Abstract is missing.
- Maximizing Extractable Value from Automated Market MakersMassimo Bartoletti, James Hsin-yu Chiang, Alberto Lluch-Lafuente. 3-19 [doi]
- Kicking-the-Bucket: Fast Privacy-Preserving Trading Using BucketsMariana Botelho da Gama, John Cartlidge, Antigoni Polychroniadou, Nigel P. Smart, Younes Talibi Alaoui. 20-37 [doi]
- Speculative Multipliers on DeFi: Quantifying On-Chain Leverage RisksZhipeng Wang, Kaihua Qin, Duc Vu Minh, Arthur Gervais. 38-56 [doi]
- Explainable ArgumentsLucjan Hanzlik, Kamil Kluczniak. 59-79 [doi]
- MPCCache: Privacy-Preserving Multi-Party Cooperative Cache Sharing at the EdgeDuong Tung Nguyen, Ni Trieu. 80-99 [doi]
- Multi-party Updatable Delegated Private Set IntersectionAydin Abadi, Changyu Dong, Steven J. Murdoch, Sotirios Terzis. 100-119 [doi]
- The Effect of False Positives: Why Fuzzy Message Detection Leads to Fuzzy Privacy Guarantees?István András Seres, Balázs Pejó, Péter Burcsi. 123-148 [doi]
- Differential Privacy in Constant Function Market MakersTarun Chitra, Guillermo Angeris, Alex Evans. 149-178 [doi]
- Anonymous Tokens with Public Metadata and Applications to Private Contact TracingTjerand Silde, Martin Strand 0001. 179-199 [doi]
- SnarkPack: Practical SNARK AggregationNicolas Gailly, Mary Maller, Anca Nitulescu. 203-229 [doi]
- On Interactive Oracle Proofs for Boolean R1CS StatementsIgnacio Cascudo, Emanuele Giunta. 230-247 [doi]
- Zero Knowledge Proofs Towards Verifiable Decentralized AI PipelinesNitin Singh, Pankaj Dayama 0001, Vinayaka Pandit. 248-275 [doi]
- Be Aware of Your LeadersShir Cohen, Rati Gelashvili, Eleftherios Kokoris-Kogias, Zekun Li, Dahlia Malkhi, Alberto Sonnino, Alexander Spiegelman. 279-295 [doi]
- Jolteon and Ditto: Network-Adaptive Efficient Consensus with Asynchronous FallbackRati Gelashvili, Lefteris Kokoris-Kogias, Alberto Sonnino, Alexander Spiegelman, Zhuolun Xiang. 296-315 [doi]
- Quick Order FairnessChristian Cachin, Jovana Micic, Nathalie Steinhauer, Luca Zanolini. 316-333 [doi]
- Analysis and Probing of Parallel Channels in the Lightning NetworkAlex Biryukov, Gleb Naumenko, Sergei Tikhomirov. 337-357 [doi]
- Hide & Seek: Privacy-Preserving Rebalancing on Payment Channel NetworksZeta Avarikioti, Krzysztof Pietrzak, Iosif Salem, Stefan Schmid 0001, Samarth Tiwari, Michelle Yeo. 358-373 [doi]
- Short Paper: A Centrality Analysis of the Lightning NetworkPhilipp Zabka, Klaus-Tycho Förster, Christian Decker, Stefan Schmid 0001. 374-385 [doi]
- Resurrecting Address Clustering in BitcoinMalte Möser, Arvind Narayanan. 386-403 [doi]
- ABSNFT: Securitization and Repurchase Scheme for Non-Fungible Tokens Based on Game Theoretical AnalysisHongyin Chen, Yukun Cheng, Xiaotie Deng, Wenhan Huang, Linxuan Rong. 407-425 [doi]
- Decentralisation Conscious Players and System ReliabilitySarah Azouvi, Alexander Hicks. 426-443 [doi]
- Towards Overcoming the Undercutting ProblemTiantian Gong, Mohsen Minaei, Wenhai Sun, Aniket Kate. 444-463 [doi]
- Arbitrage Attack: Miners of the World, Unite!Yuheng Wang, Jiliang Li, Zhou Su, Yuyi Wang 0001. 464-487 [doi]
- Suborn Channels: Incentives Against Timelock BribesZeta Avarikioti, Orfeas Stefanos Thyfronitis Litos. 488-511 [doi]
- Sliding Window Challenge Process for Congestion DetectionAyelet Lotem, Sarah Azouvi, Patrick McCorry, Aviv Zohar. 512-530 [doi]
- Short Paper: On Game-Theoretically-Fair Leader ElectionRati Gelashvili, Guy Goren, Alexander Spiegelman. 531-538 [doi]
- The Availability-Accountability Dilemma and Its Resolution via Accountability GadgetsJoachim Neu, Ertem Nusret Tas, David Tse. 541-559 [doi]
- Three Attacks on Proof-of-Stake EthereumCaspar Schwarz-Schilling, Joachim Neu, Barnabé Monnot, Aditya Asgaonkar, Ertem Nusret Tas, David Tse. 560-576 [doi]
- Permissionless Consensus in the Resource ModelBenjamin Terner. 577-593 [doi]
- Plumo: An Ultralight Blockchain ClientPsi Vesely, Kobi Gurkan, Michael Straka, Ariel Gabizon, Philipp Jovanovic, Georgios Konstantopoulos, Asa Oines, Marek Olszewski, Eran Tromer. 597-614 [doi]
- SoK: Blockchain Light ClientsPanagiotis Chatzigiannis, Foteini Baldimtsi, Konstantinos Chalkias. 615-641 [doi]
- Achieving Almost All Blockchain Functionalities with Polylogarithmic StorageParikshit Hegde, Robert Streit, Yanni Georghiades, Chaya Ganesh, Sriram Vishwanath. 642-660 [doi]
- Short Paper: On the Claims of Weak Block Synchronization in BitcoinSeungjin Baek, HoCheol Nam, Yongwoo Oh, Muoi Tran, Min-Suk Kang. 663-671 [doi]
- India's "Aadhaar" Biometric ID: Structure, Security, and VulnerabilitiesPratyush Ranjan Tiwari, Dhruv Agarwal 0001, Prakhar Jain, Swagam Dasgupta, Preetha Datta, Vineet Reddy, Debayan Gupta. 672-693 [doi]
- Short Paper: What Peer Announcements Tell Us About the Size of the Bitcoin P2P NetworkMatthias Grundmann, Hedwig Amberg, Max Baumstark, Hannes Hartenstein. 694-704 [doi]
- An Empirical Study of Two Bitcoin Artifacts Through Deep LearningRichard Tindell, Alex Mitchell 0002, Nathan Sprague, Xunhua Wang. 705-724 [doi]