:facetid:toc:\"db/conf/fc/fc2019.bht\"OK:facetid:toc:db/conf/fc/fc2019.bhtAndrew Miller 0001Iddo BentovSurya BakshiRanjit KumaresanPatrick McCorrySprites and State Channels: Payment Networks that Go Faster Than Lightning.Financial Cryptography508-5262019Conference and Workshop Papersclosedconf/fc/0001BBKM1910.1007/978-3-030-32101-7_30https://doi.org/10.1007/978-3-030-32101-7_30https://dblp.org/rec/conf/fc/0001BBKM19URL#2141940Ahmad Ibrahim 0002Ahmad-Reza SadeghiGene TsudikHEALED: HEaling & Attestation for Low-End Embedded Devices.Financial Cryptography627-6452019Conference and Workshop Papersclosedconf/fc/0002ST1910.1007/978-3-030-32101-7_36https://doi.org/10.1007/978-3-030-32101-7_36https://dblp.org/rec/conf/fc/0002ST19URL#2141941Ittai AbrahamSrinivas DevadasDanny DolevKartik NayakLing Ren 0001Synchronous Byzantine Agreement with Expected O(1) Rounds, Expected O(n2) Communication, and Optimal Resilience.Financial Cryptography320-3342019Conference and Workshop Papersclosedconf/fc/AbrahamDDN01910.1007/978-3-030-32101-7_20https://doi.org/10.1007/978-3-030-32101-7_20https://dblp.org/rec/conf/fc/AbrahamDDN019URL#2141942Dirk AchenbachRoland GröllTimon HackenjosAlexander Koch 0001Bernhard LöweJeremias MechlerJörn Müller-QuadeJochen RillYour Money or Your Life - Modeling and Analyzing the Security of Electronic Payment in the UC Framework.Financial Cryptography243-2612019Conference and Workshop Papersclosedconf/fc/AchenbachGH0LMM1910.1007/978-3-030-32101-7_16https://doi.org/10.1007/978-3-030-32101-7_16https://dblp.org/rec/conf/fc/AchenbachGH0LMM19URL#2141943Mohammed Aamir AliAad van MoorselDesigned to Be Broken: A Reverse Engineering Study of the 3D Secure 2.0 Payment Protocol.Financial Cryptography201-2212019Conference and Workshop Papersclosedconf/fc/AliM1910.1007/978-3-030-32101-7_13https://doi.org/10.1007/978-3-030-32101-7_13https://dblp.org/rec/conf/fc/AliM19URL#2141944Myrto ArapinisAndriana GkaniatsouDimitris KarakostasAggelos KiayiasA Formal Treatment of Hardware Wallets.Financial Cryptography426-4452019Conference and Workshop Papersclosedconf/fc/ArapinisGKK1910.1007/978-3-030-32101-7_26https://doi.org/10.1007/978-3-030-32101-7_26https://dblp.org/rec/conf/fc/ArapinisGKK19URL#2141946Georgia AvarikiotiLukas KäppeliYuyi Wang 0001Roger WattenhoferBitcoin Security Under Temporary Dishonest Majority.Financial Cryptography466-4832019Conference and Workshop Papersclosedconf/fc/AvarikiotiK0W1910.1007/978-3-030-32101-7_28https://doi.org/10.1007/978-3-030-32101-7_28https://dblp.org/rec/conf/fc/AvarikiotiK0W19URL#2141947Rachid El BansarkhaniLARA: A Design Concept for Lattice-Based Encryption.Financial Cryptography377-3952019Conference and Workshop Papersclosedconf/fc/Bansarkhani1910.1007/978-3-030-32101-7_23https://doi.org/10.1007/978-3-030-32101-7_23https://dblp.org/rec/conf/fc/Bansarkhani19URL#2141949Joachim BreitnerNadia HeningerBiased Nonce Sense: Lattice Attacks Against Weak ECDSA Signatures in Cryptocurrencies.Financial Cryptography3-202019Conference and Workshop Papersclosedconf/fc/BreitnerH1910.1007/978-3-030-32101-7_1https://doi.org/10.1007/978-3-030-32101-7_1https://dblp.org/rec/conf/fc/BreitnerH19URL#2141951Xavier BultelPascal Lafourcade 0001Secure Trick-Taking Game Protocols - How to Play Online Spades with Cheaters.Financial Cryptography265-2812019Conference and Workshop Papersclosedconf/fc/Bultel01910.1007/978-3-030-32101-7_17https://doi.org/10.1007/978-3-030-32101-7_17https://dblp.org/rec/conf/fc/Bultel019URL#2141953Jan CamenischAngelo De CaroEsha GhoshAlessandro SorniottiOblivious PRF on Committed Vector Inputs and Application to Deduplication of Encrypted Data.Financial Cryptography337-3562019Conference and Workshop Papersclosedconf/fc/CamenischCGS1910.1007/978-3-030-32101-7_21https://doi.org/10.1007/978-3-030-32101-7_21https://dblp.org/rec/conf/fc/CamenischCGS19URL#2141954Tom ChothiaIoana BoureanuLiqun Chen 0002Short Paper: Making Contactless EMV Robust Against Rogue Readers Colluding with Relay Attackers.Financial Cryptography222-2332019Conference and Workshop Papersclosedconf/fc/ChothiaBC1910.1007/978-3-030-32101-7_14https://doi.org/10.1007/978-3-030-32101-7_14https://dblp.org/rec/conf/fc/ChothiaBC19URL#2141955Phil DaianRafael PassElaine ShiSnow White: Robustly Reconfigurable Consensus and Applications to Provably Secure Proof of Stake.Financial Cryptography23-412019Conference and Workshop Papersclosedconf/fc/DaianPS1910.1007/978-3-030-32101-7_2https://doi.org/10.1007/978-3-030-32101-7_2https://dblp.org/rec/conf/fc/DaianPS19URL#2141958Bernardo DavidRafael DowsleyMario LarangeiraROYALE: A Framework for Universally Composable Card Games with Financial Rewards and Penalties Enforcement.Financial Cryptography282-3002019Conference and Workshop Papersclosedconf/fc/DavidDL1910.1007/978-3-030-32101-7_18https://doi.org/10.1007/978-3-030-32101-7_18https://dblp.org/rec/conf/fc/DavidDL19URL#2141959Sergi Delgado-SeguraSurya BakshiCristina Pérez-SolàJames LittonAndrew PachulskiAndrew Miller 0001Bobby BhattacharjeeTxProbe: Discovering Bitcoin's Network Topology Using Orphan Transactions.Financial Cryptography550-5662019Conference and Workshop Papersclosedconf/fc/Delgado-SeguraB1910.1007/978-3-030-32101-7_32https://doi.org/10.1007/978-3-030-32101-7_32https://dblp.org/rec/conf/fc/Delgado-SeguraB19URL#2141960Giulia FantiLeonid KoganSewoong OhKathleen RuanPramod ViswanathGerui WangCompounding of Wealth in Proof-of-Stake Cryptocurrencies.Financial Cryptography42-612019Conference and Workshop Papersclosedconf/fc/FantiKORVW1910.1007/978-3-030-32101-7_3https://doi.org/10.1007/978-3-030-32101-7_3https://dblp.org/rec/conf/fc/FantiKORVW19URL#2141963Michael FröwisAndreas Fuchs 0001Rainer BöhmeDetecting Token Systems on Ethereum.Financial Cryptography93-1122019Conference and Workshop Papersclosedconf/fc/FrowisFB1910.1007/978-3-030-32101-7_7https://doi.org/10.1007/978-3-030-32101-7_7https://dblp.org/rec/conf/fc/FrowisFB19URL#2141964Hassan HalawaKonstantin BeznosovBaris CoskunMeizhu LiuMatei RipeanuForecasting Suspicious Account Activity at Large-Scale Online Service Providers.Financial Cryptography569-5872019Conference and Workshop Papersclosedconf/fc/HalawaBCLR1910.1007/978-3-030-32101-7_33https://doi.org/10.1007/978-3-030-32101-7_33https://dblp.org/rec/conf/fc/HalawaBCLR19URL#2141967Marcella HastingsNadia HeningerEric WustrowShort Paper: The Proof is in the Pudding - Proofs of Work for Solving Discrete Logarithms.Financial Cryptography396-4042019Conference and Workshop Papersclosedconf/fc/HastingsHW1910.1007/978-3-030-32101-7_24https://doi.org/10.1007/978-3-030-32101-7_24https://dblp.org/rec/conf/fc/HastingsHW19URL#2141968Vincent HaupertStephan GabertShort Paper: How to Attack PSD2 Internet Banking.Financial Cryptography234-2422019Conference and Workshop Papersclosedconf/fc/HaupertG1910.1007/978-3-030-32101-7_15https://doi.org/10.1007/978-3-030-32101-7_15https://dblp.org/rec/conf/fc/HaupertG19URL#2141969Abraham HintereggerBernhard HaslhoferShort Paper: An Empirical Analysis of Monero Cross-chain Traceability.Financial Cryptography150-1572019Conference and Workshop Papersclosedconf/fc/HintereggerH1910.1007/978-3-030-32101-7_10https://doi.org/10.1007/978-3-030-32101-7_10https://dblp.org/rec/conf/fc/HintereggerH19URL#2141970Dennis HofheinzAkshay KamathVenkata KoppulaBrent WatersAdaptively Secure Constrained Pseudorandom Functions.Financial Cryptography357-3762019Conference and Workshop Papersclosedconf/fc/HofheinzKKW1910.1007/978-3-030-32101-7_22https://doi.org/10.1007/978-3-030-32101-7_22https://dblp.org/rec/conf/fc/HofheinzKKW19URL#2141971Chen JingCheng Wang 0001Chungang YanThinking Like a Fraudster: Detecting Fraudulent Transactions via Statistical Sequential Features.Financial Cryptography588-6042019Conference and Workshop Papersclosedconf/fc/Jing0Y1910.1007/978-3-030-32101-7_34https://doi.org/10.1007/978-3-030-32101-7_34https://dblp.org/rec/conf/fc/Jing0Y19URL#2141972Sanket KanjalkarJoseph KuoYunqi Li 0002Andrew Miller 0001Short Paper: I Can't Believe It's Not Stake! Resource Exhaustion Attacks on PoS.Financial Cryptography62-692019Conference and Workshop Papersclosedconf/fc/KanjalkarKLM1910.1007/978-3-030-32101-7_4https://doi.org/10.1007/978-3-030-32101-7_4https://dblp.org/rec/conf/fc/KanjalkarKLM19URL#2141973Antonio MarcedoneRafael PassAbhi ShelatMinimizing Trust in Hardware Wallets with Two Factor Signatures.Financial Cryptography407-4252019Conference and Workshop Papersclosedconf/fc/MarcedonePS1910.1007/978-3-030-32101-7_25https://doi.org/10.1007/978-3-030-32101-7_25https://dblp.org/rec/conf/fc/MarcedonePS19URL#2141975Anastasia MavridouAron LaszkaEmmanouela StachtiariAbhishek DubeyVeriSolid: Correct-by-Design Smart Contracts for Ethereum.Financial Cryptography446-4652019Conference and Workshop Papersclosedconf/fc/MavridouLSD1910.1007/978-3-030-32101-7_27https://doi.org/10.1007/978-3-030-32101-7_27https://dblp.org/rec/conf/fc/MavridouLSD19URL#2141977Till NeudeckerHannes HartensteinShort Paper: An Empirical Analysis of Blockchain Forks in Bitcoin.Financial Cryptography84-922019Conference and Workshop Papersclosedconf/fc/NeudeckerH1910.1007/978-3-030-32101-7_6https://doi.org/10.1007/978-3-030-32101-7_6https://dblp.org/rec/conf/fc/NeudeckerH19URL#2141980Muslum Ozgur OzmenRouzbeh BehniaAttila A. YavuzFast Authentication from Aggregate Signatures with Improved Security.Financial Cryptography686-7052019Conference and Workshop Papersclosedconf/fc/OzmenBY1910.1007/978-3-030-32101-7_39https://doi.org/10.1007/978-3-030-32101-7_39https://dblp.org/rec/conf/fc/OzmenBY19URL#2141982Kim RamchenChris CulnaneOlivier PereiraVanessa TeagueUniversally Verifiable MPC and IRV Ballot Counting.Financial Cryptography301-3192019Conference and Workshop Papersclosedconf/fc/RamchenCPT1910.1007/978-3-030-32101-7_19https://doi.org/10.1007/978-3-030-32101-7_19https://dblp.org/rec/conf/fc/RamchenCPT19URL#2141985Pierre ReibelHaaroon YousafSarah MeiklejohnShort Paper: An Exploration of Code Diversity in the Cryptocurrency Landscape.Financial Cryptography73-832019Conference and Workshop Papersclosedconf/fc/ReibelYM1910.1007/978-3-030-32101-7_5https://doi.org/10.1007/978-3-030-32101-7_5https://dblp.org/rec/conf/fc/ReibelYM19URL#2141986Zhijie RenZekeriya ErkinVAPOR: A Value-Centric Blockchain that is Scale-out, Decentralized, and Flexible by Design.Financial Cryptography487-5072019Conference and Workshop Papersclosedconf/fc/RenE1910.1007/978-3-030-32101-7_29https://doi.org/10.1007/978-3-030-32101-7_29https://dblp.org/rec/conf/fc/RenE19URL#2141987Alex SangersMaran van HeeschThomas AttemaThijs VeugenMark WiggermanJan VeldsinkOscar BloemenDaniël WormSecure Multiparty PageRank Algorithm for Collaborative Fraud Detection.Financial Cryptography605-6232019Conference and Workshop Papersclosedconf/fc/SangersHAVWVBW1910.1007/978-3-030-32101-7_35https://doi.org/10.1007/978-3-030-32101-7_35https://dblp.org/rec/conf/fc/SangersHAVWVBW19URL#2141988Nicholas StifterPhilipp SchindlerAljosha JudmayerAlexei ZamyatinAndreas KernEdgar R. WeipplEchoes of the Past: Recovering Blockchain Metrics from Merged Mining.Financial Cryptography527-5492019Conference and Workshop Papersclosedconf/fc/StifterSJZKW1910.1007/978-3-030-32101-7_31https://doi.org/10.1007/978-3-030-32101-7_31https://dblp.org/rec/conf/fc/StifterSJZKW19URL#2141991Friedhelm VictorBianca Katharina LüdersMeasuring Ethereum-Based ERC20 Token Networks.Financial Cryptography113-1292019Conference and Workshop Papersclosedconf/fc/VictorL1910.1007/978-3-030-32101-7_8https://doi.org/10.1007/978-3-030-32101-7_8https://dblp.org/rec/conf/fc/VictorL19URL#2141993Karl WüstKari KostiainenVedran CapkunSrdjan CapkunPRCash: Fast, Private and Regulated Transactions for Digital Currencies.Financial Cryptography158-1782019Conference and Workshop Papersclosedconf/fc/WustKCC1910.1007/978-3-030-32101-7_11https://doi.org/10.1007/978-3-030-32101-7_11https://dblp.org/rec/conf/fc/WustKCC19URL#2141995Karl WüstSinisa MateticMoritz SchneiderIan MiersKari KostiainenSrdjan CapkunZLiTE: Lightweight Clients for Shielded Zcash Transactions Using Trusted Execution.Financial Cryptography179-1982019Conference and Workshop Papersclosedconf/fc/WustMSMKC1910.1007/978-3-030-32101-7_12https://doi.org/10.1007/978-3-030-32101-7_12https://dblp.org/rec/conf/fc/WustMSMKC19URL#2141996Zuoxia YuMan Ho AuJiangshan YuRupeng YangQiuliang XuWang Fat LauNew Empirical Traceability Analysis of CryptoNote-Style Blockchains.Financial Cryptography133-1492019Conference and Workshop Papersclosedconf/fc/YuAYYXL1910.1007/978-3-030-32101-7_9https://doi.org/10.1007/978-3-030-32101-7_9https://dblp.org/rec/conf/fc/YuAYYXL19URL#2141998Bingsheng ZhangHong-Sheng ZhouStatement Voting.Financial Cryptography667-6852019Conference and Workshop Papersclosedconf/fc/ZhangZ1910.1007/978-3-030-32101-7_38https://doi.org/10.1007/978-3-030-32101-7_38https://dblp.org/rec/conf/fc/ZhangZ19URL#2141999Lianying ZhaoJoseph I. ChoiDidem DemiragKevin R. B. ButlerMohammad MannanErman AydayJeremy ClarkOne-Time Programs Made Practical.Financial Cryptography646-6662019Conference and Workshop Papersclosedconf/fc/ZhaoCDBMAC1910.1007/978-3-030-32101-7_37https://doi.org/10.1007/978-3-030-32101-7_37https://dblp.org/rec/conf/fc/ZhaoCDBMAC19URL#2142000Ian GoldbergTyler Moore 0001Financial Cryptography and Data Security - 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019, Revised Selected PapersFinancial CryptographyLecture Notes in Computer Science11598Springer2019Editorshipconf/fc/201910.1007/978-3-030-32101-7https://doi.org/10.1007/978-3-030-32101-7https://dblp.org/rec/conf/fc/2019URL#2272980