Short Paper: On the Claims of Weak Block Synchronization in Bitcoin
|
2022 |
Baek, Seungjin |
Three Attacks on Proof-of-Stake Ethereum
|
2022 |
Schwarz-Schilling, Caspar |
ABSNFT: Securitization and Repurchase Scheme for Non-Fungible Tokens Based on Game Theoretical Analysis
|
2022 |
Chen, Hongyin |
Zero Knowledge Proofs Towards Verifiable Decentralized AI Pipelines
|
2022 |
Singh, Nitin |
Differential Privacy in Constant Function Market Makers
|
2022 |
Chitra, Tarun |
Multi-party Updatable Delegated Private Set Intersection
|
2022 |
Abadi, Aydin |
Plumo: An Ultralight Blockchain Client
|
2022 |
Vesely, Psi |
Sliding Window Challenge Process for Congestion Detection
|
2022 |
Lotem, Ayelet |
Towards Overcoming the Undercutting Problem
|
2022 |
Gong, Tiantian |
Hide & Seek: Privacy-Preserving Rebalancing on Payment Channel Networks
|
2022 |
Avarikioti, Zeta |
Jolteon and Ditto: Network-Adaptive Efficient Consensus with Asynchronous Fallback
|
2022 |
Gelashvili, Rati |
On Interactive Oracle Proofs for Boolean R1CS Statements
|
2022 |
Cascudo, Ignacio |
MPCCache: Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge
|
2022 |
Nguyen, Duong Tung |
An Empirical Study of Two Bitcoin Artifacts Through Deep Learning
|
2022 |
Tindell, Richard |
Short Paper: What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network
|
2022 |
Grundmann, Matthias |
Achieving Almost All Blockchain Functionalities with Polylogarithmic Storage
|
2022 |
Hegde, Parikshit |
SoK: Blockchain Light Clients
|
2022 |
Chatzigiannis, Panagiotis |
Permissionless Consensus in the Resource Model
|
2022 |
Terner, Benjamin |
The Availability-Accountability Dilemma and Its Resolution via Accountability Gadgets
|
2022 |
Neu, Joachim |
Suborn Channels: Incentives Against Timelock Bribes
|
2022 |
Avarikioti, Zeta |