-
1
-
-
84987662160
-
-
http://koinify.com
-
-
-
-
2
-
-
84987661886
-
-
Amazon ec2 pricing. http://aws.amazon.com/ec2/pricing
-
-
-
-
3
-
-
84987673049
-
-
Augur. http://www.augur.net
-
-
-
-
4
-
-
84987617760
-
-
bitoinj. https://bitcoinj.github.io
-
-
-
-
6
-
-
84987610274
-
-
Skuchain. http://www.skuchain.com
-
-
-
-
8
-
-
84987661889
-
Complete characterization of fairness in secure two-party computation of boolean functions
-
G. Asharov, A. Beimel, N. Makriyannis, and E. Omri. Complete characterization of fairness in secure two-party computation of boolean functions. In TCC, 2015
-
(2015)
TCC
-
-
Asharov, G.1
Beimel, A.2
Makriyannis, N.3
Omri, E.4
-
9
-
-
84892153753
-
Provision of public goods: Fully implementing the core through private contributions
-
M. Bagnoli and B. L. Lipman. Provision of public goods: Fully implementing the core through private contributions. The Review of Economic Studies, 1989
-
(1989)
The Review of Economic Studies
-
-
Bagnoli, M.1
Lipman, B.L.2
-
10
-
-
84894047613
-
-
R. Beaulieu, D. Shors, J. Smith, S. Treatman-Clark, B. Weeks, and L. Wingers. The simon and speck families of lightweight block ciphers. http://ia.cr/2013/404
-
The Simon and Speck Families of Lightweight Block Ciphers
-
-
Beaulieu, R.1
Shors, D.2
Smith, J.3
Treatman-Clark, S.4
Weeks, B.5
Wingers, L.6
-
11
-
-
84910677439
-
Zerocash: Decentralized anonymous payments from bitcoin
-
E. Ben-Sasson, A. Chiesa, C. Garman, M. Green, I. Miers, E. Tromer, and M. Virza. Zerocash: Decentralized anonymous payments from Bitcoin. In S and P, 2014
-
(2014)
S and P
-
-
Ben-Sasson, E.1
Chiesa, A.2
Garman, C.3
Green, M.4
Miers, I.5
Tromer, E.6
Virza, M.7
-
12
-
-
84889685593
-
Snarks for C: Verifying program executions succinctly and in zero knowledge
-
E. Ben-Sasson, A. Chiesa, D. Genkin, E. Tromer, and M. Virza. Snarks for C: verifying program executions succinctly and in zero knowledge. In CRYPTO, 2013
-
(2013)
CRYPTO
-
-
Ben-Sasson, E.1
Chiesa, A.2
Genkin, D.3
Tromer, E.4
Virza, M.5
-
13
-
-
84945197063
-
Secure sampling of public parameters for succinct zero knowledge proofs
-
E. Ben-Sasson, A. Chiesa, M. Green, E. Tromer, and M. Virza. Secure sampling of public parameters for succinct zero knowledge proofs. In S and P, 2015
-
(2015)
S and P
-
-
Ben-Sasson, E.1
Chiesa, A.2
Green, M.3
Tromer, E.4
Virza, M.5
-
15
-
-
85075922906
-
Succinct noninteractive zero knowledge for a von neumann architecture
-
E. Ben-Sasson, A. Chiesa, E. Tromer, and M. Virza. Succinct noninteractive zero knowledge for a von neumann architecture. In Security, 2014
-
(2014)
Security
-
-
Ben-Sasson, E.1
Chiesa, A.2
Tromer, E.3
Virza, M.4
-
17
-
-
84945178660
-
How to use bitcoin to design fair protocols
-
I. Bentov and R. Kumaresan. How to Use Bitcoin to Design Fair Protocols. In CRYPTO, 2014
-
(2014)
CRYPTO
-
-
Bentov, I.1
Kumaresan, R.2
-
18
-
-
84879803522
-
Recursive composition and bootstrapping for snarks and proof-carrying data
-
N. Bitansky, R. Canetti, A. Chiesa, and E. Tromer. Recursive composition and bootstrapping for snarks and proof-carrying data. In STOC, 2013
-
(2013)
STOC
-
-
Bitansky, N.1
Canetti, R.2
Chiesa, A.3
Tromer, E.4
-
19
-
-
80052383468
-
Sharemind: A framework for fast privacy-preserving computations
-
D. Bogdanov, S. Laur, and J. Willemson. Sharemind: A Framework for Fast Privacy-Preserving Computations. In ESORICS. 2008
-
(2008)
ESORICS
-
-
Bogdanov, D.1
Laur, S.2
Willemson, J.3
-
20
-
-
84945176880
-
Research perspectives and challenges for bitcoin and cryptocurrencies
-
J. Bonneau, A. Miller, J. Clark, A. Narayanan, J. A. Kroll, and E. W. Felten. Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. In S and P, 2015
-
(2015)
S and P
-
-
Bonneau, J.1
Miller, A.2
Clark, J.3
Narayanan, A.4
Kroll, J.A.5
Felten, E.W.6
-
21
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. In FOCS, 2001
-
(2001)
FOCS
-
-
Canetti, R.1
-
22
-
-
4944266340
-
Universally composable signature, certification, and authentication
-
R. Canetti. Universally composable signature, certification, and authentication. In CSF, 2004
-
(2004)
CSF
-
-
Canetti, R.1
-
23
-
-
44449096427
-
Universally composable security with global setup
-
R. Canetti, Y. Dodis, R. Pass, and S. Walfish. Universally composable security with global setup. In TCC. 2007
-
(2007)
TCC
-
-
Canetti, R.1
Dodis, Y.2
Pass, R.3
Walfish, S.4
-
24
-
-
0012610677
-
Limits on the security of coin flips when half the processors are faulty
-
R. Cleve. Limits on the security of coin flips when half the processors are faulty. In STOC, 1986
-
(1986)
STOC
-
-
Cleve, R.1
-
25
-
-
84945198483
-
Geppetto: Versatile verifiable computation
-
C. Costello, C. Fournet, J. Howell, M. Kohlweiss, B. Kreuter, M. Naehrig, B. Parno, and S. Zahur. Geppetto: Versatile verifiable computation. In S &P, 2015
-
(2015)
S &P
-
-
Costello, C.1
Fournet, C.2
Howell, J.3
Kohlweiss, M.4
Kreuter, B.5
Naehrig, M.6
Parno, B.7
Zahur, S.8
-
26
-
-
84945188476
-
Pinocchio Coin: Building Zerocoin from a succinct pairing-based proof system
-
G. Danezis, C. Fournet, M. Kohlweiss, and B. Parno. Pinocchio Coin: building Zerocoin from a succinct pairing-based proof system. In PETShop, 2013
-
(2013)
PETShop
-
-
Danezis, G.1
Fournet, C.2
Kohlweiss, M.3
Parno, B.4
-
27
-
-
85003833669
-
Bitcoin transaction malleability and mtgox
-
Springer
-
C. Decker and R. Wattenhofer. Bitcoin transaction malleability and mtgox. In ESORICS. Springer, 2014
-
(2014)
ESORICS
-
-
Decker, C.1
Wattenhofer, R.2
-
29
-
-
84910683812
-
Majority is not enough: Bitcoin mining is vulnerable
-
I. Eyal and E. G. Sirer. Majority is not enough: Bitcoin mining is vulnerable. In FC, 2014
-
(2014)
FC
-
-
Eyal, I.1
Sirer, E.G.2
-
31
-
-
85076296923
-
Zø: An optimizing distributing zeroknowledge compiler
-
M. Fredrikson and B. Livshits. Zø: An optimizing distributing zeroknowledge compiler. In USENIX Security, 2014
-
(2014)
USENIX Security
-
-
Fredrikson, M.1
Livshits, B.2
-
32
-
-
84978170294
-
The bitcoin backbone protocol: Analysis and applications
-
J. A. Garay, A. Kiayias, and N. Leonardos. The bitcoin backbone protocol: Analysis and applications. In Eurocrypt, 2015
-
(2015)
Eurocrypt
-
-
Garay, J.A.1
Kiayias, A.2
Leonardos, N.3
-
35
-
-
84987662189
-
The ring of gyges: Using smart contracts for crime
-
A. Juels, A. Kosba, and E. Shi. The ring of gyges: Using smart contracts for crime. Manuscript, 2015
-
(2015)
Manuscript
-
-
Juels, A.1
Kosba, A.2
Shi, E.3
-
38
-
-
84987678998
-
-
A. Kosba, Z. Zhao, A. Miller, H. Chan, C. Papamanthou, R. Pass, abhi shelat, and E. Shi. How to use snarks in universally composable protocols. https://eprint.iacr.org/2015/1093, 2015
-
(2015)
How to Use Snarks in Universally Composable Protocols
-
-
Kosba, A.1
Zhao, Z.2
Miller, A.3
Chan, H.4
Papamanthou, C.5
Pass, R.6
Shelat, A.7
Shi, E.8
-
39
-
-
84893284162
-
PCF: A portable circuit format for scalable two-party secure computation
-
B. Kreuter, B. Mood, A. Shelat, and K. Butler. PCF: A portable circuit format for scalable two-party secure computation. In Security, 2013
-
(2013)
Security
-
-
Kreuter, B.1
Mood, B.2
Shelat, A.3
Butler, K.4
-
40
-
-
84910657489
-
How to use bitcoin to incentivize correct computations
-
R. Kumaresan and I. Bentov. How to Use Bitcoin to Incentivize Correct Computations. In CCS, 2014
-
(2014)
CCS
-
-
Kumaresan, R.1
Bentov, I.2
-
41
-
-
84945182982
-
ObliVM: A programming framework for secure computation
-
C. Liu, X. S. Wang, K. Nayak, Y. Huang, and E. Shi. ObliVM: A programming framework for secure computation. In S and P, 2015
-
(2015)
S and P
-
-
Liu, C.1
Wang, X.S.2
Nayak, K.3
Huang, Y.4
Shi, E.5
-
42
-
-
84890039053
-
A fistful of bitcoins: Characterizing payments among men with no names
-
S. Meiklejohn, M. Pomarole, G. Jordan, K. Levchenko, D. McCoy, G. M. Voelker, and S. Savage. A fistful of bitcoins: characterizing payments among men with no names. In IMC, 2013
-
(2013)
IMC
-
-
Meiklejohn, S.1
Pomarole, M.2
Jordan, G.3
Levchenko, K.4
McCoy, D.5
Voelker, G.M.6
Savage, S.7
-
44
-
-
84893481888
-
Authenticated data structures, generically
-
A. Miller, M. Hicks, J. Katz, and E. Shi. Authenticated data structures, generically. In POPL, 2014
-
(2014)
POPL
-
-
Miller, A.1
Hicks, M.2
Katz, J.3
Shi, E.4
-
47
-
-
84918575866
-
Chaskey: An efficient mac algorithm for 32-bit microcontrollers
-
Springer
-
N. Mouha, B. Mennink, A. Van Herrewege, D. Watanabe, B. Preneel, and I. Verbauwhede. Chaskey: An efficient mac algorithm for 32-bit microcontrollers. In Selected Areas in Cryptography-SAC 2014, pages 306-323. Springer, 2014
-
(2014)
Selected Areas in Cryptography-SAC 2014
, pp. 306-323
-
-
Mouha, N.1
Mennink, B.2
Van Herrewege, A.3
Watanabe, D.4
Preneel, B.5
Verbauwhede, I.6
-
50
-
-
84987961140
-
Micropayments for peer-to-peer currencies
-
R. Pass and abhi shelat. Micropayments for peer-to-peer currencies. In CCS, 2015
-
(2015)
CCS
-
-
Pass, R.1
Shelat, A.2
-
51
-
-
84914124819
-
Wysteria: A programming language for generic, mixed-mode multiparty computations
-
A. Rastogi, M. A. Hammer, and M. Hicks. Wysteria: A programming language for generic, mixed-mode multiparty computations. In S and P, 2014
-
(2014)
S and P
-
-
Rastogi, A.1
Hammer, M.A.2
Hicks, M.3
-
52
-
-
84900818871
-
Quantitative analysis of the full bitcoin transaction graph
-
D. Ron and A. Shamir. Quantitative Analysis of the Full Bitcoin Transaction Graph. In FC, 2013
-
(2013)
FC
-
-
Ron, D.1
Shamir, A.2
-
53
-
-
53249142256
-
Formalizing and securing relationships on public networks
-
N. Szabo. Formalizing and securing relationships on public networks. First Monday, 1997
-
(1997)
First Monday
-
-
Szabo, N.1
-
55
-
-
84980096808
-
Counterspeculation, auctions, and competitive sealed tenders
-
W. Vickrey. Counterspeculation, auctions, and competitive sealed tenders. Journal of finance, 1961
-
(1961)
Journal of Finance
-
-
Vickrey, W.1
-
56
-
-
84964736398
-
Efficient RAM and control flow in verifiable outsourced computation
-
R. S. Wahby, S. T. V. Setty, Z. Ren, A. J. Blumberg, and M. Walfish. Efficient RAM and control flow in verifiable outsourced computation. In NDSS, 2015
-
(2015)
NDSS
-
-
Wahby, R.S.1
Setty, S.T.V.2
Ren, Z.3
Blumberg, A.J.4
Walfish, M.5
-
58
-
-
59449105095
-
Using replication and partitioning to build secure distributed systems
-
L. Zheng, S. Chong, A. C. Myers, and S. Zdancewic. Using replication and partitioning to build secure distributed systems. In S and P, 2003
-
(2003)
S and P
-
-
Zheng, L.1
Chong, S.2
Myers, A.C.3
Zdancewic, S.4
|