


default search action
27th Financial Cryptography and Data Security 2023: Virtual Event - Part II
- Foteini Baldimtsi

, Christian Cachin
:
Financial Cryptography and Data Security - 27th International Conference, FC 2023, Bol, Brač, Croatia, May 1-5, 2023, Revised Selected Papers, Part II. Lecture Notes in Computer Science 13951, Springer 2024, ISBN 978-3-031-47750-8
Proof of X
- Hamza Abusalah

:
SNACKs for Proof-of-Space Blockchains. 3-17 - Assimakis Kattis

, Joseph Bonneau
:
Proof of Necessary Work: Succinct State Verification with Fairness Guarantees. 18-35 - Shir Cohen, Guy Goren, Lefteris Kokoris-Kogias, Alberto Sonnino, Alexander Spiegelman:

Proof of Availability and Retrieval in a Modular Blockchain Architecture. 36-53 - Miranda Christ

, Joseph Bonneau
:
Limits on Revocable Proof Systems, With Implications for Stateless Blockchains. 54-71
Layer 2
- Maxim Jourenko

, Mario Larangeira:
State Machines Across Isomorphic Layer 2 Ledgers. 75-91 - Oguzhan Ersoy, Pedro Moreno-Sanchez, Stefanie Roos:

Get Me Out of This Payment! Bailout: An HTLC Re-routing Protocol. 92-109 - Yu Shen, Oguzhan Ersoy, Stefanie Roos:

Extras and Premiums: Local PCN Routing with Redundancy and Fees. 110-127 - Theo Diamandis

, Max Resnick
, Tarun Chitra
, Guillermo Angeris
:
An Efficient Algorithm for Optimal Routing Through Constant Function Market Makers. 128-145
Attack Techniques, Defenses, and Attack Case Studies
- Tong Cao, Jérémie Decouchant

, Jiangshan Yu
:
Leveraging the Verifier's Dilemma to Double Spend in Bitcoin. 149-165 - Jaehyun Ha

, Seungjin Baek
, Muoi Tran
, Min Suk Kang
:
On the Sustainability of Bitcoin Partitioning Attacks. 166-181 - Felix Stöger

, Anxin Zhou
, Huayi Duan
, Adrian Perrig
:
Demystifying Web3 Centralization: The Case of Off-Chain NFT Hijacking. 182-199 - Zilong Zhao

, Jiyue Huang
, Lydia Y. Chen
, Stefanie Roos:
Defending Against Free-Riders Attacks in Distributed Generative Adversarial Networks. 200-217
Empirical Studies and more Decentralized Finance
- Johnnatan Messias

, Vabuk Pahari, Balakrishnan Chandrasekaran
, Krishna P. Gummadi, Patrick Loiseau:
Dissecting Bitcoin and Ethereum Transactions: On the Lack of Transaction Contention and Prioritization Transparency in Blockchains. 221-240 - Tyler Kell

, Haaroon Yousaf, Sarah Allen, Sarah Meiklejohn, Ari Juels:
Forsage: Anatomy of a Smart-Contract Pyramid Scheme. 241-258 - Hanaa Abbas

, Maurantonio Caprolu
, Roberto Di Pietro
:
Understanding Polkadot Through Graph Analysis: Transaction Model, Network Properties, and Insights. 259-275 - Sébastien Andreina

, Lorenzo Alluminio, Giorgia Azzurra Marson
, Ghassan Karame
:
Short Paper: Estimating Patch Propagation Times Across Blockchain Forks. 276-287
Game Theory and Protocols
- Lioba Heimbach

, Quentin Kniep
, Yann Vonlanthen
, Roger Wattenhofer
:
DeFi and NFTs Hinder Blockchain Scalability. 291-309 - Ertem Nusret Tas

, Dan Boneh
:
Cryptoeconomic Security for Data Availability Committees. 310-326 - Yunqi Zhang

, Shaileshh Bojja Venkatakrishnan
:
Kadabra: Adapting Kademlia for the Decentralized Web. 327-345 - Stefanos Leonardos

, Daniël Reijsbergen
, Barnabé Monnot
, Georgios Piliouras
:
Optimality Despite Chaos in Fee Markets. 346-362

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














