


default search action
23rd Financial Cryptography 2019: Frigate Bay, St. Kitts and Nevis
- Ian Goldberg, Tyler Moore:

Financial Cryptography and Data Security - 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11598, Springer 2019, ISBN 978-3-030-32100-0
Cryptocurrency Cryptanalysis
- Joachim Breitner

, Nadia Heninger:
Biased Nonce Sense: Lattice Attacks Against Weak ECDSA Signatures in Cryptocurrencies. 3-20
Proofs of Stake
- Phil Daian, Rafael Pass

, Elaine Shi:
Snow White: Robustly Reconfigurable Consensus and Applications to Provably Secure Proof of Stake. 23-41 - Giulia Fanti, Leonid Kogan, Sewoong Oh, Kathleen Ruan, Pramod Viswanath, Gerui Wang

:
Compounding of Wealth in Proof-of-Stake Cryptocurrencies. 42-61 - Sanket Kanjalkar, Joseph Kuo, Yunqi Li, Andrew Miller:

Short Paper: I Can't Believe It's Not Stake! Resource Exhaustion Attacks on PoS. 62-69
Measurement
- Pierre Reibel, Haaroon Yousaf

, Sarah Meiklejohn:
Short Paper: An Exploration of Code Diversity in the Cryptocurrency Landscape. 73-83 - Till Neudecker, Hannes Hartenstein:

Short Paper: An Empirical Analysis of Blockchain Forks in Bitcoin. 84-92 - Michael Fröwis, Andreas Fuchs, Rainer Böhme

:
Detecting Token Systems on Ethereum. 93-112 - Friedhelm Victor

, Bianca Katharina Lüders
:
Measuring Ethereum-Based ERC20 Token Networks. 113-129
Traceability and How to Stop It
- Zuoxia Yu, Man Ho Au, Jiangshan Yu

, Rupeng Yang, Qiuliang Xu, Wang Fat Lau:
New Empirical Traceability Analysis of CryptoNote-Style Blockchains. 133-149 - Abraham Hinteregger, Bernhard Haslhofer:

Short Paper: An Empirical Analysis of Monero Cross-chain Traceability. 150-157 - Karl Wüst, Kari Kostiainen, Vedran Capkun, Srdjan Capkun:

PRCash: Fast, Private and Regulated Transactions for Digital Currencies. 158-178 - Karl Wüst, Sinisa Matetic, Moritz Schneider, Ian Miers, Kari Kostiainen, Srdjan Capkun:

ZLiTE: Lightweight Clients for Shielded Zcash Transactions Using Trusted Execution. 179-198
Payment Protocol Security
- Mohammed Aamir Ali, Aad van Moorsel:

Designed to Be Broken: A Reverse Engineering Study of the 3D Secure 2.0 Payment Protocol. 201-221 - Tom Chothia, Ioana Boureanu

, Liqun Chen
:
Short Paper: Making Contactless EMV Robust Against Rogue Readers Colluding with Relay Attackers. 222-233 - Vincent Haupert, Stephan Gabert:

Short Paper: How to Attack PSD2 Internet Banking. 234-242 - Dirk Achenbach, Roland Gröll, Timon Hackenjos, Alexander Koch

, Bernhard Löwe, Jeremias Mechler, Jörn Müller-Quade, Jochen Rill:
Your Money or Your Life - Modeling and Analyzing the Security of Electronic Payment in the UC Framework. 243-261
Multiparty Protocols
- Xavier Bultel

, Pascal Lafourcade
:
Secure Trick-Taking Game Protocols - How to Play Online Spades with Cheaters. 265-281 - Bernardo David, Rafael Dowsley, Mario Larangeira:

ROYALE: A Framework for Universally Composable Card Games with Financial Rewards and Penalties Enforcement. 282-300 - Kim Ramchen, Chris Culnane, Olivier Pereira, Vanessa Teague:

Universally Verifiable MPC and IRV Ballot Counting. 301-319 - Ittai Abraham, Srinivas Devadas, Danny Dolev, Kartik Nayak, Ling Ren

:
Synchronous Byzantine Agreement with Expected O(1) Rounds, Expected O(n2) Communication, and Optimal Resilience. 320-334
Crypto Means Cryptography
- Jan Camenisch, Angelo De Caro, Esha Ghosh, Alessandro Sorniotti:

Oblivious PRF on Committed Vector Inputs and Application to Deduplication of Encrypted Data. 337-356 - Dennis Hofheinz, Akshay Kamath, Venkata Koppula, Brent Waters:

Adaptively Secure Constrained Pseudorandom Functions. 357-376 - Rachid El Bansarkhani:

LARA: A Design Concept for Lattice-Based Encryption. 377-395 - Marcella Hastings, Nadia Heninger, Eric Wustrow:

Short Paper: The Proof is in the Pudding - Proofs of Work for Solving Discrete Logarithms. 396-404
Getting Formal
- Antonio Marcedone, Rafael Pass

, Abhi Shelat:
Minimizing Trust in Hardware Wallets with Two Factor Signatures. 407-425 - Myrto Arapinis, Andriana Gkaniatsou, Dimitris Karakostas, Aggelos Kiayias:

A Formal Treatment of Hardware Wallets. 426-445 - Anastasia Mavridou, Aron Laszka

, Emmanouela Stachtiari, Abhishek Dubey
:
VeriSolid: Correct-by-Design Smart Contracts for Ethereum. 446-465 - Georgia Avarikioti, Lukas Käppeli, Yuyi Wang, Roger Wattenhofer:

Bitcoin Security Under Temporary Dishonest Majority. 466-483
Off-Chain Mechanisms and More Measurement
- Zhijie Ren, Zekeriya Erkin

:
VAPOR: A Value-Centric Blockchain that is Scale-out, Decentralized, and Flexible by Design. 487-507 - Andrew Miller, Iddo Bentov, Surya Bakshi, Ranjit Kumaresan, Patrick McCorry:

Sprites and State Channels: Payment Networks that Go Faster Than Lightning. 508-526 - Nicholas Stifter, Philipp Schindler, Aljosha Judmayer, Alexei Zamyatin, Andreas Kern, Edgar R. Weippl:

Echoes of the Past: Recovering Blockchain Metrics from Merged Mining. 527-549 - Sergi Delgado-Segura, Surya Bakshi, Cristina Pérez-Solà

, James Litton, Andrew Pachulski, Andrew Miller, Bobby Bhattacharjee:
TxProbe: Discovering Bitcoin's Network Topology Using Orphan Transactions. 550-566
Fraud Detection and Game Theory
- Hassan Halawa, Konstantin Beznosov, Baris Coskun, Meizhu Liu, Matei Ripeanu:

Forecasting Suspicious Account Activity at Large-Scale Online Service Providers. 569-587 - Chen Jing, Cheng Wang, Chungang Yan:

Thinking Like a Fraudster: Detecting Fraudulent Transactions via Statistical Sequential Features. 588-604 - Alex Sangers, Maran van Heesch, Thomas Attema

, Thijs Veugen, Mark Wiggerman, Jan Veldsink, Oscar Bloemen, Daniël Worm:
Secure Multiparty PageRank Algorithm for Collaborative Fraud Detection. 605-623
IoT Security, and Crypto Still Means Cryptography
- Ahmad Ibrahim, Ahmad-Reza Sadeghi, Gene Tsudik:

HEALED: HEaling & Attestation for Low-End Embedded Devices. 627-645 - Lianying Zhao

, Joseph I. Choi, Didem Demirag, Kevin R. B. Butler
, Mohammad Mannan, Erman Ayday, Jeremy Clark:
One-Time Programs Made Practical. 646-666 - Bingsheng Zhang, Hong-Sheng Zhou

:
Statement Voting. 667-685 - Muslum Ozgur Ozmen, Rouzbeh Behnia, Attila A. Yavuz

:
Fast Authentication from Aggregate Signatures with Improved Security. 686-705

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














