[C = Conference] | [J = Journal] | [W = Workshop] | [M = Miscellaneous] |
[J : PETS] | Reputable List Curation from
Decentralized Voting (concurrent
version)
|
[C : Asiacrypt] | Quisquis: A New Design for
Anonymous Cryptocurrencies
|
[C : CCS] | Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updatable Structured Reference Strings |
[C : AFT] | SoK: Consensus in the Age of
Blockchains
|
[C : AFT] | PISA: Arbitration Outsourcing for
State Channels
|
[C : USENIX Security] | Tracing Transactions Across
Cryptocurrency Ledgers
|
[C : FC] | Why is a Ravencoin Like a
TokenDesk? An Exploration of Code Diversity in the Cryptocurrency
Landscape (short version) (slides)
|
[C : NDSS] | Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers |
[W : CBT] | Contour: A Practical System for Binary
Transparency
|
[C : Crypto] | Updatable and Universal Common
Reference Strings with Applications to zk-SNARKs
|
[C : USENIX Security] | An Empirical Analysis of Anonymity in Zcash |
[J : S&P] | Top Ten Obstacles along Distributed
Ledgers' Path to Adoption (slides)
|
[J : PETS] | Möbius: Trustless
Tumbling for Transaction Privacy
|
[W : BITCOIN] | Egalitarian Society or Benevolent Dictatorship? The State of
Cryptocurrency Governance
|
[W : BITCOIN] | Smart Contracts for Bribing Miners |
[W : CBT] | Who Am I? Secure Identity
Registration on Distributed Ledgers
|
[C : Asiacrypt] | Déjà Q
All Over Again: Tighter and Broader Reductions of q-Type Assumptions
|
[C : CCS] | Transparency Overlays and Applications
(slides)
|
[J : CACM] | A Fistful of Bitcoins: Characterizing
Payments Among Men with No Names
|
[C : NDSS] | Centrally Banked Cryptocurrencies
(slides)
|
[C : PKC] | A Profitable Sub-Prime Loan: Obtaining the
Advantages of Composite Order in Prime-Order Bilinear Groups
|
[W : BITCOIN] | Privacy-Enhancing Overlays in
Bitcoin (slides)
|
[C : CCS] | Algebraic MACs and Keyed-Verification Anonymous
Credentials
|
[J : TCAD] | Leveraging Gate-Level Properties to
Identify Hardware Timing Channels
|
[C : CSF] | Malleable Signatures: New Definitions and
Delegatable Anonymous Credentials
|
[C : Eurocrypt] | Key-Versatile Signatures and
Applications: RKA, KDM, and Joint Enc/Sig
|
[C : Eurocrypt] | Déjà Q: Using Dual Systems
to Revisit q-Type Assumptions
(slides)
|
[M : Thesis] | Flexible Models for Secure Systems (slides) |
[C : NDSS] | Botcoin: Monetizing Stolen Cycles
|
[C : CT-RSA] | Rethinking Verifiably Encrypted
Signatures: A Gap in Functionality and Potential Solutions
(slides)
|
[J : login] | A Fistful of Bitcoins: Characterizing
Payments Among Men with No Names
|
[C : IMC] | A Fistful of Bitcoins: Characterizing Payments
Among Men with No Names
(slides)
|
[C : DATE] | A Practical Testing Framework for
Isolating Hardware Timing Channels
|
[C : TCC] | Succinct Malleable NIZKs and an Application
to Compact Shuffles
(slides)
|
[C : PKC] | Verifiable Elections That Scale for Free
(slides)
|
[C : Eurocrypt] | Malleable Proof Systems and
Applications
(slides)
|
[C : USENIX Security] | The Phantom Tollbooth: Privacy-Preserving
Electronic Toll Collection in the Presence of Driver Collusion
(slides)
|
[W : WOOT] | Heat of the Moment: Characterizing the
Efficacy of Thermal Camera-Based Attacks
(slides)
|
[C : Asiacrypt] | Limitations on Transformations from
Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind
Signatures
(slides)
|
[C : USENIX Security] | ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash (slides) |
[M : Thesis] | An Extension of the Groth-Sahai Proof
System
|