XCLAIM: Trustless, Interoperable, Cryptocurrency-Backed Assets
暂无分享,去创建一个
Alexei Zamyatin | Dominik Harz | Arthur Gervais | Joshua Lind | William Knottenbelt | Panayiotis Panayiotou | Alexei Zamyatin | Arthur Gervais | D. Harz | W. Knottenbelt | Joshua Lind | P. Panayiotou
[1] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[2] Rüdiger Kapitza,et al. AsyncShock: Exploiting Synchronisation Bugs in Intel SGX Enclaves , 2016, ESORICS.
[3] Ghassan O. Karame,et al. Is Bitcoin a Decentralized Currency? , 2014, IEEE Security & Privacy.
[4] Arthur Gervais,et al. NOCUST - A Non-Custodial 2nd-Layer Financial Intermediary , 2018, IACR Cryptol. ePrint Arch..
[5] Aggelos Kiayias,et al. Proof-of-Work Sidechains , 2019, IACR Cryptol. ePrint Arch..
[6] Marko Vukolic,et al. The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT Replication , 2015, iNetSeC.
[7] Angelo De Caro,et al. Channels: Horizontal Scaling and Confidentiality on Permissioned Blockchains , 2018, ESORICS.
[8] Elaine Shi,et al. On Scaling Decentralized Blockchains - (A Position Paper) , 2016, Financial Cryptography Workshops.
[9] Stefan Thomas,et al. A Protocol for Interledger Payments , 2016 .
[10] Johannes Götzfried,et al. Cache Attacks on Intel SGX , 2017, EUROSEC.
[11] Ethan Heilman,et al. Atomically Trading with Roger: Gambling on the Success of a Hardfork , 2017, DPM/CBT@ESORICS.
[12] Philipp Jovanovic,et al. OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[13] DR. Gavin Wood. POLKADOT: VISION FOR A HETEROGENEOUS MULTI-CHAIN FRAMEWORK , 2016 .
[14] Emin Gün Sirer,et al. Bitcoin-NG: A Scalable Blockchain Protocol , 2015, NSDI.
[15] Aviv Zohar,et al. Optimal Selfish Mining Strategies in Bitcoin , 2015, Financial Cryptography.
[16] Ilya Sergey,et al. Scilla: a Smart Contract Intermediate-Level LAnguage , 2018, ArXiv.
[17] Dan Boneh,et al. Bulletproofs: Short Proofs for Confidential Transactions and More , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[18] S. Matthew Weinberg,et al. Arbitrum: Scalable, private smart contracts , 2018, USENIX Security Symposium.
[19] Eli Ben-Sasson,et al. Zerocash: Decentralized Anonymous Payments from Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.
[20] Marcus Peinado,et al. Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems , 2015, 2015 IEEE Symposium on Security and Privacy.
[21] Emin Gün Sirer,et al. Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.
[22] Aviv Zohar,et al. Bitcoin's Security Model Revisited , 2016, ArXiv.
[23] Wilson C. Hsieh,et al. Spanner , 2012, OSDI.
[24] Fan Zhang,et al. Tesseract: Real-Time Cryptocurrency Exchange using Trusted Hardware , 2017, IACR Cryptol. ePrint Arch..
[25] Ethan Heilman,et al. Eclipse Attacks on Bitcoin's Peer-to-Peer Network , 2015, USENIX Security Symposium.
[26] Hubert Ritzdorf,et al. On the Security and Performance of Proof of Work Blockchains , 2016, IACR Cryptol. ePrint Arch..
[27] Maurice Herlihy,et al. Atomic Cross-Chain Swaps , 2018, PODC.
[28] Aggelos Kiayias,et al. Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol , 2017, CRYPTO.
[29] J. Neumann,et al. Theory of games and economic behavior , 1945, 100 Years of Math Milestones.
[30] Eli Ben-Sasson,et al. Scalable, transparent, and post-quantum secure computational integrity , 2018, IACR Cryptol. ePrint Arch..
[31] Christian Decker,et al. Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.
[32] Pieter Wuille,et al. Enabling Blockchain Innovations with Pegged Sidechains , 2014 .
[33] Abhi Shelat,et al. Analysis of the Blockchain Protocol in Asynchronous Networks , 2017, EUROCRYPT.
[34] Daniel Davis Wood,et al. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .
[35] Aggelos Kiayias,et al. Non-Interactive Proofs of Proof-of-Work , 2020, IACR Cryptol. ePrint Arch..
[36] Christian Decker,et al. A Fast and Scalable Payment Network with Bitcoin Duplex Micropayment Channels , 2015, SSS.
[37] Aggelos Kiayias,et al. Proof-of-Stake Sidechains , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[38] Tyler Moore,et al. Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk , 2013, Financial Cryptography.
[39] Thomas F. Wenisch,et al. Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution , 2018, USENIX Security Symposium.
[40] Carlos V. Rozas,et al. Intel® Software Guard Extensions (Intel® SGX) Support for Dynamic Memory Management Inside an Enclave , 2016, HASP 2016.
[41] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[42] Dan Boneh,et al. Retrofitting a two-way peg between blockchains , 2019, ArXiv.
[43] Ethan Buchman,et al. Tendermint: Byzantine Fault Tolerance in the Age of Blockchains , 2016 .
[44] Didier Sornette,et al. Classification of cryptocurrency coins and tokens by the dynamics of their market capitalizations , 2018, Royal Society Open Science.
[45] Daniel Kraft,et al. Difficulty control for blockchain-based consensus systems , 2016, Peer-to-Peer Netw. Appl..
[46] Massimo Bartoletti,et al. A Survey of Attacks on Ethereum Smart Contracts (SoK) , 2017, POST.
[47] Loi Luu,et al. FlyClient: Super-Light Clients for Cryptocurrencies , 2020, 2020 IEEE Symposium on Security and Privacy (SP).
[48] Moni Naor,et al. Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.
[49] Vitalik Buterin. A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .
[50] Neal Koblitz,et al. CM-Curves with Good Cryptographic Properties , 1991, CRYPTO.
[51] Aggelos Kiayias,et al. The Bitcoin Backbone Protocol with Chains of Variable Difficulty , 2017, CRYPTO.
[52] Andrew Miller,et al. Sprites: Payment Channels that Go Faster than Lightning , 2017, ArXiv.
[53] Marta Piekarska,et al. Strong Federations: An Interoperable Blockchain Solution to Centralized Third Party Risks , 2016, ArXiv.
[54] J. Nash. NON-COOPERATIVE GAMES , 1951, Classics in Game Theory.
[55] Nir Bitansky,et al. From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again , 2012, ITCS '12.
[56] Ralph C. Merkle,et al. A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.
[57] Jason Teutsch,et al. A scalable verification solution for blockchains , 2019, ArXiv.
[58] M. Rosenfeld. Overview of Colored Coins , 2013 .
[59] Sunny King,et al. PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake , 2012 .
[60] Adam Back,et al. Hashcash - A Denial of Service Counter-Measure , 2002 .
[61] Stefan Dziembowski,et al. Perun: Virtual Payment Hubs over Cryptocurrencies , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[62] Tim Roughgarden,et al. Algorithmic Game Theory , 2007 .