default search action
24th Financial Cryptography 2020: Kota Kinabalu, Malaysia
- Joseph Bonneau, Nadia Heninger:
Financial Cryptography and Data Security - 24th International Conference, FC 2020, Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected Papers. Lecture Notes in Computer Science 12059, Springer 2020, ISBN 978-3-030-51279-8
Attacks
- Federico Franzoni, Iván Abellán Álvarez, Vanesa Daza:
Leveraging Bitcoin Testnet for Bidirectional Botnet Command and Control Systems. 3-19 - Qin Wang, Jiangshan Yu, Zhiniang Peng, Van Cuong Bui, Shiping Chen, Yong Ding, Yang Xiang:
Security Analysis on dBFT Protocol of NEO. 20-31 - Pierrick Gaudry, Alexander Golovnev:
Breaking the Encryption Scheme of the Moscow Internet Voting System. 32-49 - Nils Wisiol, Niklas Pirnay:
Short Paper: XOR Arbiter PUFs Have Systematic Response Bias. 50-57
Consensus
- Kevin Alarcón Negy, Peter R. Rizun, Emin Gün Sirer:
Selfish Mining Re-Examined. 61-78 - Georgios Birmpas, Elias Koutsoupias, Philip Lazos, Francisco J. Marmolejo Cossío:
Fairness and Efficiency in DAG-Based Cryptocurrencies. 79-96 - Rainer Stütz, Peter Gazi, Bernhard Haslhofer, Jacob Illum:
Stake Shift in Major Cryptocurrencies: An Empirical Study. 97-113 - Mingchao Yu, Saeid Sahraei, Songze Li, Salman Avestimehr, Sreeram Kannan, Pramod Viswanath:
Coded Merkle Tree: Solving Data Availability Attacks in Blockchains. 114-134
Cryptoeconomics
- Shengjiao Cao, Yuan Yuan, Angelo De Caro, Karthik Nandakumar, Kaoutar Elkhiyaoui, Yanyan Hu:
Decentralized Privacy-Preserving Netting Protocol on Blockchain for Payment Systems. 137-155 - Ethan Heilman, Sebastien Lipmann, Sharon Goldberg:
The Arwen Trading Protocols. 156-173 - Amani Moin, Kevin Sekniqi, Emin Gün Sirer:
SoK: A Classification Framework for Stablecoin Designs. 174-197
Layer 2
- Lewis Gudgeon, Pedro Moreno-Sanchez, Stefanie Roos, Patrick McCorry, Arthur Gervais:
SoK: Layer-Two Blockchain Protocols. 201-226 - Ghada Almashaqbeh, Allison Bishop, Justin Cappos:
MicroCash: Practical Concurrent Processing of Micropayments. 227-244 - Cristina Pérez-Solà, Alejandro Ranchal-Pedrosa, Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas, Joaquín García-Alfaro:
LockDown: Balance Availability Attack Against Lightning Network Channels. 245-263 - Zeta Avarikioti, Lioba Heimbach, Yuyi Wang, Roger Wattenhofer:
Ride the Lightning: The Game Theory of Payment Channels. 264-283 - Oguzhan Ersoy, Stefanie Roos, Zekeriya Erkin:
How to Profit from Payments Channels. 284-303 - Vivek Kumar Bagaria, Joachim Neu, David Tse:
Boomerang: Redundancy Improves Latency and Throughput in Payment-Channel Networks. 304-324 - Pedro Moreno-Sanchez, Arthur Blue, Duc Viet Le, Sarang Noether, Brandon Goodell, Aniket Kate:
DLSAG: Non-interactive Refund Transactions for Interoperable Payment Channels in Monero. 325-345 - Zeta Avarikioti, Orfeas Stefanos Thyfronitis Litos, Roger Wattenhofer:
Cerberus Channels: Incentivizing Watchtowers for Bitcoin. 346-366
Secure Computation
- Satsuya Ohata, Koji Nuida:
Communication-Efficient (Client-Aided) Secure Two-Party Protocols and Its Application. 369-385 - Anselme Tueno, Florian Kerschbaum, Stefan Katzenbeisser, Yordan Boev, Mubashir Qureshi:
Secure Computation of the kth-Ranked Element in a Star Network. 386-403 - Carsten Baum, Bernardo David, Rafael Dowsley:
Insured MPC: Efficient Secure Computation with Financial Penalties. 404-420
Privacy
- Benedikt Bünz, Shashank Agrawal, Mahdi Zamani, Dan Boneh:
Zether: Towards Privacy in a Smart Contract World. 423-443 - Riad S. Wahby, Dan Boneh, Christopher Jeffrey, Joseph Poon:
An Airdrop that Preserves Recipient Privacy. 444-463 - Tsz Hon Yuen, Shifeng Sun, Joseph K. Liu, Man Ho Au, Muhammed F. Esgin, Qingzhao Zhang, Dawu Gu:
RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security. 464-483 - Nabil Alkeilani Alkadri, Rachid El Bansarkhani, Johannes Buchmann:
BLAZE: Practical Lattice-Based Blind Signatures for Privacy-Preserving Applications. 484-502
Crypto Foundations
- Aggelos Kiayias, Andrew Miller, Dionysis Zindros:
Non-interactive Proofs of Proof-of-Work. 505-522 - Kostis Karantias, Aggelos Kiayias, Dionysis Zindros:
Proof-of-Burn. 523-540 - Esteban Landerreche, Marc Stevens, Christian Schaffner:
Non-interactive Cryptographic Timestamping Based on Verifiable Delay Functions. 541-558
Empirical Studies
- James E. Arps, Nicolas Christin:
Open Market or Ghost Town? The Curious Case of OpenBazaar. 561-577 - Tong Cao, Jiangshan Yu, Jérémie Decouchant, Xiapu Luo, Paulo Veríssimo:
Exploring the Monero Peer-to-Peer Network. 578-594 - Artemij Voskobojnikov, Borke Obada-Obieh, Yue Huang, Konstantin Beznosov:
Surviving the Cryptojungle: Perception and Management of Risk Among North American Cryptocurrency (Non)Users. 595-614
Smart Contracts
- Friedhelm Victor:
Address Clustering Heuristics for Ethereum. 617-633 - Alex Groce, Josselin Feist, Gustavo Grieco, Michael Colburn:
What are the Actual Flaws in Important Smart Contracts (And How Can We Find Them)? 634-653 - Ningyu He, Lei Wu, Haoyu Wang, Yao Guo, Xuxian Jiang:
Characterizing Code Clones in the Ethereum Smart Contract Ecosystem. 654-675 - Magnus Krogsbøll, Liv Hartoft Borre, Tijs Slaats, Søren Debois:
Smart Contracts for Government Processes: Case Study and Prototype Implementation (Short Paper). 676-684
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.