default search action
25th Financial Cryptography and Data Security 2021: Virtual Event - Part II
- Nikita Borisov, Claudia Díaz:
Financial Cryptography and Data Security - 25th International Conference, FC 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers, Part II. Lecture Notes in Computer Science 12675, Springer 2021, ISBN 978-3-662-64330-3
Blockchain Protocols
- Alexei Zamyatin, Mustafa Al-Bassam, Dionysis Zindros, Eleftherios Kokoris-Kogias, Pedro Moreno-Sanchez, Aggelos Kiayias, William J. Knottenbelt:
SoK: Communication Across Distributed Ledgers. 3-36 - Sri Aravinda Krishnan Thyagarajan, Adithya Bhat, Bernardo Magri, Daniel Tschudi, Aniket Kate:
Reparo: Publicly Verifiable Layer to Repair Blockchains. 37-56 - Michael Chiu, Uros Kalabic:
Short Paper: Debt Representation in UTXO Blockchains. 57-64 - Vipul Goyal, Hanjun Li, Justin Raizes:
Instant Block Confirmation in the Sleepy Model. 65-83 - Suryanarayana Sankagiri, Xuechao Wang, Sreeram Kannan, Pramod Viswanath:
Blockchain CAP Theorem Allows User-Dependent Adaptivity and Finality. 84-103 - Soubhik Deb, Sreeram Kannan, David Tse:
PoSAT: Proof-of-Work Availability and Unpredictability, Without the Work. 104-128
Payment Channels
- Erkan Tairi, Pedro Moreno-Sanchez, Matteo Maffei:
Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments. 131-150 - Arash Mirzaei, Amin Sakzad, Jiangshan Yu, Ron Steinfeld:
FPPW: A Fair and Privacy Preserving Watchtower for Bitcoin. 151-169 - Ayelet Mizrahi, Aviv Zohar:
Congestion Attacks in Payment Channel Networks. 170-188 - Maxim Jourenko, Mario Larangeira, Keisuke Tanaka:
Payment Trees: Low Collateral Payments for Payment Channel Networks. 189-208 - Zeta Avarikioti, Eleftherios Kokoris-Kogias, Roger Wattenhofer, Dionysis Zindros:
Brick: Asynchronous Incentive-Compatible Payment Channels. 209-230
Mining
- Tim Roughgarden, Clara Shikhelman:
Ignore the Extra Zeroes: Variance-Optimal Mining Pools. 233-249 - Lucianna Kiffer, Rajmohan Rajaraman:
HaPPY-Mine: Designing a Mining Reward Function. 250-268 - Yoko Shibuya, Go Yamamoto, Fuhito Kojima, Elaine Shi, Shin'ichiro Matsuo, Aron Laszka:
Selfish Mining Attacks Exacerbated by Elastic Hash Supply. 269-276
Scaling Blockchains
- Mustafa Al-Bassam, Alberto Sonnino, Vitalik Buterin, Ismail Khoffi:
Fraud and Data Availability Proofs: Detecting Invalid Blocks in Light Clients. 279-298 - Peiyao Sheng, Bowen Xue, Sreeram Kannan, Pramod Viswanath:
ACeD: Scalable Data Availability Oracle. 299-318 - Dimitris Karakostas, Nikos Karayannidis, Aggelos Kiayias:
Efficient State Management in Distributed Ledgers. 319-338 - Manuel M. T. Chakravarty, Sandro Coretti, Matthias Fitzi, Peter Gazi, Philipp Kant, Aggelos Kiayias, Alexander Russell:
Fast Isomorphic State Channels. 339-358
Authentication and Usability
- Stephan Wiefling, Markus Dürmuth, Luigi Lo Iacono:
What's in Score for Website Users: A Data-Driven Long-Term Study on Risk-Based Authentication Characteristics. 361-381 - Wenjie Bai, Jeremiah Blocki:
DAHash: Distribution Aware Tuning of Password Hashing Costs. 382-405 - Sanchari Das, Andrew Kim, L. Jean Camp:
Short Paper: Organizational Security: Implementing a Risk-Reduction-Based Incentivization Model for MFA Adoption. 406-413
Measurement
- Anjali Vyas, Ram Sundara Raman, Nick Ceccio, Philipp M. Lutscher, Roya Ensafi:
Lost in Transmission: Investigating Filtering of COVID-19 Websites. 417-436 - Lucianna Kiffer, Asad Salman, Dave Levin, Alan Mislove, Cristina Nita-Rotaru:
Under the Hood of the Ethereum Gossip Protocol. 437-456 - Daniel Perez, Sam M. Werner, Jiahua Xu, Benjamin Livshits:
Liquidations: DeFi on a Knife-Edge. 457-476
Cryptography
- Nicolas Alhaddad, Mayank Varia, Haibin Zhang:
High-Threshold AVSS with Optimal Communication Complexity. 479-498 - David Derler, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks:
Fine-Grained Forward Secrecy: Allow-List/Deny-List Encryption and Applications. 499-519 - Pedro Geraldo M. R. Alves, Jheyne N. Ortiz, Diego F. Aranha:
Faster Homomorphic Encryption over GPGPUs via Hierarchical DGT. 520-540 - Aydin Abadi, Aggelos Kiayias:
Multi-instance Publicly Verifiable Time-Lock Puzzle and Its Applications. 541-559 - Muhammed F. Esgin, Veronika Kuchta, Amin Sakzad, Ron Steinfeld, Zhenfei Zhang, Shifeng Sun, Shumo Chu:
Practical Post-quantum Few-Time Verifiable Random Function with Applications to Algorand. 560-578 - Chan Nam Ngo, Fabio Massacci, Florian Kerschbaum, Julian Williams:
Practical Witness-Key-Agreement for Blockchain-Based Dark Pools Financial Trading. 579-598
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.