- Aaronson, S. Quantum copy-protection and quantum money. In Proceedings of the 24th Annual IEEE Conference on Computational Complexity. IEEE, 2009, 229--242. Google ScholarDigital Library
- Anderson, R. and Murdoch, S.J. EMV: Why payment systems fail. Comm. ACM, 57, 6 (June 2014), 24--28. Google ScholarDigital Library
- Androulaki, E., Karame, G.O., Roeschlin, M., Scherer, T. and Capkun, S. Evaluating user privacy in Bitcoin. Financial Cryptography and Data Security. Springer, 2013, 34--51.Google Scholar
- Babaioff, M., Dobzinski, S., Oren, S. and Zohar, A. On bitcoin and red balloons. In Proceedings of the ACM Conf. on Electronic Commerce. ACM, 2012, 56--73. Google ScholarDigital Library
- Back, A. et al. Enabling blockchain innovations with pegged sidechains; http://blockstream.com/sidechains.pdf.Google Scholar
- Bamert, T., Decker, C., Elsen, L., Wattenhofer, R. and Welten, S. Have a snack, pay with bitcoins. In Proceedings of the 13th IEEE International Conference on Peer-to-Peer Computing, Sept. 2013.Google ScholarCross Ref
- Ben-Sasson, E. et al. Zerocash: Decentralized anonymous payments from Bitcoin. In Proceedings of the IEEE Security and Privacy Symposium. IEEE, 2014. Google ScholarDigital Library
- BGP hijacking for cryptocurrency profit; http://www.secureworks.com/cyber-threatintelligence/threats/bgp-hijacking-for-cryptocurrencyprofit/.Google Scholar
- Bitcoin lightning network; https://lightning.network/.Google Scholar
- BitLicense; http://www.dfs.ny.gov/legal/regulations/adoptions/dfsp200t.pdf.Google Scholar
- Decker, C. and Wattenhofer, R. Information propagation in the Bitcoin Network. In Proceedings of the 13th IEEE International Conference on Peer-to-Peer Computing (Sept. 2013).Google ScholarCross Ref
- Decker, C. and Wattenhofer, R. Bitcoin transaction malleability and MtGox. In Proceedings of the 19th European Symposium on Research in Computer Security (Wroclaw, Poland, Sept. 2014).Google ScholarDigital Library
- Eyal, I. and Sirer, E.G. Majority is not enough: Bitcoin mining is vulnerable. Financial Cryptography and Data Security, LNCS (2014). 436--454.Google Scholar
- Gervais, A., Karame, G., Capkun, S. and Capkun, V. Is Bitcoin a decentralized currency? IACR Cryptology ePrint Archive 829 (2013).Google Scholar
- Heilman, E., Kendler, A., Zohar, A. and Goldberg, S. Eclipse attacks on Bitcoin's peer-to-peer network. In Proceedings of 24th USENIX Security Symposium. Aug. 2015 (to appear); http://eprint.iacr.org/2015/263.pdf.Google ScholarDigital Library
- Karame, G., Androulaki, E. and Capkun, S. Two bitcoins at the price of one? Double-spending attacks on fast payments in Bitcoin. IACR Cryptology ePrint Archive 248 (2012).Google Scholar
- Lamport, L., Shostak, R. and Pease, M. The byzantine generals problem. ACM Trans. Programming Lang. Systems 4, 3 (1982), 382--401. Google ScholarDigital Library
- Lewenberg, Y. Bachrach, Y. Sompolinsky, A. Zohar, and Rosenschein, J.S. Bitcoin mining pools: A cooperative game theoretic analysis. In Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems. 2015, 919--927. Google ScholarDigital Library
- Lewenberg, Y., Sompolinsky, Y. and Zohar, A. Inclusive block chain protocols. Financial Cryptography and Data Security. Springer, 2015 (to appear).Google ScholarCross Ref
- Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G.M. and Savage, S. A fistful of bitcoins: Characterizing payments among men with no names. In Proceedings of the 2013 Conference on Internet Measurement. ACM, 127--140. Google ScholarDigital Library
- Miller, A., Juels, A., Shi, E., Parno, B. and Katz, J. Permacoin: Repurposing Bitcoin work for data preservation; http://cs.umd.edu/amiller/permacoin.pdf, 2014.Google Scholar
- Miller, A. and JLaViola, Jr., J.J. Anonymous byzantine consensus from moderately hard puzzles: A model for Bitcoin, 2014.Google Scholar
- Moore, T. and Christin, N. Beware the middleman: Empirical analysis of Bitcoin-exchange risk. Financial Cryptography. Springer, 2013, 25--33.Google Scholar
- Möser, M., Böhme, R. and Breuker, D. Towards risk scoring of Bitcoin transactions. Financial Cryptography and Data Security, Lecture Notes in Computer Science. Springer, 2014, 16--32.Google Scholar
- Nakamoto, S. Bitcoin: A peer-to-peer electronic cash system. 2008; https://bitcoin.org/bitcoin.pdf.Google Scholar
- Ripple; https://ripple.com/.Google Scholar
- Ron, D. and Shamir, A. Quantitative analysis of the full Bitcoin transaction graph. Financial Cryptography and Data Security. Springer, 2013, 6--24.Google Scholar
- Rosenfeld, M. Analysis of Bitcoin pooled mining reward systems. arXiv preprint (2011); arXiv:1112.4980.Google Scholar
- Rosenfeld, M. Analysis of hashrate-based double spending; https://bitcoil.co.il.Doublespend.pdf, 2012.Google Scholar
- Sompolinsky, Y. and Zohar, A. Secure high-rate transaction processing in Bitcoin. Financial Cryptography and Data Security. Springer, 2015 (to appear).Google ScholarCross Ref
- Wiesner, S. Conjugate coding. ACM SIGACT News 15, 1 (1983) 78--88. Google ScholarDigital Library
Index Terms
- Bitcoin: under the hood
Comments