Abstract is missing.
- Leveraging Bitcoin Testnet for Bidirectional Botnet Command and Control SystemsFederico Franzoni, Ivan Abellan, Vanesa Daza. 3-19 [doi]
- Security Analysis on dBFT Protocol of NEOQin Wang, Jiangshan Yu, Zhiniang Peng, Van Cuong Bui, Shiping Chen 0001, Yong Ding, Yang Xiang 0001. 20-31 [doi]
- Breaking the Encryption Scheme of the Moscow Internet Voting SystemPierrick Gaudry, Alexander Golovnev. 32-49 [doi]
- Short Paper: XOR Arbiter PUFs Have Systematic Response BiasNils Wisiol, Niklas Pirnay. 50-57 [doi]
- Selfish Mining Re-ExaminedKevin Alarcón Negy, Peter R. Rizun, Emin Gün Sirer. 61-78 [doi]
- Fairness and Efficiency in DAG-Based CryptocurrenciesGeorgios Birmpas, Elias Koutsoupias, Philip Lazos, Francisco J. Marmolejo Cossío. 79-96 [doi]
- Stake Shift in Major Cryptocurrencies: An Empirical StudyRainer Stütz, Peter Gazi, Bernhard Haslhofer, Jacob Illum. 97-113 [doi]
- Coded Merkle Tree: Solving Data Availability Attacks in BlockchainsMingchao Yu, Saeid Sahraei, Songze Li, Salman Avestimehr, Sreeram Kannan, Pramod Viswanath. 114-134 [doi]
- Decentralized Privacy-Preserving Netting Protocol on Blockchain for Payment SystemsShengjiao Cao, Yuan Yuan, Angelo De Caro, Karthik Nandakumar, Kaoutar Elkhiyaoui, Yanyan Hu. 137-155 [doi]
- The Arwen Trading ProtocolsEthan Heilman, Sebastien Lipmann, Sharon Goldberg. 156-173 [doi]
- SoK: A Classification Framework for Stablecoin DesignsAmani Moin, Kevin Sekniqi, Emin Gün Sirer. 174-197 [doi]
- SoK: Layer-Two Blockchain ProtocolsLewis Gudgeon, Pedro Moreno-Sanchez, Stefanie Roos, Patrick McCorry, Arthur Gervais. 201-226 [doi]
- MicroCash: Practical Concurrent Processing of MicropaymentsGhada Almashaqbeh, Allison Bishop, Justin Cappos. 227-244 [doi]
- LockDown: Balance Availability Attack Against Lightning Network ChannelsCristina Pérez-Solà, Alejandro Ranchal Pedrosa, Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas, Joaquín García-Alfaro. 245-263 [doi]
- Ride the Lightning: The Game Theory of Payment ChannelsZeta Avarikioti, Lioba Heimbach, Yuyi Wang 0001, Roger Wattenhofer. 264-283 [doi]
- How to Profit from Payments ChannelsOguzhan Ersoy, Stefanie Roos, Zekeriya Erkin. 284-303 [doi]
- Boomerang: Redundancy Improves Latency and Throughput in Payment-Channel NetworksVivek Kumar Bagaria, Joachim Neu, David Tse. 304-324 [doi]
- DLSAG: Non-interactive Refund Transactions for Interoperable Payment Channels in MoneroPedro Moreno-Sanchez, Arthur Blue, Duc Viet Le, Sarang Noether, Brandon Goodell, Aniket Kate. 325-345 [doi]
- Cerberus Channels: Incentivizing Watchtowers for BitcoinZeta Avarikioti, Orfeas Stefanos Thyfronitis Litos, Roger Wattenhofer. 346-366 [doi]
- Communication-Efficient (Client-Aided) Secure Two-Party Protocols and Its ApplicationSatsuya Ohata, Koji Nuida. 369-385 [doi]
- th-Ranked Element in a Star NetworkAnselme Tueno, Florian Kerschbaum, Stefan Katzenbeisser 0001, Yordan Boev, Mubashir Qureshi. 386-403 [doi]
- Insured MPC: Efficient Secure Computation with Financial PenaltiesCarsten Baum, Bernardo David, Rafael Dowsley. 404-420 [doi]
- Zether: Towards Privacy in a Smart Contract WorldBenedikt Bünz, Shashank Agrawal, Mahdi Zamani, Dan Boneh. 423-443 [doi]
- An Airdrop that Preserves Recipient PrivacyRiad S. Wahby, Dan Boneh, Christopher Jeffrey, Joseph Poon. 444-463 [doi]
- RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger SecurityTsz Hon Yuen, Shifeng Sun, Joseph K. Liu, Man Ho Au, Muhammed F. Esgin, Qingzhao Zhang, Dawu Gu. 464-483 [doi]
- BLAZE: Practical Lattice-Based Blind Signatures for Privacy-Preserving ApplicationsNabil Alkeilani Alkadri, Rachid El Bansarkhani, Johannes Buchmann 0001. 484-502 [doi]
- Non-interactive Proofs of Proof-of-WorkAggelos Kiayias, Andrew Miller 0001, Dionysis Zindros. 505-522 [doi]
- Proof-of-BurnKostis Karantias, Aggelos Kiayias, Dionysis Zindros. 523-540 [doi]
- Non-interactive Cryptographic Timestamping Based on Verifiable Delay FunctionsEsteban Landerreche, Marc Stevens, Christian Schaffner. 541-558 [doi]
- Open Market or Ghost Town? The Curious Case of OpenBazaarJames E. Arps, Nicolas Christin. 561-577 [doi]
- Exploring the Monero Peer-to-Peer NetworkTong Cao, Jiangshan Yu, Jérémie Decouchant, Xiapu Luo, Paulo Veríssimo. 578-594 [doi]
- Surviving the Cryptojungle: Perception and Management of Risk Among North American Cryptocurrency (Non)UsersArtemij Voskobojnikov, Borke Obada-Obieh, Yue Huang, Konstantin Beznosov. 595-614 [doi]
- Address Clustering Heuristics for EthereumFriedhelm Victor. 617-633 [doi]
- What are the Actual Flaws in Important Smart Contracts (And How Can We Find Them)?Alex Groce, Josselin Feist, Gustavo Grieco, Michael Colburn. 634-653 [doi]
- Characterizing Code Clones in the Ethereum Smart Contract EcosystemNingyu He, Lei Wu, Haoyu Wang, Yao Guo, Xuxian Jiang. 654-675 [doi]
- Smart Contracts for Government Processes: Case Study and Prototype Implementation (Short Paper)Magnus Krogsbøll, Liv Hartoft Borre, Tijs Slaats, Søren Debois. 676-684 [doi]