Studies
Communication Channelswadesolomon@key2tech.com2022-03-10T01:37:20+00:00
- Marlowe–Financial contracts on blockchain
- SoK–Communication Across Distributed Ledgers
- Towards a Smart Contract-based, Decentralized, Public-Key Infrastructure
- Turn-Based Communication Channels
- Zendoo–a zk-SNARK Verifiable Cross-Chain Transfer Protocol Enabling Decoupled and Decentralized Sidechains
Economy and Taxeswadesolomon@key2tech.com2022-03-10T01:42:43+00:00
- A Proposal for An Ethereum Classic Treasury System
- A Taxonomy for Layer-2 Scalability Related Protocols for Cryptocurrencies
- A Taxonomy of Cryptocurrency Wallets
- A Treasury System for Cryptocurrencies
- Account Management in Proof of Stake Ledgers
- Babel Fees via Limited Liabilities
- Chimeric Ledgers–Translating and Unifying UTXO-based and Account-based Cryptocurrencies
- CryptoNote
- Filling the Tax Gap via Programmable Money
- Lightweight Virtual Payment Channels
- RPPLNS–Pay-per-last-N-shares with a Randomised Twist
- Standardized Crypto-Loans on the Cardano Blockchain
- The Architecture of Decentralised Finance Platforms–A New Open Finance Paradigm
Privacy and Securitywadesolomon@key2tech.com2022-03-10T01:54:05+00:00
- A Composable Security Treatment of the Lightning Network
- A Formal Treatment of Hardware Wallets
- A Rational Protocol Treatment of 51% Attacks
- Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies
- Blockchains from Non-Idealized Hash Functions
- Comparison of Block Expectation Time for Various Consensus Algorithms
- Consistency for Functional Encryption
- Hydra–Fast Isomorphic State Channels
- Impossibility on Tamper-Resilient Cryptography with Uniqueness Properties
- Kachina–Foundations of Private Smart Contracts
- Ledger Combiners for Fast Settlement
- Memory Lower Bounds of Reductions Revisited
- Mining for Privacy–How to Bootstrap a Snarky Blockchain
- Mithril–Stake-based Threshold Multisignatures
- Multi-mode Cryptocurrency Systems
- On the (Ir)Replaceability of Global Setups
- Ouroboros Crypsinous–Privacy-Preserving Proof-of-Stake
- Ouroboros Praos–An adaptively-secure, semi-synchronous proof-of-stake protocol
- Ouroboros–A Provably Secure Proof-of-Stake Blockchain Protocol
- Pay To Win–Cheap, Crowdfundable, Cross-chain Algorithmic Incentive Manipulation Attacks on PoW Cryptocurrencies
- Payment Trees–Low Collateral Payments for Payment Channel Networks
- Policy-Compliant Signatures
- Post-Quantum Security of the Bitcoin Backbone
- Proof-of-Stake Blockchain Protocols with Near-Optimal Throughput
- Security Limitations of Classical-Client Delegated Quantum Computing
- Stake-Bleeding Attacks on Proof-of-Stake Blockchains
- Steel–Composable Hardware-based Stateful and Randomised Functional Encryption
- Tight Consistency Bounds for Bitcoin
- Translation Certification for Smart Contracts
- Uncontrolled Randomness in Blockchains–Covert Bulletin Board for Illicit Activity
- Zero-Knowledge SNARKs from Linear-Size Universal and Updateable Structured Reference Strings
Probabilitywadesolomon@key2tech.com2022-03-10T01:59:24+00:00
- A Framework for Universally Composable CardGames with Financial Rewards and Penalties Enforcement
- Another Look at Extraction and Randomization of Groth’s zk-SNARK
- Blockchain Technologies–Probability of Double-Spend Attack on a Proof-of-Stake Consensus
- Bringing Down the Complexity–Fast Composable Protocols for Card Games Without Secret State
- Consensus Redux–Distributed Ledgers in the Face of Adversarial Supremacy
- Decreasing Security Threshold Against Double Spend Attack in Networks with Slow Synchronization
- Efficient static analysis of Marlowe contracts
- Kaleidoscope–An Efficient Poker Protocol with Payment Distribution and Penalty Enforcement
- Probability Models of Distributed Proof Generation–zk-SNARK-Based Blockchains – mathematics-09-03016-v2
- Probability of double spend attack for network with non-zero synchronization time
- SCRAPE–Scalable Randomness Attested by Public Entities
- The Combinatorics of the Longest-Chain Rule–Linear Consistency for Proof-of-Stake Blockchains
- Upper Bound Probability of Double Spend Attack on SPECTRE
Technicalwadesolomon@key2tech.com2022-03-10T02:04:41+00:00
- A Type and Scope Safe Universe of Syntaxes with Binding
- An Ontology for Smart Contracts
- Coalition-Safe Equalibria with Virtual Payoffs
- Composition with Knowledge Assumptions
- Djed–A Formally Verified Crypto-Backed Pegged Algorithmic Stablecoin
- Flexible Formality–Practical Experience with Agile Formal Methods
- Full Analysis of Nakamoto Consensus in Bounded-Delay Networks
- Functional Blockchain Contracts
- Ghosts of Departed Proofs
- Introduction to the design of the Data Diffusion and Networking for Cardano Shelley
- IOHK Technical Report–On UC-Secure Range Extension and Batch Verification For ECVRF
- Marlowe–implementing and analysing financial contracts on blockchain
- Mining in Logarithmic Space
- Models of distributed proof generation for ZK-SNARK-based blockchains
- Native Custom Tokens in the Extended UTXO Model
- One-shot Signatures and Applications to Hybrid Quantum Classical Authentication
- Scripting smart contracts for distributed ledger technology
- Self-Reproducing Coins as Universal Turing Machine
- Stake Shift in Major Cryptocurrencies–An Empirical Study
- System F in Agda–For fun and profit
- Unraveling recursion–Compiling an IR with recursion to System F
- UTxO- vs account-based smart contract blockchain programming paradigms
Time And Synchronywadesolomon@key2tech.com2022-03-10T02:07:04+00:00
- BRICK–Asynchronous Payment Channels
- Compact Storage of Superblocks for NIPoPoW Applications
- Consistency of Proof-of-Stake Blockchains with Concurrent Honest Slot Leaders
- How to Prove Work With Time or Memory
- Interhead Hydra–Two Heads are Better than One
- Multi-instance Publicly Verifiable Time-lock Puzzle and its Applications
- Ouroboros-BFT–A Simple Byzantine Fault Tolerant Consensus Protocol
- Permissionless Clock Synchronization
- Practical Settlement Bounds for Proof-of-Work Blockchains
- Securing Proof-of-Work Ledgers via Checkpointing
- Timed Signatures and Zero-Knowledge Proofs –Timestamping in the Blockchain Era
Workabilitywadesolomon@key2tech.com2022-03-10T02:14:20+00:00
- A Gas-Efficient Superlight Bitcoin Client in Solidity
- Bitcoin Crypto–Bounties for Quantum Capable Adversaries
- Blockchains from Non-Idealized Hash Functions
- Bypassing Non-Outsourceable Proof-of-Work Schemes Using Collateralized Smart Contracts
- Cardano Disaster Recovery Plan
- Conclave–A Collective Stake Pool Protocol
- Cryptocurrency Egalitarianism–A Quantitative Approach
- Efficient State Management in Distributed Ledgers
- Formal specification for a Cardano wallet
- Generalized Proofs Of Knowledge and Applications
- Ifelimos–A Provably Secure Blockchain Protocol
- Improving Authenticated Dynamic Dictionaries, with Applications to Cryptocurrencies
- Incentives Against Power Grabs
- Leakage-Resilient Cryptography from Puncturable Primitives and Obfuscation
- Mind Your Outcomes–Quality-Centric Systems Development
- Non-Interactive Proofs of Proof-of-Work
- Ouroboros Genesis–Composable Proof-of-Stake Blockchains with Dynamic Availability
- Parallel Chains–Improving Throughput and Latency of Blockchain Protocols via Parallel Composition
- Proof-of-Burn
- Proof-of-Stake Sidechains
- Proof-of-Work Sidechains
- Reward Sharing Schemes for Stake Pools
- Smart Contract Derivatives
- The Bitcoin Backbone Protocol with Chains of Variable Difficulty
- The Extended UTXO Model
- TwinsCoin–A Cryptocurrency via Proof-of-Work and Proof-of-Stake
- Universal Composition with Global Subroutines–Capturing Global Setup within plain UC
- Updatable Blockchains
- Velvet Path to Superlight Blockchain Clients
- W-OTS(+) up my Sleeve! A Hidden Secure Fallback for Cryptocurrency Wallets