocurrencies and fundamental rights. Journal of Cybersecurity, 5(1).
Added by: Rucknium 2022-05-03 12:49
Kearney, J. J., & Perez-Delgado, C. A. (2021). Vulnerability of blockchain technologies to quantum attacks. Array, 10, 100065.
Added by: Rucknium 2022-05-03 03:13
Aumayr, L., Thyagarajan, S. A., Malavolta, G., Monero-Sánchez, P., & Maffei, M. 2021. Sleepy channels: Bitcoin-compatible bi-directional payment channels without watchtowers. [Cryptology ePrint Archive, Report 2021/1445].
Last edited by: Rucknium 2022-04-20 15:56
Borggren, N., & Yao, L. (2020). Correlations of multi-input monero transactions. arXiv preprint arXiv:2001.04827,
Last edited by: Rucknium 2022-04-20 15:36
Arnosti, N., & Weinberg, M. S. 2018, Bitcoin: A Natural Oligopoly. Paper presented at 10th Innovations in Theoretical Computer Science Conference (ITCS 2019).
Last edited by: endor 2022-04-19 23:11
Huberman, G., Leshno, J. D., & Moallemi, C. (2021). Monopoly without a Monopolist: An Economic Analysis of the Bitcoin Payment System. The Review of Economic Studies, 88(6), 3011–3040.
Last edited by: endor 2022-04-19 23:07
Carlsten, M., Kalodner, H., Weinberg, S., & Narayanan, A. 2016, On the instability of bitcoin without the block reward.
Added by: endor 2022-04-17 23:28
Bonneau, J. 2019, Hostile blockchain takeovers (short paper). Paper presented at Financial Cryptography and Data Security.
Last edited by: endor 2022-04-17 22:47
Chepurnoy, A., Kharin, V., & Meshkov, D. 2019, A systematic approach to cryptocurrency fees. Paper presented at Financial Cryptography and Data Security.
Added by: endor 2022-04-17 22:41
Chen, J., Cheng, Y., Xu, Z., & Cao, Y. 2021, Evolutionary equilibrium analysis for decision on block size in blockchain systems. Paper presented at Combinatorial Optimization and Applications.
Added by: endor 2022-04-17 22:41
Fantazzini, D., & Kolodin, N. (2020). Does the hashrate affect the bitcoin price?. Journal of Risk and Financial Management, 13(11).
Added by: endor 2022-04-17 21:15
Akbari, E., Zhao, W., Yang, S., & Luo, X. 2020, The impact of block parameters on the throughput and security of blockchains. Paper presented at Proceedings of the 2020 The 2nd International Conference on Blockchain Technology.
Added by: endor 2022-04-17 21:05
Garay, J., Kiayias, A., & Leonardos, N. 2015, The bitcoin backbone protocol: Analysis and applications. Paper presented at Advances in Cryptology - EUROCRYPT 2015.
Added by: endor 2022-04-17 21:02
Ghesmati, S., Fdhila, W., & Weippl, E. 2022. User-perceived privacy in blockchain. [Cryptology ePrint Archive, Report 2022/287].
Added by: endor 2022-04-17 20:59
Taylor, M. B. 2013, Bitcoin and the age of bespoke silicon. Paper presented at Proceedings of the 2013 International Conference on Compilers, Architectures and Synthesis for Embedded Systems.
Added by: endor 2022-04-17 20:23
O'Dwyer, K. J., & Malone, D. 2014, June Bitcoin mining and its energy footprint. Paper presented at 25th IET Irish Signals Systems Conference 2014 and 2014 China-Ireland International Conference on Information and Communications Technologies (ISSC 2014/CIICT 2014).
Added by: endor 2022-04-17 20:19
Gervais, A., Karame, G. O., W"ust, K., Glykantzis, V., Ritzdorf, H., & Capkun, S. 2016, On the security and performance of proof of work blockchains. Paper presented at Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security.
Last edited by: endor 2022-04-17 19:53
Karame, G. O., Androulaki, E., Roeschlin, M., Gervais, A., & vCapkun, S. (2015). Misbehavior in bitcoin: A study of double-spending and accountability. ACM Trans. Inf. Syst. Secur. 18(1).
Last edited by: endor 2022-04-17 19:51
Magaki, I., Khazraee, M., Gutierrez, L. V., & Taylor, M. B. 2016, June Asic clouds: Specializing the datacenter. Paper presented at 2016 ACM/IEEE 43rd Annual International Symposium on Computer Architecture (ISCA).
Added by: endor 2022-04-17 19:40
Nikzad, A., & Mehregan, M. (2022). Techno-economic, and environmental evaluations of a novel cogeneration system based on solar energy and cryptocurrency mining. Solar Energy, 232, 409–420.
Added by: endor 2022-04-17 19:34
Vranken, H. (2017). Sustainability of bitcoin and blockchains. Current Opinion in Environmental Sustainability, 28, 1–9.
Added by: endor 2022-04-17 19:32
Vries, A. D. (2020). Bitcoin’s energy consumption is underestimated: A market dynamics approach. Energy Research & Social Science, 70, 101721.
Added by: endor 2022-04-17 19:32
Li, J., Li, N., Peng, J., Cui, H., & Wu, Z. (2019). Energy consumption of cryptocurrency mining: A study of electricity consumption in mining cryptocurrencies. Energy, 168, 160–168.
Added by: endor 2022-04-17 19:30
Goorha, P. Principles of natural resource economics for bitcoin. The Journal of The British Blockchain Association, 4(August).
Last edited by: endor 2022-04-14 20:14
Li, S.-N., Yang, Z., & Tessone, C. J. 2020, Proof-of-work cryptocurrency mining: A statistical approach to fairness. Paper presented at 2020 IEEE/CIC International Conference on Communications in China (ICCC Workshops).
Added by: endor 2022-04-03 18:53
Borggren, N., Kim, H.-Y., Yao, L., & Koplik, G. (2020). Simulated blockchains for machine learning traceability and transaction values in the monero network. arXiv preprint arXiv:2001.03937,
Last edited by: Jack 2022-04-01 18:46
Tevador. Tevador/randomx: Proof of work algorithm based on random code execution.
Added by: Jack 2022-04-01 18:41
Fanti, G., Venkatakrishnan, S. B., Bakshi, S., Denby, B., Bhargava, S., & Miller, A., et al. (2018). Dandelion++ lightweight cryptocurrency networking with formal anonymity guarantees. Proceedings of the ACM on Measurement and Analysis of Computing Systems, 2(2), 1–35.
Added by: Jack 2022-04-01 18:41
Goodell, B., Noether, S., & Blue, A. (2019). Concise linkable ring signatures and forgery against adversarial keys.
Added by: Jack 2022-04-01 18:41
WIKINDX 6.5.0 | Total resources: 100 | Username: -- | Bibliography: WIKINDX Master Bibliography | Style: American Psychological Association (APA)