These are collections of papers by other researchers on topics I find interesting:
![]() | This bibliography concentrates on peer-reviewed papers published at academic conferences in the areas of security, cryptography and distributed systems. A few unpublished tech reports are included selectively. | |
-
2015
Misbehavior in Bitcoin: A Study of Double-Spending and Accountability
G. O. Karame, E. Androulaki, M. Roeschlin, A. Gervais, S. Capkun
TISSEC, 18(1), 2015Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges
G. Dagher, B. Bünz, J. Bonneau, J. Clark, D. Boneh
CCS 2015Liar, Liar, Coins on Fire! — Penalizing Equivocation By Loss of Bitcoins
T. Ruffing, A. Kate, D. Schroeder
CCS 2015How to Use Bitcoin to Play Decentralized Poker
R. Kumaresan, T. Moran, I. Bentov
CCS 2015Micropayments for Decentralized Currencies
R. Pass, a. shelat
CCS 2015Traitor Deterring Schemes: Using Bitcoin as Collateral for Digital Content
A. Kiayias, Q. Tang
CCS 2015Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions
A. Miller, A. Kosba, E. Shi, J. Katz
CCS 2015Tampering with the Delivery of Blocks and Transactions in Bitcoin
A. Gervais, H. Ritzdorf, G. O. Karame, S. Capkun
CCS 2015Making Bitcoin Exchanges Transparent
C. Decker, J. Guthrie, J. Seidel and R. Wattenhofer
ESORICS 2015PoW-Based Distributed Cryptography with no Trusted Setup
M. Andrychowicz, S. Dziembowski
CRYPTO 2015Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem
K. Soska, N. Christin
USENIX Security 2015Eclipse Attacks on Bitcoin's Peer-to-Peer Network
E. Heilman, A. Kendler, A. Zohar, S. Goldberg
USENIX Security 2015Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications
A. Miller, R. Jansen
CSET 2015An empirical study of Namecoin and lessons for decentralized namespace design
H. Kalodner, M. Carlsten, P. Ellenbogen, J. Bonneau, and A. Narayanan
WEIS 2015Bitcoin and Second-generation Cryptocurrencies
J. Bonneau, A. Miller, J. Clark, A. Narayanan, J. Kroll, and E.W. Felten
IEEE SP (Oakland) 2015Bitcoin over Tor isn't a Good Idea
A. Biryukov and I. Pustogarov
IEEE SP (Oakland) 2015The Bitcoin Backbone Protocol: Analysis and Applications
J. Garay, A. Kiayias and N. Leonardos
EUROCRYPT 2015A First Look at the Usability of Bitcoin Key Management
S. Eskandari, D, Barrera, E. Stobert, and J. Clark
USEC 2015There's No Free Lunch, Even Using Bitcoin: Tracking the Popularity and Profits of Virtual Currency Scams
M. Vasek and T. Moore
Financial Cryptography 2015Hierarchical deterministic Bitcoin wallets that tolerate key leakage
G. Gutoski and D. Stebila
Financial Cryptography 2015Secure High-Rate Transaction Processing in Bitcoin
Y. Sompolinsky and A. Zohar
Financial Cryptography 2015Inclusive Block Chain Protocols
Y. Lewenberg, Y. Sompolinsky and A. Zohar
Financial Cryptography 2015BITCOIN 2015
(Entire Program)
2014
On the Privacy Provisions of Bloom Filters in Lightweight Bitcoin Clients
A. Gervais, G.O. Karame, D. Gruber and S. Capkun
ACSAC 2014Sybil-Resistant Mixing for Bitcoin
G. Bissias, A.P. Ozisik, B.N. Levine, and M. Liberatore
WPES 2014How to Use Bitcoin to Incentivize Correct Computations
R. Kumaresan and I. Bentov
CCS 2014Deanonymisation of clients in Bitcoin P2P network
A. Biryukov, D. Khovratovich and I. Pustogarov
CCS 2014VerSum: Verifiable Computations over Large Public Logs
J. van del Hooff, M. F. Kaashoek and N. Zeldovich
CCS 2014Modeling Bitcoin Contracts by Timed Automata
M. Andrychowicz, S. Dziembowski, D. Malinowski and L. Mazurek
FORMATS 2014CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin
T. Ruffing, P. Moreno-Sanchez, and A. Kate
ESORICS 2014Bitcoin Transaction Malleability and MtGox
C. Decker, and R. Wattenhofer
ESORICS 2014BlueWallet: The Secure Bitcoin Wallet
T. Bamert, C. Decker, R. Wattenhofer and S. Welten
STM 2014How to Use Bitcoin to Design Fair Protocols
I. Bentov and R. Kumaresan
CRYPTO 2014Better in Practice than in Theory: Lessons from the Rise of Bitcoin
J. Bonneau and A. Narayanan
HotSec 2014 (Speakers)From Onions to Shallots: Rewarding Tor Relays with TEARS
R. Jansen, A. Miller, P. Syverson and B. Ford
HotPETS 2014A TorPath to TorCoin: Proof-of-Bandwidth Altcoins for Compensating Relays
M. Ghosh, M. Richardson, B. Ford and R. Jansen
HotPETS 2014On Decentralizing Prediction Markets and Order Books
J. Clark, J. Bonneau, E.W. Felten, J.A. Kroll, A. Miller, and A. Narayanan
WEIS 2014Competition in the Crypto-Currency Market
N. Gandal and H. Halaburda
WEIS 2014Is Bitcoin a Decentralized Currency?
A. Gervais, G.O. Karame, S. Capkun and V. Capkun
IEEE S&P Magazine 12(3) 2014Anonymous Byzantine Consensus from Moderately-Hard Puzzles: A Model for Bitcoin
A. Miller and J.J. LaViola
Tech Report 2014Secure Multiparty Computations on Bitcoin
M. Andrychowicz, S. Dziembowski, D. Malinowski, and L. Mazurek
IEEE SSP (Oakland) 2014Zerocash: Decentralized Anonymous Payments from Bitcoin
E. Ben-Sasson, A. Chiesa, C. Garman, M. Green, I. Miers, E. Tromer, and M. Virza
IEEE SSP (Oakland) 2014PermaCoin: Repurposing Bitcoin Work for Data Preservation
A. Miller, A. Juels, E. Shi, B. Parno, and J. Katz
IEEE SSP (Oakland) 2014Botcoin: Monetizing Stolen Cycles
D.Y. Huang, H. Dharmdasani, S. Meiklejohn, V. Dave, C. Grier, D. McCoy, S. Savage, N. Weaver, A.C. Snoeren and K. Levchenko
NDSS 2014Decentralized Anonymous Credentials
C. Garman, M. Green, and I. Miers
NDSS 2014Majority is not Enough: Bitcoin Mining is Vulnerable
I. Eyal and E.G. Sirer
Financial Cryptography 2014BitIodine: Extracting Intelligence from the Bitcoin Network
M. Spagnuolo, F. Maggi and S. Zanero
Financial Cryptography 2014Mixcoin: Anonymity for Bitcoin with accountable mixes
J. Bonneau, A. Narayanan, A. Miller, J. Clark, J.A. Kroll and E.W. Felten
Financial Cryptography 2014An Analysis of Anonymity in Bitcoin Using P2P Network Traffic
P. Koshy, D. Koshy and P. McDaniel
Financial Cryptography 2014Elliptic Curve Cryptography in Practice
J. Bos, J.A. Halderman, N. Heninger, J. Moore, M. Naehrig and E. Wustrow
Financial Cryptography 2014Bitcoin and Cryptocurrency Research Conference
Entire Program
CITP, Princeton, 2014BITCOIN 2014
(Entire Program)
2013
A Fistful of Bitcoins: Characterizing Payments Among Men with No Names
S. Meiklejohn, M. Pomarole, G. Jordan, K. Levchenko, D. McCoy, G.M. Voelker, and S. Savage
IMC 2013Have a Snack, Pay with Bitcoins
T. Bamert, C. Decker, L. Elsen, R. Wattenhofer and S. Welten
P2P 2013Information Propagation in the Bitcoin Network
C. Decker and R. Wattenhofer
P2P 2013The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries
J. Kroll, I. Davey, and E. Felten
WEIS 2013Pinocchio Coin: Building Zerocoin from a Succinct Pairing-based Proof System
G. Danezis, C. Fournet, M. Kohlweiss, and B. Parno
PETShop 2013Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace
N. Christin
WWW 2013Zerocoin: Anonymous Distributed e-Cash from Bitcoin
I. Miers, C. Garman, M. Green, and A. Rubin
IEEE SSP (Oakland) 2013Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk
T. Moore and N. Christin
Financial Cryptography 2013Evaluating User Privacy in Bitcoin
E. Androulaki, G. Karame, M. Roeschlin, T. Scherer and S. Capkun
Financial Cryptography 2013Quantitative Analysis of the Full Bitcoin Transaction Graph
D. Ron and A. Shamir
Financial Cryptography 2013
2012 and before
Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin
G. O. Karame, E. Androulaki, and S. Capkun
CCS 2012Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by the Bitcoin Currency
J. Becker, D. Breuker, T. Heide, J. Holler, H. P. Rauer, and R. Bohme
WEIS 2012Bitter to Better — How to Make Bitcoin a Better Currency
S. Barber, X. Boyen, E. Shi, and E. Uzun
Financial Cryptography 2012CommitCoin: Carbon Dating Commitments with Bitcoin
J. Clark and A. Essex
Financial Cryptography 2012On Bitcoin and Red Balloons
M. Babaioff, S. Dobzinski, S. Oren, and A. Zohar
SIGecon Exchanges, 10(3), 2011An Analysis of Anonymity in the Bitcoin System
F. Reid and M. Harrigan
PASSAT 2011Bitcoin: A Peer-to-Peer Electronic Cash System
S. Nakamoto
Tech Report, 2009
![]() |
SSL/TLS and HTTPS Bibliography (2013–) In 2013, we published a paper at Oakland that systemized 100+ research papers in the area of SSL/TLS, HTTPS, and its certificate trust model. The papers in this collection appeared after (or concurrent to) our study. | |
No Attack Necessary: The Surprising Dynamics of SSL Trust Relationships
B. Amann, R. Sommer, M. Vallentin, and S. Hall
ACSAC 2013Analysis of the HTTPS Certificate Ecosystem
Z. Durumeric, J. Kasten, M. Bailey, and J.A. Halderman
IMC 2013Truncating TLS Connections to Violate Beliefs in Web Applications
B. Smyth and A. Pironti
WOOT 2013On the Security of the TLS Protocol: A Systematic Analysis
H. Krawczyk, K. G. Paterson, and H. Wee
CRYPTO 2013On the Security of RC4 in TLS
N. AlFardan, D. J. Bernstein, K. G. Paterson, B. Poettering, and J.C.N. Schuldt
USENIX Security 2013Security Economics and Value-Chain Governance of HTTPS Communications
A. Arnbak, N. van Eijk, H. Asghari, and M. Van Eeten
WEIS 2013Trust Darknet: Control and Compromise in the Internet's Certificate Authority Model
S.B. Roosa and S. Schultze
IEEE Internet Computing, 17(3), 2013S-links: Why distributed security policy requires secure introduction
J. Bonneau
W2SP 2013Implementing TLS with Veriļ¬ed Cryptographic Security
K. Bhargavan, C. Fournet, M. Kohlweiss, A. Pironti, and P.Y. Strub
IEEE SP (Oakland) 2013Lucky Thirteen: Breaking the TLS and DTLS record protocols
N. AlFardan and K. G. Paterson.
IEEE SP (Oakland) 2013SSL and HTTPS: Revisiting Past Challenges and Evaluating Certificate Trust Model Enhancements
J. Clark and P.C. van Oorschot
IEEE SP (Oakland) 2013Here's My Cert, So Trust Me, Maybe? Understanding TLS Errors on the Web
D. Akhawe, B. Amann, M. Vallentin, and R. Sommer
WWW 2013Transparent Key Infrastructure (TKI): A Proposal for a Public-Key Validation
T. Hyun-Jin Kim, L.S. Huang, A. Perrig, C. Jackson, and V. Gligor
WWW 2013CAge: Taming Certificate Authorities by Inferring Restricted Scopes
J. Kasten, E. Wustrow and J. A. Halderman
Financial Cryptography 2013
![]() |
||
A Practical Coercion Resistant Voting Scheme Revisited
R. Araujo and J. Traore
VoteID 2013Caveat Coercitor: Coercion-Evidence in Electronic Voting
G.S. Grewal, M.D. Ryan, S. Bursuc, and P.Y.A. Ryan
IEEE SSP (Oakland) 2013Cobra: Toward Concurrent Ballot Authorization for Internet Voting
A. Essex, J. Clark, and U. Hengartner
EVT/WOTE 2012Achieving Meaningful Efficiency in Coercion-Resistant, Verifiable Internet Voting
O. Spycher, R. Koenig, R. Haenni, and M. Schlapfer
EVOTE 2012Practical Remote End-to-End Voting Scheme
X. Yi and E. Okamoto
EGOVIS 2011Efficient Vote Authorization in Coercion-Resistant Internet Voting
M. Schlapfer, R. Haenni, R. Koenig, and O. Spycher
Vote-ID 2011Veriļ¬able Remote Voting with Large Scale Coercion Resistance
M. Raykova and D. Wagner
Tech Report, 2011Study, Analysis, and Implementation of a Remote Electronic Voting System
M. Stennier
Thesis, 2011Mental Voting Booths
J. Dossogne and F. Lafitte
NordSec 2011Selections: Internet Voting with Over-the-Shoulder Coercion-Resistance
J. Clark and U. Hengartner
Financial Cryptography 2011A New Approach Towards Coercion-Resistant Remote E-Voting in Linear Time
O. Spycher, R. Koenig, R. Haenni, and M. Schlapfer
Financial Cryptography 2011Preventing Board Flooding Attacks in Coercion-Resistant Electronic Voting Schemes
R. Koenig, R. Haenni, and S. Fischli
Information Security Conference (Sec) 2011Towards Practical and Secure Coercion-Resistant Electronic Elections
R. Araujo, N. B. Rajeb, R. Robbana, J. Traore, and S. Youssfi
CANS 2010Coercion-Resistant Hybrid Voting Systems
O. Spycher, R. Haenni, and E. Dubuis
EVOTE 2010Remote Electronic Voting with Revocable Anonymity
M. Smart and E. Ritter
Information Systems Security (ICISS) 2009Masked Ballot Voting for Receipt-Free Online Elections
R. Wen and R. Buckland
Vote-ID 2009Civitas: Toward a Secure Voting System
M. R. Clarkson, S. Chong, and A. C. Myers
IEEE Symposium on Security & Privacy 2008A Coercion-Resistant Internet Voting Protocol
B. Meng
Systems and Networks Communications (ICSNC) 2007Robust Coercion-Resistant Registration for Remote E-voting
T. Krivoruchko
WOTE 2007A Practical and Secure Coercion-Resistant Scheme for Internet Voting
R. Araujo, S. Foulle, and J. Traore
Frontiers of Electronic Voting 2007On Coercion-Resistant Electronic Elections with Linear Work
S. G. Weber, R. Araujo, and J. Buchmann
ARES 2007Coercion-Resistant Electronic Elections with Observer
J. Schweisgut
EVOTE 2006A method for electronic voting with Coercion-free receipt
D. J. Reynolds
Frontiers in Electronic Elections (FEE) 2005New cryptographic election protocol with best-known theoretical properties
W. D. Smith
Frontiers in Electronic Elections 2005Coercion-Resistant Electronic Elections
A. Juels, D. Catalano, and M. Jakobsson
WPES 2005Receipt-Free Homomorphic Elections and Write-in Voter Veriļ¬ed Ballots
A. Acquisti
Tech Report, 2004How to prevent buying of votes in computer elections
V. Niemi and A. Renvall
ASIACRYPT 1994