Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit
|
2021 |
Qin, Kaihua |
PERIMETER: A Network-Layer Attack on the Anonymity of Cryptocurrencies
|
2021 |
Apostolaki, Maria |
Zero-Knowledge Proofs for Set Membership: Efficient, Succinct, Modular
|
2021 |
Benarroch, Daniel |
Timelocked Bribing
|
2021 |
Nadahalli, Tejaswi |
Improving the Efficiency of AES Protocols in Multi-Party Computation
|
2021 |
Durak, F. Betül |
The Complex Shape of Anonymity in Cryptocurrencies: Case Studies from a Systematic Approach
|
2021 |
Amarasinghe, Niluka |
Rabbit: Efficient Comparison for Secure Multi-Party Computation
|
2021 |
Makri, Eleftheria |
Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Multiparty Computation
|
2021 |
Eriguchi, Reo |
Speculative Dereferencing: Reviving Foreshadow
|
2021 |
Schwarzl, Martin |
SoK: Securing Email—A Stakeholder-Based Analysis
|
2021 |
Clark, Jeremy |
Generic Plaintext Equality and Inequality Proofs
|
2021 |
Blazy, Olivier |
BooLigero: Improved Sublinear Zero Knowledge Proofs for Boolean Circuits
|
2021 |
Gvili, Yaron |
The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts
|
2021 |
Torres, Christof Ferreira |
Shielded Computations in Smart Contracts Overcoming Forks
|
2021 |
Botta, Vincenzo |
Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask)
|
2021 |
Pakki, Jaswant |
A Formal Model of Algorand Smart Contracts
|
2021 |
Bartoletti, Massimo |
Cross-Layer Deanonymization Methods in the Lightning Protocol
|
2021 |
Romiti, Matteo |
An Empirical Analysis of Privacy in the Lightning Network
|
2021 |
Kappos, George |
Specfuscator: Evaluating Branch Removal as a Spectre Mitigation
|
2021 |
Schwarzl, Martin |
Sigforgery: Breaking and Fixing Data Authenticity in Sigfox
|
2021 |
Ferreira, Loíc |