An Empirical Analysis of Privacy in the Lightning Network
|
2021 |
Kappos, George |
Specfuscator: Evaluating Branch Removal as a Spectre Mitigation
|
2021 |
Schwarzl, Martin |
Sigforgery: Breaking and Fixing Data Authenticity in Sigfox
|
2021 |
Ferreira, Loíc |
Short Paper: Terrorist Fraud in Distance Bounding: Getting Around the Models
|
2021 |
Gerault, David |
Somewhere Statistically Binding Commitment Schemes with Applications
|
2021 |
Fauzi, Prastudy |
Another Look at Extraction and Randomization of Groth’s zk-SNARK
|
2021 |
Baghery, Karim |
Mining for Privacy: How to Bootstrap a Snarky Blockchain
|
2021 |
Kerber, Thomas |
The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts
|
2021 |
Torres, Christof Ferreira |
Shielded Computations in Smart Contracts Overcoming Forks
|
2021 |
Botta, Vincenzo |
Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask)
|
2021 |
Pakki, Jaswant |
A Formal Model of Algorand Smart Contracts
|
2021 |
Bartoletti, Massimo |
Cross-Layer Deanonymization Methods in the Lightning Protocol
|
2021 |
Romiti, Matteo |
Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit
|
2021 |
Qin, Kaihua |
PERIMETER: A Network-Layer Attack on the Anonymity of Cryptocurrencies
|
2021 |
Apostolaki, Maria |
Zero-Knowledge Proofs for Set Membership: Efficient, Succinct, Modular
|
2021 |
Benarroch, Daniel |
Timelocked Bribing
|
2021 |
Nadahalli, Tejaswi |
Improving the Efficiency of AES Protocols in Multi-Party Computation
|
2021 |
Durak, F. Betül |
The Complex Shape of Anonymity in Cryptocurrencies: Case Studies from a Systematic Approach
|
2021 |
Amarasinghe, Niluka |
Rabbit: Efficient Comparison for Secure Multi-Party Computation
|
2021 |
Makri, Eleftheria |
Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Multiparty Computation
|
2021 |
Eriguchi, Reo |