default search action
23rd Financial Cryptography 2019: Frigate Bay, St. Kitts and Nevis
- Ian Goldberg, Tyler Moore:
Financial Cryptography and Data Security - 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11598, Springer 2019, ISBN 978-3-030-32100-0
Cryptocurrency Cryptanalysis
- Joachim Breitner, Nadia Heninger:
Biased Nonce Sense: Lattice Attacks Against Weak ECDSA Signatures in Cryptocurrencies. 3-20
Proofs of Stake
- Phil Daian, Rafael Pass, Elaine Shi:
Snow White: Robustly Reconfigurable Consensus and Applications to Provably Secure Proof of Stake. 23-41 - Giulia Fanti, Leonid Kogan, Sewoong Oh, Kathleen Ruan, Pramod Viswanath, Gerui Wang:
Compounding of Wealth in Proof-of-Stake Cryptocurrencies. 42-61 - Sanket Kanjalkar, Joseph Kuo, Yunqi Li, Andrew Miller:
Short Paper: I Can't Believe It's Not Stake! Resource Exhaustion Attacks on PoS. 62-69
Measurement
- Pierre Reibel, Haaroon Yousaf, Sarah Meiklejohn:
Short Paper: An Exploration of Code Diversity in the Cryptocurrency Landscape. 73-83 - Till Neudecker, Hannes Hartenstein:
Short Paper: An Empirical Analysis of Blockchain Forks in Bitcoin. 84-92 - Michael Fröwis, Andreas Fuchs, Rainer Böhme:
Detecting Token Systems on Ethereum. 93-112 - Friedhelm Victor, Bianca Katharina Lüders:
Measuring Ethereum-Based ERC20 Token Networks. 113-129
Traceability and How to Stop It
- Zuoxia Yu, Man Ho Au, Jiangshan Yu, Rupeng Yang, Qiuliang Xu, Wang Fat Lau:
New Empirical Traceability Analysis of CryptoNote-Style Blockchains. 133-149 - Abraham Hinteregger, Bernhard Haslhofer:
Short Paper: An Empirical Analysis of Monero Cross-chain Traceability. 150-157 - Karl Wüst, Kari Kostiainen, Vedran Capkun, Srdjan Capkun:
PRCash: Fast, Private and Regulated Transactions for Digital Currencies. 158-178 - Karl Wüst, Sinisa Matetic, Moritz Schneider, Ian Miers, Kari Kostiainen, Srdjan Capkun:
ZLiTE: Lightweight Clients for Shielded Zcash Transactions Using Trusted Execution. 179-198
Payment Protocol Security
- Mohammed Aamir Ali, Aad van Moorsel:
Designed to Be Broken: A Reverse Engineering Study of the 3D Secure 2.0 Payment Protocol. 201-221 - Tom Chothia, Ioana Boureanu, Liqun Chen:
Short Paper: Making Contactless EMV Robust Against Rogue Readers Colluding with Relay Attackers. 222-233 - Vincent Haupert, Stephan Gabert:
Short Paper: How to Attack PSD2 Internet Banking. 234-242 - Dirk Achenbach, Roland Gröll, Timon Hackenjos, Alexander Koch, Bernhard Löwe, Jeremias Mechler, Jörn Müller-Quade, Jochen Rill:
Your Money or Your Life - Modeling and Analyzing the Security of Electronic Payment in the UC Framework. 243-261
Multiparty Protocols
- Xavier Bultel, Pascal Lafourcade:
Secure Trick-Taking Game Protocols - How to Play Online Spades with Cheaters. 265-281 - Bernardo David, Rafael Dowsley, Mario Larangeira:
ROYALE: A Framework for Universally Composable Card Games with Financial Rewards and Penalties Enforcement. 282-300 - Kim Ramchen, Chris Culnane, Olivier Pereira, Vanessa Teague:
Universally Verifiable MPC and IRV Ballot Counting. 301-319 - Ittai Abraham, Srinivas Devadas, Danny Dolev, Kartik Nayak, Ling Ren:
Synchronous Byzantine Agreement with Expected O(1) Rounds, Expected O(n2) Communication, and Optimal Resilience. 320-334
Crypto Means Cryptography
- Jan Camenisch, Angelo De Caro, Esha Ghosh, Alessandro Sorniotti:
Oblivious PRF on Committed Vector Inputs and Application to Deduplication of Encrypted Data. 337-356 - Dennis Hofheinz, Akshay Kamath, Venkata Koppula, Brent Waters:
Adaptively Secure Constrained Pseudorandom Functions. 357-376 - Rachid El Bansarkhani:
LARA: A Design Concept for Lattice-Based Encryption. 377-395 - Marcella Hastings, Nadia Heninger, Eric Wustrow:
Short Paper: The Proof is in the Pudding - Proofs of Work for Solving Discrete Logarithms. 396-404
Getting Formal
- Antonio Marcedone, Rafael Pass, Abhi Shelat:
Minimizing Trust in Hardware Wallets with Two Factor Signatures. 407-425 - Myrto Arapinis, Andriana Gkaniatsou, Dimitris Karakostas, Aggelos Kiayias:
A Formal Treatment of Hardware Wallets. 426-445 - Anastasia Mavridou, Aron Laszka, Emmanouela Stachtiari, Abhishek Dubey:
VeriSolid: Correct-by-Design Smart Contracts for Ethereum. 446-465 - Georgia Avarikioti, Lukas Käppeli, Yuyi Wang, Roger Wattenhofer:
Bitcoin Security Under Temporary Dishonest Majority. 466-483
Off-Chain Mechanisms and More Measurement
- Zhijie Ren, Zekeriya Erkin:
VAPOR: A Value-Centric Blockchain that is Scale-out, Decentralized, and Flexible by Design. 487-507 - Andrew Miller, Iddo Bentov, Surya Bakshi, Ranjit Kumaresan, Patrick McCorry:
Sprites and State Channels: Payment Networks that Go Faster Than Lightning. 508-526 - Nicholas Stifter, Philipp Schindler, Aljosha Judmayer, Alexei Zamyatin, Andreas Kern, Edgar R. Weippl:
Echoes of the Past: Recovering Blockchain Metrics from Merged Mining. 527-549 - Sergi Delgado-Segura, Surya Bakshi, Cristina Pérez-Solà, James Litton, Andrew Pachulski, Andrew Miller, Bobby Bhattacharjee:
TxProbe: Discovering Bitcoin's Network Topology Using Orphan Transactions. 550-566
Fraud Detection and Game Theory
- Hassan Halawa, Konstantin Beznosov, Baris Coskun, Meizhu Liu, Matei Ripeanu:
Forecasting Suspicious Account Activity at Large-Scale Online Service Providers. 569-587 - Chen Jing, Cheng Wang, Chungang Yan:
Thinking Like a Fraudster: Detecting Fraudulent Transactions via Statistical Sequential Features. 588-604 - Alex Sangers, Maran van Heesch, Thomas Attema, Thijs Veugen, Mark Wiggerman, Jan Veldsink, Oscar Bloemen, Daniël Worm:
Secure Multiparty PageRank Algorithm for Collaborative Fraud Detection. 605-623
IoT Security, and Crypto Still Means Cryptography
- Ahmad Ibrahim, Ahmad-Reza Sadeghi, Gene Tsudik:
HEALED: HEaling & Attestation for Low-End Embedded Devices. 627-645 - Lianying Zhao, Joseph I. Choi, Didem Demirag, Kevin R. B. Butler, Mohammad Mannan, Erman Ayday, Jeremy Clark:
One-Time Programs Made Practical. 646-666 - Bingsheng Zhang, Hong-Sheng Zhou:
Statement Voting. 667-685 - Muslum Ozgur Ozmen, Rouzbeh Behnia, Attila A. Yavuz:
Fast Authentication from Aggregate Signatures with Improved Security. 686-705
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.