Abstract is missing.
- Biased Nonce Sense: Lattice Attacks Against Weak ECDSA Signatures in CryptocurrenciesJoachim Breitner, Nadia Heninger. 3-20 [doi]
- Snow White: Robustly Reconfigurable Consensus and Applications to Provably Secure Proof of StakePhil Daian, Rafael Pass, Elaine Shi. 23-41 [doi]
- Compounding of Wealth in Proof-of-Stake CryptocurrenciesGiulia C. Fanti, Leonid Kogan, Sewoong Oh, Kathleen Ruan, Pramod Viswanath, Gerui Wang. 42-61 [doi]
- Short Paper: I Can't Believe It's Not Stake! Resource Exhaustion Attacks on PoSSanket Kanjalkar, Joseph Kuo, Yunqi Li, Andrew Miller. 62-69 [doi]
- Short Paper: An Exploration of Code Diversity in the Cryptocurrency LandscapePierre Reibel, Haaroon Yousaf, Sarah Meiklejohn. 73-83 [doi]
- Short Paper: An Empirical Analysis of Blockchain Forks in BitcoinTill Neudecker, Hannes Hartenstein. 84-92 [doi]
- Detecting Token Systems on EthereumMichael Fröwis, Andreas Fuchs, Rainer Böhme. 93-112 [doi]
- Measuring Ethereum-Based ERC20 Token NetworksFriedhelm Victor, Bianca Katharina Lüders. 113-129 [doi]
- New Empirical Traceability Analysis of CryptoNote-Style BlockchainsZuoxia Yu, Man Ho Au, Jiangshan Yu, Rupeng Yang, Qiuliang Xu, Wang Fat Lau. 133-149 [doi]
- Short Paper: An Empirical Analysis of Monero Cross-chain TraceabilityAbraham Hinteregger, Bernhard Haslhofer. 150-157 [doi]
- PRCash: Fast, Private and Regulated Transactions for Digital CurrenciesKarl Wüst, Kari Kostiainen, Vedran Capkun, Srdjan Capkun. 158-178 [doi]
- ZLiTE: Lightweight Clients for Shielded Zcash Transactions Using Trusted ExecutionKarl Wüst, Sinisa Matetic, Moritz Schneider, Ian Miers, Kari Kostiainen, Srdjan Capkun. 179-198 [doi]
- Designed to Be Broken: A Reverse Engineering Study of the 3D Secure 2.0 Payment ProtocolMohammed Aamir Ali, Aad van Moorsel. 201-221 [doi]
- Short Paper: Making Contactless EMV Robust Against Rogue Readers Colluding with Relay AttackersTom Chothia, Ioana Boureanu, Liqun Chen. 222-233 [doi]
- Short Paper: How to Attack PSD2 Internet BankingVincent Haupert, Stephan Gabert. 234-242 [doi]
- Your Money or Your Life - Modeling and Analyzing the Security of Electronic Payment in the UC FrameworkDirk Achenbach, Roland Gröll, Timon Hackenjos, Alexander Koch 0001, Bernhard Löwe, Jeremias Mechler, Jörn Müller-Quade, Jochen Rill. 243-261 [doi]
- Secure Trick-Taking Game Protocols - How to Play Online Spades with CheatersXavier Bultel, Pascal Lafourcade 0001. 265-281 [doi]
- ROYALE: A Framework for Universally Composable Card Games with Financial Rewards and Penalties EnforcementBernardo David, Rafael Dowsley, Mario Larangeira. 282-300 [doi]
- Universally Verifiable MPC and IRV Ballot CountingKim Ramchen, Chris Culnane, Olivier Pereira, Vanessa Teague. 301-319 [doi]
- 2) Communication, and Optimal ResilienceIttai Abraham, Srinivas Devadas, Danny Dolev, Kartik Nayak, Ling Ren 0001. 320-334 [doi]
- Oblivious PRF on Committed Vector Inputs and Application to Deduplication of Encrypted DataJan Camenisch, Angelo De Caro, Esha Ghosh, Alessandro Sorniotti. 337-356 [doi]
- Adaptively Secure Constrained Pseudorandom FunctionsDennis Hofheinz, Akshay Kamath, Venkata Koppula, Brent Waters. 357-376 [doi]
- LARA: A Design Concept for Lattice-Based EncryptionRachid El Bansarkhani. 377-395 [doi]
- Short Paper: The Proof is in the Pudding - Proofs of Work for Solving Discrete LogarithmsMarcella Hastings, Nadia Heninger, Eric Wustrow. 396-404 [doi]
- Minimizing Trust in Hardware Wallets with Two Factor SignaturesAntonio Marcedone, Rafael Pass, Abhi Shelat. 407-425 [doi]
- A Formal Treatment of Hardware WalletsMyrto Arapinis, Andriana Gkaniatsou, Dimitris Karakostas, Aggelos Kiayias. 426-445 [doi]
- VeriSolid: Correct-by-Design Smart Contracts for EthereumAnastasia Mavridou, Aron Laszka, Emmanouela Stachtiari, Abhishek Dubey. 446-465 [doi]
- Bitcoin Security Under Temporary Dishonest MajorityGeorgia Avarikioti, Lukas Käppeli, Yuyi Wang 0001, Roger Wattenhofer. 466-483 [doi]
- VAPOR: A Value-Centric Blockchain that is Scale-out, Decentralized, and Flexible by DesignZhijie Ren, Zekeriya Erkin. 487-507 [doi]
- Sprites and State Channels: Payment Networks that Go Faster Than LightningAndrew Miller 0001, Iddo Bentov, Surya Bakshi, Ranjit Kumaresan, Patrick McCorry. 508-526 [doi]
- Echoes of the Past: Recovering Blockchain Metrics from Merged MiningNicholas Stifter, Philipp Schindler, Aljosha Judmayer, Alexei Zamyatin, Andreas Kern, Edgar R. Weippl. 527-549 [doi]
- TxProbe: Discovering Bitcoin's Network Topology Using Orphan TransactionsSergi Delgado-Segura, Surya Bakshi, Cristina Pérez-Solà, James Litton, Andrew Pachulski, Andrew Miller 0001, Bobby Bhattacharjee. 550-566 [doi]
- Forecasting Suspicious Account Activity at Large-Scale Online Service ProvidersHassan Halawa, Konstantin Beznosov, Baris Coskun, Meizhu Liu, Matei Ripeanu. 569-587 [doi]
- Thinking Like a Fraudster: Detecting Fraudulent Transactions via Statistical Sequential FeaturesChen Jing, Cheng Wang 0001, ChunGang Yan. 588-604 [doi]
- Secure Multiparty PageRank Algorithm for Collaborative Fraud DetectionAlex Sangers, Maran van Heesch, Thomas Attema, Thijs Veugen, Mark Wiggerman, Jan Veldsink, Oscar Bloemen, Daniël Worm. 605-623 [doi]
- HEALED: HEaling & Attestation for Low-End Embedded DevicesAhmad Ibrahim 0002, Ahmad-Reza Sadeghi, Gene Tsudik. 627-645 [doi]
- One-Time Programs Made PracticalLianying Zhao, Joseph I. Choi, Didem Demirag, Kevin R. B. Butler, Mohammad Mannan, Erman Ayday, Jeremy Clark. 646-666 [doi]
- Statement VotingBingsheng Zhang, Hong-Sheng Zhou. 667-685 [doi]
- Fast Authentication from Aggregate Signatures with Improved SecurityMuslum Ozgur Ozmen, Rouzbeh Behnia, Attila A. Yavuz. 686-705 [doi]