Abstract is missing.
- SoK: Communication Across Distributed LedgersAlexei Zamyatin, Mustafa Al-Bassam, Dionysis Zindros, Eleftherios Kokoris-Kogias, Pedro Moreno-Sanchez, Aggelos Kiayias, William J. Knottenbelt. 3-36 [doi]
- Reparo: Publicly Verifiable Layer to Repair BlockchainsSri Aravinda Krishnan Thyagarajan, Adithya Bhat, Bernardo Magri, Daniel Tschudi, Aniket Kate. 37-56 [doi]
- Short Paper: Debt Representation in UTXO BlockchainsMichael Chiu, Uros Kalabic. 57-64 [doi]
- Instant Block Confirmation in the Sleepy ModelVipul Goyal, Hanjun Li, Justin Raizes. 65-83 [doi]
- Blockchain CAP Theorem Allows User-Dependent Adaptivity and FinalitySuryanarayana Sankagiri, Xuechao Wang, Sreeram Kannan, Pramod Viswanath. 84-103 [doi]
- PoSAT: Proof-of-Work Availability and Unpredictability, Without the WorkSoubhik Deb, Sreeram Kannan, David Tse. 104-128 [doi]
- Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain PaymentsErkan Tairi, Pedro Moreno-Sanchez, Matteo Maffei. 131-150 [doi]
- FPPW: A Fair and Privacy Preserving Watchtower for BitcoinArash Mirzaei, Amin Sakzad, Jiangshan Yu, Ron Steinfeld. 151-169 [doi]
- Congestion Attacks in Payment Channel NetworksAyelet Mizrahi, Aviv Zohar. 170-188 [doi]
- Payment Trees: Low Collateral Payments for Payment Channel NetworksMaxim Jourenko, Mario Larangeira, Keisuke Tanaka. 189-208 [doi]
- Brick: Asynchronous Incentive-Compatible Payment ChannelsZeta Avarikioti, Eleftherios Kokoris-Kogias, Roger Wattenhofer, Dionysis Zindros. 209-230 [doi]
- Ignore the Extra Zeroes: Variance-Optimal Mining PoolsTim Roughgarden, Clara Shikhelman. 233-249 [doi]
- HaPPY-Mine: Designing a Mining Reward FunctionLucianna Kiffer, Rajmohan Rajaraman. 250-268 [doi]
- Selfish Mining Attacks Exacerbated by Elastic Hash SupplyYoko Shibuya, Go Yamamoto, Fuhito Kojima, Elaine Shi, Shin'ichiro Matsuo, Aron Laszka. 269-276 [doi]
- Fraud and Data Availability Proofs: Detecting Invalid Blocks in Light ClientsMustafa Al-Bassam, Alberto Sonnino, Vitalik Buterin, Ismail Khoffi. 279-298 [doi]
- ACeD: Scalable Data Availability OraclePeiyao Sheng, Bowen Xue, Sreeram Kannan, Pramod Viswanath. 299-318 [doi]
- Efficient State Management in Distributed LedgersDimitris Karakostas, Nikos Karayannidis, Aggelos Kiayias. 319-338 [doi]
- Fast Isomorphic State ChannelsManuel M. T. Chakravarty, Sandro Coretti, Matthias Fitzi, Peter Gazi, Philipp Kant, Aggelos Kiayias, Alexander Russell. 339-358 [doi]
- What's in Score for Website Users: A Data-Driven Long-Term Study on Risk-Based Authentication CharacteristicsStephan Wiefling, Markus Dürmuth, Luigi Lo Iacono. 361-381 [doi]
- DAHash: Distribution Aware Tuning of Password Hashing CostsWenjie Bai, Jeremiah Blocki. 382-405 [doi]
- Short Paper: Organizational Security: Implementing a Risk-Reduction-Based Incentivization Model for MFA AdoptionSanchari Das, Andrew Kim, L. Jean Camp. 406-413 [doi]
- Lost in Transmission: Investigating Filtering of COVID-19 WebsitesAnjali Vyas, Ram Sundara Raman, Nick Ceccio, Philipp M. Lutscher, Roya Ensafi. 417-436 [doi]
- Under the Hood of the Ethereum Gossip ProtocolLucianna Kiffer, Asad Salman, Dave Levin, Alan Mislove, Cristina Nita-Rotaru. 437-456 [doi]
- Liquidations: DeFi on a Knife-EdgeDaniel Perez 0001, Sam M. Werner, Jiahua Xu, Benjamin Livshits. 457-476 [doi]
- High-Threshold AVSS with Optimal Communication ComplexityNicolas Alhaddad, Mayank Varia, Haibin Zhang. 479-498 [doi]
- Fine-Grained Forward Secrecy: Allow-List/Deny-List Encryption and ApplicationsDavid Derler, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks. 499-519 [doi]
- Faster Homomorphic Encryption over GPGPUs via Hierarchical DGTPedro Geraldo M. R. Alves, Jheyne N. Ortiz, Diego F. Aranha. 520-540 [doi]
- Multi-instance Publicly Verifiable Time-Lock Puzzle and Its ApplicationsAydin Abadi, Aggelos Kiayias. 541-559 [doi]
- Practical Post-quantum Few-Time Verifiable Random Function with Applications to AlgorandMuhammed F. Esgin, Veronika Kuchta, Amin Sakzad, Ron Steinfeld, Zhenfei Zhang, Shifeng Sun, Shumo Chu. 560-578 [doi]
- Practical Witness-Key-Agreement for Blockchain-Based Dark Pools Financial TradingChan Nam Ngo, Fabio Massacci, Florian Kerschbaum, Julian Williams. 579-598 [doi]