Linked e-resources

Details

Tokenomics
Maximizing Extractable Value from Automated Market Makers
Kicking-the-Bucket: Fast Privacy-Preserving Trading Using Buckets
Speculative Multipliers on DeFi: Quantifying On-Chain Leverage Risks
MPC (mostly)
Explainable Arguments
MPCCache: Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge
Multi-party Updatable Delegated Private Set Intersection
Privacy
The Effect of False Positives: Why Fuzzy Message Detection Leads to Fuzzy Privacy Guarantees?
Differential Privacy in Constant Function Market Makers
Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing
ZKP
SnarkPack: Practical SNARK Aggregation
On Interactive Oracle Proofs for Boolean R1CS Statements
Zero Knowledge Proofs towards Verifiable Decentralized AI
Old-School Consensus
Be Aware of Your Leaders
Jolteon and Ditto: Network-Adaptive Efficient Consensus with Asynchronous Fallback
Quick Order Fairness
Mostly Payment Networks
Analysis and Probing of Parallel Channels in the Lightning Network
Hide & Seek: Privacy-Preserving Rebalancing on Payment Channel Networks
Short Paper: A Centrality Analysis of the Lightning Network
Resurrecting Address Clustering in Bitcoin
Incentives
ABSNFT: Securitization and Repurchase Scheme for Non-Fungible Tokens Based on Game Theoretical Analysis
Decentralization Conscious Players And System Reliability
Towards Overcoming the Undercutting Problem
Arbitrage attack: Miners of the world, unite!
Suborn Channels: Incentives Against Timelock Bribes
Sliding Window Challenge Process for Congestion Detection
Short Paper: On Game-Theoretically-Fair Leader Election
Not Proof of Work
The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets
Three Attacks on Proof-of-Stake Ethereum
Permissionless Consensus in the Resource Model
Performance
Plumo: An Ultralight Blockchain Client
SoK: Blockchain Light Clients
Achieving Almost All Blockchain Functionalities with Polylogarithmic Storage
Measurements
Short Paper: On the Claims of Weak Block Synchronization in Bitcoin
India's "Aadhaar" Biometric ID: Structure, Security, and Vulnerabilities
Short Paper: What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network
An empirical study of two Bitcoin artifacts through deep learning.

Browse Subjects

Show more subjects...

Statistics

from
to
Export