- CCS
- A Secure Sharding Protocol For Open Blockchains [Blockchain, Sharding]
- The Honey Badger of BFT Protocols [Blockchain, Consensus]
- Breaking Web Applications Built On Top of Encrypted Data [Verifiability]
- On the Instability of Bitcoin Without the Block Reward [Blockchain]
- Transparency Overlays and Applications [Blockchain]
- The Ring of Gyges: Investigating the Future of Criminal Smart Contracts [Blockchain]
- Town Crier: An Authenticated Data Feed for Smart Contracts [Blockchain, Oracle]
- USENIX
- Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing [Blockchain, Consensus]
- S&P
- Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts [Blockchain, Zero-Knowledge Proof]
- NDSS
- Centrally Banked Cryptocurrencies [Blockchain]
- Equihash: Asymmetric Proof-of-Work Based on [Blockchain, POW]
- OSDI
- Just Say NO to Paxos Overhead: Replacing Consensus with Network Ordering [Consensus]
- Slicer: Auto-Sharding for Datacenter Applications [Sharding]
- CCS
- Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin [Blockchain]
- Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing [Blockchain, Verifiabilty]
- Solidus: Confidential Distributed Ledger Transactions via PVORM [Blockchain, Privacy]
- Practical UC-Secure Delegatable Credentials with Attributes and Their Application to Blockchain [Blockchain]
- Bolt: Anonymous Payment Channels for Decentralized Currencies [Blockchain, Privacy, Channel]
- Concurrency and Privacy with Payment-Channel Networks [Blockchain, Privacy, Channel]
- Revive: Rebalancing Off-Blockchain Payment Networks [Blockchain, Privacy, Channel]
- Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services [Blockchain, Privacy, Channel]
- USENIX
- SmartPool: Practical Decentralized Pooled Mining [Blockchain]
- REM: Resource-Efficient Mining for Blockchains [Blockchain, Mining]
- S&P
- Hijacking Bitcoin: Routing Attacks on Cryptocurrencies [Blockchain, Attack]
- IKP: Turning a PKI Around with Decentralized Automated Incentives [Blockchain, Application]
- vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases [Blockchain, Verifiabilty]
- Scalable Bias-Resistant Distributed Randomness [Blockchain]
- Catena: Efficient Non-equivocation via Bitcoin [Blockchain]
- NDSS
- TumbleBit: An Untrusted Bitcoin-Compatible Anonymous Payment Hub [Blockchain, Channel]
- P2P Mixing and Unlinkable Bitcoin Transactions [Blockchain, Privacy]
- Crypto
- Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol [Blockchain, Consensus]
- Bitcoin as a Transaction Ledger: A Composable Treatment [Blockchain]
- The Bitcoin Backbone Protocol with Chains of Variable Difficulty [Blockchain]
- EuroCrypto
- Decentralized Anonymous Micropayments [Blockchain, Channel]
- Analysis of the Blockchain Protocol in Asynchronous Networks [Blockchain]
- SOSP
- Algorand: Scaling Byzantine Agreements for Cryptocurrencies [Blockchain, Consensus]
- Verifying a high-performance crash-safe file system using a tree specification [Verifiability]
- Lazy Diagnosis of In-Production Concurrency Bugs [Blockchain, Debug]
- CCS
- BitML: a calculus for Bitcoin smart contracts [Blockchain]
- SECURIFY: Practical Security Analysis of Smart Contracts [Blockchain]
- The Gap Game [Blockchain]
- USENIX
- DIZK: A Distributed Zero Knowledge Proof System [Zero-Knowledge Proof]
- teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts [Blockchain]
- Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts [Blockchain]
- Arbitrum: Scalable, private smart contracts [Blockchain, Privacy]
- Erays: Reverse Engineering Ethereum's Opaque Smart Contracts [Blockchain]
- An Empirical Analysis of Anonymity in Zcash [Blockchain, Zero-Knowledge Proof]
- S&P
- vRAM: Faster Verifiable RAM With Program-Independent Preprocessing [Verifiability]
- Doubly-efficient zkSNARKs without trusted setup [Zero-Knowledge Proof]
- xJsnark: A Framework for Efficient Verifiable Computation [Verifiability]
- Secure Two-party Threshold ECDSA from ECDSA Assumptions [Verifiability]
- PIR with Compressed Queries and Amortized Query Processing [Verifiability]
- Crypto
- Verifiable Delay Functions [Consensus]
- Proofs of Work From Worst-Case Assumptions [Consensus]
- EuroCrypto
- Thunderella: Blockchains with Optimistic Instant Confirmation [Consensus]
- But Why Does it Work? A Rational Protocol Design Treatment of Bitcoin [Consensus]
- Sustained Space Complexity [POW]
- Ouroboros Praos: An adaptively-secure, semi-synchronous proof-of-stake blockchain [Consensus]
- SIGMOD
- Eon Mode: Bringing the Vertica Columnar Database to the Cloud [Database]
- Amazon Aurora: On Avoiding Distributed Consensus for I/Os, Commits, and Membership Change [Database]
- When Query Authentication Meets Fine-Grained Access Control: A Zero-Knowledge Approach [Database, Zero-Knowledge Proof]