Breaking the Encryption Scheme of the Moscow Internet Voting System
|
2020 |
Gaudry, Pierrick |
Short Paper: XOR Arbiter PUFs Have Systematic Response Bias
|
2020 |
Wisiol, Nils |
Coded Merkl Tree: Solving Deata Availability Attacks in Blockchains
|
2020 |
Yu, Mingchao |
The Arwen Trading Protocols
|
2020 |
Heilman, Ethan |
SoK: A Classification Framework for Stablecoin Designs
|
2020 |
Moin, Amani |
Boomerang: Redundancy Improves Latency and Throughput in Payment-Channel Networks
|
2020 |
Bagaria, Vivek |
CERBERUS Channels: Incentivizing Watchtowers for Bitcoin
|
2020 |
Avarikioti, Zeta |
Zether: Towards Privacy in a Smart Contract World
|
2020 |
Bünz, Benedikt |
An Airdrop that Preserves Recipient Privacy
|
2020 |
Wahby, Riad S. |
Proof-of-Burn
|
2020 |
Karantias, Kostis |
What are the Actual Flaws in Important Smart Contracts (And How Can We Find Them) ?
|
2020 |
Groce, Alex |
Address Clustering Heuristics for Ethereum
|
2020 |
Victor, Friedhelm |
Leveraging Bitcoin Testnet for Bidirectional Botnet Command and Control Systems
|
2020 |
Franzoni, Federico |
SoK: Layer-Two Blockchain Protocols
|
2020 |
Gudgeon, Lewis |
How to Profit from Payments Channels
|
2020 |
Ersoy, Oguzhan |
Non-interactive Proofs of Proof-of-Work
|
2020 |
Kiayias, Aggelos |
Non-interactive Cryptographic Timestamping Based on Verifiable Delay Functions
|
2020 |
Landerreche, Esteban |
Open Market or Ghost Town? The Curious Case of OpenBazaar
|
2020 |
Arps, James E. |
Exploring the Monero Peer-to-Peer Network
|
2020 |
Cao, Tong |
Security Analysis on dBFT Protocol of NEO
|
2020 |
Wang, Qin |