Bitcoin's academic pedigree

The concept of cryptocurrencies is built from forgotten ideas in research literature.

[1]  Ralph C. Merkle,et al.  Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.

[2]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[3]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[4]  David Chaum,et al.  Blind Signatures for Untraceable Payments , 1982, CRYPTO.

[5]  David Chaum,et al.  Security without identification: transaction systems to make big brother obsolete , 1985, CACM.

[6]  Amos Fiat,et al.  Untraceable Electronic Cash , 1990, CRYPTO.

[7]  Moni Naor,et al.  Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.

[8]  Stuart Haber,et al.  Improving the Efficiency and Reliability of Digital Time-Stamping , 1993 .

[9]  Adi Shamir,et al.  PayWord and MicroMint: Two Simple Micropayment Schemes , 1996, Security Protocols Workshop.

[10]  Mike Just Some Timestamping Protocol Failures , 1998, NDSS.

[11]  Markus Jakobsson,et al.  Curbing Junk E-Mail via Secure Classification , 1998, Financial Cryptography.

[12]  Leslie Lamport,et al.  The part-time parliament , 1998, TOCS.

[13]  Markus Jakobsson,et al.  Proofs of Work and Bread Pudding Protocols , 1999, Communications and Multimedia Security.

[14]  Miguel Oom Temudo de Castro,et al.  Practical Byzantine fault tolerance , 1999, OSDI '99.

[15]  John G. Brainard,et al.  Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks , 1999, NDSS.

[16]  Ian Goldberg,et al.  A pseudonymous communications infrastructure for the internet , 2000 .

[17]  Leslie Lamport,et al.  Paxos Made Simple , 2001 .

[18]  Adam Back,et al.  Hashcash - A Denial of Service Counter-Measure , 2002 .

[19]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[20]  Benny Pinkas,et al.  Securing passwords against dictionary attacks , 2002, CCS '02.

[21]  J. Aspnes,et al.  Exposing Computationally-Challenged Byzantine Impostors , 2005 .

[22]  S. Nakamoto,et al.  Bitcoin: A Peer-to-Peer Electronic Cash System , 2008 .

[23]  Arno Fiedler,et al.  Certificate transparency , 2014, Commun. ACM.

[24]  Michael J. Freedman,et al.  CONIKS: Bringing Key Transparency to End Users , 2015, USENIX Security Symposium.

[25]  Aggelos Kiayias,et al.  The Bitcoin Backbone Protocol: Analysis and Applications , 2015, EUROCRYPT.

[26]  Abhi Shelat,et al.  Analysis of the Blockchain Protocol in Asynchronous Networks , 2017, EUROCRYPT.

[27]  Arvind Narayanan,et al.  Bitcoin and Cryptocurrency Technologies - A Comprehensive Introduction , 2016 .

[28]  Roger Wattenhofer,et al.  The Science of the Blockchain , 2016 .

[29]  K. Levy Book-Smart, Not Street-Smart: Blockchain-Based Smart Contracts and The Social Workings of Law , 2017 .

[30]  Michael A. Loesch Smart Contracts : Neither Smart , Nor Contracts ? , .