An Empirical Study of Two Bitcoin Artifacts Through Deep Learning
|
2022 |
Tindell, Richard |
Short Paper: What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network
|
2022 |
Grundmann, Matthias |
Achieving Almost All Blockchain Functionalities with Polylogarithmic Storage
|
2022 |
Hegde, Parikshit |
SoK: Blockchain Light Clients
|
2022 |
Chatzigiannis, Panagiotis |
Permissionless Consensus in the Resource Model
|
2022 |
Terner, Benjamin |
The Availability-Accountability Dilemma and Its Resolution via Accountability Gadgets
|
2022 |
Neu, Joachim |
Suborn Channels: Incentives Against Timelock Bribes
|
2022 |
Avarikioti, Zeta |
Analysis and Probing of Parallel Channels in the Lightning Network
|
2022 |
Biryukov, Alex |
SnarkPack: Practical SNARK Aggregation
|
2022 |
Gailly, Nicolas |
Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing
|
2022 |
Silde, Tjerand |
The Effect of False Positives: Why Fuzzy Message Detection Leads to Fuzzy Privacy Guarantees?
|
2022 |
Seres, István András |
Kicking-the-Bucket: Fast Privacy-Preserving Trading Using Buckets
|
2022 |
da Gama, Mariana Botelho |
Maximizing Extractable Value from Automated Market Makers
|
2022 |
Bartoletti, Massimo |
Short Paper: On the Claims of Weak Block Synchronization in Bitcoin
|
2022 |
Baek, Seungjin |
Three Attacks on Proof-of-Stake Ethereum
|
2022 |
Schwarz-Schilling, Caspar |
ABSNFT: Securitization and Repurchase Scheme for Non-Fungible Tokens Based on Game Theoretical Analysis
|
2022 |
Chen, Hongyin |
Zero Knowledge Proofs Towards Verifiable Decentralized AI Pipelines
|
2022 |
Singh, Nitin |
Differential Privacy in Constant Function Market Makers
|
2022 |
Chitra, Tarun |
Multi-party Updatable Delegated Private Set Intersection
|
2022 |
Abadi, Aydin |
Plumo: An Ultralight Blockchain Client
|
2022 |
Vesely, Psi |