


default search action
25th Financial Cryptography and Data Security 2021: Virtual Event - Part I
- Nikita Borisov, Claudia Díaz:

Financial Cryptography and Data Security - 25th International Conference, FC 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers, Part I. Lecture Notes in Computer Science 12674, Springer 2021, ISBN 978-3-662-64321-1
Smart Contracts
- Kaihua Qin, Liyi Zhou, Benjamin Livshits, Arthur Gervais:

Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit. 3-32 - Christof Ferreira Torres

, Antonio Ken Iannillo
, Arthur Gervais
, Radu State
:
The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts. 33-52 - Tejaswi Nadahalli, Majid Khabbazian, Roger Wattenhofer:

Timelocked Bribing. 53-72 - Vincenzo Botta

, Daniele Friolo
, Daniele Venturi, Ivan Visconti:
Shielded Computations in Smart Contracts Overcoming Forks. 73-92 - Massimo Bartoletti, Andrea Bracciali, Cristian Lepore

, Alceste Scalas
, Roberto Zunino
:
A Formal Model of Algorand Smart Contracts. 93-114
Anonymity and Privacy in Cryptocurrencies
- Jaswant Pakki, Yan Shoshitaishvili, Ruoyu Wang, Tiffany Bao, Adam Doupé:

Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask). 117-146 - Maria Apostolaki, Cedric Maire, Laurent Vanbever:

Perimeter: A Network-Layer Attack on the Anonymity of Cryptocurrencies. 147-166 - George Kappos, Haaroon Yousaf

, Ania M. Piotrowska, Sanket Kanjalkar, Sergi Delgado-Segura, Andrew Miller, Sarah Meiklejohn:
An Empirical Analysis of Privacy in the Lightning Network. 167-186 - Matteo Romiti

, Friedhelm Victor
, Pedro Moreno-Sanchez
, Peter Sebastian Nordholt, Bernhard Haslhofer
, Matteo Maffei:
Cross-Layer Deanonymization Methods in the Lightning Protocol. 187-204 - Niluka Amarasinghe, Xavier Boyen, Matthew McKague:

The Complex Shape of Anonymity in Cryptocurrencies: Case Studies from a Systematic Approach. 205-225
Secure Multi-party Computation
- F. Betül Durak, Jorge Guajardo:

Improving the Efficiency of AES Protocols in Multi-Party Computation. 229-248 - Eleftheria Makri, Dragos Rotaru, Frederik Vercauteren, Sameer Wagh:

Rabbit: Efficient Comparison for Secure Multi-Party Computation. 249-270 - Reo Eriguchi, Atsunori Ichikawa, Noboru Kunihiro

, Koji Nuida
:
Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Multiparty Computation. 271-290
System and Application Security
- Martin Schwarzl, Claudio Canella, Daniel Gruss

, Michael Schwarz:
Specfuscator: Evaluating Branch Removal as a Spectre Mitigation. 293-310 - Martin Schwarzl, Thomas Schuster, Michael Schwarz, Daniel Gruss:

Speculative Dereferencing: Reviving Foreshadow. 311-330 - Loïc Ferreira:

Sigforgery: Breaking and Fixing Data Authenticity in Sigfox. 331-350 - David Gérault:

Short Paper: Terrorist Fraud in Distance Bounding: Getting Around the Models. 351-359 - Jeremy Clark, Paul C. van Oorschot, Scott Ruoti

, Kent E. Seamons, Daniel Zappala:
SoK: Securing Email - A Stakeholder-Based Analysis. 360-390
Zero-Knowledge Proofs
- Daniel Benarroch, Matteo Campanelli

, Dario Fiore, Kobi Gurkan, Dimitris Kolonelos:
Zero-Knowledge Proofs for Set Membership: Efficient, Succinct, Modular. 393-414 - Olivier Blazy

, Xavier Bultel
, Pascal Lafourcade
, Octavio Perez-Kempner
:
Generic Plaintext Equality and Inequality Proofs. 415-435 - Prastudy Fauzi

, Helger Lipmaa, Zaira Pindado, Janno Siim
:
Somewhere Statistically Binding Commitment Schemes with Applications. 436-456 - Karim Baghery

, Markulf Kohlweiss
, Janno Siim
, Mikhail Volkhov:
Another Look at Extraction and Randomization of Groth's zk-SNARK. 457-475 - Yaron Gvili, Sarah Scheffler

, Mayank Varia:
BooLigero: Improved Sublinear Zero Knowledge Proofs for Boolean Circuits. 476-496 - Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss

:
Mining for Privacy: How to Bootstrap a Snarky Blockchain. 497-514

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














