609242c2c220c112d83fed1e9537b88dc3a604de77e4af32a7e37aee72b02f08 2017-03-mit-bitcoin-expo-andytoshi-mimblewmble-scriptless-scripts.pdf 9ec02234307900d68991e5f697dc6cfd803492c6b0978ab98419b528e14887be A bayesian approach to identify bitcoin users - 2016.pdf b3f89432de2df0d7bb0615faa1731bce66634c18ff3b9617efdc5d886d45e64c A Bitcoin standard: Lessons from the gold standard - 2016.pdf e4d7f8268ba2d2d936dea117379521ecc2b66f3015f6c83d2c09146679b6bee0 Accelerating Bitcoin's transaction processing: fast money grows on trees, not chains.pdf c5210105f14b688581f3cd4024532b170d5248cd14300533c06bf61cfbcffd21 A CFTC primer on virtual currencies - 2017.pdf 94d820360463ec29eb3bc87802ebde6fd57a0c575daede58996f46716ff6b327 A cryptocubic protocol for hacker-proof off-chain bitcoin transactions - Leonard Apelstin.pdf 36ea12048d6669e741d49ad4a6ba1a2221cab31d9d05339c16f471eca805b2de A denial of service attack against fair computations using Bitcoin deposits.pdf 99814752d21fea51de75cd109f18f5e755c20137624f40485f5149b60cafacdd A fast and scalable payment network with bitcoin duplex micropayment channels.pdf b76ba4d71be7879463609160fc0b2ad9a933804eb2b5e70c63981f23d18aa97d A fistful of Bitcoins: Characterizing payments among men with no names.pdf cb10b29077f5030035b005bd83eda12c5a6d6c8c66fa313b7ee39349362c8c95 A formal model of bitcoin transactions - 2017.pdf 64fec88824e65302a18614cb51bc35615037ff2ebd6aff45f8412b28d02f29ce aggreg.pdf 887bbb3c640424b53861ce2497e16267f6ffb79f7b27373b99f5a33048a58f87 algorand-ledger.pdf 8d1d3eb522c8903d8bfb6bfcaa78a786229303bb15d61228e71da376a3d0e13b alts.pdf a3b1b014f36e7637fb6e70292b8c400b51e66ba1fd2746f56d58eda8eed24e9b A multiparty protocol for constructing the public parameters of the Pinocchio zk-SNARK.pdf f1646a121046a337656d0f7ee6927cece8bdd8adf869602d2d52c29bb54f2b1b Analysis of Bitcoin pooled mining reward systems - Rosenfeld - 2011.pdf 967d14ac41f1a09f6efd8ea17b1241ff2b63478f11d66374517c7b8b089fff95 Analysis of hashrate-based double-spending.pdf 9628f1d2c33a2be2c9e27bec39f7acd7fb3e428a45566066f6ef4e3e8ae50c0e Analysis of the bitcoin UTXO set - 2017.pdf 88ecdc49cd869541f444433d2c2134af78305563eb4d08535b4f46348e3eb448 Analysis of the blockchain protocol in asynchronous networks - 2016.pdf 1d3290a5d7b4bd94bd84bcd8d4f4458b23f0c3c3565c998a7d144c0e3acbe3f2 Analyzing the bitcoin ponzi scheme ecosystem - 2018.pdf 5aba17d7565b7739eee067fc6e7ee38c4724926d5e645e3e7577d166c2601d02 An analysis of the acceptance policies for blockchain transactions - 2018.pdf 8daf69fd8320b73b88e8fb5288f88809bbdef316464e859c7c6e36afbeab6e4b andytoshi-scriptless-scripts.2018-05-18.slides.pdf f4e0765327b6cbaa7aa7d3fc0f799f2f9ab34b9945bed3128431ccd924342991 An efficient protocol for secure two-party computation in the presence of malicious adversaries.pdf c2df568413c0416afb7df922539140fc9c4062c07f62ee77b157180be5d52935 An empirical analysis of linkability in the Monero blockchain - 2017.pdf a4f741c0d06a446a2cace859065101f920d9b4c196bf44fa0b2957f1f4da068a A new approach to deanonymization of unreachable bitcoin nodes - 2018.pdf f7a9d9c20d217f2d7b9d656838d914462cad9693a2e892f433d7e3837687a9f7 A new look at the refund mechanism in the bitcoin payment protocol bip70 - 2018.pdf 653a87e05dd0b645d627c5262b6fce90b8d57c6081fbf554884a62b59e39a4ad An explanation of Nakamoto's analysis of double-spend attacks - 2017.pdf 62816a829c2132893270e9109bf689ab5f455779a09708dd4f8b3b1fdda88ef3 An investigation into Confidential Transactions - Adam Gibson - 2016.pdf 8600b039dea122b0842640890d944e6a964a04d550ba39ed620d5a6619bca680 Anonymous byzantine consensus from moderately-hard puzzles: a model for Bitcoin.pdf 50ccbf523bf917985c4eb14e1cf590285a43a02ba074408c70c8b41262500e8b Another coin bites the dust: An analysis of dust in UTXO based cryptocurrencies - 2018.pdf 32e813aac4b03f757dabd446b08d46f2c89513c6e14d069b9d1534e8f90a2d8b A preliminary field guide for bitcoin transaction patterns.pdf 52e6f9de60a0c2f2fcb27d0763722ee5675d5e88838edd31bd9ada105cc50fb8 A proportionate response from Nathan Cook - 2017.pdf 50b5ec2214a46759faa531f5ab90b927dc2747339b53883c88333c804f11d6ed A Prunable Blockchain Consensus Protocol Based on Non-Interactive Proofs of Past States Retrievability - 2016.pdf 55d8191c0644581fd916b6bc41acd40280368419561356275be12b476f05bb57 A quantitative analysis of the impact of arbitrary blockchain content on bitcoin - 2018.pdf f5ac46194f91486fd8420d28cea524e2b47f7118c469dbce48b9782f6718ea8b armory-verisign-bitcoin-wallet-identity-specification.pdf 2f92b9de4590074cab56978db0d4de2815442b5329137d49f134a0112f08cc45 A secure sharding protocol for open blockchains - elastico - 2017.pdf 26c98bbbc89911402e04dbc56867a26bded3158f2aa528a84bab1b51ee881ebf AsicBoost - A speedup for bitcoin mining.pdf 7acaec6556f1cde3403a6f429b96aad5f65d136655a6683d5e6b87f62058272a asic-faq.pdf fb1024044e6df23861206822b765299a734570a3ae9b2ec7109676660a5824ea A simple macroeconomic model of bitcoin.pdf 8082063ee8d0e0cf53721d4363f998c0a9b84a7e274bb17c03a1510f851e71de A survey on security and privacy issues in bitcoin - 2017.pdf a35f238cc66baf2db5c35b7fee0587dedbb4027f01605f07abd8f3d19122fc48 Asymmetric proof-of-work based on the Generalized Birthday problem.pdf 107f7b32eb57cff63a6b33eb98f78dda1bf9353b137b1d38a1f7c4f8a5319ba4 A systematic approach to cryptocurrency fees - 2018.pdf 25a6af50b8035a377749a6c662215cf17152e212571ffdc8e23118a76645bc89 Atomically trading with Roger: Gambling on the success of a hard-fork - 2017.pdf 9d58aa0872f0ad6d309117255015e00acdc7ba6fe6e6102f12612a789d2aeca8 Atomic cross-chain swaps - Herlihy - 2018.pdf 4af254af098eed0fc82068b6a65d348888f676c734f925c0aedda344e31142fa A trusted latency monitor service for preventing abuse in Lightning-based peer-to-peer exchange.pdf 5f25776108356a1bf36ade1dc48cd7aca7cf527958941b5d7c322bcca919b35c Automated verification of electrum wallet - 2016.pdf d43482d0bdfbb9df1c0a3b26329d8be6d89c2ff55af0b7c1af9d9bb3cbac8bb8 A wild velvet fork appears: Inclusive blockchain protocol changes in practice - 2018.pdf 40efbb0a7eea3092edcb48ffde53c6734f74e5ccd0f18983cd9e77408337d274 BC-2, Day 2_ New Elements Features.pdf c1b2e5a4ccd2fb0626261873da47004e1ab682d272f52cfc7ce55e344ecf19c3 BC-2, Day 3_ Smart Contracting.pdf c97a72da56a6e5189cd88ac1a2c623d00aefc72031476284bd88731733527732 bc2-jeremy-rubin-2017.pdf 8126cf7395e1272f165c4a87e294cb3cc64d612131700622b1cb0045340dcbd5 BCH sybil nodes on the bitcoin peer-to-peer network - 2017.pdf caf1c99bb08bcdcdfaa63eea86d49285f5237ddb6f06f47a131006b4bbe8cc3c Be selfish and avoid dilemmas: Fork after withholding (FAW) attacks on bitcoin - 2017.pdf 07c8566179b53007f05af110311683dd7f2b2c983dac059b91d943b2b887779d Beyond Hellman's time-memory trade-offs with applications to proofs of space - 2017.pdf 623085c762771b6972743a1c08802a5d6b4e1f9b440eddfd96dc4c65d1895280 Bitcoin and beyond: A technical survey on decentralized digital currencies.pdf 9916275f412fbce78714be35d743891dad2847b3ee04be15e32ef2a41cb3c1c7 Bitcoin and Gresham's law - the economic inevitability of collapse - Ian Grigg.pdf 0741dca515455cfc0ec90778e00017a85de2eb1a72ffbf6d78d9f36919a881cd Bitcoin - a primer for policymakers.pdf 4bb07bb7e39d021d9b099008aaaefa3e9cfdfbd9ddd41347002a23e2730d59e8 Bitcoin beacon - 2016.pdf 3f495928b059c402f6ffd1e19e05b2419bdf65a00a2deab623cf3052c0d6eb5e bitcoin-birthday.pdf 81c58fe1730b9f22a4753cd42d845ab26077ff95b71c9b47c8491deeb538141f Bitcoin covenants - 2016.pdf e65234902c158c76778b7b13ca46aa59e95ba75085853aa56c67ea16cf2323c2 Bitcoin meets strong consistency.pdf 5fa4377c6e2955c26574a28479f70cd091fbad2b8755096666d7720ade407ab1 Bitcoin network measurements for simulation validation and parameterisation - 2016.pdf 2784750834813f2e8081aaebd536dc19a6d307255631196bcac875563c761ee4 Bitcoin-NG: A scalable blockchain protocol.pdf e91b9a7f8bd71fcf87d420c398d690d425d48bcd4a438ae5b92f4fc321df220c Bitcoin over Tor isn't a good idea.pdf 427c63b364c6db914cf23072a09ffd53ee078397b7c6ab2d604e12865a982faa bitcoin.pdf adf5a87b051a5499dbe19bd722de59912d592bd27eba54fecf21ede7e1560f0e bitcoin-probabilistic-payments.pdf e86019e56905a4a4e02169ab4c51444c30c33e88fdbee8a63cbb2c3f003d5113 Bitcoin protocol specification 0.8.6 - Krzysztof Okupski - 2014-06-25.pdf 8982dd268640b174ce53ca365203938f72bed600bf720b8b96c8d598ce8fcbe4 Bitcoin protocol specification 0.8.6 - Krzysztof Okupski.pdf b1674191a88ec5cdd733e4240a81803105dc412d6c6708d53ab94fc248f4f553 bitcoin.revised.pdf 19a7ea543b9793e07055f81f75750d792bb1f0d440bc3b4894924c0672ab5a7d Bitcoin: Ringing the bell for a new asset class - Adam White - 2016.pdf 3e475acbfffce4da33facf900ab93718381a5e0cad4481bc488a56d4eb324793 bitcoin-tech-dev-talks-schnorr-signatures.2018-02-01.pdf a0368521a58559975237465b9418b7ea3714e936d7f93ce9f4fa7be5a2560352 bitfury-report-on-block-size-increase.pdf 3dc10cc18585df6c2dd8148b52464e21f9799b090a1b135e823329f1511686b6 bitfury-research-voting-process-mathematical-formalism.pdf 090392868656cd87bcf08f2abe6b59832a9a4f8a9757b329957b37db2f90313e Bitmessage - a peer-to-peer message authentication and delivery system.pdf 2a8be2ab900b050ab540945be9b72ff31978d0e8c3719e772c35afd86141b7d2 BitML: A calculus for Bitcoin smart contracts - 2018.pdf 7dd22e3c81ce90fec223129eba3358743db03fa8fb75048bb6e71eb59588fa1c bitshare-newsletter-february-2014.pdf 0487c8360aeb7e86e8f6ca10160eb3e97d574797ed184609e1077b0452650c6c bitshares.pdf 163eab71c809ca68245a2572034d7b7ff5d9f264672bfc6bf61f636fb176d2f2 blind-ecdsa-draft-v1.pdf 19de50e0a21cca34542d863ba366da07f379ffaff0e32f2509d276ed490e5719 Blindly signed contracts: Anonymous on-blockchain and off-blockchain bitcoin transactions - 2016.pdf a5f43f2bb3cfc1bbadfe1d0a411a258d2081e9f629a8b189943b8672487ba3b3 Blind signatures for bitcoin transaction anonymity - 2012.pdf 1f251b9d511ac8951e673cdc5d775e12b5181ad32f8af122af6decbea970ff09 Blind signatures for untraceable payments.pdf 82d5f3565a6880f59edfc45178f67f75a6238e0fbde235304bf958f9c59c937d Blockchain consensus protocols in the wild - 2017.pdf c3d15bd6e8fc6972161b6d4bfbc357d978ec98f44860715f9db2c851787bb466 Blockchain-free cryptocurrencies: A rational framework for truly decentralized fast transactions - 2016.pdf f699259fce05b1bde791555cbac2d875d92b46c9bc2b595129eadf3e28d80da5 BlockChain-In-Capital-Markets.pdf 8465580037c3374d60a6ff32ae92bad728ce828c993ec2d0ae0230f85857befe Blockchains from a distributed computing perspective - 2018.pdf e756f37ff4c8a679aab449c7c412e6a8817a5ff5a033d5a37e1f3372c10ade46 Bolt: Anonymous payment channels for decentralized currencies - 2016.pdf 6bfa3707826f204e504fe4bf7d18e0b2ef4cbaba17f15de8d6a5a00b4a48a847 Borromean ring signatures.pdf 3d3e2aea2421341a14ef28405fb9b5acb225ed71bf216f1771311c66afac8e1d Botcoin: Monetizing stolen cycles.pdf f4eb940dbf063a71b0368f74f8ac629fbbbf1ca359aea8c7cd5eed473287c27c Brahms: Byzantine resilient random membership sampling.pdf 018405980ca1b50a293d0d0d0f8bfb06bc28688ae98f76bd98ec8b343dbc54b6 brands-technical.pdf 81b54186bf11f0204ea4b6d4eee38c16184e42d7059057e9d071b5cdb12e0857 Bulletproofs: Efficient range proofs for confidential transactions.pdf 426e22577fcb691ea398d0c44faa09b148bc94c8fe327cb56247a8ac0a95ae28 Byzantine chain replication.pdf 5eaef1289ab615c1b80ab0d1bf0e7c7343145d1d2ddc0323e77f939e1b496b47 Byzantine cycle mode: Scalable bitcoin mixing on unequal inputs.pdf 497548419c6ee23013e3eb29844d148175dcbc46523dd5565ba3b84562c5df1a Byzantine fault tolerant set consensus with efficient reconciliation - 2015-12-21.pdf 9766247a67c5f26249cf5cf20da46fa59a6f9f34dd5c203becee448a7ab729c4 Catena: Preventing lies with bitcoin - 2016.pdf b74494c716fe3d18a2efb153efc3dc56717fe6c9133a9ca1df46f9cd3d3ed5d2 cc-sidechains2.pdf 15b6a05160456ddb33cb871024156cbb3f275021c2306451fb0a85f45bf7ebbe Centrally banked cryptocurrencies.pdf 6f16509e5d259ff5c11abee8686681d9c26a538659c94568e24998544f1b0056 Centrally banked cryptocurrencies - rscoin - Bank of England - 2016.pdf 00084b4bb50012cb4d944c7671bc733bc73e4dd7b5877e74ca207006b863d2b1 coinbase-securities-law-framework.pdf 6e442ae7c4d5a47bf5a7c81266c805d3027051f373994f963efb2c87c5172f43 coin-center-securities-framework.pdf 961721b35e31719a0df956210553843cd8a2daff13e3487a36238e9926794057 Coinparty: Secure multi-party mixing of bitcoins.pdf 9a1b1b58190c84bfd568f7f4b3899f433015b12eadb1b8e9eb7bfdf5cf880fd8 coinscope.pdf c44a97d3c93b4efc80c763a559989eb7eb1ad10c03fe021d49c8a93d379f47a1 Compact confidential transactions.pdf 4f49c67d56c888c1a8f7882770e4aa3ec7d2c1d6f721673f4923a970845c3dad Compact multi-signatures for smaller blockchains - 2018.pdf f95246adf1f225011d5ee8626e3baa3496062917e0fa19637a1bc8c314449197 Compact proofs of retrievability.pdf 59f049a1a51df9ed1f4aeeb048655ca4d2faa8f65e17038620e11e555f0c0960 Concurrency and privacy with payment channel networks - 2017.pdf 2503e16dcff2c8a0b6e6968c3092fe07600e0579b1a0a0a70058bb6f97d707eb Confidential assets - 2017.pdf 09aa6d70b4ffe903c01a2c87c1ec67c583dc1f68693d3e39026a17e02f6cf9c4 Congestion - Mimesis of traffic flow - petertodd.pdf 63932c55a60c6e478b038ed158242145b07b11c2e2bda972111664fe2248e434 Congressional research service - bitcoin - 2015-08-14.pdf e0294239d6a6792ab82cf55e3e554ea24a77f3cdf7c35d4559a3f94aec166814 Consensus-as-a-service: a brief report on the emergence of permissioned, distributed ledger systems.pdf f7b8c2729fc1899653edcb0a58a6883cca06693688cf2c25b79d9f82aa0ec2ad Cryptographic combinatorial clock-proxy auctions.pdf 376aba3f33529a575bf2728d147ce2cfadb925d32cb98abc7535f186b9497450 cryptonote.pdf f10e2e9468ebca57aca8481544651a7780591c1ccc35c9fe618bf071b7f2cecd Cuckoo cycle: A memory bound graph-theoretic proof-of-work - John Tromp.pdf e4f14ccbe6958de2f1dfb83c0dd51a7e66ef16c0186b8309c5be49c904c6f345 D1T1 - Filippo Valsorda - Exploiting ECDSA Failures in the Bitcoin Blockchain.pdf 9dd1872de5e83ae412f3e4db33f0c7f05af88bc62bbcf181e9c849a033fbf3a4 dagcoin-v41.pdf 00571ebe73183a0e7b9961b085ed682209c87801c8684f18c2aab97a5a543d63 Dandelion++: Lightweight cryptocurrency networking with formal anonymity guarantees - 2018.pdf 4f1dd31a2cd2573ba7eb5b7105a7162570193a1a42511d77573dbf257d56c48d Dandelion: Redesigning the bitcoin network for anonymity - 2017.pdf f333e6947b2e902eb54ef36194e5651e30adce8718e782e1b22438e876a512cb DarkcoinWhitepaper.pdf 693ac943345fd1d8c9835fb6a6c61b32456124381a006c2e39ab8deced3a5498 DarkSendv3.pdf e24db92f48c32d3db7f3fd9390776374241e9cbf64c01bfa07be1760a9a9006f DDosCoin: Cryptocurrency with a malicious proof-of-work - 2016.pdf 38217deb1ad0a5fbbae069888e84299bb4a067a6a0bc48f24aa67d1c41048e07 Deanonymisation of clients in Bitcoin P2P network.pdf c6e13e424f425bc6b6e7ad88e69aedae0605660217b8610dbf4c1abeebae7184 Decentralized anonymous credentials.pdf f732f94bcd3335b9421521d3e8efccdf33aed090a91cfc858bd286588b580013 Decentralized anonymous micropayments - 2016.pdf 2fc23672bd0d906d81b1218e986bfa9728fdb6d568366639a6f24f74ba2d52e2 Decentralizing privacy: Using blockchain to protect personal data.pdf fcd574943a73c8099e33130248f995c56e30ae36e982c8fc82789b13966f2b37 Deleting secret data with public verifiability.pdf af5d6ed220482a1e506dc30b7817a0b9317784fe0d234d6ddf764e6d37d1ee8d Design of a secure timestamping system with minimal trust requirements.pdf f9774f90502f04348efd92bc20f5e19e0562006d1fba051a78749b353beea04a Discreet log contracts - 2017.pdf 1f83222fe70405d2c84887c961de35001d04223eca1531eef7c7a8da5917a3d2 Distributed double spending prevention - 2008.pdf 3e4771aba4eae827ea5b25259b1e26deec8f652db4e5ad53b2a1e077943f6d39 Double spend races - 2017.pdf 7436f1bc76db25c021ffffb5f532baccbc02dfec8a3425c74f05a7df6e71b386 Do you need a blockchain? - 2017.pdf 1e1f4dc402d71f696790ee8bd331210ea927e1ad574d4ece30063b4d74a89390 Drivechains, sidechains and hybrid 2-way peg designs - Sergio Lerner - 2016.pdf 73f0dd115d9f758ef7d1c557f0dc648bd393694af7ef053120ffc83f68af4076 dtcc-embracing-disruption.pdf 027d78a441f78c0374307df62d199142b90372e08f0892da3b2068319460eefc ECDSA-Security-in-Bitcoin-and-Ethereum-a-Research-Survey.pdf e1940b34ca3080d7ab61a3b422db7a062d0a8604d622eeb378a63c19340a79b8 Eclipse attacks on Bitcoin's peer-to-peer network.pdf e6d645a25dcc9ec918555a0b89c35c8b723ab8bb8c7fd1c1be6af72fb609422f Efficient multi-exponentiation - Bootle.pdf aad11045c7e2483424dde79212f36f9126b99e4a7f1bbb0422fd10285c5a5f10 Efficient zero knowledge contingent payments in cryptocurrencies without scripts - 2016.pdf 3b0f75526b95e37d6af221f49f40bc49641e2e3458dca38cf3b818e93c278669 Efficient zero knowledge contingent payments in cryptocurrencies without scripts - 2016.v2.pdf 627cf7934a56958b4520ba779c6f1efafd9d6960152bff8cb9e9694e8cea0c5c Egalitarian society or benevolent dictatorship: The state of cryptocurrency governance - 2018.pdf aa630d637e4e1aedd91249d52609ab75b2eef2da8e4146e74f30e63c96fb7c26 eltoo.pdf 04f4f014f82d4a8baf7de893f3ff1ed17d9f26a96fa34159a72dcb7b87fe678a Enhancing bitcoin security and performance with strong consistency via collective signing.pdf fe8e5240d7e1b88d47c4997379f321095c925f19553f865f2b552358b2ab7dea Enhancing bitcoin transactions with covenants - 2017.pdf d6024e533a3e69cfecb45f0a2cd1754ab12cfac99af370654654db4b59030916 Enigma: Decentralized computation platform with guaranteed privacy.pdf 19dd96cd37ccf59a35421c6b553985d1e55a22d4833a67a84f7d25a32d9dddcc erhardt2016coinselection.pdf 2cb22cab78c4a4b78e911753bc7bd9f50fb929846fecffcf058d62030c840fc9 Estimating profitability of alternative cryptocurrencies - 2018.pdf d6787d8b5ca7a01afc21e738a5792c6b7d1eaa604fd1ccc23722bfcc4198d8ea Estimation of miner hash rates and consensus on blockchains - 2017.pdf 20c511e91264bf800fcf36c99a8062a260843fcfee926b19d96fcd8b87b07062 Ethereum: a secure decentralised generalised transaction ledger.pdf 7f08f9013dc005a4d18cd52c74cd99e2c3f394cccc9ae209c9151975c1a61b8d Evaluating user privacy in bitcoin.pdf 160c244b79d83356e60ed0a91804af10134c799885cb721566ced7a00b6ea1da Evolution of probabilistic consensus in digital organisms.pdf aa4ad6607fd79896d5ab085b506d29a7f93f69046dbbcacde213d1afbd5fbe6b Experiences deploying a large-scale emergent network - MojoNation - zooko.pdf 0948ef476b291caaa9ffc050104f1aa062693f10ad5c7cb965225f6951945c86 Exploiting transaction accumulation and double spends for topology inference in bitcoin - 2018.pdf ae336a03052eb56427ae0693bf315307d9dfaf5b27939d7ca17cdb60a99c0607 Extractable witness encryption and timed-release encryption from bitcoin - 2016.pdf ebd679c96ef681a95898bff869ac31dfd736fb84f857080777b0fd5ad28209b3 Fair client puzzles from the bitcoin blockchain - 2016.pdf 207422a07d829639aaaa41b3225ba1f9a8eb150553783c108bd0c2873d0fed76 falcon-retreat-2016-05-17.pdf 99814752d21fea51de75cd109f18f5e755c20137624f40485f5149b60cafacdd Fast and scalable payment network with Bitcoin duplex micropayment channels.pdf 419fdca106db0ab08025c9e04cff4b2651a996236cf906820c4d3166b5ab0bfe Fast batch verification for modular exponentiation and digital signatures.pdf 72ca433369b9085bcdec6be375ae40c62819c7663acbb2555051f21d589d5612 Faster batch forgery identification - djb.pdf 0edf31a9ddea38d3cd1cf59867882fd2b9d3f407a0613e039638c70bb54b0b3d Federal Reserve Board - Bitcoin: technical background and data analysis.pdf 556f2c907187e5d5b17f29689bce0fff71515947afcd3581b90d8ebad6e89416 Flare: An approach to routing in lightning network - 2016.pdf 18a0b6ae0a4cbe9374985cb96ac9e93756f7c4f39ffafc5b9374d2d2bac1c348 freimarkets-v0.0.1.pdf 94a27c47c360f0d76ca48a80c91c199ad9a6b25109ebf19454e2a2376e255702 From zero-knowledge to bulletproofs - FromZK2BPs - v1.pdf d72b19b78ad499f5b8bb0807f4fffedbc0239fbd7e86c4dbe16b5193f20212b1 Fully bideniable public-key encryption.pdf 783a655bf191ecf038a6c6c9a41b4de9c7d663976a7689b8b54c2dd049ae1022 Future technological directions in bitcoin - 2018-01-24.pdf 3e8957db8c539f51abfe13258eb61b92360f11fa83beba7f307122ed5028a716 Game-theoretic analysis of DDoS attacks against Bitcoin mining pools.pdf d1cdb14f210e0570a4d1a2c3fddea73f196b5ed96a5b9238fca7a294e8874455 glacier-protocol.pdf 8932739b2e198fa77d562345eb0bf493ce73482268de2ec8f13e41cc894cdc56 gmaxwell_sfbitcoin_2015_04_20.pdf b1fe7df98249101d39e85a6b79e3ba543a3ae86279d7b2045e8ffc52017cacf2 Group signatures.pdf 4451825e8a71405e9a300020587b34475246a1c8d8128fdac13a56b949bd3423 Hardening stratum, the bitcoin pool mining protocol - 2017.pdf fb8b1a6a3f8cdf48b189e77c0355e0f2ffb0f9d6d51d7f1d8c2b29f61c0d33bc Hashcash - a denial-of-service counter-measure.pdf 9d2a1f18b0556d478245a89a16d884dd312367b325fa8f4375547ee4dbd90607 Hash tube signature scheme.pdf d292e41ab1fd7f95c25a85b5459f3d04497c734988c8cf730184cfd58037ae90 Hawk: the blockchain model of cryptography and privacy-preserving smart contracts.pdf 59182fd464883d8b5064a2866c13956e1aa3fbb559e44cc9fc806474cbb6e3f0 Hey chain: A liquidity optimizing mechanism on lightning network - 2018.pdf 0226cd30a822d65fa38ad70aacb7d0cc5ed4e7376be8ba2f421a61952f0b907f Hierarchical deterministic Bitcoin wallets that can tolerate key leakage.pdf 062e51b3ecb964ae2f1fc251ce37112fc95cb72ae5e95ac9755ad30caf5b614d High-frequency jump analysis of the bitcoin market - 2017.pdf 64ce47f1830d6d0656effc884c061a00c0be5aa0b7f2537b90ce5e4b74ec099c Hijacking Bitcoin: Large-scale Network Attacks on Cryptocurrencies - 2016.pdf a6aa0380016a7b0f8ebb7f6795037b31f6f750088598ddb87125a3a1653ec8cf Hijacking Bitcoin: Routing attacks on cryptocurrencies - 2017.pdf 03f40a7acfd7229e34ba3f67dd72f2a78b5c40ee4b8cf9f82a343f29959bfd09 Homomorphic payment addresses and the pay-to-contract protocol.pdf 52b72ca99248b49e213c39135490a6c811893f68aac78e809227eaf6dd8b0280 How to leak a secret - ring signatures - Rivest.pdf f36b5cf208b3a45906558b8e994d20464a3b89aed1b08ed2fb42bd4d4a84fd44 How to squeeze a crowd: Reducing bandwidth in mixing cryptocurrencies.pdf 0b611c3f647ff5dab9a4b0ce7946964b719805a7b147d6bf84601f3eb32b58fb How to use bitcoin to design fair protocols.pdf 19c74048fe74a865acac486e3c8df38eb98f1ddde158e12bdc4fec54c2b31896 How to use bitcoin to incentivize correct computations.pdf affad00abc0cd4b8e5e6ef741a006ee1c2acd751a5335d866e6a4c69f85bb595 How to use indistinguishability obfuscation: deniable encryption, and more.pdf 80e1c33be45362d6ce0eeaba0259939df16eaff592cd612d42d783e4686c82b7 Impossibility of distributed consensus with one faulty process.pdf 48e69846fd57f73ad47a40330c8e052abf716d91b57e3117f37447950926f888 Improved cryptographic puzzle based on modular exponentiation - 2015.pdf f86bce50324aafc8b965e602aa55fe361ea33c1deed1cb7a9eeaa231f8813d0f Improving obfuscation in the CryptoNote protocol.pdf 3a45cde7edfaf7aca5cc0601ec999eef3a30f05c18f6b8c89ae8f39e33fb8c5e impulse.pdf 7da6e84aa6b0e018da608338d6985e31932003808e2a4a72c35bd417579f3005 Incentive mechanisms for securing the Bitcoin blockchain - BitFury.pdf 222e6d39e5d51de2ce3f72f6c0106606dad5617faab0b3f029d135f5b7c959c1 Incentivize p2p systems with lightweight micropayments.pdf 28310c0c3992ee4864de4a93b25e8bc80643244d11fcd4b80c8e4a2294cf0f7b Incentivizing double-spend collusion in bitcoin - 2017.pdf bc72a19534cb2aa852d343c57d3db8f4f49bc9aa4eeda3d9540bf242432ff707 Inclusive block chain protocols (using directed acyclic graphs instead of chains).pdf 3daaa796bf61e287e5b2037604e7e5013faec325fed1e365059a520cc55ec6e3 Increasing anonymity in bitcoin using one-way aggregatable signatures.pdf 224c69c9180e50e0dbbef4cd5f5960122bb7bb5db6b87eb8a70f5589dca5101c Information propagation in the Bitcoin network.pdf 082a592e27d4a47414e594b413e5e5e1bb950a8b3e37789ca0259d954584fbd6 Instantaneous decentralized poker - 2017.pdf 5c6859d71a5f2ad3261e12697dc0c1092b2b95cbad557bd1afd97f8ba82f8707 Invertible bloom lookup tables.pdf 56ebe1eaccb1871a4c06f5ac5962cd0d24a259dae8bd46626d1098b7f370bb9b jeremy-rubin-asicboost-notes.pdf 805ff936511859ff80637933d7ae547d52811471e0b8c1ffdbc605a63c2ae752 Join me on a market for anonymity - joinmarket - 2016.pdf daa069172878e2f97312ce86e3ed3411ea13fbc8429363dd9d403d582ac5e6aa libconsensus-2016-10-13.pdf 5b71eaee09af5c24d2e16b46feab4021d4517be8fe7b3867060fd4687be4d39a Lightning Network as Directed Graph Single-Funded Channel Topology - Tadge Dryja - 2016-04-11.pdf 435f9ed47f0c5d72c2a804fb3d8b9e6af59ff6632736ae4541322628f9616d81 lightning-network-paper-DRAFT-0.5.pdf 8824e863d199920e4c2eea1b91bb084e60343983e0728f17b36dfeadf94d2efa lightning-network-presentation-time-2015-07-06.pdf 24ce226fd1c03509906ea519ebb142a67f9f19e1223ab86ab93c0b9b2e3f70b3 lightning-network-summary.pdf 73a0abf5bfea70e9cbfd0faf4c63bad36d4254cce788d63c633cdb6d5b18a260 ln-deploy-draft-01.pdf a0643dee03c0555adf72bed2bee2550f0fc4dd6842e5933a8057596e1628f281 lucre-theory2.pdf df5e3553bdeaa25da3d248c5ee1e4d3be1a862a2ea29b0c6d04503c6807c02f6 Majority is not Enough: Bitcoin Mining is Vulnerable.pdf d0d5bbd5fcdfe6c40dd05b4ffbe035bd6ac6d0221f4c6110065fe2f8b1d3b8f2 Making bitcoin exchanges transparent.pdf be113db38765c0f8714e3bd86688bf9fdbf5f3c223fac80e940070649fb62c1f Making smart contracts smarter.pdf cf3dbd26bd838833d6c336b1538106cc26ecb4f9bb1972ea1ab82e8ca7e1124f Malleability of the blockchain's entropy - 2016.pdf 0aebd1803929edb5d69f34ccc14c2cddfa5b6de77bdfd768a11797d5c8b4e7fc mavepay1.pdf 11545c3d4dca323f2ccd77300840d4dcdbef74f156205af0e852524831edd9c2 Mempool optimized fees, and the correlation between user costs, miner incentives, and block capacity - 2017.pdf e506493af71e84bc9b636292922af0f512b3df9ef57291db670b6e5aa59dd5c3 Merged mining: Curse or cure? - 2017.pdf 0a515e4db2db93feafd4d4d86d9c5d94f5b11f89d8f4bcce9965f365022ed368 Merkle hash trees for distributed audit logs.pdf 260c3809c6f9cc971f9d00bb69c152e643015bbc675141a9cdaf3ca1cf67df5d merkle-proof.pdf 2f6d5e56cc39d4ed7604de110624a98b95b289ce7e431e06e00c5d9b70ec140b Merklized abstract syntax trees.pdf f86f27eda897d7edd5ff7343a6433c1d8dc9378a497917645d64b53f98ac86da Micropayments for decentralized currencies.pdf a5487d34a69d98a8cf5af850612a25ddbc92b8e782436e94d50a0cfb5ef73389 mimblewimble-2016-scaling-bitcoin-slides.pdf f9a8b8d7c7e2a63aeac0f146812188025696f58d113629717e9395d66dbb1ccb mimblewimble-andytoshi-draft-2016-10-20.pdf d3383b8316a1ac23018a1384624396e34b954e48d32817df51c36e4cd8fdb7e2 mimblewimble-andytoshi-INCOMPLETE-DRAFT-2016-09-25.pdf b9ee6cb484c6601dc3f10733d053fa03709b88602e88f24658ea54fa6dd4f1c0 mimblewimble-andytoshi-INCOMPLETE-DRAFT-2016-09-28-02.pdf fa449fd4dc19aee19f1542c3f1a05e4132ab2ecd75635683f97f224a4f5601e8 mimblewimble-andytoshi-INCOMPLETE-DRAFT-2016-09-28.pdf f9a8b8d7c7e2a63aeac0f146812188025696f58d113629717e9395d66dbb1ccb mimblewimble-andytoshi-INCOMPLETE-DRAFT-2016-10-06-001.pdf 609242c2c220c112d83fed1e9537b88dc3a604de77e4af32a7e37aee72b02f08 mimblewimble-mit-bitcoin-expo-2017-slides.pdf cd3fd1682a7223f3157ad483a3276cb995a73e5d50bef9946e8905a95d0b9e97 MiniLEGO: Efficient secure two-party computation from general assumptions (full version).pdf dc27f337ca903fb4613bdd5023714be33638601302812d931b8f74dddfb842cd Minimum disclosure proofs of knowledge.pdf 602d848eb2857432c92b59af366da67fc2d18e7023745ec0f76b974618f2cdbd mit-dci-iota-emails.pdf a6f8cb709de24212f9603747b2a25dddbdd3d664b0a4ba0e7d8f3541a9d06947 Mixcoin: Anonymity for Bitcoin with accountable mixes.pdf 5b5217e0641211e53434d6372ac516ba9f7e43ea80a527d97ae55a130b3cde6f Mixing confidential transactions: Comprehensive transaction privacy for bitcoin - 2017.pdf 624dce33b603d598a0d1b5c60fcc9e231d82f6dffd6b99c346e134ccb4772ee5 Monero-RCT-report.pdf dafb80105ebf03ae215d47c6d10808f4ca1304484d05a54eaf2966c11cc89ff0 Monopoly without a monopolist: An economic analysis of the bitcoin payment system - 2017.pdf 7dde01cdcc9711ececfff2c408d472465e4e916e998e74b2bc83ba8bc77eb2f5 Morgan Stanley blockchain report - 2016-04-20.pdf 2386de9e69956e5dacbd3161c133d9c33a394ecddd4e0e0a9850c9e38caeef37 mtgox-transparency-jan-2012.pdf a9024bc07000770ddd90ee63132ca1a7ab9a18ef0b630d0a9ca0735bdeab79aa Multi-hop locks for secure, privacy-preserving and interoperable payment-channel networks.pdf 480d6aad6059d8eccf2ba2024126aad058ca854dd4227acf3943d78e66cb630e Multi-signatures in the plain public-key model and a general forking lemma.pdf 08b37e78ee81668edc895636cc8c461a606025d5aeb3ffa9707a5c74f44ad5e0 new-pos.001.pdf cf136b180535966670b7f12c99081f8c44e17582e2f102c7be2183eec914ed87 Non-interactive proofs of proof-of-work - 2017.pdf 8a7acafbfdc0d1057ca0afb80df5d0a1e5b2a96f165228a905d2f877d3952433 nonoutsourceable_full.pdf e24eafb0fa6d274f6a609a09cca373761f06c2c73e8db01c5b89c1a10fb05be2 Nonoutsourceable scratch-off puzzles to discourage Bitcoin mining coalitions - Andrew Miller.pdf 356738dd107b6ca1af61524bee1bebd718afcd4f2531c2f4cab53351545367f9 Notes on scalable blockchain protocols using collations and partitioning - vbuterin.pdf 8ae5f8f9b9bcb3bcb7f5da65aa10f231fc4f9170095c3666d66fc6f64a8cfa09 Not so predictable mining pools: Attacking solo mining pools by bagging blocks and conning competitors - 2018.pdf f7dc4896c9295d454f12a59f0896ae4c57e803bb00b3e11a4397c736d39b53cc Obfuscation in bitcoin: Techniques and politics - Arvind Narayanan - 2017.pdf 6329ce588f5a648fc5bc75751f098bb03ae2e846ee48b290ec272dc47e5bf7cd Obscuro: A bitcoin mixer using trusted execution environments - 2017.pdf f109bc72b943631a4414428a9a193f52e7d8eb5fd9a44425284ba62b8cefa9f3 Off-line Karma: A decentralized currency for static peer-to-peer and grid networks - 2004.pdf 9b3bc1af5df26694bd2c8fc048d1daa39955f9795608b5fda3989c08a3f29c58 Okamoto beats Schnorr: On the provable security of multi-signatures - 2018.pdf 9e68760fd1acab3a671bb9c19ddb10597f5e898e80f95c8638babe5e726331c9 OldBlue: Causal broadcast in a mutually suspicious environment (working draft).pdf fcc6fea6af97446c8cca4880bffa34dac06b820d47a8386f2c119cbf6142388b On Bitcoin and red balloons.pdf e6f9f7b8f89152fc15989d9ffd5253e94c3810e8b2188c9af896ccaf9ae5d146 On bitcoin as a public randomness source - 2015.pdf 60014de5c72ced0b74e2806565eda52aea8f3d8ddbe88482552c5086d78ea377 On Bitcoin security in the presence of broken crypto primitives - 2016.pdf df1daa677d7f83c025a5e91be4ff3b02d69f9db40c42e28f0b7e9a38656dd0da One-out-of-many proofs: or how to leak a secret and spend a coin.pdf a71b9c14ace3e821fd94cb223cb028af868aba79fb3d4771ff2b8705d4f7620c One weird trick to stop selfish miners: Fresh bitcoins, a solution for the honest miner.pdf 65db274c404e795ad3a26ae014718e8acfa9e5764c6364bd5564034f24eccfd0 On profitability of selfish mining.pdf 75c9dec775027a3418862355faf3a170509f4632950f625e8a710ffd4eb58b8d On scaling decentralized blockchains - A position paper.pdf be9305cfa1c387a6aa6ca4fe453055fd24ddb1d46bcfb4d72160d12585c610fe On subversive miner strategies and block withholding attack in Bitcoin digital currency.pdf 6f2e1607ba0a336d234cee8a1793ab38c40feae5e786dac58293ea3909e7f888 On the instability of Bitcoin without the block reward - 2016.pdf 1fbdd19ae337000c9ac67f9df0c98b0a24be8e46b67c6af7cb687ca1b595ce26 On the necessity of a prescribed block validity consensus: Analyzing bitcoin unlimited mining protocol - 2017.pdf 47b7648318fe13ff7d1abe25271c2482172b441461a9ff7f1a34ae71e6886392 On the privacy provisions of bloom filters in lightweight Bitcoin clients.pdf 53cc7389bbd4abb8c45cfedd0bee44d96a9704d49a732f1d295aca5a9412e1f8 On the security and performance of proof-of-work blockchains - 2016.pdf 21c52ceb84ee084e03edcd405264331a6636c675b592712f82f1002480d1f603 Open-Transactions: Secure contracts between untrusted parties.pdf 12bd97321862cf1363b1bb95b4b222e569131e8bd42ea5c1a65cea6b80754ce1 Optimal selfish mining strategies in bitcoin.pdf e6a0d71cbc623aa9a86cc34697e6fd1f7cad19d37ad29152e52cfa89d59bc66b Optimizing fee estimation via the mempool state - 2017 - kallewoof.pdf 3104e2ad5b7e687e311e7cb99c05b8fe4434131f5af2eb9a61ea5bb9285d0766 Overview of colored coins - 2012-12-04.pdf 3104e2ad5b7e687e311e7cb99c05b8fe4434131f5af2eb9a61ea5bb9285d0766 Overview of colored coins.pdf dceb466838c21bd041d39a722eec9bd28c056a40f3e64566f86bf8f1e667b980 P2P mixing and unlinkable p2p transactions - Anonymity of the people, by the people, and for the people - 2016.pdf 3aa65c3b34eb71a7d509b7af50dcb14bde6f55387ebff74a060dc5c821dc8093 P2P mixing and unlinkable p2p transactions - Scalable strong anonymity without external routers - coinshuffle++ - 2016.pdf 36e8968fa52a1bb8f895438728ad74ba8870ed7f794c73e93d8c327655fed758 Paralysis proofs: Safe access-structure updates for cryptocurrencies and more - 2018.pdf 4130a5b0090b31820c0f626c073a9682e2819764303f172024dcde3e6efcd439 patent - WO2016200885 - Cryptographically concealing amounts transacted on a ledger while preserving a network's ability to verify the transaction - 2016.pdf d5c2e3e517a795897860c2b07824d377764a0a82118a4b5a48880a2d714aeb48 permacoin.pdf b669246abe8b5829b9a59ff00efafa575797d4b87d51ca2cfbd5336d2165c07d Phantom: A scalable block DAG protocol - 2018.pdf 77eb38d7cf4f0febe4c06f3cad3219027267f242fa1f57d5be51908fa8db7e9e PieceWork: Generalized outsourcing control for proofs of work - 2017.pdf 087497a022ad06a20134909bcb929471e259517ab4e7b3b6a8e6927ed09c6f63 PISA: Arbitration outsourcing for state channels.pdf 67e29f8df27bf68ad673fcdd4beb031c10ef79a19f90f0197d522d24bc246a12 Plasma: Scalable autonomous smart contracts - 2017.pdf 7044a8317e70fa91995ec8b8631ffbdd912ffc69aa152b015a01e06ea3abc97c pos.pdf 966b14119326be2853188c4b1303b588a4d737c4f2b7fbaf05a9e2f6c15c096e Practical constant-size ring signature.pdf 2e2de9038ce7ddd04118546d84b36bbd7c906eb1e851641c0a9a25e11dc0907c Practical delegation of computation using multiple servers.pdf ab9f87501abad71c8ae02703573ae0aa507944ceedd69c63825addd848c32560 Preventing transaction delays with a Lightning routing service for preventing abuse in Lightning-based peer-to-peer exchange.pdf 0e8458a521b92f54784488850f1d7b94952b87b8f1fa083ec239f5190b5b297c Price manipulation in the bitcoin ecosystem - 2017.pdf 4371b745c56c9c71e6876234c0d37881204507465ac0fed0da35a753150bbcc7 Princeton bitcoin book.pdf 886977fe7e913191cab989421b18e15f638f6a63346fde8d996853774816af9e Privacy-enhancing overlays in bitcoin.pdf 219c595b769ca276f41c6f743c61fffac5ba098af66fb20aaab92126b32103ae Proof-of-work as anonymous micropayment: rewarding a tor relay.pdf 2241ceee3eeb64f5cf5abc4552943eaa95371a2f041d18ffa303b8961002fffc Proof of work without all the work - 2017.pdf c0737af1c65063df6cb1404fc06a43b0a9be47af85ed02daa6227837e354b796 Proofs of partial knowledge and simplified design of witness hiding protocols.pdf 9ddc8484599f26cb3ee4c6482a0f58070407a5f0b693ef154bb73e449ca63f04 Proofs of proof of work with sublinear complexity.pdf b345e2cb8838019f204742f64968bb6d9e993f00d53aba72ea6d107c38bcc000 Proofs of work for blockchain protocols - 2017.pdf f3c4ebaac02618a3489119ddf7d63452b6d9dff44056320ed1a18c3b5e7b6512 Protocols for public-key cryptosystems.pdf edec9119cd2b48aa22e8d30633046d80b6bfda29ea6fdd00382ad184f38fe514 Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges.pdf 7d9664579af75aa923032aebfd8910561ac1b1a00526c083a497d008b7dce5a2 Pseudonymous secure computation from time-lock puzzles.pdf b1c86bb84470fed949a3e229b6e0b460f7d060c474341f716a7fd45671d2b0cc Publicly auditable secure multi-party computation.pdf b93ea9ec630d815271a629a2b533835583ac08968b93978570e022f0d074a0f1 Publicly verifiable proofs of sequential work.pdf 08b65560f2148268523f4ab62d80c4cf84ef4fb36c8696f0c6621a1af4b139ed Publish or perish: A backward-compatible defense against selfish mining in bitcoin.pdf 86c1ee41e3c6b0e73b2d9c498b76d6f374e05830d9a08e8cfe49f25d4745c412 Purely p2p crypto-currency with finite mini-blockchain.pdf 9700a858ef7997c230060d9aee159bbd4708e8878168b0a57c80ca308b89f8a7 Purely P2P crypto-currency with finite mini-blockchain.pdf c19cd64e42bcac3c6514d1ed9b85fadc0abbda041300bec5f4fbe86a287b7daa Quantum money from hidden subspaces - Scott Aaronson.pdf 73a0abf5bfea70e9cbfd0faf4c63bad36d4254cce788d63c633cdb6d5b18a260 Reaching the ground with lightning - Rusty Russell.pdf 28cc805211fc3f3fbcbc4e8e94e81d9b59ee3efb5e630522f259707c3f3fba6b Realizing hash-and-sign signatures under standard assumptions.pdf b48ca91adc59eeac3c542e1dedbe6911cd011f301c1dd741066f05b5985c3397 Realizing two-factor authentication for the Bitcoin protocol.pdf 2c18042748f71fc763d827a1f0a02485703166ada0e082549631c4a9d4c408ce Redactable blockchain or rewriting history in bitcoin and friends - 2016.pdf 7d1a771dfc22a6967568f0af3cd0482b1eb8db31247896975e192f431e596524 Redesigning bitcoin's fee market - 2017.pdf 8e71d7be1a0c2311cb611dbe69e59cdd4fc87c2e9555007755fef47963cfaaf6 Refund attacks on Bitcoin's Payment Protocol.pdf 69435c1f53db7cd6523394d6947dbc7651c605d17afca6ebf99d2f5fa16ad011 Regulating bitcoin and block chain derivatives - Houman B. Shadab.pdf 5328799b14800547b8e7194d95166662cc627a4850b436db7fc41214f73c8ee0 Regulating digital currencies - bringing Bitcoin within the reach of the IMF.pdf 57cbe38636893f3faedb5ae6f8238e35f4079d581bd51d2e047a6c1d5b0ac5e6 report-bsa-crypto-token1.pdf b1553bbba305dc258aa07578405e3f0f1e3336e98cce3a3616cf4c0f67ecbb80 Research perspectives and challenges for Bitcoin and cryptocurrencies.pdf 48aad60bbfcd24060a18824a151c1185040c8cce3751b3c693b975e8d6f7c6a5 Research perspectives on Bitcoin and second-generation cryptocurrencies - Andrew Miller (systemization of knowledge draft).pdf ddedbc51c29cdb1bd8c5fc9b3912a9305d93b8545b14dbc081dc34857e403e4d Revisiting difficulty control for blockchain systems - 2017.pdf af85d0078f10d05dca9fe2fbaac21dc8f2994d502d32a184b039d31bfd7f374f Ring confidential transactions - Noether - 2015.pdf cd9d5782a155c8dd6661dc8a6fc4fad83c3b6618ef0d237cc0522a11c7745e6c Ring confidential transactions.pdf 7d5b7dad343eebdb8a5961f726a8a8f455c48b2715298aaeaf8bdd1f8715a068 RingCT 2.0: A compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency monero - 2017.pdf 1393d2205f816a14e5981ea3385b56f3c6770b4a5c3e9487b27e550826008f10 Ring CT for Monero.pdf 245314272849844dec438b63e5553472ee1274d64a1750f4ac78afeeec0cedf5 RootstockWhitePaperv9-Overview.pdf 3a555e1a746a98b3de57c0889abd58dc5cd64050c9680ee29628d195047015e5 rtokenwhitepaper.pdf 896b1fb648c2bd0899127bd1edcbeb3f9cfb6f46d916fe3c2eef49f16d0a3ead Safer smart contracts through type-driven development - 2016.pdf 15576ea5c385d12a19a107b017b26727d0f327742372dc96e4871d6827502499 satoshium.pdf bdcf6e98e67e3e1523def7416c99ec64668eb0d6a04b6ca3d202d569be12f2e9 Scalable funding of bitcoin micropayment channel networks - 2017.pdf 0c0df48beac8508c2a90ee739264558e0e715b625eaaed010f15f19003a854d4 Scalable zero knowledge via cycles of elliptic curves.pdf 368ea42858cf81ca838bacf50637efd7924e95d7a9b869f8ef4a43796e3c82c4 scalingbitcoin-montreal-2015-summary.pdf c9b1cd35819822694f01c38f66470858420dfaebfbeb8018739dfaa44de012fb Scriptless scripts with ECDSA - 2018-04-26.pdf 06758e6bc6010afe81f01270d151feac551ecdf00bad579f1ed8e8d5f77d4670 Secure and efficient asynchronous broadcast protocols.pdf fa16dd25be5fbea87ed602a2d5bd72ca6eeca97f4765fce4cbf79c600e74418b Secure communications over insecure channels.pdf 1087a4d640b097e70f61c5e5453c92e48e989b9734f1595c56740db8e98de2c4 Secure multiparty computations on Bitcoin.pdf f266086008fbe51420e7ce00034b029b18d8a07a66e99f9e0cb29d45763379f2 Secure multi-party computation with identifiable abort.pdf da268619824498e2a42996ae87a4d1a96250da1083e33af1a76fdee481cf5cfb Securing Bitcoin wallets via a new DSA ECDSA threshold signature scheme.pdf 59ccbf1b3b22ed341c0dd7239c7bb5ac25124f23066efff818b812d0dab697a2 Securing Bitcoin wallets via threshold signatures.pdf 33c9788facf18e70379cb5ed937ed1b8b14246ed191f31024ac982faa0e18888 Security without identification.pdf 133a194c4027deb5ac480734812132136c3068a2af55965c6208740e92a17727 Serialization of proof-of-work events: Confirming transactions via recursive elections - 2016.pdf 3390731859b210b3ebf5d89673f8fb8f95a9c07dbbb1d8bd295b66eed327f84c shadowbitcoin-cset-20150810.pdf f8a6cda9000e1100e9055bd0a6e99ef871288a0060578e2c8b32d68cd891f046 Sharding PoW-based blockchains via proofs of knowledge - 2017.pdf f9031b7fb9b449fd7598f84823abd8aed4f001d5123864cf4361ac63b1f86547 Short accountable ring signatures based on DDH.pdf 47b37de9ec5aacc705931a8cc292dea49e96a275ee5fbc40877afe15c90bb274 Should Cryptocurrencies be included in the Portfolio of International Reserves held by the Central Bank of Barbados.pdf 680c71aef9ed578720e25c58fd50de5cdbee755c3800e7601dad9a745ca65cf3 sidechains.pdf c0583e43ee3aeada8ed4d2a1602bf6ed9c5b12b82dabb8afdfd5a6afb02888ac Simple proofs of sequential work - 2018.pdf d5a8ab6943ceeebd83fde84ede1595c3012d8815fb3aff134f316ee7916a4b5a Simple schnorr multi-signatures with applications to bitcoin - 2018.pdf ece593d8530ff5e5212efce25da418c8d21cb992f9f8b28d9de557c46a57ae3f Simple schnorr multi-signatures with applications to bitcoin - 2018.v0.pdf a57347ed983b621586170d1b559403a875546fabc24eea8b09acab6a905b5f87 Simplicity: A new language for blockchains - 2017.pdf bb49284d66699a0a6625681e75dbb4fedd6cfbf2fa7c2cfbff9aacbef3943a5a Simulation-based evaluation of coin selection strategies - 2016.pdf 61e59eba1262e38c20eaf467c1a9d25c7ebcac4e05a1a112a991ba44c25f39b8 sizing_up_the_blocksize_debate.pdf f594cc9c8443b9e8791fab929e555653981206ef3ba88c6a0108bf5bc85a2dea Smart contract markets: trading derivative contracts on the blockchain - 2015 - Trevor Kiviat.pdf 570047c44f137daccbd451c8fc914319abd59685f507fefe5f10d88a80afad6d Smart contracts for bribing miners.pdf 10b01be390f4b7c4b4e6ebbd812ae63b6fe7db858cea4d55abed5438dc6f0fa3 Smart contracts make bitcoin mining pools vulnerable - 2017.pdf 6534764eb911eab2638674a202b7bbb072e1484feeeb7e3194545eb293dd7cbc Smarter signatures: Experiments in verifications - 2016.pdf 629fe7a96d35f3b33d751514b8a3360b6ad72dd04008252ecef4316a5e3d12b8 smart-signatures.pdf 9e8d2fd9645a6e3849ee54af92d69a9becf84055de2540990fd954bbd300bd58 Spacecoin: A cryptocurrency based on proofs of space.pdf a63ae4dfd1dffff72a69d6bb31826a83aa20785bd8c75d55861bb612f0e4275a Speed-security tradeoffs in blockchain protocols.pdf 6ae99661d2632d3f6dcca69270090332d71b8b178e103d15fca6025bf2bcb489 Sphinx: A compact and provably secure mix format.pdf 834c593726ace5e6bc4b1cf6382be64d09bc0eb02afe16a23284fba1aa2e4da0 Sprites: Payment channels that go faster than lightning - 2017.pdf 78ccce70b2a5c1c98eabcc884712d998a9d9810dccb775d809b9e334aac360f4 Spy vs. Spy: Rumor source obfuscation - p2p - 2015.pdf 4ede45a0bd408f31d506d362ceec249fb859c8cb87ff5032d50e43984699fdee Stake-bleeding attacks on proof-of-stake blockchains - 2018.pdf 7fce0bb2ce21549628f45d8a527ec6263c8d4335a9321af69a95cab17280873a Strain: A secure auction for blockchains - 2017.pdf 5d29da05958192902370febec4aeb0cf7c704370de668010f250ee450b1fa841 Stratum-networkprotocolspec.pdf 488f3a73ee2ec4367609e4cceab9554924658691db49e26c750e8e9dd0301c54 Streaming authenticated data structures - Shi.pdf 8835c2d2ba6e5fe8e1f57fe122575b888815ac348a5992bed9af5f2e11b728c7 Stressing out: Bitcoin stress testing - analysis - 2016.pdf 39fc6105d12bf07a75c700fdaa3552d516dcc3c53c8608190eafc99f14cec962 Strong federations: An interoperable blockchain solution to centralized third party risks - 2017.pdf 6a50b33ee7af2a2c4e663adaa824db8c022ad9359048b16849411995fd1c0a54 Stubborn mining: Generalizing selfish mining and combining with an eclipse attack.pdf 6743049cb0806f646683e3b7b03c2dba396781bd1759ec41a271807cf0dee09b Switch commitments: A safety switch for confidential transactions - 2017.pdf b93bfda97f4ec24458bdabcf5b300627b85194e38217637944b6a9d9b5b57a8d Sybil-resistant mixing for bitcoin.pdf 9408eabbab0425e68466cbe99eb16875dd8cbf0f9fe4d5f5c40b09511a4b2fec Sybil-resistant network identities from dedicated hardware.pdf 841b39f7f35ec56416662bc95f57bfaf72a22b6d6e62af25e1e232b8ea0f5bf2 Tampering with the delivery of blocks and transactions in bitcoin.pdf 7874eccf3f394634c5b3cd2772fba2139787e2da7a3916f06ea7df847437f2e1 Tangaroa - a Byzantine Fault Tolerant Raft.pdf d00ab40dbbe677b6b7394b75c4399a78bf21cc7dbb6a4452cea6e7b143d12744 tendermint_v02.pdf 7d290df1ac01ffbb654278a12044f4cdd792a311bd7e9574304a4715f388be83 tendermint_v03.pdf e04dc6169160dce74eee2aab9feb640bc55ddd56b7f84a0d65b0e6f6dec2f452 tendermint_v04.pdf ec2bbf18314267353b91ea9dc29bc099c1bbc0c36a065197e4a6fe7e77b3a068 tendermint_v05.pdf b9914b943a324999a17363307d60410cef77b6a551ca9867ced26bb056b73861 Tesseract: Real-time cryptocurrency exchange using trusted hardware - 2017.pdf cd24433a69511b2f91ed4f5d548f385353b82c60dbc8ffc06952c98a702037da The Bitcoin backbone protocol: Analysis and applications.pdf 40807dab08eb08477d6bd1ed22b91b4dcd6633550a4a62682ecbbd00c00d8b08 The Byzantine generals problem - Lamport - 1982.pdf 6d190be665fc1e651342eb54a6b8729c29d336b97483edc0a6e9b290c32b06d4 The case for central bank electronic money and the non-case for central bank cryptocurrencies - 2018.pdf 7c3e5b3e86df50026b0697617953de9af32a39716807989f5edd2b4d36c7090c The economics of bitcoin mining, or bitcoin in the presence of adversaries.pdf 848068169bcf10d604678f06c81d644f353fab4687b55c044cb7514d6ccc8085 The economics of bitcoin transaction fees - 2014.pdf 7f9f2bba3a95cce46d5abd9eec81492c4d018d4e0b97b37495f483aa776683b1 The evolution of bitcoin hardware - 2017.pdf 4658a3aafe925087a9335c02a3ae07022b9d7782f4b11aef15697ac958f892b2 The honey badger of BFT protocols - Andrew Miller - 2016.pdf 3e18da0bb94c02c9e11c81ef7318b973d78a910a84c8a04113b262d0e9f847b3 The impact and potential of blockchain on the securities transaction lifecycle - SWIFT - 2016.pdf eb61b801e378d9ce7c76124acd94fcd47c81a034ad4dccd38917098ba7adf5e3 The impact of transaction fees on bitcoin mining strategies - 2016.pdf d479715d590bd5f09b67a997759fba2904df6ee4991a7cf156e6a5531b9123f6 The miner's dilemma - Ittay Eyal.pdf 3ecba0b60e0c2783c7b31bb3afcbf1eccc85fdf32cc7cecdd3ec435ce070d261 Theoretical Bitcoin attacks with less than half of the computational power (draft) - Lear Bahack.pdf ae2d8feee28f49aae72bbe35747db6a69e5354b3922c6cf130ebce2d1e096e7e The price of anonymity: empirical evidence from a market for Bitcoin anonymization - 2017.pdf cd6d0115c39c29d7d95c66b8454d906a69151aa0cf40d5b19e2606e9a3e1fcb0 The Saddest Moment (about Byzantine fault tolerance).pdf 18c2cecfde383f2d9b089036521ee29fd04ebb35c670f811d4b4c0d0d0a04527 The sybil attack.pdf 6b1c90b71cbe90d3290989ae1f4938cf208460e26a006b8a135d1b5b5ca8f71c The tangle.pdf aa3f139dfd473c700ec7ee36010e2322be75bcdf5777102d2040bef5711348f4 The unreasonable effectiveness of address clustering - 2016.pdf 8207eb6961fb08f4d0af5812a8c4a5a024aa6865964e75dec2343a9a73b57b30 The unreasonable fundamental uncertitudes behind bitcoin mining - Nicolas Courtois - 2014.pdf 21c87e527f1b1c6145dbd1e08290a537997e30c5c2a1e836be9fb6cffe563da6 The Use of Distributed Ledger Technologies in Payment, Clearing, and Settlement - Lael Brainard - Federal Reserve - 2016-04-14.pdf c55e7cab4230aa3d7126748a149b2db6f0d7a67296d5eccfdd50a210299a96b2 Time, clocks, and the ordering of events in a distributed system - Lamport.pdf e44de08b02303422df52973343f28c5d517f4584af83b409e68517efd1f6afdc TLS-N: Non-repudiation over TLS enabling ubiquitous content signing for disintermediation.pdf 50da4ba3ce6d7704f1b2df634f51ed00ccd045a1b8f98755c645f12054ebce1a Town Crier: An authenticated data feed for smart contracts.pdf a515ed41827999601ed533d9feedde54e3d5e97a2651594b2c46e95c55917ea0 Traffic analysis attacks and trade-offs in anonymity providing systems - 2001.pdf 969ea18886b211995d9a57b6e153b11731ef5c6a0c673651e69c4a6716b6e799 Transaction remote release: use onion routing for transaction relaying for anonymity.pdf 518c712f6e30bf82c155bdbbb69b344f409d329804f2ea8f5cf004fd8b200c8a tree-chains-preliminary.pdf 00254892fe1e0f3a05807351b6a93e2daddec9fb994bcff7ee6ef1642a4f9d0b TumbleBit: An untrusted bitcoin-compatible anonymous payment hub - 2016.pdf b071c0ecbb7346facf18e4def94e60f874790811b8e9ad0181601137bb967d4f TumbleBit: An untrusted tumbler for bitcoin-compatible anonymous payments - 2016.pdf 1c2c3181f1c8f58698b9513ff99e01e53009efc86efdab621e619a9a87c0858e Two-factor authentication for the Bitcoin protocol.pdf 07e6544a55c3bf754043133498b2db5356877c636d27fb2185399d1ccc915637 Untraceable electronic cash.pdf 2c7fab48aed5bb61006713b01828e8a5138a11f67c22612d54a16da73a4dce86 Untraceable off-line cash in wallets with observers (1993).pdf 054d0dd18c56d616033f1bd6115876ba92d93ff121fe80146df6af3c5567e0f3 Velocity - fully-collateralized smart contracts for derivatives trading on ethereum.pdf f39fe70a43b5364e27f3ecf8577dbf6c49197690c84c2c1cc1e89296a33244ce Verifiable oblivious storage.pdf 63bed7753b755c00f9ae68660e36cad3ca742e4655f469895792a8d9b883aa9d Verifying computations without reexecuting them: from theoretical possibility to near practicality.pdf a126871d80ad6115b28c4d2252e802d9b1cb553f9ce8fd0f3f789ce53d3c2c99 VerSum: Verifiable computations over large public logs.pdf 264e9d5502ec12437cabd3e9327543865d7bdadc2e1e7dff2de9a33ec87d37fc visa-rules-public.pdf 25bbcaf4530e54da3c66c910440bd67f986df347d998af61c3834f9f213d25eb When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies - 2017.pdf d4a3b8586a2614244a9a2956bff6d638c79b06eaab90464687f15d25c147a8e2 Why buy when you can rent? Bribery attacks on Bitcoin consensus.pdf 7bc96f8205927f0a4122bd0308f0c4bf2f6e8357922e1a7fa7fb3fe6d5c877ba Why buy when you can rent? Bribery attacks on Bitcoin-style consensus - 2016.pdf b4231be329b801f3386f3bbf8768b2e6b72db7209fcf47a8034db4263686a04c zcash-protocol-specification-2016-10-28.pdf d2d47a9b88dea2572a58582df4bc74db8b6d3e1b7925e9ad252d76b9a3a3c842 zcash-protocol-specification-2.0-alpha-1.pdf 39ace2dbe6e5a65c8d4004e59fe4e66e9a07fc592209af1b600f96f4f38b47c7 Z-channel: Scalable and efficient scheme in zerocash - 2017.pdf 9b7cfc9434ed1cacf743a3c215e4a0d9fbc694aa8922a220f1ddff0f27be08d1 Zerocash: Decentralized anonymous payments from Bitcoin (extended version) - 2014-05-18.pdf 9b7cfc9434ed1cacf743a3c215e4a0d9fbc694aa8922a220f1ddff0f27be08d1 zerocash-extended-20140518.pdf 739ab979d70c1e0612671ed7892ed102da0e6e3b333a74eb2d4d58c166f958af zerocash-oakland2014.pdf d7575870b8f515c611263d769d997e7cad1c50fb3ae5b19c02ebd7233cdb66da Zerocoin: anonymous distributed e-cash from bitcoin.pdf f0c2d969515eec5883f234a463de6a71b0c8a9136923dd25c61f4aa9840f3426 Zero-collateral lotteries in bitcoin and ethereum - Andrew Miller - 2016.pdf db2649593c8bb94b5e41f03dab4d8dafe93644b2451b95cbde4dbfdcae0776d4 Zero-knowledge contingent payments revisited: Attacks and payments for services.pdf 3baa862925036497713bae0cd0142d1da2d9dd54c6cb48729f5df0c6c873ad0a zkcp3.pdf dfafb76b4cb25072c2be9c45f36c3f58b778f18b5fa99b227978232246655dca zkLedger: Privacy-preserving auditing for distributed ledgers - Narula - 2018.pdf 35938d1734ac562656b3e318c91fdf487288fcb001d7f5e8ef7c45126ff6b97e A formal language for analyzing contracts.html 6b2f9fd81770c8d216b02694c880e3fd5a23e8b8d05d2bff5bdd48147d4091d7 anti_observers.html 4f82438b44baee410dbd123d7f71c233f23688e86d57e84cdfa5dff2273c9da1 BLSmultisig.html 3350afed3b305e29319cc0c09a2d239603c793a5884ce1a850c46249070a13df Detecting double spending - Hal Finney.html 4b0991caa38c289e303586d89fbc2399373ba4dc116e52c9b270824d42ed7c5e Digital cash and privacy.html b47b0a3361159667d28c07d0c1c0aa7f13d11001d85af1dd3bbb747407fc194a ethereum.html f019d6d626586099fc986ad957e7de4ac18767c011fcdf3f8534dcf73e152d8e how-to-parse-bitcoin-blockchain.html b325dad4ef27911c90f06236d8a139f17da805af1288c60fa46d7edf697c3e96 ideafutures.html d84e61539f3ff96294500a0b662c91e73204c6909d1484d65d569a6f31673c3f intrapoly.html 813cbd9222d43369bcc661560244407c5b92f07530780901090a5e69c90ae592 origins-of-money.html 24613744bc7043a94147eaf777146209bb2e8d81b7dd88bf6fae2fa059baa294 Secure property titles with owner authority.html c381d4298a780d6e37d3ce131b0dd286bbbde6d65358a164d138621934043787 the-ricardian-contract.html 8f1dc54c12354108b4a744a4a56651d9e6212e76f219283690a281f3d51505dc Trusted third parties are security holes.html 97753c149b1cc17f9d6096d965d15dd280c4e7c0dc652aeb19b800d41c228aac unforgeablecostliness.html 39df0fc9b00b593c6d4365f6b51844d781041a11deeeed7fcc6d9c363fde6f77 Untraceable Digital Cash, Information Markets, and BlackNet.html 4c92c4071193fa61043e2333e877679f09a86b19337347594d2e79d01019605b Using electronic markets to achieve efficient task distribution.html 275ef16ceea0664e0731fa6670ef4466ab5fc1029c19d51c9eab3153935f2664 Zero-knowledge_proof.html f059099473588e736f52f647c034cb6965ba4de91c3a691f1244dc0fd1512813 bitcoin-wizards-fraud-proof.log.txt 7c6924b9ed965d28a1f297fe3468c45960f063f80943799ba774632ac9d24bdf bitmarket.txt 174211819266332adae4e01a5fa065703da8700655e7c4f91fa5a90bc57f2dc5 bitmarket.url.txt fd88a436ac0e007db9160c8790e391938cf29b198e6c49a0b2b9e37d1bd4f142 bitshares.url.txt 90b8784420809599b422ec61b374db26a65e2b0539ffb4764f3a68c245312415 bmoney.txt 15ade4bb8ec9f2b2d930e8023faa58d0090fd16505d5dcb1050b461d84f8d8a6 brs-arbitrary-output-sizes.txt 402f5d754f62ccd3eee9b543a9d8d6522129c3e0fa5ada9d8ed23cfb3d0e9881 confidential_values.20150821.txt c32653e6bad3fc540197cb2b047dd8174669a4f261009cb0536491b57b08f517 confidential_values.txt 828d6ad7e957129d757f6dd52a8697f17cd4612a65674e7acdfeffa97302396f cyphernomicon.txt a7def2b936df86a1bf0f55db6e7ea6e44ede310fe36017486ac14ad08d3110a8 cypherpunk-manifesto.txt 4806c0749f1b1dc503f69c0833343a1da568b967623d15e7f5a3eb6c2fe3e5df get.txt df292d821dfec25afe6e43db4c3e1d7c77d3c28bd70a4f6ba5ef60f79cc2f866 gmaxwell-simple_verifyable_execution.txt 4bb0600cd348aa06fa77017a6e767ba1902be362a5d62938f5001841237416cd mimblewimble.txt e77f7e02b8e1ae9d173eb6588cdbdd5996618a035d919bc58c02b53b87d8ecce ringsig-blinding.txt 05ee93e576458a95566ca5be96744d538a2787dab772b8ed4421d1937bb3f974 Riv99b.lcs35-puzzle-description.txt 53b385ca8c3b99aa7a507db9f3742be9081e2dd3708612b7ff24f3236320f8a2 rusty-russell-shachain-design.txt 10fe87dc54c6f81496eac2558585e04fcaa4b3b2c370db0a235e3b05b4a2eb30 url.bak.txt a594c64491bbe4b8007553b0046f03922482aa86e1e5cd593748ab4c7793cc10 url.txt f236ce9f562aeac0512a9da8639fafaba89cbf45e0f95c7820ca703f39c57462 filehashes.txt