Abstract is missing.
- Stressing Out: Bitcoin "Stress Testing"Khaled Baqer, Danny Yuxing Huang, Damon McCoy, Nicholas Weaver. 3-18 [doi]
- Why Buy When You Can Rent? - Bribery Attacks on Bitcoin-Style ConsensusJoseph Bonneau. 19-26 [doi]
- Automated Verification of Electrum WalletMathieu Turuani, Thomas Voegtlin, Michaël Rusinowitch. 27-42 [doi]
- Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain Bitcoin TransactionsEthan Heilman, Foteini Baldimtsi, Sharon Goldberg. 43-60 [doi]
- Proofs of Proofs of Work with Sublinear ComplexityAggelos Kiayias, Nikolaos Lamprou, Aikaterini-Panagiota Stouka. 61-78 [doi]
- Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency LabKevin Delmolino, Mitchell Arnett, Ahmed E. Kosba, Andrew Miller, Elaine Shi. 79-94 [doi]
- EthIKS: Using Ethereum to Audit a CONIKS Key Transparency LogJoseph Bonneau. 95-105 [doi]
- On Scaling Decentralized Blockchains - (A Position Paper)Kyle Croman, Christian Decker, Ittay Eyal, Adem Efe Gencer, Ari Juels, Ahmed E. Kosba, Andrew Miller, Prateek Saxena, Elaine Shi, Emin Gün Sirer, Dawn Song, Roger Wattenhofer. 106-125 [doi]
- Bitcoin CovenantsMalte Möser, Ittay Eyal, Emin Gün Sirer. 126-141 [doi]
- Cryptocurrencies Without Proof of WorkIddo Bentov, Ariel Gabizon, Alex Mizrahi. 142-157 [doi]
- Coercion-Resistant Internet Voting with Everlasting PrivacyPhilipp Locher, Rolf Haenni, Reto E. Koenig. 161-175 [doi]
- Selene: Voting with Transparent Verifiability and Coercion-MitigationPeter Y. A. Ryan, Peter B. Rønne, Vincenzo Iovino. 176-192 [doi]
- On the Possibility of Non-interactive E-Voting in the Public-Key SettingRosario Giustolisi, Vincenzo Iovino, Peter B. Rønne. 193-208 [doi]
- Efficiency Comparison of Various Approaches in E-Voting ProtocolsOksana Kulyk, Melanie Volkamer. 209-223 [doi]
- Remote Electronic Voting Can Be Efficient, Verifiable and Coercion-ResistantRoberto Araújo, Amira Barki, Solenn Brunet, Jacques Traoré. 224-232 [doi]
- Universal Cast-as-Intended VerifiabilityAlex Escala, Sandra Guasch, Javier Herranz, Paz Morillo. 233-250 [doi]
- Hiding Access Patterns in Range Queries Using Private Information Retrieval and ORAMGamze Tillem, Ömer Mert Candan, Erkay Savas, Kamer Kaya. 253-270 [doi]
- Optimizing MPC for Robust and Scalable Integer and Floating-Point ArithmeticLiisi Kerik, Peeter Laud, Jaak Randmets. 271-287 [doi]
- On-the-fly Homomorphic Batching/UnbatchingYarkin Doröz, Gizem S. Çetin, Berk Sunar. 288-301 [doi]
- Using Intel Software Guard Extensions for Efficient Two-Party Secure Function EvaluationDebayan Gupta, Benjamin Mood, Joan Feigenbaum, Kevin R. B. Butler, Patrick Traynor. 302-318 [doi]
- CallForFire: A Mission-Critical Cloud-Based Application Built Using the Nomad FrameworkMamadou H. Diallo, Michael August, Roger Hallman, Megan Kline, Henry Au, Vic Beach. 319-327 [doi]
- Cryptographic Solutions for Genomic PrivacyErman Ayday. 328-341 [doi]