Wednesday, 11 October 2017

A list of some whitepapers


-
[   ]2017-03-mit-bitcoin-expo-andytoshi-mimblewmble-scriptless-scripts.pdf2017-03-05 06:56152K
[   ]A Bitcoin standard: Lessons from the gold standard - 2016.pdf2016-03-31 05:371.8M
[   ]A Prunable Blockchain Consensus Protocol Based on Non-Interactive Proofs of Past States Retrievability - 2016.pdf2016-03-27 19:5194K
[   ]A bayesian approach to identify bitcoin users - 2016.pdf2016-12-22 17:532.5M
[   ]Accelerating Bitcoin's transaction processing: fast money grows on trees, not chains.pdf2013-12-05 01:14214K
[   ]A cryptocubic protocol for hacker-proof off-chain bitcoin transactions - Leonard Apelstin.pdf2014-08-01 16:39509K
[   ]A denial of service attack against fair computations using Bitcoin deposits.pdf2014-11-04 14:56207K
[   ]A fast and scalable payment network with bitcoin duplex micropayment channels.pdf2015-06-08 04:07425K
[   ]A fistful of Bitcoins: Characterizing payments among men with no names.pdf2013-08-21 09:173.4M
[TXT]A formal language for analyzing contracts.html2013-12-13 12:1367K
[   ]Analysis of Bitcoin pooled mining reward systems - Rosenfeld - 2011.pdf2011-12-21 18:22351K
[   ]Analysis of hashrate-based double-spending.pdf2012-12-12 23:47285K
[   ]Analysis of the blockchain protocol in asynchronous networks - 2016.pdf2016-05-09 18:22536K
[   ]An efficient protocol for secure two-party computation in the presence of malicious adversaries.pdf2014-10-22 20:174.3M
[   ]An empirical analysis of linkability in the Monero blockchain - 2017.pdf1969-12-31 16:00469K
[   ]An explanation of Nakamoto's analysis of double-spend attacks - 2017.pdf2017-01-16 18:23356K
[   ]An investigation into Confidential Transactions - Adam Gibson - 2016.pdf2016-04-10 08:24551K
[   ]Anonymous byzantine consensus from moderately-hard puzzles: a model for Bitcoin.pdf2014-04-23 20:25274K
[   ]A preliminary field guide for bitcoin transaction patterns.pdf2015-08-03 16:373.7M
[   ]A proportionate response from Nathan Cook - 2017.pdf2017-03-25 11:03421K
[   ]A secure sharding protocol for open blockchains - elastico - 2017.pdf2016-12-14 02:13460K
[   ]AsicBoost - A speedup for bitcoin mining.pdf2016-03-31 21:40522K
[   ]A simple macroeconomic model of bitcoin.pdf2015-03-22 06:28112K
[   ]A survey on security and privacy issues in bitcoin - 2017.pdf2017-07-05 20:58928K
[   ]Asymmetric proof-of-work based on the Generalized Birthday problem.pdf2015-10-01 03:33412K
[   ]Atomically trading with Roger: Gambling on the success of a hard-fork - 2017.pdf2017-07-10 01:55541K
[   ]Automated verification of electrum wallet - 2016.pdf2016-01-27 07:23252K
[   ]BCH sybil nodes on the bitcoin peer-to-peer network - 2017.pdf2017-08-04 08:14291K
[   ]Beyond Hellman's time-memory trade-offs with applications to proofs of space - 2017.pdf2017-09-17 13:39534K
[   ]Bitcoin-NG: A scalable blockchain protocol.pdf2015-11-11 18:141.7M
[   ]Bitcoin - a primer for policymakers.pdf2013-08-19 07:271.5M
[   ]Bitcoin: Ringing the bell for a new asset class - Adam White - 2016.pdf2016-06-02 08:042.2M
[   ]Bitcoin and Gresham's law - the economic inevitability of collapse - Ian Grigg.pdf2012-02-24 03:43152K
[   ]Bitcoin and beyond: A technical survey on decentralized digital currencies.pdf2015-05-15 04:34706K
[   ]Bitcoin beacon - 2016.pdf2016-05-16 18:34352K
[   ]Bitcoin covenants - 2016.pdf2016-01-27 07:23284K
[   ]Bitcoin meets strong consistency.pdf2015-11-16 04:39411K
[   ]Bitcoin network measurements for simulation validation and parameterisation - 2016.pdf2016-05-29 09:20532K
[   ]Bitcoin over Tor isn't a good idea.pdf2014-10-22 17:36307K
[   ]Bitcoin protocol specification 0.8.6 - Krzysztof Okupski - 2014-06-25.pdf2014-06-25 11:45948K
[   ]Bitcoin protocol specification 0.8.6 - Krzysztof Okupski.pdf2014-05-17 13:14609K
[   ]Bitmessage - a peer-to-peer message authentication and delivery system.pdf2013-07-30 17:37194K
[   ]Blindly signed contracts: Anonymous on-blockchain and off-blockchain bitcoin transactions - 2016.pdf2016-01-27 07:23386K
[   ]Blind signatures for bitcoin transaction anonymity - 2012.pdf2012-03-11 16:13156K
[   ]Blind signatures for untraceable payments.pdf2011-06-07 01:12264K
[   ]BlockChain-In-Capital-Markets.pdf2016-02-03 03:382.4M
[   ]Blockchain-free cryptocurrencies: A rational framework for truly decentralized fast transactions - 2016.pdf2016-09-06 17:01352K
[   ]Blockchain consensus protocols in the wild - 2017.pdf2017-07-09 17:05197K
[   ]Bolt: Anonymous payment channels for decentralized currencies - 2016.pdf2016-07-12 14:38473K
[   ]Borromean ring signatures.pdf2015-06-02 01:05206K
[   ]Botcoin: Monetizing stolen cycles.pdf2013-12-09 09:33640K
[   ]Brahms: Byzantine resilient random membership sampling.pdf2008-06-19 03:59677K
[   ]Byzantine chain replication.pdf2012-11-07 09:06299K
[   ]Byzantine cycle mode: Scalable bitcoin mixing on unequal inputs.pdf2015-09-01 16:03292K
[   ]Byzantine fault tolerant set consensus with efficient reconciliation - 2015-12-21.pdf2016-01-05 02:48902K
[   ]Catena: Preventing lies with bitcoin - 2016.pdf2016-11-12 23:146.0M
[   ]Centrally banked cryptocurrencies - rscoin - Bank of England - 2016.pdf2016-02-22 09:26434K
[   ]Centrally banked cryptocurrencies.pdf2015-05-26 17:32469K
[   ]Coinparty: Secure multi-party mixing of bitcoins.pdf2015-01-26 06:32607K
[   ]Compact confidential transactions.pdf2015-09-21 09:34308K
[   ]Compact proofs of retrievability.pdf2012-09-27 13:18607K
[   ]Concurrency and privacy with payment channel networks - 2017.pdf2017-06-16 13:53872K
[   ]Confidential assets - 2017.pdf2017-03-12 19:14314K
[   ]Congestion - Mimesis of traffic flow - petertodd.pdf2015-05-09 09:29859K
[   ]Congressional research service - bitcoin - 2015-08-14.pdf2015-08-20 11:46777K
[   ]Consensus-as-a-service: a brief report on the emergence of permissioned, distributed ledger systems.pdf2015-04-06 12:251.5M
[   ]Cryptographic combinatorial clock-proxy auctions.pdf2009-04-07 16:00341K
[   ]Cuckoo cycle: A memory bound graph-theoretic proof-of-work - John Tromp.pdf2015-11-17 13:07290K
[   ]D1T1 - Filippo Valsorda - Exploiting ECDSA Failures in the Bitcoin Blockchain.pdf2014-10-14 20:244.7M
[   ]DDosCoin: Cryptocurrency with a malicious proof-of-work - 2016.pdf2016-08-08 00:11799K
[   ]Dandelion: Redesigning the bitcoin network for anonymity - 2017.pdf2017-01-17 17:34680K
[   ]DarkSendv3.pdf2014-03-06 15:23156K
[   ]DarkcoinWhitepaper.pdf2014-03-25 08:06339K
[   ]Deanonymisation of clients in Bitcoin P2P network.pdf2014-07-08 02:32516K
[   ]Decentralized anonymous credentials.pdf2013-11-24 05:441.1M
[   ]Decentralized anonymous micropayments - 2016.pdf2016-10-31 18:39815K
[   ]Decentralizing privacy: Using blockchain to protect personal data.pdf2015-06-27 11:46229K
[   ]Deleting secret data with public verifiability.pdf2014-05-25 00:36322K
[   ]Design of a secure timestamping system with minimal trust requirements.pdf2014-01-16 13:45127K
[TXT]Detecting double spending - Hal Finney.html1998-03-17 21:2714K
[TXT]Digital cash and privacy.html1998-03-17 21:275.4K
[   ]Discreet log contracts - 2017.pdf2017-06-02 18:28130K
[   ]Distributed double spending prevention - 2008.pdf2013-02-14 05:54202K
[   ]Double spend races - 2017.pdf2017-02-09 17:38789K
[   ]Do you need a blockchain? - 2017.pdf2017-04-27 06:55176K
[   ]Drivechains, sidechains and hybrid 2-way peg designs - Sergio Lerner - 2016.pdf2016-04-01 07:261.1M
[   ]ECDSA-Security-in-Bitcoin-and-Ethereum-a-Research-Survey.pdf2016-05-17 15:19371K
[   ]Eclipse attacks on Bitcoin's peer-to-peer network.pdf2015-03-20 12:41860K
[   ]Efficient zero knowledge contingent payments in cryptocurrencies without scripts - 2016.pdf2016-05-09 10:44438K
[   ]Efficient zero knowledge contingent payments in cryptocurrencies without scripts - 2016.v2.pdf2016-07-13 05:59439K
[   ]Enhancing bitcoin security and performance with strong consistency via collective signing.pdf2016-02-23 17:26771K
[   ]Enhancing bitcoin transactions with covenants - 2017.pdf2017-03-12 19:13196K
[   ]Enigma: Decentralized computation platform with guaranteed privacy.pdf2015-06-07 15:41244K
[   ]Estimation of miner hash rates and consensus on blockchains - 2017.pdf2017-07-03 18:241.0M
[   ]Ethereum: a secure decentralised generalised transaction ledger.pdf2014-04-07 08:28304K
[   ]Evaluating user privacy in bitcoin.pdf2013-02-06 02:37940K
[   ]Evolution of probabilistic consensus in digital organisms.pdf2009-04-22 11:321.5M
[   ]Experiences deploying a large-scale emergent network - MojoNation - zooko.pdf2006-02-19 09:0091K
[   ]Extractable witness encryption and timed-release encryption from bitcoin - 2016.pdf2016-06-04 07:11479K
[   ]Fair client puzzles from the bitcoin blockchain - 2016.pdf2016-07-05 16:57371K
[   ]Fast and scalable payment network with Bitcoin duplex micropayment channels.pdf2015-06-08 04:07425K
[   ]Federal Reserve Board - Bitcoin: technical background and data analysis.pdf2014-12-19 10:00869K
[   ]Flare: An approach to routing in lightning network - 2016.pdf2016-07-07 04:22234K
[   ]Fully bideniable public-key encryption.pdf2013-10-23 00:02306K
[   ]Game-theoretic analysis of DDoS attacks against Bitcoin mining pools.pdf2014-02-18 09:20685K
[   ]Group signatures.pdf2014-03-09 12:02480K
[   ]Hardening stratum, the bitcoin pool mining protocol - 2017.pdf2017-05-16 06:261.6M
[   ]Hashcash - a denial-of-service counter-measure.pdf2013-11-06 17:2583K
[   ]Hash tube signature scheme.pdf2015-12-28 06:33285K
[   ]Hawk: the blockchain model of cryptography and privacy-preserving smart contracts.pdf2015-07-20 21:02720K
[   ]Hierarchical deterministic Bitcoin wallets that can tolerate key leakage.pdf2014-12-15 18:49215K
[   ]High-frequency jump analysis of the bitcoin market - 2017.pdf2017-04-26 17:54518K
[   ]Hijacking Bitcoin: Large-scale Network Attacks on Cryptocurrencies - 2016.pdf2016-05-24 18:03870K
[   ]Hijacking Bitcoin: Routing attacks on cryptocurrencies - 2017.pdf2017-03-24 05:391.1M
[   ]Homomorphic payment addresses and the pay-to-contract protocol.pdf2012-12-13 18:31445K
[   ]How to leak a secret - ring signatures - Rivest.pdf2016-05-31 08:27554K
[   ]How to use bitcoin to design fair protocols.pdf2014-03-03 15:46494K
[   ]How to use bitcoin to incentivize correct computations.pdf2015-01-09 05:03370K
[   ]How to use indistinguishability obfuscation: deniable encryption, and more.pdf2014-02-17 08:11356K
[   ]Impossibility of distributed consensus with one faulty process.pdf2013-01-10 12:29709K
[   ]Improving obfuscation in the CryptoNote protocol.pdf2015-02-23 06:03359K
[   ]Incentive mechanisms for securing the Bitcoin blockchain - BitFury.pdf2015-12-07 13:39168K
[   ]Incentivize p2p systems with lightweight micropayments.pdf2013-12-18 23:39133K
[   ]Incentivizing double-spend collusion in bitcoin - 2017.pdf2017-03-12 19:13281K
[   ]Inclusive block chain protocols (using directed acyclic graphs instead of chains).pdf2015-01-10 21:33160K
[   ]Increasing anonymity in bitcoin using one-way aggregatable signatures.pdf2014-07-11 07:59418K
[   ]Information propagation in the Bitcoin network.pdf2013-08-08 01:20323K
[   ]Invertible bloom lookup tables.pdf2015-10-05 19:15321K
[   ]Join me on a market for anonymity - joinmarket - 2016.pdf2016-05-18 10:26329K
[   ]Lightning Network as Directed Graph Single-Funded Channel Topology - Tadge Dryja - 2016-04-11.pdf2016-04-14 08:55320K
[   ]Majority is not Enough: Bitcoin Mining is Vulnerable.pdf2013-11-04 08:46775K
[   ]Making bitcoin exchanges transparent.pdf2015-09-15 03:02259K
[   ]Making smart contracts smarter.pdf2016-06-20 22:25522K
[   ]Malleability of the blockchain's entropy - 2016.pdf2016-04-11 10:59847K
[   ]Merged mining: Curse or cure? - 2017.pdf2017-08-21 06:26548K
[   ]Merkle hash trees for distributed audit logs.pdf2015-04-06 20:00202K
[   ]Merklized abstract syntax trees.pdf2014-12-20 09:36174K
[   ]Micropayments for decentralized currencies.pdf2015-10-29 21:121.6M
[   ]MiniLEGO: Efficient secure two-party computation from general assumptions (full version).pdf2013-04-29 02:32769K
[   ]Minimum disclosure proofs of knowledge.pdf2012-12-19 02:015.6M
[   ]Mixcoin: Anonymity for Bitcoin with accountable mixes.pdf2014-01-20 06:58374K
[   ]Mixing confidential transactions: Comprehensive transaction privacy for bitcoin - 2017.pdf2017-03-12 19:13566K
[   ]Monopoly without a monopolist: An economic analysis of the bitcoin payment system - 2017.pdf2017-08-30 08:41832K
[   ]Morgan Stanley blockchain report - 2016-04-20.pdf2016-04-21 07:151.9M
[   ]Multi-signatures in the plain public-key model and a general forking lemma.pdf2007-03-07 00:55276K
[   ]Non-interactive proofs of proof-of-work - 2017.pdf2017-09-29 17:24612K
[   ]Nonoutsourceable scratch-off puzzles to discourage Bitcoin mining coalitions - Andrew Miller.pdf2014-07-15 07:16424K
[   ]Notes on scalable blockchain protocols using collations and partitioning - vbuterin.pdf2015-09-08 20:491.0M
[   ]Obfuscation in bitcoin: Techniques and politics - Arvind Narayanan - 2017.pdf2017-06-08 07:55249K
[   ]Off-line Karma: A decentralized currency for static peer-to-peer and grid networks - 2004.pdf2013-05-30 01:52162K
[   ]OldBlue: Causal broadcast in a mutually suspicious environment (working draft).pdf2012-11-06 20:02321K
[   ]On Bitcoin and red balloons.pdf2012-02-08 09:29380K
[   ]On Bitcoin security in the presence of broken crypto primitives - 2016.pdf2016-02-19 03:53328K
[   ]On bitcoin as a public randomness source - 2015.pdf2015-10-18 15:58427K
[   ]One-out-of-many proofs: or how to leak a secret and spend a coin.pdf2014-09-29 14:52420K
[   ]One weird trick to stop selfish miners: Fresh bitcoins, a solution for the honest miner.pdf2014-04-04 08:11203K
[   ]On scaling decentralized blockchains - A position paper.pdf2016-01-27 07:23302K
[   ]On subversive miner strategies and block withholding attack in Bitcoin digital currency.pdf2014-12-02 20:37465K
[   ]On the instability of Bitcoin without the block reward - 2016.pdf2016-10-21 06:041.3M
[   ]On the necessity of a prescribed block validity consensus: Analyzing bitcoin unlimited mining protocol - 2017.pdf2017-07-11 00:351.1M
[   ]On the privacy provisions of bloom filters in lightweight Bitcoin clients.pdf2014-10-13 13:23355K
[   ]On the security and performance of proof-of-work blockchains - 2016.pdf2016-06-02 05:16393K
[   ]Optimal selfish mining strategies in bitcoin.pdf2015-07-22 17:51376K
[   ]Overview of colored coins - 2012-12-04.pdf2013-09-24 11:3387K
[   ]Overview of colored coins.pdf2013-09-24 11:3387K
[   ]P2P mixing and unlinkable p2p transactions - Anonymity of the people, by the people, and for the people - 2016.pdf2016-08-24 13:02458K
[   ]P2P mixing and unlinkable p2p transactions - Scalable strong anonymity without external routers - coinshuffle++ - 2016.pdf2016-06-03 04:42506K
[   ]PieceWork: Generalized outsourcing control for proofs of work - 2017.pdf2017-03-12 19:13211K
[   ]Plasma: Scalable autonomous smart contracts - 2017.pdf2017-08-09 11:56705K
[   ]Practical delegation of computation using multiple servers.pdf2011-08-17 05:15190K
[   ]Princeton bitcoin book.pdf2016-02-09 14:4318M
[   ]Privacy-enhancing overlays in bitcoin.pdf2015-01-28 08:03382K
[   ]Proof-of-work as anonymous micropayment: rewarding a tor relay.pdf2014-12-24 08:28344K
[   ]Proof of work without all the work - 2017.pdf2017-08-06 17:36762K
[   ]Proofs of partial knowledge and simplified design of witness hiding protocols.pdf2001-04-03 07:12223K
[   ]Proofs of proof of work with sublinear complexity.pdf2016-01-27 07:23194K
[   ]Proofs of work for blockchain protocols - 2017.pdf2017-08-09 05:26579K
[   ]Protocols for public-key cryptosystems.pdf2013-12-30 08:57648K
[   ]Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges.pdf2015-10-26 11:47480K
[   ]Pseudonymous secure computation from time-lock puzzles.pdf2014-10-19 13:34381K
[   ]Publicly auditable secure multi-party computation.pdf2014-07-22 13:40687K
[   ]Publicly verifiable proofs of sequential work.pdf2013-03-17 20:59503K
[   ]Publish or perish: A backward-compatible defense against selfish mining in bitcoin.pdf2017-04-19 15:06908K
[   ]Purely P2P crypto-currency with finite mini-blockchain.pdf2013-05-04 15:55203K
[   ]Purely p2p crypto-currency with finite mini-blockchain.pdf2014-07-16 16:04149K
[   ]Quantum money from hidden subspaces - Scott Aaronson.pdf2012-03-21 06:52437K
[   ]Reaching the ground with lightning - Rusty Russell.pdf2015-07-17 01:12248K
[   ]Realizing hash-and-sign signatures under standard assumptions.pdf2009-06-14 11:48237K
[   ]Realizing two-factor authentication for the Bitcoin protocol.pdf2014-08-15 06:54297K
[   ]Redactable blockchain or rewriting history in bitcoin and friends - 2016.pdf2016-08-05 02:15489K
[   ]Redesigning bitcoin's fee market - 2017.pdf2017-09-26 17:431.0M
[   ]Refund attacks on Bitcoin's Payment Protocol.pdf2016-01-11 01:151.0M
[   ]Regulating bitcoin and block chain derivatives - Houman B. Shadab.pdf2015-09-17 05:11329K
[   ]Regulating digital currencies - bringing Bitcoin within the reach of the IMF.pdf2013-07-23 06:28598K
[   ]Research perspectives and challenges for Bitcoin and cryptocurrencies.pdf2015-03-02 08:34299K
[   ]Research perspectives on Bitcoin and second-generation cryptocurrencies - Andrew Miller (systemization of knowledge draft).pdf2015-02-07 22:47291K
[   ]Revisiting difficulty control for blockchain systems - 2017.pdf2017-07-28 08:16326K
[   ]RingCT 2.0: A compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency monero - 2017.pdf2017-08-14 04:24436K
[   ]Ring CT for Monero.pdf2015-10-16 12:51264K
[   ]Ring confidential transactions - Noether - 2015.pdf2015-12-17 12:04489K
[   ]Ring confidential transactions.pdf2015-11-11 01:29345K
[TXT]Riv99b.lcs35-puzzle-description.txt2017-02-20 12:1514K
[   ]RootstockWhitePaperv9-Overview.pdf2015-12-04 12:18587K
[   ]Safer smart contracts through type-driven development - 2016.pdf2016-04-20 05:58903K
[   ]Scalable zero knowledge via cycles of elliptic curves.pdf2015-04-28 04:40735K
[   ]Secure and efficient asynchronous broadcast protocols.pdf2001-03-07 05:52358K
[   ]Secure communications over insecure channels.pdf2014-02-05 11:12582K
[   ]Secure multi-party computation with identifiable abort.pdf2014-10-24 10:04406K
[   ]Secure multiparty computations on Bitcoin.pdf2014-03-18 12:18394K
[TXT]Secure property titles with owner authority.html2013-12-02 08:1626K
[   ]Securing Bitcoin wallets via a new DSA ECDSA threshold signature scheme.pdf2015-03-08 06:13804K
[   ]Securing Bitcoin wallets via threshold signatures.pdf2014-06-03 19:44247K
[   ]Security without identification.pdf2012-07-17 15:411.7M
[   ]Short accountable ring signatures based on DDH.pdf2015-06-29 11:26290K
[   ]Should Cryptocurrencies be included in the Portfolio of International Reserves held by the Central Bank of Barbados.pdf2015-11-13 12:54500K
[   ]Simulation-based evaluation of coin selection strategies - 2016.pdf2016-09-21 08:15177K
[   ]Smart contract markets: trading derivative contracts on the blockchain - 2015 - Trevor Kiviat.pdf2016-03-26 13:47613K
[   ]Smart contracts make bitcoin mining pools vulnerable - 2017.pdf2017-03-12 19:14304K
[   ]Smarter signatures: Experiments in verifications - 2016.pdf2016-09-12 15:04454K
[   ]Spacecoin: A cryptocurrency based on proofs of space.pdf2015-06-16 12:43438K
[   ]Speed-security tradeoffs in blockchain protocols.pdf2015-10-21 16:08454K
[   ]Sphinx: A compact and provably secure mix format.pdf2009-03-06 06:17281K
[   ]Sprites: Payment channels that go faster than lightning - 2017.pdf2017-02-20 17:49954K
[   ]Spy vs. Spy: Rumor source obfuscation - p2p - 2015.pdf2015-04-27 21:12571K
[   ]Stratum-networkprotocolspec.pdf2013-12-25 08:40182K
[   ]Streaming authenticated data structures - Shi.pdf2015-07-05 02:08380K
[   ]Stressing out: Bitcoin stress testing - analysis - 2016.pdf2016-01-27 07:23351K
[   ]Strong federations: An interoperable blockchain solution to centralized third party risks - 2017.pdf2017-01-08 18:48432K
[   ]Stubborn mining: Generalizing selfish mining and combining with an eclipse attack.pdf2015-08-08 14:032.4M
[   ]Switch commitments: A safety switch for confidential transactions - 2017.pdf2017-03-12 19:13292K
[   ]Sybil-resistant mixing for bitcoin.pdf2014-09-13 07:28659K
[   ]Sybil-resistant network identities from dedicated hardware.pdf2015-09-15 05:47396K
[   ]Tampering with the delivery of blocks and transactions in bitcoin.pdf2015-06-10 05:25791K
[   ]Tangaroa - a Byzantine Fault Tolerant Raft.pdf2014-12-15 00:13113K
[   ]The Bitcoin backbone protocol: Analysis and applications.pdf2014-10-11 17:50902K
[   ]The Byzantine generals problem - Lamport - 1982.pdf2002-05-21 17:101.2M
[VID]The Rabbit Hole (Phantom Shares)-3A_HWaEnYQs.mp42014-01-26 04:3067M
[   ]The Saddest Moment (about Byzantine fault tolerance).pdf2013-10-02 14:061.0M
[   ]The Use of Distributed Ledger Technologies in Payment, Clearing, and Settlement - Lael Brainard - Federal Reserve - 2016-04-14.pdf2016-04-14 10:1547K
[   ]The economics of bitcoin mining, or bitcoin in the presence of adversaries.pdf2013-07-10 14:15353K
[   ]The economics of bitcoin transaction fees - 2014.pdf2017-04-18 05:35292K
[   ]The honey badger of BFT protocols - Andrew Miller - 2016.pdf2016-02-29 20:04389K
[   ]The impact and potential of blockchain on the securities transaction lifecycle - SWIFT - 2016.pdf2016-05-04 12:01695K
[   ]The impact of transaction fees on bitcoin mining strategies - 2016.pdf2017-03-31 14:08799K
[   ]The miner's dilemma - Ittay Eyal.pdf2014-11-30 17:521.0M
[   ]Theoretical Bitcoin attacks with less than half of the computational power (draft) - Lear Bahack.pdf2013-12-25 09:34313K
[   ]The price of anonymity: empirical evidence from a market for Bitcoin anonymization - 2017.pdf2017-08-01 05:56544K
[   ]The sybil attack.pdf2008-12-01 11:4698K
[   ]The tangle.pdf2015-11-14 11:26304K
[   ]The unreasonable effectiveness of address clustering - 2016.pdf2016-05-22 17:441.2M
[   ]The unreasonable fundamental uncertitudes behind bitcoin mining - Nicolas Courtois - 2014.pdf2014-04-10 18:401.6M
[   ]Time, clocks, and the ordering of events in a distributed system - Lamport.pdf2002-05-21 16:32835K
[   ]Town Crier: An authenticated data feed for smart contracts.pdf2016-02-19 13:07345K
[   ]Traffic analysis attacks and trade-offs in anonymity providing systems - 2001.pdf2015-07-28 19:4054K
[   ]Transaction remote release: use onion routing for transaction relaying for anonymity.pdf2015-09-21 17:14474K
[TXT]Trusted third parties are security holes.html2013-12-06 08:3529K
[   ]TumbleBit: An untrusted bitcoin-compatible anonymous payment hub - 2016.pdf2016-08-26 15:16690K
[   ]TumbleBit: An untrusted tumbler for bitcoin-compatible anonymous payments - 2016.pdf2016-06-03 09:24526K
[   ]Two-factor authentication for the Bitcoin protocol.pdf2014-11-04 05:22359K
[TXT]Untraceable Digital Cash, Information Markets, and BlackNet.html1997-03-04 19:0933K
[   ]Untraceable electronic cash.pdf2011-06-07 01:13446K
[   ]Untraceable off-line cash in wallets with observers (1993).pdf2008-08-13 16:11205K
[TXT]Using electronic markets to achieve efficient task distribution.html2004-01-23 07:0771K
[   ]Velocity - fully-collateralized smart contracts for derivatives trading on ethereum.pdf2016-06-01 07:18811K
[   ]VerSum: Verifiable computations over large public logs.pdf2014-10-03 11:05266K
[   ]Verifiable oblivious storage.pdf2014-03-02 15:04446K
[   ]Verifying computations without reexecuting them: from theoretical possibility to near practicality.pdf2015-08-29 10:381.0M
[   ]When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies - 2017.pdf2017-08-16 17:21719K
[   ]Why buy when you can rent? Bribery attacks on Bitcoin-style consensus - 2016.pdf2016-01-27 07:23203K
[   ]Why buy when you can rent? Bribery attacks on Bitcoin consensus.pdf2015-03-27 01:24216K
[   ]Z-channel: Scalable and efficient scheme in zerocash - 2017.pdf2017-07-09 19:03434K
[   ]Zero-collateral lotteries in bitcoin and ethereum - Andrew Miller - 2016.pdf2016-12-19 17:31512K
[TXT]Zero-knowledge_proof.html2014-04-03 01:3782K
[   ]Zero-knowledge contingent payments revisited: Attacks and payments for services.pdf2017-06-09 10:11416K
[   ]Zerocash: Decentralized anonymous payments from Bitcoin (extended version) - 2014-05-18.pdf2014-05-28 15:52839K
[   ]Zerocoin: anonymous distributed e-cash from bitcoin.pdf2013-07-12 07:31475K
[   ]aggreg.pdf2010-06-04 13:24236K
[   ]algorand-ledger.pdf2016-11-17 20:011.4M
[   ]alts.pdf2014-03-04 16:58128K
[DIR]andytoshi-wizardry/2016-09-28 09:23-
[   ]andytoshi.gpg2014-04-06 21:1115K
[TXT]anti_observers.html1998-03-17 21:273.2K
[   ]armory-verisign-bitcoin-wallet-identity-specification.pdf2015-03-13 15:48250K
[   ]asic-faq.pdf2014-03-31 16:58142K
[   ]bc2-jeremy-rubin-2017.pdf2017-07-10 21:531.5M
[   ]bitcoin-birthday.pdf2013-06-16 07:5786K
[   ]bitcoin-probabilistic-payments.pdf2014-05-16 11:4167K
[TXT]bitcoin-wizards-fraud-proof.log.txt2014-02-21 10:5548K
[DIR]bitcoin.it-wiki/2016-05-31 17:43-
[   ]bitcoin.pdf2015-01-30 08:15179K
[   ]bitcoin.revised.pdf2013-12-16 04:31180K
[DIR]bitcointalk.org-technical/2015-08-31 17:31-
[   ]bitfury-report-on-block-size-increase.pdf2015-08-31 13:22136K
[   ]bitfury-research-voting-process-mathematical-formalism.pdf2015-09-13 09:0992K
[TXT]bitmarket.txt2014-01-08 10:1623K
[TXT]bitmarket.url.txt2014-01-08 10:1637
[   ]bitshare-newsletter-february-2014.pdf2014-02-20 00:205.7M
[   ]bitshares.pdf2013-12-26 19:381.4M
[TXT]bitshares.url.txt2014-01-08 10:15188
[   ]blind-ecdsa-draft-v1.pdf2014-02-17 07:0384K
[IMG]blockchain.png2014-01-05 00:40813K
[TXT]bmoney.txt2013-11-06 17:258.1K
[   ]brands-technical.pdf2007-02-16 07:07593K
[TXT]brs-arbitrary-output-sizes.txt2014-07-30 14:598.5K
[   ]coin-center-securities-framework.pdf2016-01-25 13:422.5M
[   ]coinbase-securities-law-framework.pdf2017-01-12 17:571.0M
[   ]coinscope.pdf2015-04-26 18:071.4M
[   ]coinshuffle_code.tar.gz2014-04-24 04:35108K
[TXT]confidential_values.20150821.txt2015-06-19 15:1716K
[TXT]confidential_values.txt2015-06-08 16:2216K
[   ]cryptonote.pdf2014-04-01 07:14435K
[TXT]cyphernomicon.txt2013-11-06 17:251.0M
[TXT]cypherpunk-manifesto.txt2013-12-07 17:515.1K
[   ]dagcoin-v41.pdf2015-09-11 15:52266K
[TXT]digicrash.htm2012-03-12 22:3322K
[   ]dtcc-embracing-disruption.pdf2016-01-25 06:09461K
[   ]erhardt2016coinselection.pdf2016-10-31 16:00943K
[TXT]ethereum.html2014-01-06 16:3760K
[   ]falcon-retreat-2016-05-17.pdf2016-05-23 07:53229K
[   ]fanaticism.zip2014-04-09 20:1711K
[DIR]fanaticism/2014-04-09 22:17-
[DIR]finney.org/2014-12-04 12:31-
[   ]freimarkets-v0.0.1.pdf2015-02-04 07:24368K
[TXT]get.txt2015-09-26 07:1044
[   ]glacier-protocol.pdf2017-05-05 01:27819K
[TXT]gmaxwell-simple_verifyable_execution.txt2014-01-11 19:486.3K
[   ]gmaxwell_sfbitcoin_2015_04_20.pdf2015-04-20 16:59163K
[TXT]how-to-parse-bitcoin-blockchain.html2014-01-04 16:2619K
[TXT]ideafutures.html2014-01-16 11:239.7K
[   ]impulse.pdf2015-01-17 07:49136K
[TXT]intrapoly.html2014-06-28 09:2817K
[   ]jeremy-rubin-asicboost-notes.pdf2017-04-09 18:42249K
[   ]libconsensus-2016-10-13.pdf2016-10-13 12:042.2M
[   ]lightning-network-paper-DRAFT-0.5.pdf2015-02-28 02:24636K
[   ]lightning-network-presentation-time-2015-07-06.pdf2015-07-27 13:582.2M
[   ]lightning-network-summary.pdf2015-10-02 03:16350K
[   ]ln-deploy-draft-01.pdf2015-07-17 01:12248K
[   ]lucre-theory2.pdf2008-10-30 12:45152K
[   ]mavepay1.pdf2012-04-17 12:12176K
[DIR]meh/2015-06-03 09:32-
[   ]merkle-proof.pdf2008-06-22 04:14268K
[   ]mimblewimble-2016-scaling-bitcoin-slides.pdf2016-10-08 03:442.6M
[   ]mimblewimble-andytoshi-INCOMPLETE-DRAFT-2016-09-25.pdf2016-09-25 08:32119K
[   ]mimblewimble-andytoshi-INCOMPLETE-DRAFT-2016-09-28-02.pdf2016-09-28 09:27197K
[   ]mimblewimble-andytoshi-INCOMPLETE-DRAFT-2016-09-28.pdf2016-09-25 18:14122K
[   ]mimblewimble-andytoshi-INCOMPLETE-DRAFT-2016-10-06-001.pdf2016-10-06 14:23201K
[   ]mimblewimble-andytoshi-draft-2016-10-20.pdf2016-10-06 14:23201K
[   ]mimblewimble-mit-bitcoin-expo-2017-slides.pdf2017-03-05 06:56152K
[TXT]mimblewimble.txt2016-08-02 06:5213K
[IMG]mining-work-delay.gmaxwell.2015-11-09.png2015-10-15 22:35256K
[   ]mtgox-transparency-jan-2012.pdf2013-12-15 20:51693K
[   ]new-pos.001.pdf2015-03-19 18:24154K
[   ]nonoutsourceable_full.pdf2014-06-18 13:27434K
[TXT]notarychains-whitepaper.md2014-08-02 21:0525K
[DIR]old/2015-11-17 13:07-
[TXT]origins-of-money.html2014-02-13 14:1093K
[   ]patent - WO2016200885 - Cryptographically concealing amounts transacted on a ledger while preserving a network's ability to verify the transaction - 2016.pdf2016-12-15 09:29256K
[   ]permacoin.pdf2014-03-15 16:02520K
[   ]pos.pdf2014-05-31 21:5476K
[TXT]ringsig-blinding.txt2014-09-03 19:032.2K
[TXT]rusty-russell-shachain-design.txt2016-03-09 14:333.9K
[TXT]satoshinakamoto.asc2014-04-02 09:341.7K
[   ]satoshium.pdf2017-01-12 16:461.4M
[   ]scalingbitcoin-montreal-2015-summary.pdf2015-11-17 09:01765K
[   ]shadowbitcoin-cset-20150810.pdf2015-08-15 19:1710M
[   ]sidechains.pdf2014-10-22 09:29257K
[   ]simons-institute-dan-boneh-pairing-cryptography.mp4.ots2017-01-04 14:02966
[   ]sizing_up_the_blocksize_debate.pdf2015-06-09 06:45581K
[   ]smart-signatures.pdf2016-06-08 13:57400K
[DIR]snarks/2016-10-15 16:34-
[   ]tendermint_v02.pdf2014-08-24 00:27683K
[   ]tendermint_v03.pdf2014-08-24 00:27683K
[   ]tendermint_v04.pdf2014-08-24 00:27687K
[   ]tendermint_v05.pdf2014-08-24 00:27432K
[TXT]the-ricardian-contract.html2013-11-06 17:2638K
[   ]tree-chains-preliminary.pdf2014-03-30 22:50183K
[TXT]unforgeablecostliness.html2014-06-28 09:2628K
[DIR]unsorted/2014-10-24 17:36-
[TXT]url.bak.txt2016-01-29 13:1610K
[TXT]url.txt2017-10-02 08:1813K
[   ]visa-rules-public.pdf2016-01-30 08:162.9M
[DIR]wizards/2015-09-07 09:20-
[   ]zcash-protocol-specification-2.0-alpha-1.pdf2016-03-30 12:06737K
[   ]zcash-protocol-specification-2016-10-28.pdf2016-10-28 08:10865K
[   ]zerocash-extended-20140518.pdf2015-03-20 15:05839K
[   ]zerocash-oakland2014.pdf2015-03-20 15:05670K
[   ]zkcp3.pdf2016-02-26 11:1375K

Apache/2.4.25 (Debian) Server at diyhpl.us Port 80

No comments:

Post a Comment