1. | Bitcoin: A Peer-to-Peer Electronic Cash System Nakamoto, Satoshi. 2008  | 13187 |
2. | Ethereum: a secure decentralised generalised transaction ledger Wood, Gavin. 2014  | 3499 |
3. | Blockchains and smart contracts for the internet of things Christidis, Konstantinos and Devetsikiotis, Michael. 2016 | 2417 |
4. | Majority is not enough: Bitcoin mining is vulnerable Eyal, Ittay and Gün Sirer, Emin. 2014  | 1703 |
5. | Decentralizing privacy: Using blockchain to protect personal data Zyskind, Guy and Nathan, Oz and others. 2015 | 1585 |
6. | Mastering Bitcoin: unlocking digital cryptocurrencies Antonopoulos, Andreas M. 2014 | 1548 |
7. | Hawk: The blockchain model of cryptography and privacy-preserving smart contracts Kosba, Ahmed and Miller, Andrew and Shi, Elaine and Wen, Zikai and Papamanthou, Charalampos. 2016  | 1509 |
8. | Pricing via processing or combatting junk mail Dwork, Cynthia and Naor, Moni. 1992 | 1506 |
9. | A next-generation smart contract and decentralized application platform Buterin, Vitalik. 2014  | 1463 |
10. | Hyperledger fabric: a distributed operating system for permissioned blockchains Androulaki, Elli and Barger, Artem and Bortnikov, Vita and Cachin, Christian and Christidis, Konstantinos and De Caro, Angelo and Enyeart, David and Ferris, Christopher and Laventman, Gennady and Manevich, Yacov and Muralidharan, Srinivasan and Murthy, Chet and Nguyen, Binh and Sethi, Manish and Singh, Gari and Smith, Keith and Sorniotti, Alessandro and Stathakopoulou, Chrysoula and Vukolić, Marko and Weed Cocco, Sharon and Yellick, Jason. 2018  | 1417 |
11. | Bitcoin and cryptocurrency technologies: a comprehensive introduction Narayanan, Arvind and Bonneau, Joseph and Felten, Edward and Miller, Andrew and Goldfeder, Steven. 2016 | 1360 |
12. | Formalizing and securing relationships on public networks Szabo, Nick. 1997 | 1203 |
13. | Zerocash: Decentralized anonymous payments from bitcoin Ben-Sasson, Eli and Chiesa, Alessandro and Garman, Christina and Green, Matthew and Miers, Ian and Tromer, Eran and Virza, Madars. 2014  | 1183 |
14. | An analysis of anonymity in the bitcoin system Reid, F and Harrigan, M. 2013 | 1086 |
15. | Making smart contracts smarter Luu, Loi and Chu, Duc-Hiep and Olickel, Hrishi and Saxena, Prateek and Hobor, Aquinas. 2016  | 1046 |
16. | A fistful of bitcoins: characterizing payments among men with no names Meiklejohn, Sarah and Pomarole, Marjori and Jordan, Grant and Levchenko, Kirill and McCoy, Damon and Voelker, Geoffrey M and Savage, Stefan. 2013  | 1037 |
17. | SoK: Research perspectives and challenges for bitcoin and cryptocurrencies Bonneau, Joseph and Miller, Andrew and Clark, Jeremy and Narayanan, Arvind and Kroll, Joshua A. and Felten, Edward W.. 2015  | 985 |
18. | Bitcoin-NG: A Scalable Blockchain Protocol Eyal, Ittay and Gencer, Adem Efe and Sirer, Emin Gün and van Renesse, Robbert. 2016  | 983 |
19. | The Bitcoin Backbone Protocol : Analysis and Applications Garay, Juan A and Kiayias, Aggelos and Leonardos, Nikos. 2014  | 983 |
20. | Information propagation in the Bitcoin network Decker, Christian and Wattenhofer, Roger. 2013  | 922 |
21. | Quantitative analysis of the full bitcoin transaction graph Ron, Dorit and Shamir, Adi. 2013 | 907 |
22. | On Scaling Decentralized Blockchains Croman, Kyle and Decker, Christian and Eyal, Ittay and Gencer, Adem Efe and Juels, Ari and Kosba, Ahmed and Miller, Andrew and Saxena, Prateek and Shi, Elaine and Gün Sirer, Emin. 2016 | 890 |
23. | On the security and performance of proof of work blockchains Gervais, Arthur and Karame, Ghassan O and W\"ust, Karl and Glykantzis, Vasileios and Ritzdorf, Hubert and Capkun, Srdjan. 2016  | 846 |
24. | Hashcash - A Denial of Service Counter-Measure Back, Adam. 2002 | 843 |
25. | The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication Vukolić, Marko. 2015 | 826 |
26. | Zerocoin: Anonymous distributed e-cash from bitcoin Miers, Ian and Garman, Christina and Green, Matthew and Rubin, Aviel D. 2013  | 816 |
27. | Ouroboros: A provably secure proof-of-stake blockchain protocol Kiayias, Aggelos and Russell, Alexander and David, Bernardo and Oliynykov, Roman. 2017  | 813 |
28. | A survey of attacks on ethereum smart contracts (sok) Atzei, Nicola and Bartoletti, Massimo and Cimoli, Tiziana. 2017  | 752 |
29. | Pinocchio: Nearly practical verifiable computation Parno, Bryan and Howell, Jon and Gentry, Craig and Raykova, Mariana. 2013 | 709 |
30. | Bitter to better - How to make bitcoin a better currency Barber, Simon and Boyen, Xavier and Shi, Elaine and Uzun, Ersin. 2012 | 696 |
31. | Algorand: Scaling byzantine agreements for cryptocurrencies Gilad, Yossi and Hemo, Rotem and Micali, Silvio and Vlachos, Georgios and Zeldovich, Nickolai. 2017  | 681 |
32. | Ipfs-content addressed, versioned, p2p file system Benet, Juan. 2014  | 630 |
33. | Ppcoin: Peer-to-peer crypto-currency with proof-of-stake King, Sunny and Nadal, Scott. 2012 | 629 |
34. | The bitcoin lightning network: Scalable off-chain instant payments Poon, Joseph and Dryja, Thaddeus. 2016  | 627 |
35. | A survey on the security of blockchain systems Li, Xiaoqi and Jiang, Peng and Chen, Ting and Luo, Xiapu and Wen, Qiaoyan. 2017 | 624 |
36. | Evaluating user privacy in bitcoin Androulaki, Elli and Karame, Ghassan O and Roeschlin, Marc and Scherer, Tobias and Capkun, Srdjan. 2013 | 585 |
37. | A secure sharding protocol for open blockchains Luu, Loi and Narayanan, Viswesh and Zheng, Chaodong and Baweja, Kunal and Gilbert, Seth and Saxena, Prateek. 2016  | 570 |
38. | Do you need a Blockchain? Wüst, Karl and Gervais, Arthur. 2017 | 562 |
39. | The economics of Bitcoin mining, or Bitcoin in the presence of adversaries Kroll, Joshua A and Davey, Ian C and Felten, Edward W. 2013 | 541 |
40. | Eclipse Attacks on Bitcoin's Peer-to-Peer Network Heilman, Ethan and Kendler, Alison and Zohar, Aviv and Goldberg, Sharon. 2015  | 522 |
41. | Quadratic span programs and succinct NIZKs without PCPs Gennaro, Rosario and Gentry, Craig and Parno, Bryan and Raykova, Mariana. 2013 | 518 |
42. | Enhancing bitcoin security and performance with strong consistency via collective signing Kogias, Eleftherios Kokoris and Jovanovic, Philipp and Gailly, Nicolas and Khoffi, Ismail and Gasser, Linus and Ford, Bryan. 2016  | 474 |
43. | A survey on security and privacy issues of bitcoin Conti, Mauro and Kumar, E Sandeep and Lal, Chhagan and Ruj, Sushmita. 2018 | 459 |
44. | Proof of Activity: Extending Bitcoin's Proof of Work via Proof of Stake Bentov, Iddo and Lee, Charles and Mizrahi, Alex and Rosenfeld, Meni. 2014 | 456 |
45. | Analysis of the Blockchain Protocol in Asynchronous Networks Pass, Rafael and Seeman, Lior and abhi Shelat. 2016 | 454 |
46. | SNARKs for C: Verifying program executions succinctly and in zero knowledge Ben-Sasson, Eli and Chiesa, Alessandro and Genkin, Daniel and Tromer, Eran and Virza, Madars. 2013  | 446 |
47. | A taxonomy of blockchain-based systems for architecture design Xu, Xiwei and Weber, Ingo and Staples, Mark and Zhu, Liming and Bosch, Jan and Bass, Len and Pautasso, Cesare and Rimba, Paul. 2017 | 446 |
48. | The Ripple protocol consensus algorithm Schwartz, D and Youngs, N and Britto, A. 2014 | 442 |
49. | Optimal Selfish Mining Strategies in Bitcoin Sapirshtein, Ayelet and Sompolinsky, Yonatan and Zohar, Aviv. 2015 | 438 |
50. | Step by step towards creating a safe smart contract: Lessons and insights from a cryptocurrency lab Delmolino, Kevin and Arnett, Mitchell and Kosba, Ahmed and Miller, Andrew and Shi, Elaine. 2016 | 437 |
51. | Formal verification of smart contracts: Short paper Bhargavan, Karthikeyan and Delignat-Lavaud, Antoine and Fournet, C\'edric and Gollamudi, Anitha and Gonthier, Georges and Kobeissi, Nadim and Kulatova, Natalia and Rastogi, Aseem and Sibut-Pinote, Thomas and Swamy, Nikhil and others. 2016 | 407 |
52. | Deanonymisation of clients in Bitcoin P2P network Biryukov, Alex and Khovratovich, Dmitry and Pustogarov, Ivan. 2014 | 405 |
53. | Omniledger: A secure, scale-out, decentralized ledger via sharding Kokoris-Kogias, Eleftherios and Jovanovic, Philipp and Gasser, Linus and Gailly, Nicolas and Syta, Ewa and Ford, Bryan. 2018 | 404 |
54. | Blockchain consensus protocols in the wild Cachin, Christian and Vukoli\'c, Marko. 2017 | 401 |
55. | Enabling blockchain innovations with pegged sidechains Back, A and Corallo, M and Dashjr, L. 2014 | 398 |
56. | The honey badger of BFT protocols Miller, Andrew and Xia, Yu and Croman, Kyle and Shi, Elaine and Song, Dawn. 2016 | 391 |
57. | Secure multiparty computations on bitcoin Andrychowicz, Marcin and Dziembowski, Stefan and Malinowski, Daniel and Mazurek, Lukasz. 2014 | 374 |
58. | Town crier: An authenticated data feed for smart contracts Zhang, Fan and Cecchetti, Ethan and Croman, Kyle and Juels, Ari and Shi, Elaine. 2016  | 365 |
59. | The Miner's Dilemma Eyal, Ittay. 2014  | 364 |
60. | Enigma: Decentralized computation platform with guaranteed privacy Zyskind, Guy and Nathan, Oz and Pentland, Alex. 2015  | 357 |
61. | Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture. Ben-Sasson, Eli and Chiesa, Alessandro and Tromer, Eran and Virza, Madars. 2014 | 354 |
62. | Separating succinct non-interactive arguments from all falsifiable assumptions Gentry, Craig and Wichs, Daniel. 2011  | 344 |
63. | Analysis of Hashrate-Based Double Spending Rosenfeld, Meni. 2014 | 335 |
64. | An analysis of anonymity in bitcoin using p2p network traffic Koshy, Philip and Koshy, Diana and McDaniel, Patrick. 2014 | 333 |
65. | Short pairing-based non-interactive zero-knowledge arguments Groth, Jens. 2010 | 333 |
66. | Mixcoin: Anonymity for bitcoin with accountable mixes Bonneau, Joseph and Narayanan, Arvind and Miller, Andrew and Clark, Jeremy and Kroll, Joshua A. and Felten, Edward W.. 2014 | 332 |
67. | Casper the friendly finality gadget Buterin, Vitalik and Griffith, Virgil. 2017  | 330 |
68. | A fast and scalable payment network with bitcoin duplex micropayment channels Decker, Christian and Wattenhofer, Roger. 2015 | 325 |
69. | The stellar consensus protocol: A federated model for internet-level consensus Mazieres, David. 2015  | 324 |
70. | An empirical analysis of smart contracts: platforms, applications, and design patterns Bartoletti, Massimo and Pompianu, Livio. 2017 | 323 |
71. | Darkcoin : Peer to Peer Crypto Currency with Anonymous Blockchain Transactions and an Improved Proof of Work System Duffield, Evan and Hagan, Kyle. 2014 | 300 |
72. | CoinShuffle: Practical decentralized coin mixing for bitcoin Ruffing, Tim and Moreno-Sanchez, Pedro and Kate, Aniket. 2014 | 300 |
73. | Cryptocurrencies without proof of work Bentov, Iddo and Gabizon, Ariel and Mizrahi, Alex. 2016 | 297 |
74. | Analysis of bitcoin pooled mining reward systems Rosenfeld, Meni. 2011 | 297 |
75. | Bulletproofs: Short proofs for confidential transactions and more B\"unz, Benedikt and Bootle, Jonathan and Boneh, Dan and Poelstra, Andrew and Wuille, Pieter and Maxwell, Greg. 2018  | 297 |
76. | Is bitcoin a decentralized currency? Gervais, Arthur and Karame, Ghassan O and Capkun, Vedran and Capkun, Srdjan. 2014 | 291 |
77. | How to use Bitcoin to design fair protocols Bentov, Iddo and Kumaresan, Ranjit. 2014 | 289 |
78. | On Bitcoin and red balloons Babaioff, Moshe and Dobzinski, Shahar and Oren, Sigal and Zohar, Aviv. 2011 | 286 |
79. | Securify: Practical security analysis of smart contracts Tsankov, Petar and Dan, Andrei and Drachsler-Cohen, Dana and Gervais, Arthur and Buenzli, Florian and Vechev, Martin. 2018  | 279 |
80. | A smart contract for boardroom voting with maximum voter privacy McCorry, Patrick and Shahandashti, Siamak F and Hao, Feng. 2017 | 278 |
81. | Hijacking bitcoin: Routing attacks on cryptocurrencies Apostolaki, Maria and Zohar, Aviv and Vanbever, Laurent. 2017 | 276 |
82. | Centrally banked cryptocurrencies Danezis, George and Meiklejohn, Sarah. 2015 | 267 |
83. | Inclusive block chain protocols Lewenberg, Yoad and Sompolinsky, Yonatan and Zohar, Aviv. 2015 | 266 |
84. | Permacoin: Repurposing bitcoin work for data preservation Miller, Andrew and Juels, Ari and Shi, Elaine and Parno, Bryan and Katz, Jonathan. 2014 | 260 |
85. | The blockchain folk theorem Biais, Bruno and Bisi\`ere, Christophe and Bouvard, Matthieu and Casamatta, Catherine. 2017 | 251 |
86. | Zeus: Analyzing safety of smart contracts Kalra, Sukrit and Goel, Seep and Dhawan, Mohan and Sharma, Subodh. 2018  | 246 |
87. | Finding The Greedy, Prodigal, and Suicidal Contracts at Scale Nikolic, Ivica and Kolluri, Aashish and Sergey, Ilya and Saxena, Prateek and Hobor, Aquinas. 2018 | 244 |
88. | On the size of pairing-based non-interactive arguments Groth, Jens. 2016  | 241 |
89. | On the instability of bitcoin without the block reward Carlsten, Miles and Kalodner, Harry and Weinberg, S Matthew and Narayanan, Arvind. 2016 | 238 |
90. | Hybrid consensus: Efficient consensus in the permissionless model Pass, Rafael and Shi, Elaine. 2017 | 234 |
91. | Rapidchain: Scaling blockchain via full sharding Zamani, Mahdi and Movahedi, Mahnush and Raykova, Mariana. 2018  | 228 |
92. | Plasma: Scalable Autonomous Smart Contracts Poon, Joseph and Buterin, Vitalik. 2017  | 226 |
93. | Succinct non-interactive arguments via linear interactive proofs Bitansky, Nir and Chiesa, Alessandro and Ishai, Yuval and Paneth, Omer and Ostrovsky, Rafail. 2013 | 224 |
94. | Proofs of Space Dziembowski, Stefan and Faust, Sebastian and Kolmogorov, Vladimir and Pietrzak, Krzysztof. 2015 | 223 |
95. | Mastering ethereum: building smart contracts and dapps Antonopoulos, Andreas M and Wood, Gavin. 2018  | 222 |
96. | Recursive composition and bootstrapping for SNARKs and proof-carrying data Bitansky, Nir and Canetti, Ran and Chiesa, Alessandro and Tromer, Eran. 2013 | 217 |
97. | Constant-size commitments to polynomials and their applications Kate, Aniket and Zaverucha, Gregory M and Goldberg, Ian. 2010  | 211 |
98. | Fruitchains: A fair blockchain Pass, Rafael and Shi, Elaine. 2016 | 210 |
99. | Tendermint: Byzantine fault tolerance in the age of blockchains Buchman, Ethan. 2016  | 208 |
100. | Decentralization in bitcoin and ethereum networks Gencer, Adem Efe and Basu, Soumya and Eyal, Ittay and Van Renesse, Robbert and Sirer, Emin G\"un. 2018 | 202 |
101. | Snow White: Provably Secure Proofs of Stake. Bentov, Iddo and Pass, Rafael and Shi, Elaine. 2016 | 196 |
102. | Difficulty control for blockchain-based consensus systems Kraft, Daniel. 2016 | 196 |
103. | On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency Courtois, Nicolas T and Bahack, Lear. 2013 | 193 |
104. | Scalable zero knowledge via cycles of elliptic curves Ben-Sasson, Eli and Chiesa, Alessandro and Tromer, Eran and Virza, Madars. 2017  | 181 |
105. | Game-theoretic analysis of DDoS attacks against Bitcoin mining pools Johnson, Benjamin and Laszka, Aron and Grossklags, Jens and Vasek, Marie and Moore, Tyler. 2014 | 177 |
106. | Empirical analysis of denial-of-service attacks in the Bitcoin ecosystem Vasek, Marie and Thornton, Micah and Moore, Tyler. 2014 | 177 |
107. | Scalable, transparent, and post-quantum secure computational integrity Eli Ben-Sasson and Iddo Bentov and Yinon Horesh and Michael Riabzev. 2018  | 176 |
108. | Defining the ethereum virtual machine for interactive theorem provers Hirai, Yoichi. 2017  | 173 |
109. | CryptoNote v 2.0 Saberhagen, Nicolas Van. 2013 | 172 |
110. | Primecoin: Cryptocurrency with prime number proof-of-work King, Sunny. 2013 | 171 |
111. | Geppetto: Versatile verifiable computation Costello, Craig and Fournet, C\'edric and Howell, Jon and Kohlweiss, Markulf and Kreuter, Benjamin and Naehrig, Michael and Parno, Bryan and Zahur, Samee. 2015  | 171 |
112. | Under-optimized smart contracts devour your money Chen, Ting and Li, Xiaoqi and Luo, Xiapu and Zhang, Xiaosong. 2017 | 169 |
113. | Demystifying incentives in the consensus computer Luu, Loi and Teutsch, Jason and Kulkarni, Raghav and Saxena, Prateek. 2015 | 168 |
114. | A Semantic Framework for the Security Analysis of Ethereum smart contracts Grishchenko, Ilya and Maffei, Matteo and Schneidewind, Clara. 2018 | 166 |
115. | Vector commitments and their applications Catalano, Dario and Fiore, Dario. 2013 | 166 |
116. | TumbleBit: An untrusted Bitcoin-compatible anonymous payment hub Heilman, Ethan and Alshenibr, Leen and Baldimtsi, Foteini and Scafuro, Alessandra and Goldberg, Sharon. 2017 | 165 |
117. | Bolt: Anonymous payment channels for decentralized currencies Green, Matthew and Miers, Ian. 2017  | 163 |
118. | Consensus in the age of blockchains Bano, Shehar and Sonnino, Alberto and Al-Bassam, Mustafa and Azouvi, Sarah and McCorry, Patrick and Meiklejohn, Sarah and Danezis, George. 2017 | 163 |
119. | Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts Cheng, Raymond and Zhang, Fan and Kos, Jernej and He, Warren and Hynes, Nicholas and Johnson, Noah and Juels, Ari and Miller, Andrew and Song, Dawn. 2019 | 157 |
120. | A Decentralized Public Key Infrastructure with Identity Retention. Fromknecht, Conner and Velicanu, Dragos and Yakoubov, Sophia. 2014 | 155 |
121. | Smartcheck: Static analysis of ethereum smart contracts Tikhomirov, Sergei and Voskresenskaya, Ekaterina and Ivanitskiy, Ivan and Takhaviev, Ramil and Marchenko, Evgeny and Alexandrov, Yaroslav. 2018  | 154 |
122. | Atomic cross-chain swaps Herlihy, Maurice. 2018 | 152 |
123. | Have a Snack, Pay with Bitcoins Bamert, Tobias and Decker, Christian and Elsen, Lennart and Wattenhofer, Roger and Welten, Samuel. 2013 | 150 |
124. | Verifiable Delay Functions Dan Boneh, Joseph Bonneau, Benedikt Bünz, Ben Fisch. 2018  | 150 |
125. | Fair two-party computations via bitcoin deposits Andrychowicz, Marcin and Dziembowski, Stefan and Malinowski, Daniel and Mazurek, Lukasz. 2014 | 147 |
126. | The Bitcoin Backbone Protocol with Chains of Variable Difficulty Juan A. Garay and Aggelos Kiayias and Nikos Leonardos. 2016  | 145 |
127. | ContractFuzzer: fuzzing smart contracts for vulnerability detection Jiang, Bo and Liu, Ye and Chan, WK. 2018 | 144 |
128. | Accelerating Bitcoin's Transaction Processing. Fast Money Grows on Trees, Not Chains Sompolinsky, Yonatan and Zohar, A. 2013 | 142 |
129. | Towards Verifying Ethereum Smart Contract Bytecode in Isabelle/HOL Amani, Sidney and B\'egel, Myriam and Bortin, Maksym and Staples, Mark. 2018 | 139 |
130. | Hotstuff: Bft consensus with linearity and responsiveness Yin, Maofan and Malkhi, Dahlia and Reiter, Michael K and Gueta, Guy Golan and Abraham, Ittai. 2019 | 138 |
131. | Zcash protocol specification Hopwood, Daira and Bowe, Sean and Hornby, Taylor and Wilcox, Nathan. 2016 | 137 |
132. | Ligero: Lightweight sublinear arguments without a trusted setup Ames, Scott and Hazay, Carmit and Ishai, Yuval and Venkitasubramaniam, Muthuramakrishnan. 2017  | 133 |
133. | The ring of gyges: Investigating the future of criminal smart contracts Juels, Ari and Kosba, Ahmed and Shi, Elaine. 2016 | 133 |
134. | Thunderella: Blockchains with Optimistic Instant Confirmation Rafael Pass and Elaine Shi. 2017 | 133 |
135. | Pbft vs proof-of-authority: applying the cap theorem to permissioned blockchain De Angelis, Stefano and Aniello, Leonardo and Baldoni, Roberto and Lombardi, Federico and Margheri, Andrea and Sassone, Vladimiro. 2018 | 132 |
136. | Speed-Security Tradeoffs in Blockchain Protocols Kiayias, Aggelos and Panagiotakos, Giorgos. 2015 | 130 |
137. | Incentive Compatibility of Bitcoin Mining Pool Reward Functions Schrijvers, Okke and Bonneau, Joseph and Boneh, Dan and Roughgarden, Tim. 2016 | 129 |
138. | ZKBoo: Faster Zero-Knowledge for Boolean Circuits. Giacomelli, Irene and Madsen, Jesper and Orlandi, Claudio. 2016 | 127 |
139. | Revive: Rebalancing Off-Blockchain Payment Networks Rami Khalil and Arthur Gervais. 2017 | 127 |
140. | Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security Gennaro, Rosario and Goldfeder, Steven and Narayanan, Arvind. 2016 | 127 |
141. | Madmax: Surviving out-of-gas conditions in ethereum smart contracts Grech, Neville and Kong, Michael and Jurisevic, Anton and Brent, Lexi and Scholz, Bernhard and Smaragdakis, Yannis. 2018 | 127 |
142. | Blindly signed contracts: Anonymous on-blockchain and off-blockchain bitcoin transactions Heilman, Ethan and Baldimtsi, Foteini and Goldberg, Sharon. 2016 | 126 |
143. | Binary quadratic forms Lipa Long. 2019 | 126 |
144. | Ring Signature Confidential Transactions for Monero Shen Noether. 2015 | 125 |
145. | RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero Sun, Shi-Feng and Au, Man Ho and Liu, Joseph K and Yuen, Tsz Hon. 2017 | 125 |
146. | Smart contracts: security patterns in the ethereum ecosystem and solidity Wohrer, Maximilian and Zdun, Uwe. 2018 | 125 |
147. | Chainspace: A Sharded Smart Contracts Platform Al-Bassam, Mustafa and Sonnino, Alberto and Bano, Shehar and Hrycyszyn, Dave and Danezis, George. 2017 | 123 |
148. | On Bitcoin as a public randomness source. Bonneau, Joseph and Clark, Jeremy and Goldfeder, Steven. 2015 | 123 |
149. | On power splitting games in distributed computation: The case of bitcoin pooled mining Luu, Loi and Saha, Ratul and Parameshwaran, Inian and Saxena, Prateek and Hobor, Aquinas. 2015 | 123 |
150. | Efficient RAM and control flow in verifiable outsourced computation. Wahby, Riad S and Setty, Srinath TV and Ren, Zuocheng and Blumberg, Andrew J and Walfish, Michael. 2015 | 121 |
151. | Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability Christian Badertscher and Peter Ga\vzi and Aggelos Kiayias and Alexander Russell and Vassilis Zikas. 2018 | 118 |
152. | Secure sampling of public parameters for succinct zero knowledge proofs Ben-Sasson, Eli and Chiesa, Alessandro and Green, Matthew and Tromer, Eran and Virza, Madars. 2015 | 118 |
153. | Efficient zero-knowledge arguments for arithmetic circuits in the discrete log setting Bootle, Jonathan and Cerulli, Andrea and Chaidos, Pyrros and Groth, Jens and Petit, Christophe. 2016 | 117 |
154. | Interactive oracle proofs Ben-Sasson, Eli and Chiesa, Alessandro and Spooner, Nicholas. 2016  | 117 |
155. | Concurrency and privacy with payment-channel networks Malavolta, Giulio and Moreno-Sanchez, Pedro and Kate, Aniket and Maffei, Matteo and Ravi, Srivatsan. 2017 | 115 |
156. | Resolving the conflict between generality and plausibility in verified computation Setty, Srinath and Braun, Benjamin and Vu, Victor and Blumberg, Andrew J and Parno, Bryan and Walfish, Michael. 2013 | 115 |
157. | SCPKI: A smart contract-based PKI and identity system Al-Bassam, Mustafa. 2017 | 114 |
158. | A traceability analysis of monero’s blockchain Kumar, Amrit and Fischer, Cl\'ement and Tople, Shruti and Saxena, Prateek. 2017 | 114 |
159. | Deterministic usage of the digital signature algorithm (DSA) and elliptic curve digital signature algorithm (ECDSA) Pornin, Thomas. 2013 | 114 |
160. | Taxonomy of blockchain technologies. Principles of identification and classification Tasca, Paolo and Tessone, Claudio J. 2017 | 112 |
161. | teether: Gnawing at ethereum to automatically exploit smart contracts Krupp, Johannes and Rossow, Christian. 2018  | 111 |
162. | Bitcoin as a Transaction Ledger: A Composable Treatment Christian Badertscher and Ueli Maurer and Daniel Tschudi and Vassilis Zikas. 2017 | 110 |
163. | Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions Roos, Stefanie and Moreno-Sanchez, Pedro and Kate, Aniket and Goldberg, Ian. 2017 | 106 |
164. | Pinocchio coin Danezis, George and Fournet, Cedric and Kohlweiss, Markulf and Parno, Bryan. 2013 | 105 |
165. | One-out-of-many proofs: Or how to leak a secret and spend a coin Groth, Jens and Kohlweiss, Markulf. 2015 | 105 |
166. | Anonymous Byzantine Consensus from Moderately-Hard Puzzles: A Model for Bitcoin Miller, Andrew and Jr, Jj LaViola. 2014 | 104 |
167. | Nonoutsourceable scratch-off puzzles to discourage bitcoin mining coalitions Miller, Andrew and Kosba, Ahmed and Katz, Jonathan and Shi, Elaine. 2015 | 104 |
168. | Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft) Lear Bahack. 2013 | 104 |
169. | Aurora: Transparent Succinct Arguments for R1CS Ben-Sasson, Eli and Chiesa, Alessandro and Riabzev, Michael and Spooner, Nicholas and Virza, Madars and Ward, Nicholas P. 2018  | 101 |
170. | Proofs of Space: When Space is of the Essence Ateniese, Giuseppe and Bonacina, Ilario and Faonio, Antonio and Galesi, Nicola. 2013 | 100 |
171. | Simple schnorr multi-signatures with applications to bitcoin Maxwell, Gregory and Poelstra, Andrew and Seurin, Yannick and Wuille, Pieter. 2018 | 100 |
172. | Online detection of effectively callback free objects with applications to smart contracts Grossman, Shelly and Abraham, Ittai and Golan-Gueta, Guy and Michalevsky, Yan and Rinetzky, Noam and Sagiv, Mooly and Zohar, Yoni. 2017 | 100 |
173. | Blockchain Access Privacy: Challenges and Directions Henry, Ryan and Herzberg, Amir and Kate, Aniket. 2018 | 99 |
174. | SpaceMint: A Cryptocurrency Based on Proofs of Space Sunoo Park and Albert Kwon and Georg Fuchsbauer and Peter Gaži and Joël Alwen and Krzysztof Pietrzak. 2015 | 98 |
175. | Designing secure Ethereum smart contracts: A finite state machine based approach Mavridou, Anastasia and Laszka, Aron. 2017 | 98 |
176. | How to use bitcoin to play decentralized poker Kumaresan, Ranjit and Moran, Tal and Bentov, Iddo. 2015 | 98 |
177. | DFINITY Technology Overview Series, Consensus System Hanke, Timo and Movahedi, Mahnush and Williams, Dominic. 2018  | 95 |
178. | Polkadot: Vision for a heterogeneous multi-chain framework Wood, Gavin. 2016 | 94 |
179. | SMART POOL : Practical Decentralized Pooled Mining Luu, Loi and Velner, Yaron and Teutsch, Jason and Saxena, Prateek. 2017 | 93 |
180. | Trends, tips, tolls: A longitudinal study of Bitcoin transaction fees M\"oser, Malte and B\"ohme, Rainer. 2015 | 93 |
181. | Simple verifiable delay functions Pietrzak, Krzysztof Z. 2019 | 93 |
182. | Doubly-efficient zkSNARKs without trusted setup Riad S. Wahby and Ioanna Tzialla and abhi shelat and Justin Thaler and Michael Walfish. 2017  | 92 |
183. | Efficient verifiable delay functions Wesolowski, Benjamin. 2019  | 91 |
184. | Vandal: A scalable security analysis framework for smart contracts Brent, Lexi and Jurisevic, Anton and Kong, Michael and Liu, Eric and Gauthier, Francois and Gramoli, Vincent and Holz, Ralph and Scholz, Bernhard. 2018 | 89 |
185. | Square span programs with applications to succinct NIZK arguments Danezis, George and Fournet, C\'edric and Groth, Jens and Kohlweiss, Markulf. 2014  | 88 |
186. | Compact Multi-Signatures for Smaller Blockchains Dan Boneh and Manu Drijvers and Gregory Neven. 2018 | 87 |
187. | A concurrent perspective on smart contracts Sergey, Ilya and Hobor, Aquinas. 2017 | 85 |
188. | A scalable verification solution for blockchains Teutsch, Jason and Reitwie\ssner, Christian. 2017 | 84 |
189. | MiMC: Efficient encryption and cryptographic hashing with minimal multiplicative complexity Albrecht, Martin and Grassi, Lorenzo and Rechberger, Christian and Roy, Arnab and Tiessen, Tyge. 2016 | 84 |
190. | Succinct non-interactive zero knowledge arguments from span programs and linear error-correcting codes Lipmaa, Helger. 2013  | 83 |
191. | Snarky Signatures: Minimal Signatures of Knowledge from Simulation-Extractable SNARKs Jens Groth and Mary Maller. 2017  | 82 |
192. | PHANTOM: A Scalable BlockDAG Protocol Yonatan Sompolinsky and Aviv Zohar. 2018 | 81 |
193. | Fast secure two-party ECDSA signing Lindell, Yehuda. 2017  | 81 |
194. | Scp: A computationally-scalable byzantine consensus protocol for blockchains Luu, Loi and Narayanan, Viswesh and Baweja, Kunal and Zheng, Chaodong and Gilbert, Seth and Saxena, Prateek. 2015 | 81 |
195. | Sprites and State Channels: Payment Networks that Go Faster than Lightning Miller, Andrew and Bentov, Iddo and Kumaresan, Ranjit and Cordi, Christopher and McCorry, Patrick. 2018  | 80 |
196. | Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updateable Structured Reference Strings Maller, Mary and Bowe, Sean and Kohlweiss, Markulf and Meiklejohn, Sarah. 2019  | 80 |
197. | An Empirical Analysis of Anonymity in Zcash Kappos, George and Yousaf, Haaroon and Maller, Mary and Meiklejohn, Sarah. 2018  | 79 |
198. | A multi-party protocol for constructing the public parameters of the Pinocchio zk-SNARK Bowe, Sean and Gabizon, Ariel and Green, Matthew D. 2018 | 79 |
199. | On Trees, Chains and Fast Transactions in the Blockchain Kiayias, Aggelos and Panagiotakos, Giorgos. 2016 | 78 |
200. | SoK: Off The Chain Transactions Gudgeon, Lewis and McCorry, Patrick and Moreno-Sanchez, Pedro and Gervais, Arthur and Roos, Stefanie. 2019 | 78 |
201. | Chain interoperability Buterin, Vitalik. 2016 | 78 |
202. | High Parallel Complexity Graphs and Memory-Hard Functions Alwen, Jo\"el and Serbinenko, Vladimir. 2015 | 76 |
203. | When bitcoin mining pools run dry Laszka, Aron and Johnson, Benjamin and Grossklags, Jens. 2015 | 76 |
204. | A protocol for interledger payments Thomas, Stefan and Schwartz, Evan. 2015 | 76 |
205. | Non-interactive proofs of proof-of-work Aggelos Kiayias and Andrew Miller and Dionysis Zindros. 2017 | 75 |
206. | P2P Mixing and Unlinkable Bitcoin Transactions. Ruffing, Tim and Moreno-Sanchez, Pedro and Kate, Aniket. 2017 | 74 |
207. | KEVM: A Complete Semantics of the Ethereum Virtual Machine Hildenbrandt, Everett and Saxena, Manasvi and Zhu, Xiaoran and Rodrigues, Nishant and Daian, Philip and Guth, Dwight and Rosu, Grigore. 2017  | 73 |
208. | Arbitrum: scalable, private smart contracts Kalodner, Harry and Goldfeder, Steven and Chen, Xiaoqi and Weinberg, S Matthew and Felten, Edward W. 2018  | 73 |
209. | SilentWhispers: Enforcing security and privacy in credit networks Malavolta, Giulio and Moreno-Sanchez, Pedro and Kate, Aniket and Maffei, Matteo. 2017 | 72 |
210. | FairSwap: How to fairly exchange digital goods Dziembowski, Stefan and Eckey, Lisa and Faust, Sebastian. 2018 | 72 |
211. | Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services Matteo Campanelli and Rosario Gennaro and Steven Goldfeder and Luca Nizzardo. 2017 | 71 |
212. | Scilla: a Smart Contract Intermediate-Level LAnguage Sergey, Ilya and Kumar, Amrit and Hobor, Aquinas. 2018  | 70 |
213. | Towards scaling blockchain systems via sharding Dang, Hung and Dinh, Tien Tuan Anh and Loghin, Dumitrel and Chang, Ee-Chien and Lin, Qian and Ooi, Beng Chin. 2019 | 70 |
214. | Solidus: An Incentive-compatible Cryptocurrency Based on Permissionless Byzantine Consensus Abraham, Ittai and Malkhi, Dahlia and Nayak, Kartik and Ren, Ling and Spiegelman, Alexander. 2016 | 69 |
215. | Ouroboros Praos: An adaptively-secure, semi-synchronous proof-of-stake protocol Bernardo David and Peter Ga\vzi and Aggelos Kiayias and Alexander Russell. 2017 | 69 |
216. | Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge. Tramer, Florian and Zhang, Fan and Lin, Huang and Hubaux, Jean-Pierre and Juels, Ari and Shi, Elaine. 2016 | 69 |
217. | Empirical Vulnerability Analysis of Automated Smart Contracts Security Testing on Blockchains Parizi, Reza M and Dehghantanha, Ali and Choo, Kim-Kwang Raymond and Singh, Amritraj. 2018 | 69 |
218. | Validation of decentralised smart contracts through game theory and formal methods Bigi, Giancarlo and Bracciali, Andrea and Meacci, Giovanni and Tuosto, Emilio. 2015 | 69 |
219. | On the Malleability of Bitcoin Transactions Marcin Andrychowicz and Stefan Dziembowski and Daniel Malinowski and Lukasz Mazurek. 2015 | 68 |
220. | Low-Resource Eclipse Attacks on Ethereum’s Peer-to-Peer Network Marcus, Yuval and Heilman, Ethan and Goldberg, Sharon. 2018 | 67 |
221. | An Empirical Analysis of Linkability in the Monero Blockchain Andrew Miller and Malte M\"oser and Kevin Lee and Arvind Narayanan. 2017 | 67 |
222. | Accountable privacy for decentralized anonymous payments Garman, Christina and Green, Matthew and Miers, Ian. 2016 | 67 |
223. | Bitcoin's security model revisited Sompolinsky, Yonatan and Zohar, Aviv. 2016 | 66 |
224. | Astraea: A decentralized blockchain oracle Adler, John and Berryhill, Ryan and Veneris, Andreas and Poulos, Zissis and Veira, Neil and Kastania, Anastasia. 2018 | 66 |
225. | Publicly Verifiable Proofs of Sequential Work Mahmoody, Mohammad and Moran, Tal and Vadhan, Salil. 2013 | 65 |
226. | Flare: An approach to routing in lightning network Prihodko, Pavel and Zhigulin, Slava and Sahno, Mykola and Ostrovskiy, Aleksei and Osuntokun, Olaoluwa. 2016 | 65 |
227. | Micropayments for decentralized currencies Pass, Rafael and Shelat, Abhi. 2015 | 65 |
228. | Stake-Bleeding Attacks on Proof-of-Stake Blockchains Peter Gaži and Aggelos Kiayias and Alexander Russell. 2018 | 64 |
229. | Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains Boneh, Dan and B\"unz, Benedikt and Fisch, Benjamin. 2018  | 64 |
230. | Updatable and Universal Common Reference Strings with Applications to zk-SNARKs Jens Groth and Markulf Kohlweiss and Mary Maller and Sarah Meiklejohn and Ian Miers. 2018 | 63 |
231. | Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability Giulio Malavolta and Pedro Moreno-Sanchez and Clara Schneidewind and Aniket Kate and Matteo Maffei. 2019  | 63 |
232. | Simplicity: A new language for blockchains O'Connor, Russell. 2017 | 63 |
233. | Hotstuff: Bft consensus in the lens of blockchain Yin, Maofan and Malkhi, Dahlia and Reiter, Michael K and Gueta, Guy Golan and Abraham, Ittai. 2018 | 63 |
234. | Zether: Towards Privacy in a Smart Contract World. B\"unz, Benedikt and Agrawal, Shashank and Zamani, Mahdi and Boneh, Dan. 2019  | 62 |
235. | Towards bitcoin payment networks McCorry, Patrick and M\"oser, Malte and Shahandasti, Siamak F and Hao, Feng. 2016 | 62 |
236. | EthIKS: Using Ethereum to audit a CONIKS key transparency log Bonneau, Joseph. 2016 | 61 |
237. | Cosmos: A network of distributed ledgers Kwon, Jae and Buchman, Ethan. 2016  | 61 |
238. | Algorand Chen, Jing and Micali, Silvio. 2016 | 61 |
239. | How did dread pirate roberts acquire and protect his bitcoin wealth? Ron, Dorit and Shamir, Adi. 2014 | 60 |
240. | Subversion-zero-knowledge SNARKs Georg Fuchsbauer. 2017 | 59 |
241. | A Survey of Two Verifiable Delay Functions. Boneh, Dan and B\"unz, Benedikt and Fisch, Ben. 2018 | 59 |
242. | Osiris: Hunting for integer bugs in ethereum smart contracts Torres, Christof Ferreira and Sch\"utte, Julian and others. 2018 | 59 |
243. | Fast secure multiparty ecdsa with practical distributed key generation and applications to cryptocurrency custody Lindell, Yehuda and Nof, Ariel. 2018 | 58 |
244. | The Gap Game Tsabary, Itay and Eyal, Ittay. 2018 | 57 |
245. | Publish or Perish: A Backward-Compatible Defense against Selfish Mining in Bitcoin Zhang, Ren and Preneel, Bart. 2017 | 57 |
246. | Tezos -- a self-amending crypto-ledger Goodman, L.M.. 2014 | 57 |
247. | Tesseract: Real-Time Cryptocurrency Exchange using Trusted Hardware. Bentov, Iddo and Ji, Yan and Zhang, Fan and Li, Yunqi and Zhao, Xueyuan and Breidenbach, Lorenz and Daian, Philip and Juels, Ari. 2017 | 57 |
248. | Setting standards for altering and undoing smart contracts Marino, Bill and Juels, Ari. 2016 | 57 |
249. | Pisa: Arbitration Outsourcing for State Channels McCorry, Patrick and Bakshi, Surya and Bentov, Iddo and Meiklejohn, Sarah and Miller, Andrew. 2018  | 56 |
250. | Fast multiparty threshold ecdsa with fast trustless setup Gennaro, Rosario and Goldfeder, Steven. 2018  | 56 |
251. | Analysis of the XRP ledger consensus protocol Chase, Brad and MacBrough, Ethan. 2018 | 56 |
252. | A Subversion-Resistant SNARK Behzad Abdolmaleki and Karim Baghery and Helger Lipmaa and Michal Zajac. 2017  | 55 |
253. | Scalable Multi-party Computation for zk-SNARK Parameters in the Random Beacon Model Sean Bowe and Ariel Gabizon and Ian Miers. 2017 | 55 |
254. | Incentivizing blockchain forks via whale transactions Liao, Kevin and Katz, Jonathan. 2017 | 55 |
255. | Privacy preserving payments in credit networks Moreno-Sanchez, Pedro and Kate, Aniket and Maffei, Matteo and Pecina, Kim. 2015 | 55 |
256. | 0x: An open protocol for decentralized exchange on the Ethereum blockchain Warren, Will and Bandeali, Amir. 2017 | 55 |
257. | Liar, liar, coins on fire!: Penalizing equivocation by loss of bitcoins Ruffing, Tim and Kate, Aniket and Schr\"oder, Dominique. 2015 | 54 |
258. | A Better Method to Analyze Blockchain Consistency Kiffer, Lucianna and Rajaraman, Rajmohan and others. 2018 | 54 |
259. | Scalable Zero Knowledge with No Trusted Setup Ben-Sasson, Eli and Bentov, Iddo and Horesh, Yinon and Riabzev, Michael. 2019 | 54 |
260. | Secure two-party threshold ECDSA from ECDSA assumptions Doerner, Jack and Kondi, Yashvanth and Lee, Eysa and Shelat, Abhi. 2018 | 54 |
261. | Formal verification of smart contracts based on users and blockchain behaviors models Abdellatif, Tesnim and Brousmiche, Kei-L\'eo. 2018 | 54 |
262. | Erays: Reverse engineering ethereum’s opaque smart contracts Zhou, Yi and Kumar, Deepak and Bakshi, Surya and Mason, Joshua and Miller, Andrew and Bailey, Michael. 2018 |
-