Abstract is missing.
- Attacking the DeFi Ecosystem with Flash Loans for Fun and ProfitKaihua Qin, Liyi Zhou, Benjamin Livshits, Arthur Gervais. 3-32 [doi]
- The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart ContractsChristof Ferreira Torres, Antonio Ken Iannillo, Arthur Gervais, Radu State. 33-52 [doi]
- Timelocked BribingTejaswi Nadahalli, Majid Khabbazian, Roger Wattenhofer. 53-72 [doi]
- Shielded Computations in Smart Contracts Overcoming ForksVincenzo Botta, Daniele Friolo, Daniele Venturi 0001, Ivan Visconti. 73-92 [doi]
- A Formal Model of Algorand Smart ContractsMassimo Bartoletti, Andrea Bracciali, Cristian Lepore, Alceste Scalas, Roberto Zunino. 93-114 [doi]
- Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask)Jaswant Pakki, Yan Shoshitaishvili, Ruoyu Wang 0001, Tiffany Bao, Adam Doupé. 117-146 [doi]
- Perimeter: A Network-Layer Attack on the Anonymity of CryptocurrenciesMaria Apostolaki, Cedric Maire, Laurent Vanbever. 147-166 [doi]
- An Empirical Analysis of Privacy in the Lightning NetworkGeorge Kappos, Haaroon Yousaf, Ania M. Piotrowska, Sanket Kanjalkar, Sergi Delgado-Segura, Andrew Miller 0001, Sarah Meiklejohn. 167-186 [doi]
- Cross-Layer Deanonymization Methods in the Lightning ProtocolMatteo Romiti, Friedhelm Victor, Pedro Moreno-Sanchez, Peter Sebastian Nordholt, Bernhard Haslhofer, Matteo Maffei. 187-204 [doi]
- The Complex Shape of Anonymity in Cryptocurrencies: Case Studies from a Systematic ApproachNiluka Amarasinghe, Xavier Boyen, Matthew McKague. 205-225 [doi]
- Improving the Efficiency of AES Protocols in Multi-Party ComputationF. Betül Durak, Jorge Guajardo. 229-248 [doi]
- Rabbit: Efficient Comparison for Secure Multi-Party ComputationEleftheria Makri, Dragos Rotaru, Frederik Vercauteren, Sameer Wagh. 249-270 [doi]
- Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Multiparty ComputationReo Eriguchi, Atsunori Ichikawa, Noboru Kunihiro, Koji Nuida. 271-290 [doi]
- Specfuscator: Evaluating Branch Removal as a Spectre MitigationMartin Schwarzl, Claudio Canella, Daniel Gruss, Michael Schwarz 0001. 293-310 [doi]
- Speculative Dereferencing: Reviving ForeshadowMartin Schwarzl, Thomas Schuster, Michael Schwarz 0001, Daniel Gruss. 311-330 [doi]
- Sigforgery: Breaking and Fixing Data Authenticity in SigfoxLoïc Ferreira. 331-350 [doi]
- Short Paper: Terrorist Fraud in Distance Bounding: Getting Around the ModelsDavid Gérault. 351-359 [doi]
- SoK: Securing Email - A Stakeholder-Based AnalysisJeremy Clark, Paul C. van Oorschot, Scott Ruoti, Kent E. Seamons, Daniel Zappala. 360-390 [doi]
- Zero-Knowledge Proofs for Set Membership: Efficient, Succinct, ModularDaniel Benarroch, Matteo Campanelli, Dario Fiore 0001, Kobi Gurkan, Dimitris Kolonelos. 393-414 [doi]
- Generic Plaintext Equality and Inequality ProofsOlivier Blazy, Xavier Bultel, Pascal Lafourcade 0001, Octavio Perez-Kempner. 415-435 [doi]
- Somewhere Statistically Binding Commitment Schemes with ApplicationsPrastudy Fauzi, Helger Lipmaa, Zaira Pindado, Janno Siim. 436-456 [doi]
- Another Look at Extraction and Randomization of Groth's zk-SNARKKarim Baghery, Markulf Kohlweiss, Janno Siim, Mikhail Volkhov. 457-475 [doi]
- BooLigero: Improved Sublinear Zero Knowledge Proofs for Boolean CircuitsYaron Gvili, Sarah Scheffler, Mayank Varia. 476-496 [doi]
- Mining for Privacy: How to Bootstrap a Snarky BlockchainThomas Kerber, Aggelos Kiayias, Markulf Kohlweiss. 497-514 [doi]