


default search action
25th Financial Cryptography and Data Security 2021: Virtual Event - Part II
- Nikita Borisov, Claudia Díaz:

Financial Cryptography and Data Security - 25th International Conference, FC 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers, Part II. Lecture Notes in Computer Science 12675, Springer 2021, ISBN 978-3-662-64330-3
Blockchain Protocols
- Alexei Zamyatin, Mustafa Al-Bassam, Dionysis Zindros, Eleftherios Kokoris-Kogias, Pedro Moreno-Sanchez, Aggelos Kiayias, William J. Knottenbelt:

SoK: Communication Across Distributed Ledgers. 3-36 - Sri Aravinda Krishnan Thyagarajan

, Adithya Bhat, Bernardo Magri, Daniel Tschudi, Aniket Kate:
Reparo: Publicly Verifiable Layer to Repair Blockchains. 37-56 - Michael T. C. Chiu, Uros Kalabic:

Short Paper: Debt Representation in UTXO Blockchains. 57-64 - Vipul Goyal, Hanjun Li

, Justin Raizes:
Instant Block Confirmation in the Sleepy Model. 65-83 - Suryanarayana Sankagiri, Xuechao Wang

, Sreeram Kannan, Pramod Viswanath:
Blockchain CAP Theorem Allows User-Dependent Adaptivity and Finality. 84-103 - Soubhik Deb, Sreeram Kannan, David Tse:

PoSAT: Proof-of-Work Availability and Unpredictability, Without the Work. 104-128
Payment Channels
- Erkan Tairi

, Pedro Moreno-Sanchez, Matteo Maffei:
Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments. 131-150 - Arash Mirzaei, Amin Sakzad, Jiangshan Yu

, Ron Steinfeld:
FPPW: A Fair and Privacy Preserving Watchtower for Bitcoin. 151-169 - Ayelet Mizrahi

, Aviv Zohar
:
Congestion Attacks in Payment Channel Networks. 170-188 - Maxim Jourenko

, Mario Larangeira, Keisuke Tanaka:
Payment Trees: Low Collateral Payments for Payment Channel Networks. 189-208 - Zeta Avarikioti, Eleftherios Kokoris-Kogias, Roger Wattenhofer, Dionysis Zindros:

Brick: Asynchronous Incentive-Compatible Payment Channels. 209-230
Mining
- Tim Roughgarden

, Clara Shikhelman
:
Ignore the Extra Zeroes: Variance-Optimal Mining Pools. 233-249 - Lucianna Kiffer, Rajmohan Rajaraman:

HaPPY-Mine: Designing a Mining Reward Function. 250-268 - Yoko Shibuya, Go Yamamoto, Fuhito Kojima, Elaine Shi, Shin'ichiro Matsuo, Aron Laszka:

Selfish Mining Attacks Exacerbated by Elastic Hash Supply. 269-276
Scaling Blockchains
- Mustafa Al-Bassam, Alberto Sonnino, Vitalik Buterin, Ismail Khoffi:

Fraud and Data Availability Proofs: Detecting Invalid Blocks in Light Clients. 279-298 - Peiyao Sheng, Bowen Xue, Sreeram Kannan, Pramod Viswanath:

ACeD: Scalable Data Availability Oracle. 299-318 - Dimitris Karakostas, Nikos Karayannidis, Aggelos Kiayias:

Efficient State Management in Distributed Ledgers. 319-338 - Manuel M. T. Chakravarty, Sandro Coretti, Matthias Fitzi, Peter Gazi, Philipp Kant, Aggelos Kiayias, Alexander Russell

:
Fast Isomorphic State Channels. 339-358
Authentication and Usability
- Stephan Wiefling

, Markus Dürmuth
, Luigi Lo Iacono
:
What's in Score for Website Users: A Data-Driven Long-Term Study on Risk-Based Authentication Characteristics. 361-381 - Wenjie Bai, Jeremiah Blocki

:
DAHash: Distribution Aware Tuning of Password Hashing Costs. 382-405 - Sanchari Das, Andrew Kim, L. Jean Camp:

Short Paper: Organizational Security: Implementing a Risk-Reduction-Based Incentivization Model for MFA Adoption. 406-413
Measurement
- Anjali Vyas, Ram Sundara Raman, Nick Ceccio, Philipp M. Lutscher

, Roya Ensafi:
Lost in Transmission: Investigating Filtering of COVID-19 Websites. 417-436 - Lucianna Kiffer, Asad Salman, Dave Levin, Alan Mislove, Cristina Nita-Rotaru:

Under the Hood of the Ethereum Gossip Protocol. 437-456 - Daniel Perez, Sam M. Werner, Jiahua Xu, Benjamin Livshits:

Liquidations: DeFi on a Knife-Edge. 457-476
Cryptography
- Nicolas Alhaddad, Mayank Varia, Haibin Zhang:

High-Threshold AVSS with Optimal Communication Complexity. 479-498 - David Derler

, Sebastian Ramacher
, Daniel Slamanig
, Christoph Striecks
:
Fine-Grained Forward Secrecy: Allow-List/Deny-List Encryption and Applications. 499-519 - Pedro Geraldo M. R. Alves

, Jheyne N. Ortiz
, Diego F. Aranha
:
Faster Homomorphic Encryption over GPGPUs via Hierarchical DGT. 520-540 - Aydin Abadi

, Aggelos Kiayias:
Multi-instance Publicly Verifiable Time-Lock Puzzle and Its Applications. 541-559 - Muhammed F. Esgin, Veronika Kuchta

, Amin Sakzad, Ron Steinfeld, Zhenfei Zhang, Shifeng Sun, Shumo Chu:
Practical Post-quantum Few-Time Verifiable Random Function with Applications to Algorand. 560-578 - Chan Nam Ngo

, Fabio Massacci
, Florian Kerschbaum, Julian Williams
:
Practical Witness-Key-Agreement for Blockchain-Based Dark Pools Financial Trading. 579-598

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














