FileMood

Download Financial Cryptography

Financial Cryptography

Name

Financial Cryptography

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

2.9 GB

Total Files

1476

Last Seen

Hash

2697917DF4B325F56ADBCAF8FA2400B8551502AE

/

Financial Cryptography thank you.txt

0.9 KB

HEADER.md

0.5 KB

IFCA Logo 1.gif

6.2 KB

IFCA Logo 2.jpg

9.0 KB

CoDecFin 2021/

Analyzing the United States Financial Crimes Enforcement Network’s Proposed Regulation Relating.mp4

5.3 MB

Collaborative Deanonymization.mp4

19.0 MB

FinCEN Docket Number FINCEN-2020-0020 - RIN 1506-AB47 - Requirements for Certain Transactions Inv.mp4

18.6 MB

Regulatory Considerations on Centralized Aspects of DeFi managed by DAOs.mp4

12.9 MB

Risk Framework for Bitcoin Custody Operation with the Revault Protocol.mp4

17.3 MB

/.../CoDecFin 2021 captions/

Analyzing the United States Financial Crimes Enforcement Network’s Proposed Regulation Relating.eng.json

459.2 KB

Analyzing the United States Financial Crimes Enforcement Network’s Proposed Regulation Relating.eng.lrc

12.6 KB

Analyzing the United States Financial Crimes Enforcement Network’s Proposed Regulation Relating.eng.srt

13.4 KB

Analyzing the United States Financial Crimes Enforcement Network’s Proposed Regulation Relating.eng.text

10.7 KB

Analyzing the United States Financial Crimes Enforcement Network’s Proposed Regulation Relating.eng.tsv

11.7 KB

Analyzing the United States Financial Crimes Enforcement Network’s Proposed Regulation Relating.eng.txt

12.7 KB

Analyzing the United States Financial Crimes Enforcement Network’s Proposed Regulation Relating.eng.vtt

12.7 KB

Collaborative Deanonymization.eng.json

871.7 KB

Collaborative Deanonymization.eng.lrc

23.5 KB

Collaborative Deanonymization.eng.srt

25.8 KB

Collaborative Deanonymization.eng.text

18.3 KB

Collaborative Deanonymization.eng.tsv

21.2 KB

Collaborative Deanonymization.eng.txt

23.7 KB

Collaborative Deanonymization.eng.vtt

23.7 KB

FinCEN Docket Number FINCEN-2020-0020 - RIN 1506-AB47 - Requirements for Certain Transactions Inv.eng.json

1.1 MB

FinCEN Docket Number FINCEN-2020-0020 - RIN 1506-AB47 - Requirements for Certain Transactions Inv.eng.lrc

28.4 KB

FinCEN Docket Number FINCEN-2020-0020 - RIN 1506-AB47 - Requirements for Certain Transactions Inv.eng.srt

30.7 KB

FinCEN Docket Number FINCEN-2020-0020 - RIN 1506-AB47 - Requirements for Certain Transactions Inv.eng.text

23.3 KB

FinCEN Docket Number FINCEN-2020-0020 - RIN 1506-AB47 - Requirements for Certain Transactions Inv.eng.tsv

26.2 KB

FinCEN Docket Number FINCEN-2020-0020 - RIN 1506-AB47 - Requirements for Certain Transactions Inv.eng.txt

28.6 KB

FinCEN Docket Number FINCEN-2020-0020 - RIN 1506-AB47 - Requirements for Certain Transactions Inv.eng.vtt

28.6 KB

Regulatory Considerations on Centralized Aspects of DeFi managed by DAOs.eng.json

649.1 KB

Regulatory Considerations on Centralized Aspects of DeFi managed by DAOs.eng.lrc

16.9 KB

Regulatory Considerations on Centralized Aspects of DeFi managed by DAOs.eng.srt

18.2 KB

Regulatory Considerations on Centralized Aspects of DeFi managed by DAOs.eng.text

14.0 KB

Regulatory Considerations on Centralized Aspects of DeFi managed by DAOs.eng.tsv

15.6 KB

Regulatory Considerations on Centralized Aspects of DeFi managed by DAOs.eng.txt

17.0 KB

Regulatory Considerations on Centralized Aspects of DeFi managed by DAOs.eng.vtt

17.0 KB

Risk Framework for Bitcoin Custody Operation with the Revault Protocol.eng.json

670.1 KB

Risk Framework for Bitcoin Custody Operation with the Revault Protocol.eng.lrc

18.0 KB

Risk Framework for Bitcoin Custody Operation with the Revault Protocol.eng.srt

19.4 KB

Risk Framework for Bitcoin Custody Operation with the Revault Protocol.eng.text

14.7 KB

Risk Framework for Bitcoin Custody Operation with the Revault Protocol.eng.tsv

16.5 KB

Risk Framework for Bitcoin Custody Operation with the Revault Protocol.eng.txt

18.1 KB

Risk Framework for Bitcoin Custody Operation with the Revault Protocol.eng.vtt

18.1 KB

DeFi 2021/

Cyclic Arbitrage in Decentralized Exchange Markets.mp4

3.2 MB

Formal Analysis of Composable DeFi Protocols.mp4

9.0 MB

How to Exploit a DeFi Project.mp4

13.4 MB

Market Based Mechanisms for Incentivising Exchange Liquidity Provision.mp4

5.5 MB

Measuring Asset Composability as a Proxy for DeFi Ecosystem Integration.mp4

4.0 MB

Project Wallfacer Demystifying Generalized Frontrunning Bots.mp4

12.2 MB

Red-Black Coins.mp4

6.6 MB

Taming MEV - Implementing a policy framework for transaction orders on blockchains.mp4

19.0 MB

Towards a Formal Theory of DeFi.mp4

10.1 MB

Trading on-chain how feasible is regulators’ worst-case scenario.mp4

19.9 MB

/.../DeFi 2021 captions/

Cyclic Arbitrage in Decentralized Exchange Markets.eng.json

342.1 KB

Cyclic Arbitrage in Decentralized Exchange Markets.eng.lrc

8.6 KB

Cyclic Arbitrage in Decentralized Exchange Markets.eng.srt

9.3 KB

Cyclic Arbitrage in Decentralized Exchange Markets.eng.text

6.8 KB

Cyclic Arbitrage in Decentralized Exchange Markets.eng.tsv

7.7 KB

Cyclic Arbitrage in Decentralized Exchange Markets.eng.txt

8.6 KB

Cyclic Arbitrage in Decentralized Exchange Markets.eng.vtt

8.6 KB

Formal Analysis of Composable DeFi Protocols.eng.json

572.5 KB

Formal Analysis of Composable DeFi Protocols.eng.lrc

14.4 KB

Formal Analysis of Composable DeFi Protocols.eng.srt

15.4 KB

Formal Analysis of Composable DeFi Protocols.eng.text

12.1 KB

Formal Analysis of Composable DeFi Protocols.eng.tsv

13.3 KB

Formal Analysis of Composable DeFi Protocols.eng.txt

14.5 KB

Formal Analysis of Composable DeFi Protocols.eng.vtt

14.5 KB

How to Exploit a DeFi Project.eng.json

548.2 KB

How to Exploit a DeFi Project.eng.lrc

13.7 KB

How to Exploit a DeFi Project.eng.srt

14.8 KB

How to Exploit a DeFi Project.eng.text

11.0 KB

How to Exploit a DeFi Project.eng.tsv

12.5 KB

How to Exploit a DeFi Project.eng.txt

13.8 KB

How to Exploit a DeFi Project.eng.vtt

13.8 KB

Market Based Mechanisms for Incentivising Exchange Liquidity Provision.eng.json

420.7 KB

Market Based Mechanisms for Incentivising Exchange Liquidity Provision.eng.lrc

10.5 KB

Market Based Mechanisms for Incentivising Exchange Liquidity Provision.eng.srt

11.1 KB

Market Based Mechanisms for Incentivising Exchange Liquidity Provision.eng.text

9.0 KB

Market Based Mechanisms for Incentivising Exchange Liquidity Provision.eng.tsv

9.8 KB

Market Based Mechanisms for Incentivising Exchange Liquidity Provision.eng.txt

10.5 KB

Market Based Mechanisms for Incentivising Exchange Liquidity Provision.eng.vtt

10.5 KB

Measuring Asset Composability as a Proxy for DeFi Ecosystem Integration.eng.json

238.9 KB

Measuring Asset Composability as a Proxy for DeFi Ecosystem Integration.eng.lrc

6.3 KB

Measuring Asset Composability as a Proxy for DeFi Ecosystem Integration.eng.srt

6.8 KB

Measuring Asset Composability as a Proxy for DeFi Ecosystem Integration.eng.text

5.3 KB

Measuring Asset Composability as a Proxy for DeFi Ecosystem Integration.eng.tsv

5.8 KB

Measuring Asset Composability as a Proxy for DeFi Ecosystem Integration.eng.txt

6.4 KB

Measuring Asset Composability as a Proxy for DeFi Ecosystem Integration.eng.vtt

6.4 KB

Project Wallfacer Demystifying Generalized Frontrunning Bots.eng.json

847.9 KB

Project Wallfacer Demystifying Generalized Frontrunning Bots.eng.lrc

20.1 KB

Project Wallfacer Demystifying Generalized Frontrunning Bots.eng.srt

21.6 KB

Project Wallfacer Demystifying Generalized Frontrunning Bots.eng.text

16.6 KB

Project Wallfacer Demystifying Generalized Frontrunning Bots.eng.tsv

18.5 KB

Project Wallfacer Demystifying Generalized Frontrunning Bots.eng.txt

20.2 KB

Project Wallfacer Demystifying Generalized Frontrunning Bots.eng.vtt

20.2 KB

Red-Black Coins.eng.json

562.6 KB

Red-Black Coins.eng.lrc

13.6 KB

Red-Black Coins.eng.srt

14.6 KB

Red-Black Coins.eng.text

11.0 KB

Red-Black Coins.eng.tsv

12.4 KB

Red-Black Coins.eng.txt

13.7 KB

Red-Black Coins.eng.vtt

13.7 KB

Taming MEV - Implementing a policy framework for transaction orders on blockchains.eng.json

818.0 KB

Taming MEV - Implementing a policy framework for transaction orders on blockchains.eng.lrc

20.5 KB

Taming MEV - Implementing a policy framework for transaction orders on blockchains.eng.srt

22.3 KB

Taming MEV - Implementing a policy framework for transaction orders on blockchains.eng.text

16.3 KB

Taming MEV - Implementing a policy framework for transaction orders on blockchains.eng.tsv

18.6 KB

Taming MEV - Implementing a policy framework for transaction orders on blockchains.eng.txt

20.6 KB

Taming MEV - Implementing a policy framework for transaction orders on blockchains.eng.vtt

20.6 KB

Towards a Formal Theory of DeFi.eng.json

811.6 KB

Towards a Formal Theory of DeFi.eng.lrc

19.8 KB

Towards a Formal Theory of DeFi.eng.srt

21.4 KB

Towards a Formal Theory of DeFi.eng.text

16.0 KB

Towards a Formal Theory of DeFi.eng.tsv

18.1 KB

Towards a Formal Theory of DeFi.eng.txt

19.9 KB

Towards a Formal Theory of DeFi.eng.vtt

19.9 KB

Trading on-chain how feasible is regulators’ worst-case scenario.eng.json

1.2 MB

Trading on-chain how feasible is regulators’ worst-case scenario.eng.lrc

26.5 KB

Trading on-chain how feasible is regulators’ worst-case scenario.eng.srt

29.1 KB

Trading on-chain how feasible is regulators’ worst-case scenario.eng.text

20.7 KB

Trading on-chain how feasible is regulators’ worst-case scenario.eng.tsv

24.0 KB

Trading on-chain how feasible is regulators’ worst-case scenario.eng.txt

26.8 KB

Trading on-chain how feasible is regulators’ worst-case scenario.eng.vtt

26.8 KB

DeFi 2022/

A Closer Look at the Building Blocks of DeFi Compositions.mp4

14.5 MB

A Short Survey on Business Models of Decentralized Finance DeFi Protocols.mp4

18.4 MB

An Empirical Study of Market Inefficiencies in Uniswap and SushiSwap.mp4

12.1 MB

Beyond Staking - An Aphoristic Design for Staking and Rewards.mp4

26.5 MB

Centralized Governance in Decentralized Finance DeFi - A Case Study of MakerDAO.mp4

28.7 MB

Gyroscope P AMM - Designing an Autonomous Primary Market for Stabilizing Non custodial Stablecoins.mp4

18.8 MB

KEYNOTE - MEV Definitions - Wat Do Next.mp4

57.6 MB

NFT Wash Trading - Quantifying suspicious behaviour in NFT markets.mp4

9.4 MB

On Chain Auction with Deposits.mp4

28.1 MB

Oracle Counterpoint - Relationships Between On chain and Off chain Market Data.mp4

7.4 MB

Privacy Preserving Decentralized Netting.mp4

30.1 MB

Replicating Monotonic Payoffs Without Oracles.mp4

8.4 MB

Smart Contracts Upgradeability in DeFi Protocols.mp4

26.5 MB

SoK - Mitigation of Front running in Decentralized Finance.mp4

22.7 MB

The Case for Variable Fees in Constant Product Markets - An Agent Based Simulation.mp4

24.6 MB

/.../DeFi 2022 captions/

A Closer Look at the Building Blocks of DeFi Compositions.eng.json

586.9 KB

A Closer Look at the Building Blocks of DeFi Compositions.eng.lrc

14.9 KB

A Closer Look at the Building Blocks of DeFi Compositions.eng.srt

16.0 KB

A Closer Look at the Building Blocks of DeFi Compositions.eng.text

12.2 KB

A Closer Look at the Building Blocks of DeFi Compositions.eng.tsv

13.7 KB

A Closer Look at the Building Blocks of DeFi Compositions.eng.txt

15.0 KB

A Closer Look at the Building Blocks of DeFi Compositions.eng.vtt

15.0 KB

A Short Survey on Business Models of Decentralized Finance DeFi Protocols.eng.json

534.1 KB

A Short Survey on Business Models of Decentralized Finance DeFi Protocols.eng.lrc

11.7 KB

A Short Survey on Business Models of Decentralized Finance DeFi Protocols.eng.srt

12.7 KB

A Short Survey on Business Models of Decentralized Finance DeFi Protocols.eng.text

9.4 KB

A Short Survey on Business Models of Decentralized Finance DeFi Protocols.eng.tsv

10.6 KB

A Short Survey on Business Models of Decentralized Finance DeFi Protocols.eng.txt

11.8 KB

A Short Survey on Business Models of Decentralized Finance DeFi Protocols.eng.vtt

11.8 KB

An Empirical Study of Market Inefficiencies in Uniswap and SushiSwap.eng.json

861.6 KB

An Empirical Study of Market Inefficiencies in Uniswap and SushiSwap.eng.lrc

19.4 KB

An Empirical Study of Market Inefficiencies in Uniswap and SushiSwap.eng.srt

21.1 KB

An Empirical Study of Market Inefficiencies in Uniswap and SushiSwap.eng.text

15.5 KB

An Empirical Study of Market Inefficiencies in Uniswap and SushiSwap.eng.tsv

17.6 KB

An Empirical Study of Market Inefficiencies in Uniswap and SushiSwap.eng.txt

19.5 KB

An Empirical Study of Market Inefficiencies in Uniswap and SushiSwap.eng.vtt

19.5 KB

Beyond Staking - An Aphoristic Design for Staking and Rewards.eng.json

794.8 KB

Beyond Staking - An Aphoristic Design for Staking and Rewards.eng.lrc

18.7 KB

Beyond Staking - An Aphoristic Design for Staking and Rewards.eng.srt

20.3 KB

Beyond Staking - An Aphoristic Design for Staking and Rewards.eng.text

14.9 KB

Beyond Staking - An Aphoristic Design for Staking and Rewards.eng.tsv

16.9 KB

Beyond Staking - An Aphoristic Design for Staking and Rewards.eng.txt

18.8 KB

Beyond Staking - An Aphoristic Design for Staking and Rewards.eng.vtt

18.8 KB

Centralized Governance in Decentralized Finance DeFi - A Case Study of MakerDAO.eng.json

765.1 KB

Centralized Governance in Decentralized Finance DeFi - A Case Study of MakerDAO.eng.lrc

19.8 KB

Centralized Governance in Decentralized Finance DeFi - A Case Study of MakerDAO.eng.srt

22.1 KB

Centralized Governance in Decentralized Finance DeFi - A Case Study of MakerDAO.eng.text

14.6 KB

Centralized Governance in Decentralized Finance DeFi - A Case Study of MakerDAO.eng.tsv

17.4 KB

Centralized Governance in Decentralized Finance DeFi - A Case Study of MakerDAO.eng.txt

20.0 KB

Centralized Governance in Decentralized Finance DeFi - A Case Study of MakerDAO.eng.vtt

20.0 KB

Gyroscope P AMM - Designing an Autonomous Primary Market for Stabilizing Non custodial Stablecoins.eng.json

760.0 KB

Gyroscope P AMM - Designing an Autonomous Primary Market for Stabilizing Non custodial Stablecoins.eng.lrc

18.8 KB

Gyroscope P AMM - Designing an Autonomous Primary Market for Stabilizing Non custodial Stablecoins.eng.srt

20.4 KB

Gyroscope P AMM - Designing an Autonomous Primary Market for Stabilizing Non custodial Stablecoins.eng.text

14.9 KB

Gyroscope P AMM - Designing an Autonomous Primary Market for Stabilizing Non custodial Stablecoins.eng.tsv

17.0 KB

Gyroscope P AMM - Designing an Autonomous Primary Market for Stabilizing Non custodial Stablecoins.eng.txt

18.9 KB

Gyroscope P AMM - Designing an Autonomous Primary Market for Stabilizing Non custodial Stablecoins.eng.vtt

18.9 KB

KEYNOTE - MEV Definitions - Wat Do Next.eng.json

1.8 MB

KEYNOTE - MEV Definitions - Wat Do Next.eng.lrc

44.6 KB

KEYNOTE - MEV Definitions - Wat Do Next.eng.srt

49.0 KB

KEYNOTE - MEV Definitions - Wat Do Next.eng.text

34.8 KB

KEYNOTE - MEV Definitions - Wat Do Next.eng.tsv

40.4 KB

KEYNOTE - MEV Definitions - Wat Do Next.eng.txt

44.9 KB

KEYNOTE - MEV Definitions - Wat Do Next.eng.vtt

44.9 KB

NFT Wash Trading - Quantifying suspicious behaviour in NFT markets.eng.json

502.6 KB

NFT Wash Trading - Quantifying suspicious behaviour in NFT markets.eng.lrc

13.7 KB

NFT Wash Trading - Quantifying suspicious behaviour in NFT markets.eng.srt

15.0 KB

NFT Wash Trading - Quantifying suspicious behaviour in NFT markets.eng.text

10.7 KB

NFT Wash Trading - Quantifying suspicious behaviour in NFT markets.eng.tsv

12.3 KB

NFT Wash Trading - Quantifying suspicious behaviour in NFT markets.eng.txt

13.8 KB

NFT Wash Trading - Quantifying suspicious behaviour in NFT markets.eng.vtt

13.9 KB

On Chain Auction with Deposits.eng.json

688.1 KB

On Chain Auction with Deposits.eng.lrc

17.8 KB

On Chain Auction with Deposits.eng.srt

19.8 KB

On Chain Auction with Deposits.eng.text

13.4 KB

On Chain Auction with Deposits.eng.tsv

15.8 KB

On Chain Auction with Deposits.eng.txt

18.0 KB

On Chain Auction with Deposits.eng.vtt

18.0 KB

Oracle Counterpoint - Relationships Between On chain and Off chain Market Data.eng.json

264.5 KB

Oracle Counterpoint - Relationships Between On chain and Off chain Market Data.eng.lrc

6.3 KB

Oracle Counterpoint - Relationships Between On chain and Off chain Market Data.eng.srt

6.8 KB

Oracle Counterpoint - Relationships Between On chain and Off chain Market Data.eng.text

5.2 KB

Oracle Counterpoint - Relationships Between On chain and Off chain Market Data.eng.tsv

5.8 KB

Oracle Counterpoint - Relationships Between On chain and Off chain Market Data.eng.txt

6.4 KB

Oracle Counterpoint - Relationships Between On chain and Off chain Market Data.eng.vtt

6.4 KB

Privacy Preserving Decentralized Netting.eng.json

877.3 KB

Privacy Preserving Decentralized Netting.eng.lrc

22.2 KB

Privacy Preserving Decentralized Netting.eng.srt

23.9 KB

Privacy Preserving Decentralized Netting.eng.text

18.3 KB

Privacy Preserving Decentralized Netting.eng.tsv

20.4 KB

Privacy Preserving Decentralized Netting.eng.txt

22.3 KB

Privacy Preserving Decentralized Netting.eng.vtt

22.3 KB

Replicating Monotonic Payoffs Without Oracles.eng.json

1.0 MB

Replicating Monotonic Payoffs Without Oracles.eng.lrc

23.8 KB

Replicating Monotonic Payoffs Without Oracles.eng.srt

25.6 KB

Replicating Monotonic Payoffs Without Oracles.eng.text

19.7 KB

Replicating Monotonic Payoffs Without Oracles.eng.tsv

21.9 KB

Replicating Monotonic Payoffs Without Oracles.eng.txt

24.0 KB

Replicating Monotonic Payoffs Without Oracles.eng.vtt

24.0 KB

Smart Contracts Upgradeability in DeFi Protocols.eng.json

749.7 KB

Smart Contracts Upgradeability in DeFi Protocols.eng.lrc

18.6 KB

Smart Contracts Upgradeability in DeFi Protocols.eng.srt

20.3 KB

Smart Contracts Upgradeability in DeFi Protocols.eng.text

14.6 KB

Smart Contracts Upgradeability in DeFi Protocols.eng.tsv

16.7 KB

Smart Contracts Upgradeability in DeFi Protocols.eng.txt

18.8 KB

Smart Contracts Upgradeability in DeFi Protocols.eng.vtt

18.8 KB

SoK - Mitigation of Front running in Decentralized Finance.eng.json

912.0 KB

SoK - Mitigation of Front running in Decentralized Finance.eng.lrc

22.7 KB

SoK - Mitigation of Front running in Decentralized Finance.eng.srt

25.1 KB

SoK - Mitigation of Front running in Decentralized Finance.eng.text

17.2 KB

SoK - Mitigation of Front running in Decentralized Finance.eng.tsv

20.2 KB

SoK - Mitigation of Front running in Decentralized Finance.eng.txt

22.9 KB

SoK - Mitigation of Front running in Decentralized Finance.eng.vtt

22.9 KB

The Case for Variable Fees in Constant Product Markets - An Agent Based Simulation.eng.json

817.3 KB

The Case for Variable Fees in Constant Product Markets - An Agent Based Simulation.eng.lrc

19.5 KB

The Case for Variable Fees in Constant Product Markets - An Agent Based Simulation.eng.srt

21.3 KB

The Case for Variable Fees in Constant Product Markets - An Agent Based Simulation.eng.text

15.4 KB

The Case for Variable Fees in Constant Product Markets - An Agent Based Simulation.eng.tsv

17.7 KB

The Case for Variable Fees in Constant Product Markets - An Agent Based Simulation.eng.txt

19.7 KB

The Case for Variable Fees in Constant Product Markets - An Agent Based Simulation.eng.vtt

19.7 KB

FC 2021/

A Formal Model of Algorand Smart Contracts.mp4

23.0 MB

ACeD Scalable Data Availability Oracle.mp4

11.3 MB

An Empirical Analysis of Privacy in the Lightning Network.mp4

6.5 MB

Another Look at Extraction and Randomization of Groth's zk-SNARK.mp4

20.6 MB

Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit.mp4

13.0 MB

Blockchain CAP Theorem Allows User-Dependent Adaptivity and Finality.mp4

13.2 MB

BooLigero Improved Sublinear Zero Knowledge Proofs for Boolean Circuits.mp4

13.8 MB

Brick Asynchronous Incentive-Compatible Payment Channels.mp4

10.2 MB

Congestion Attacks in Payment Channel Networks.mp4

18.1 MB

Cross-Layer Deanonymization Methods in the Lightning Protocol.mp4

22.0 MB

DAHash Distribution Aware Tuning of Password Hashing Costs.mp4

20.6 MB

Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Mu.mp4

18.3 MB

Efficient State Management in Distributed Ledgers.mp4

13.8 MB

Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask).mp4

15.9 MB

Fast Isomorphic State Channels.mp4

16.1 MB

Faster Homomorphic Encryption over GPGPUs via hierarchical DGT.mp4

21.7 MB

Fine-Grained Forward Secrecy Allow-List Deny-List Encryption and Applications.mp4

15.1 MB

FPPW A Fair and Privacy Preserving Watchtower for Bitcoin.mp4

13.3 MB

Fraud and Data Availability Proofs Detecting Invalid Blocks in Light Clients.mp4

14.7 MB

Generic Plaintext Equality and Inequality Proofs.mp4

5.4 MB

HaPPY-mine Designing a Mining Reward Function.mp4

16.4 MB

High-Threshold AVSS with Optimal Communication Complexity.mp4

16.9 MB

Ignore the Extra Zeroes Variance-Optimal Mining Pools.mp4

11.6 MB

Improving the Efficiency of AES Protocols in Multi-Party Computation.mp4

15.5 MB

Instant Block Confirmation in the Sleepy Model.mp4

18.3 MB

Liquidations DeFi on a Knife-Edge.mp4

13.2 MB

Lost in Transmission Investigating Filtering of COVID-19 Websites.mp4

6.9 MB

Mining for Privacy How to Bootstrap a Snarky Blockchain.mp4

22.5 MB

Multi-Instance Publicly Verifiable Time-Lock Puzzle and Its Applications.mp4

9.0 MB

Payment Trees Low Collateral Payments for Payment Channel Networks.mp4

16.1 MB

PERIMETER A Network-Layer Attack on the Anonymity of Cryptocurrencies.mp4

8.8 MB

PoSAT Proof-of-Work Dynamic Availability and Unpredictability, without the Work.mp4

13.9 MB

Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments.mp4

12.8 MB

Practical Post-Quantum Few-Time Verifiable Random Function with Applications to Algorand.mp4

19.0 MB

Practical Witness-Key-Agreement for Blockchain-Based Dark Pools Financial Trading.mp4

17.0 MB

Rabbit Efficient Comparison for Secure Multi-Party Computation.mp4

22.6 MB

Reparo Publicly Verifiable Layer to Repair Blockchains.mp4

16.1 MB

Shielded Computations in Smart Contracts Overcoming Forks.mp4

13.3 MB

Short Paper Debt representation in UTXO blockchains.mp4

9.1 MB

Short Paper Selfish Mining Attacks Exacerbated by Elastic Hash Supply.mp4

12.4 MB

Short Paper Terrorist Fraud in Distance Bounding Getting Around the Models.mp4

8.7 MB

Sigforgery Breaking and Fixing Data Authenticity in Sigfox.mp4

12.5 MB

SoK Communication Across Distributed Ledgers.mp4

13.0 MB

SoK Securing Email-A Stakeholder-Based Analysis.mp4

14.3 MB

Somewhere Statistically Binding Commitment Schemes with Applications.mp4

11.2 MB

Specfuscator Evaluating Branch Removal as a Spectre Mitigation.mp4

13.9 MB

Speculative Dereferencing of Registers Reviving Foreshadow.mp4

13.3 MB

The Complex Shape of Anonymity in Cryptocurrencies Case Studies from a Systematic Approa.mp4

10.9 MB

The Eye of Horus Spotting and Analyzing Attacks on Ethereum Smart Contracts.mp4

14.4 MB

Timelocked Bribing.mp4

15.8 MB

Under the Hood of the Ethereum Gossip Protocol.mp4

15.2 MB

What's in Score for Website Users A Data-Driven Long-Term Study on Risk-Based Authentica.mp4

37.2 MB

WTSC 2021 - Absentia secure function evaluation on Ethereum.mp4

11.4 MB

WTSC 2021 - Coins Covid Keynes and K-Shaped Recovery.mp4

13.5 MB

WTSC 2021 - Empirical Analysis of On-chain Voting with Smart Contracts.mp4

6.7 MB

WTSC 2021 - EthVer Formal verification of randomized Ethereum smart contracts.mp4

10.9 MB

WTSC 2021 - Fairness in ERC token markets A Case Study of CryptoKitties.mp4

18.3 MB

WTSC 2021 - Merkle Trees Optimized for Stateless Clients inBitcoin.mp4

13.7 MB

WTSC 2021 - Mirroring Public Key Infrastructures to Blockchains for On-chain Authentication.mp4

27.9 MB

WTSC 2021 - On-Chain Smart Contract Verification over Tendermint.mp4

21.8 MB

WTSC 2021 - Pay To Win Cheap, Cross-chain Bribing Attacks on PoW Cryptocurrencies.mp4

18.4 MB

WTSC 2021 - Privacy-preserving Resource Sharing using Permissioned Blockchains (the Case of Smart Neighbour.mp4

12.4 MB

WTSC 2021 - Publicly Verifiable and Secrecy Preserving Periodic Auctions.mp4

17.8 MB

WTSC 2021 - Reactive Key-Loss Protection in Blockchains.mp4

17.2 MB

WTSC 2021 - SoK Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies.mp4

16.6 MB

WTSC 2021 - Standardized crypto-loans on the Cardano blockchain.mp4

10.2 MB

WTSC 2021 - Towards a Formal Theory of DeFi.mp4

10.2 MB

Zero-Knowledge Proofs for Set Membership Efficient, Succinct, Modular.mp4

14.4 MB

/.../FC 2021 captions/

A Formal Model of Algorand Smart Contracts.eng.json

1.1 MB

A Formal Model of Algorand Smart Contracts.eng.lrc

26.3 KB

A Formal Model of Algorand Smart Contracts.eng.srt

29.0 KB

A Formal Model of Algorand Smart Contracts.eng.text

20.4 KB

A Formal Model of Algorand Smart Contracts.eng.tsv

23.8 KB

A Formal Model of Algorand Smart Contracts.eng.txt

26.6 KB

A Formal Model of Algorand Smart Contracts.eng.vtt

26.6 KB

ACeD Scalable Data Availability Oracle.eng.json

974.5 KB

ACeD Scalable Data Availability Oracle.eng.lrc

25.1 KB

ACeD Scalable Data Availability Oracle.eng.srt

27.2 KB

ACeD Scalable Data Availability Oracle.eng.text

20.2 KB

ACeD Scalable Data Availability Oracle.eng.tsv

22.9 KB

ACeD Scalable Data Availability Oracle.eng.txt

25.3 KB

ACeD Scalable Data Availability Oracle.eng.vtt

25.3 KB

An Empirical Analysis of Privacy in the Lightning Network.eng.json

5.0 KB

An Empirical Analysis of Privacy in the Lightning Network.eng.lrc

0.1 KB

An Empirical Analysis of Privacy in the Lightning Network.eng.srt

0.1 KB

An Empirical Analysis of Privacy in the Lightning Network.eng.text

0.1 KB

An Empirical Analysis of Privacy in the Lightning Network.eng.tsv

0.1 KB

An Empirical Analysis of Privacy in the Lightning Network.eng.txt

0.1 KB

An Empirical Analysis of Privacy in the Lightning Network.eng.vtt

0.1 KB

Another Look at Extraction and Randomization of Groth's zk-SNARK.eng.json

1.2 MB

Another Look at Extraction and Randomization of Groth's zk-SNARK.eng.lrc

28.8 KB

Another Look at Extraction and Randomization of Groth's zk-SNARK.eng.srt

31.3 KB

Another Look at Extraction and Randomization of Groth's zk-SNARK.eng.text

23.1 KB

Another Look at Extraction and Randomization of Groth's zk-SNARK.eng.tsv

26.3 KB

Another Look at Extraction and Randomization of Groth's zk-SNARK.eng.txt

29.0 KB

Another Look at Extraction and Randomization of Groth's zk-SNARK.eng.vtt

29.0 KB

Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit.eng.json

662.3 KB

Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit.eng.lrc

16.5 KB

Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit.eng.srt

18.0 KB

Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit.eng.text

12.9 KB

Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit.eng.tsv

14.9 KB

Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit.eng.txt

16.6 KB

Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit.eng.vtt

16.6 KB

Blockchain CAP Theorem Allows User-Dependent Adaptivity and Finality.eng.json

526.7 KB

Blockchain CAP Theorem Allows User-Dependent Adaptivity and Finality.eng.lrc

13.8 KB

Blockchain CAP Theorem Allows User-Dependent Adaptivity and Finality.eng.srt

14.9 KB

Blockchain CAP Theorem Allows User-Dependent Adaptivity and Finality.eng.text

11.1 KB

Blockchain CAP Theorem Allows User-Dependent Adaptivity and Finality.eng.tsv

12.5 KB

Blockchain CAP Theorem Allows User-Dependent Adaptivity and Finality.eng.txt

13.9 KB

Blockchain CAP Theorem Allows User-Dependent Adaptivity and Finality.eng.vtt

13.9 KB

BooLigero Improved Sublinear Zero Knowledge Proofs for Boolean Circuits.eng.json

1.0 MB

BooLigero Improved Sublinear Zero Knowledge Proofs for Boolean Circuits.eng.lrc

24.3 KB

BooLigero Improved Sublinear Zero Knowledge Proofs for Boolean Circuits.eng.srt

26.5 KB

BooLigero Improved Sublinear Zero Knowledge Proofs for Boolean Circuits.eng.text

19.4 KB

BooLigero Improved Sublinear Zero Knowledge Proofs for Boolean Circuits.eng.tsv

22.2 KB

BooLigero Improved Sublinear Zero Knowledge Proofs for Boolean Circuits.eng.txt

24.5 KB

BooLigero Improved Sublinear Zero Knowledge Proofs for Boolean Circuits.eng.vtt

24.5 KB

Brick Asynchronous Incentive-Compatible Payment Channels.eng.json

832.2 KB

Brick Asynchronous Incentive-Compatible Payment Channels.eng.lrc

20.6 KB

Brick Asynchronous Incentive-Compatible Payment Channels.eng.srt

22.3 KB

Brick Asynchronous Incentive-Compatible Payment Channels.eng.text

16.7 KB

Brick Asynchronous Incentive-Compatible Payment Channels.eng.tsv

18.8 KB

Brick Asynchronous Incentive-Compatible Payment Channels.eng.txt

20.8 KB

Brick Asynchronous Incentive-Compatible Payment Channels.eng.vtt

20.8 KB

Congestion Attacks in Payment Channel Networks.eng.json

1.3 MB

Congestion Attacks in Payment Channel Networks.eng.lrc

34.0 KB

Congestion Attacks in Payment Channel Networks.eng.srt

36.9 KB

Congestion Attacks in Payment Channel Networks.eng.text

27.7 KB

Congestion Attacks in Payment Channel Networks.eng.tsv

31.3 KB

Congestion Attacks in Payment Channel Networks.eng.txt

34.3 KB

Congestion Attacks in Payment Channel Networks.eng.vtt

34.3 KB

Cross-Layer Deanonymization Methods in the Lightning Protocol.eng.json

1.2 MB

Cross-Layer Deanonymization Methods in the Lightning Protocol.eng.lrc

28.8 KB

Cross-Layer Deanonymization Methods in the Lightning Protocol.eng.srt

31.2 KB

Cross-Layer Deanonymization Methods in the Lightning Protocol.eng.text

23.3 KB

Cross-Layer Deanonymization Methods in the Lightning Protocol.eng.tsv

26.5 KB

Cross-Layer Deanonymization Methods in the Lightning Protocol.eng.txt

29.0 KB

Cross-Layer Deanonymization Methods in the Lightning Protocol.eng.vtt

29.0 KB

DAHash Distribution Aware Tuning of Password Hashing Costs.eng.json

1.3 MB

DAHash Distribution Aware Tuning of Password Hashing Costs.eng.lrc

32.7 KB

DAHash Distribution Aware Tuning of Password Hashing Costs.eng.srt

35.8 KB

DAHash Distribution Aware Tuning of Password Hashing Costs.eng.text

25.8 KB

DAHash Distribution Aware Tuning of Password Hashing Costs.eng.tsv

29.7 KB

DAHash Distribution Aware Tuning of Password Hashing Costs.eng.txt

33.0 KB

DAHash Distribution Aware Tuning of Password Hashing Costs.eng.vtt

33.0 KB

Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Mu.eng.json

762.9 KB

Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Mu.eng.lrc

20.4 KB

Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Mu.eng.srt

22.1 KB

Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Mu.eng.text

16.5 KB

Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Mu.eng.tsv

18.7 KB

Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Mu.eng.txt

20.6 KB

Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Mu.eng.vtt

20.6 KB

Efficient State Management in Distributed Ledgers.eng.json

807.9 KB

Efficient State Management in Distributed Ledgers.eng.lrc

19.7 KB

Efficient State Management in Distributed Ledgers.eng.srt

21.3 KB

Efficient State Management in Distributed Ledgers.eng.text

16.0 KB

Efficient State Management in Distributed Ledgers.eng.tsv

18.0 KB

Efficient State Management in Distributed Ledgers.eng.txt

19.8 KB

Efficient State Management in Distributed Ledgers.eng.vtt

19.8 KB

Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask).eng.json

949.5 KB

Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask).eng.lrc

24.6 KB

Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask).eng.srt

26.7 KB

Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask).eng.text

19.7 KB

Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask).eng.tsv

22.4 KB

Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask).eng.txt

24.8 KB

Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask).eng.vtt

24.8 KB

Fast Isomorphic State Channels.eng.json

929.7 KB

Fast Isomorphic State Channels.eng.lrc

22.5 KB

Fast Isomorphic State Channels.eng.srt

24.1 KB

Fast Isomorphic State Channels.eng.text

18.7 KB

Fast Isomorphic State Channels.eng.tsv

20.9 KB

Fast Isomorphic State Channels.eng.txt

22.6 KB

Fast Isomorphic State Channels.eng.vtt

22.7 KB

Faster Homomorphic Encryption over GPGPUs via hierarchical DGT.eng.json

948.3 KB

Faster Homomorphic Encryption over GPGPUs via hierarchical DGT.eng.lrc

24.1 KB

Faster Homomorphic Encryption over GPGPUs via hierarchical DGT.eng.srt

26.3 KB

Faster Homomorphic Encryption over GPGPUs via hierarchical DGT.eng.text

19.2 KB

Faster Homomorphic Encryption over GPGPUs via hierarchical DGT.eng.tsv

22.0 KB

Faster Homomorphic Encryption over GPGPUs via hierarchical DGT.eng.txt

24.3 KB

Faster Homomorphic Encryption over GPGPUs via hierarchical DGT.eng.vtt

24.3 KB

Fine-Grained Forward Secrecy Allow-List Deny-List Encryption and Applications.eng.json

918.8 KB

Fine-Grained Forward Secrecy Allow-List Deny-List Encryption and Applications.eng.lrc

23.5 KB

Fine-Grained Forward Secrecy Allow-List Deny-List Encryption and Applications.eng.srt

25.3 KB

Fine-Grained Forward Secrecy Allow-List Deny-List Encryption and Applications.eng.text

19.3 KB

Fine-Grained Forward Secrecy Allow-List Deny-List Encryption and Applications.eng.tsv

21.6 KB

Fine-Grained Forward Secrecy Allow-List Deny-List Encryption and Applications.eng.txt

23.6 KB

Fine-Grained Forward Secrecy Allow-List Deny-List Encryption and Applications.eng.vtt

23.6 KB

FPPW A Fair and Privacy Preserving Watchtower for Bitcoin.eng.json

848.5 KB

FPPW A Fair and Privacy Preserving Watchtower for Bitcoin.eng.lrc

21.2 KB

FPPW A Fair and Privacy Preserving Watchtower for Bitcoin.eng.srt

22.7 KB

FPPW A Fair and Privacy Preserving Watchtower for Bitcoin.eng.text

17.6 KB

FPPW A Fair and Privacy Preserving Watchtower for Bitcoin.eng.tsv

19.6 KB

FPPW A Fair and Privacy Preserving Watchtower for Bitcoin.eng.txt

21.3 KB

FPPW A Fair and Privacy Preserving Watchtower for Bitcoin.eng.vtt

21.3 KB

Fraud and Data Availability Proofs Detecting Invalid Blocks in Light Clients.eng.json

1.1 MB

Fraud and Data Availability Proofs Detecting Invalid Blocks in Light Clients.eng.lrc

26.3 KB

Fraud and Data Availability Proofs Detecting Invalid Blocks in Light Clients.eng.srt

28.0 KB

Fraud and Data Availability Proofs Detecting Invalid Blocks in Light Clients.eng.text

22.4 KB

Fraud and Data Availability Proofs Detecting Invalid Blocks in Light Clients.eng.tsv

24.6 KB

Fraud and Data Availability Proofs Detecting Invalid Blocks in Light Clients.eng.txt

26.4 KB

Fraud and Data Availability Proofs Detecting Invalid Blocks in Light Clients.eng.vtt

26.5 KB

Generic Plaintext Equality and Inequality Proofs.eng.json

532.2 KB

Generic Plaintext Equality and Inequality Proofs.eng.lrc

13.6 KB

Generic Plaintext Equality and Inequality Proofs.eng.srt

14.8 KB

Generic Plaintext Equality and Inequality Proofs.eng.text

11.0 KB

Generic Plaintext Equality and Inequality Proofs.eng.tsv

12.4 KB

Generic Plaintext Equality and Inequality Proofs.eng.txt

13.7 KB

Generic Plaintext Equality and Inequality Proofs.eng.vtt

13.7 KB

HaPPY-mine Designing a Mining Reward Function.eng.json

938.5 KB

HaPPY-mine Designing a Mining Reward Function.eng.lrc

21.9 KB

HaPPY-mine Designing a Mining Reward Function.eng.srt

23.6 KB

HaPPY-mine Designing a Mining Reward Function.eng.text

18.0 KB

HaPPY-mine Designing a Mining Reward Function.eng.tsv

20.1 KB

HaPPY-mine Designing a Mining Reward Function.eng.txt

22.0 KB

HaPPY-mine Designing a Mining Reward Function.eng.vtt

22.0 KB

High-Threshold AVSS with Optimal Communication Complexity.eng.json

1.1 MB

High-Threshold AVSS with Optimal Communication Complexity.eng.lrc

27.3 KB

High-Threshold AVSS with Optimal Communication Complexity.eng.srt

29.8 KB

High-Threshold AVSS with Optimal Communication Complexity.eng.text

21.7 KB

High-Threshold AVSS with Optimal Communication Complexity.eng.tsv

24.8 KB

High-Threshold AVSS with Optimal Communication Complexity.eng.txt

27.5 KB

High-Threshold AVSS with Optimal Communication Complexity.eng.vtt

27.5 KB

Ignore the Extra Zeroes Variance-Optimal Mining Pools.eng.json

777.0 KB

Ignore the Extra Zeroes Variance-Optimal Mining Pools.eng.lrc

17.9 KB

Ignore the Extra Zeroes Variance-Optimal Mining Pools.eng.srt

19.4 KB

Ignore the Extra Zeroes Variance-Optimal Mining Pools.eng.text

14.4 KB

Ignore the Extra Zeroes Variance-Optimal Mining Pools.eng.tsv

16.4 KB

Ignore the Extra Zeroes Variance-Optimal Mining Pools.eng.txt

18.0 KB

Ignore the Extra Zeroes Variance-Optimal Mining Pools.eng.vtt

18.0 KB

Improving the Efficiency of AES Protocols in Multi-Party Computation.eng.json

1.0 MB

Improving the Efficiency of AES Protocols in Multi-Party Computation.eng.lrc

24.9 KB

Improving the Efficiency of AES Protocols in Multi-Party Computation.eng.srt

26.9 KB

Improving the Efficiency of AES Protocols in Multi-Party Computation.eng.text

20.3 KB

Improving the Efficiency of AES Protocols in Multi-Party Computation.eng.tsv

22.9 KB

Improving the Efficiency of AES Protocols in Multi-Party Computation.eng.txt

25.1 KB

Improving the Efficiency of AES Protocols in Multi-Party Computation.eng.vtt

25.1 KB

Instant Block Confirmation in the Sleepy Model.eng.json

1.0 MB

Instant Block Confirmation in the Sleepy Model.eng.lrc

25.0 KB

Instant Block Confirmation in the Sleepy Model.eng.srt

27.2 KB

Instant Block Confirmation in the Sleepy Model.eng.text

20.0 KB

Instant Block Confirmation in the Sleepy Model.eng.tsv

22.8 KB

Instant Block Confirmation in the Sleepy Model.eng.txt

25.2 KB

Instant Block Confirmation in the Sleepy Model.eng.vtt

25.2 KB

Liquidations DeFi on a Knife-Edge.eng.json

898.7 KB

Liquidations DeFi on a Knife-Edge.eng.lrc

21.3 KB

Liquidations DeFi on a Knife-Edge.eng.srt

22.9 KB

Liquidations DeFi on a Knife-Edge.eng.text

17.6 KB

Liquidations DeFi on a Knife-Edge.eng.tsv

19.7 KB

Liquidations DeFi on a Knife-Edge.eng.txt

21.5 KB

Liquidations DeFi on a Knife-Edge.eng.vtt

21.5 KB

Lost in Transmission Investigating Filtering of COVID-19 Websites.eng.json

899.9 KB

Lost in Transmission Investigating Filtering of COVID-19 Websites.eng.lrc

20.4 KB

Lost in Transmission Investigating Filtering of COVID-19 Websites.eng.srt

22.0 KB

Lost in Transmission Investigating Filtering of COVID-19 Websites.eng.text

16.8 KB

Lost in Transmission Investigating Filtering of COVID-19 Websites.eng.tsv

18.7 KB

Lost in Transmission Investigating Filtering of COVID-19 Websites.eng.txt

20.6 KB

Lost in Transmission Investigating Filtering of COVID-19 Websites.eng.vtt

20.6 KB

Mining for Privacy How to Bootstrap a Snarky Blockchain.eng.json

1.1 MB

Mining for Privacy How to Bootstrap a Snarky Blockchain.eng.lrc

26.1 KB

Mining for Privacy How to Bootstrap a Snarky Blockchain.eng.srt

28.2 KB

Mining for Privacy How to Bootstrap a Snarky Blockchain.eng.text

21.2 KB

Mining for Privacy How to Bootstrap a Snarky Blockchain.eng.tsv

24.0 KB

Mining for Privacy How to Bootstrap a Snarky Blockchain.eng.txt

26.2 KB

Mining for Privacy How to Bootstrap a Snarky Blockchain.eng.vtt

26.2 KB

Multi-Instance Publicly Verifiable Time-Lock Puzzle and Its Applications.eng.json

546.7 KB

Multi-Instance Publicly Verifiable Time-Lock Puzzle and Its Applications.eng.lrc

14.2 KB

Multi-Instance Publicly Verifiable Time-Lock Puzzle and Its Applications.eng.srt

15.5 KB

Multi-Instance Publicly Verifiable Time-Lock Puzzle and Its Applications.eng.text

11.2 KB

Multi-Instance Publicly Verifiable Time-Lock Puzzle and Its Applications.eng.tsv

12.8 KB

Multi-Instance Publicly Verifiable Time-Lock Puzzle and Its Applications.eng.txt

14.3 KB

Multi-Instance Publicly Verifiable Time-Lock Puzzle and Its Applications.eng.vtt

14.3 KB

Payment Trees Low Collateral Payments for Payment Channel Networks.eng.json

968.7 KB

Payment Trees Low Collateral Payments for Payment Channel Networks.eng.lrc

24.0 KB

Payment Trees Low Collateral Payments for Payment Channel Networks.eng.srt

26.0 KB

Payment Trees Low Collateral Payments for Payment Channel Networks.eng.text

19.3 KB

Payment Trees Low Collateral Payments for Payment Channel Networks.eng.tsv

21.9 KB

Payment Trees Low Collateral Payments for Payment Channel Networks.eng.txt

24.1 KB

Payment Trees Low Collateral Payments for Payment Channel Networks.eng.vtt

24.1 KB

PERIMETER A Network-Layer Attack on the Anonymity of Cryptocurrencies.eng.json

901.6 KB

PERIMETER A Network-Layer Attack on the Anonymity of Cryptocurrencies.eng.lrc

18.6 KB

PERIMETER A Network-Layer Attack on the Anonymity of Cryptocurrencies.eng.srt

20.2 KB

PERIMETER A Network-Layer Attack on the Anonymity of Cryptocurrencies.eng.text

14.9 KB

PERIMETER A Network-Layer Attack on the Anonymity of Cryptocurrencies.eng.tsv

16.9 KB

PERIMETER A Network-Layer Attack on the Anonymity of Cryptocurrencies.eng.txt

18.8 KB

PERIMETER A Network-Layer Attack on the Anonymity of Cryptocurrencies.eng.vtt

18.8 KB

PoSAT Proof-of-Work Dynamic Availability and Unpredictability, without the Work.eng.json

694.0 KB

PoSAT Proof-of-Work Dynamic Availability and Unpredictability, without the Work.eng.lrc

17.9 KB

PoSAT Proof-of-Work Dynamic Availability and Unpredictability, without the Work.eng.srt

19.4 KB

PoSAT Proof-of-Work Dynamic Availability and Unpredictability, without the Work.eng.text

14.6 KB

PoSAT Proof-of-Work Dynamic Availability and Unpredictability, without the Work.eng.tsv

16.5 KB

PoSAT Proof-of-Work Dynamic Availability and Unpredictability, without the Work.eng.txt

18.1 KB

PoSAT Proof-of-Work Dynamic Availability and Unpredictability, without the Work.eng.vtt

18.1 KB

Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments.eng.json

965.5 KB

Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments.eng.lrc

24.0 KB

Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments.eng.srt

25.7 KB

Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments.eng.text

20.0 KB

Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments.eng.tsv

22.1 KB

Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments.eng.txt

24.1 KB

Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments.eng.vtt

24.1 KB

Practical Post-Quantum Few-Time Verifiable Random Function with Applications to Algorand.eng.json

1.3 MB

Practical Post-Quantum Few-Time Verifiable Random Function with Applications to Algorand.eng.lrc

29.9 KB

Practical Post-Quantum Few-Time Verifiable Random Function with Applications to Algorand.eng.srt

31.9 KB

Practical Post-Quantum Few-Time Verifiable Random Function with Applications to Algorand.eng.text

25.3 KB

Practical Post-Quantum Few-Time Verifiable Random Function with Applications to Algorand.eng.tsv

28.0 KB

Practical Post-Quantum Few-Time Verifiable Random Function with Applications to Algorand.eng.txt

30.1 KB

Practical Post-Quantum Few-Time Verifiable Random Function with Applications to Algorand.eng.vtt

30.1 KB

Practical Witness-Key-Agreement for Blockchain-Based Dark Pools Financial Trading.eng.json

755.5 KB

Practical Witness-Key-Agreement for Blockchain-Based Dark Pools Financial Trading.eng.lrc

19.0 KB

Practical Witness-Key-Agreement for Blockchain-Based Dark Pools Financial Trading.eng.srt

20.4 KB

Practical Witness-Key-Agreement for Blockchain-Based Dark Pools Financial Trading.eng.text

15.7 KB

Practical Witness-Key-Agreement for Blockchain-Based Dark Pools Financial Trading.eng.tsv

17.5 KB

Practical Witness-Key-Agreement for Blockchain-Based Dark Pools Financial Trading.eng.txt

19.1 KB

Practical Witness-Key-Agreement for Blockchain-Based Dark Pools Financial Trading.eng.vtt

19.1 KB

Rabbit Efficient Comparison for Secure Multi-Party Computation.eng.json

1.1 MB

Rabbit Efficient Comparison for Secure Multi-Party Computation.eng.lrc

28.5 KB

Rabbit Efficient Comparison for Secure Multi-Party Computation.eng.srt

31.2 KB

Rabbit Efficient Comparison for Secure Multi-Party Computation.eng.text

22.5 KB

Rabbit Efficient Comparison for Secure Multi-Party Computation.eng.tsv

26.0 KB

Rabbit Efficient Comparison for Secure Multi-Party Computation.eng.txt

28.7 KB

Rabbit Efficient Comparison for Secure Multi-Party Computation.eng.vtt

28.7 KB

Reparo Publicly Verifiable Layer to Repair Blockchains.eng.json

858.9 KB

Reparo Publicly Verifiable Layer to Repair Blockchains.eng.lrc

22.7 KB

Reparo Publicly Verifiable Layer to Repair Blockchains.eng.srt

25.0 KB

Reparo Publicly Verifiable Layer to Repair Blockchains.eng.text

17.6 KB

Reparo Publicly Verifiable Layer to Repair Blockchains.eng.tsv

20.4 KB

Reparo Publicly Verifiable Layer to Repair Blockchains.eng.txt

22.9 KB

Reparo Publicly Verifiable Layer to Repair Blockchains.eng.vtt

22.9 KB

Shielded Computations in Smart Contracts Overcoming Forks.eng.json

720.9 KB

Shielded Computations in Smart Contracts Overcoming Forks.eng.lrc

18.3 KB

Shielded Computations in Smart Contracts Overcoming Forks.eng.srt

19.9 KB

Shielded Computations in Smart Contracts Overcoming Forks.eng.text

14.6 KB

Shielded Computations in Smart Contracts Overcoming Forks.eng.tsv

16.6 KB

Shielded Computations in Smart Contracts Overcoming Forks.eng.txt

18.4 KB

Shielded Computations in Smart Contracts Overcoming Forks.eng.vtt

18.4 KB

Short Paper Debt representation in UTXO blockchains.eng.json

615.5 KB

Short Paper Debt representation in UTXO blockchains.eng.lrc

16.3 KB

Short Paper Debt representation in UTXO blockchains.eng.srt

17.7 KB

Short Paper Debt representation in UTXO blockchains.eng.text

13.1 KB

Short Paper Debt representation in UTXO blockchains.eng.tsv

14.8 KB

Short Paper Debt representation in UTXO blockchains.eng.txt

16.5 KB

Short Paper Debt representation in UTXO blockchains.eng.vtt

16.5 KB

Short Paper Selfish Mining Attacks Exacerbated by Elastic Hash Supply.eng.json

597.5 KB

Short Paper Selfish Mining Attacks Exacerbated by Elastic Hash Supply.eng.lrc

15.4 KB

Short Paper Selfish Mining Attacks Exacerbated by Elastic Hash Supply.eng.srt

16.7 KB

Short Paper Selfish Mining Attacks Exacerbated by Elastic Hash Supply.eng.text

12.4 KB

Short Paper Selfish Mining Attacks Exacerbated by Elastic Hash Supply.eng.tsv

14.0 KB

Short Paper Selfish Mining Attacks Exacerbated by Elastic Hash Supply.eng.txt

15.5 KB

Short Paper Selfish Mining Attacks Exacerbated by Elastic Hash Supply.eng.vtt

15.5 KB

Short Paper Terrorist Fraud in Distance Bounding Getting Around the Models.eng.json

862.9 KB

Short Paper Terrorist Fraud in Distance Bounding Getting Around the Models.eng.lrc

20.7 KB

Short Paper Terrorist Fraud in Distance Bounding Getting Around the Models.eng.srt

22.4 KB

Short Paper Terrorist Fraud in Distance Bounding Getting Around the Models.eng.text

16.6 KB

Short Paper Terrorist Fraud in Distance Bounding Getting Around the Models.eng.tsv

18.8 KB

Short Paper Terrorist Fraud in Distance Bounding Getting Around the Models.eng.txt

20.8 KB

Short Paper Terrorist Fraud in Distance Bounding Getting Around the Models.eng.vtt

20.8 KB

Sigforgery Breaking and Fixing Data Authenticity in Sigfox.eng.json

796.7 KB

Sigforgery Breaking and Fixing Data Authenticity in Sigfox.eng.lrc

20.0 KB

Sigforgery Breaking and Fixing Data Authenticity in Sigfox.eng.srt

21.7 KB

Sigforgery Breaking and Fixing Data Authenticity in Sigfox.eng.text

16.0 KB

Sigforgery Breaking and Fixing Data Authenticity in Sigfox.eng.tsv

18.2 KB

Sigforgery Breaking and Fixing Data Authenticity in Sigfox.eng.txt

20.1 KB

Sigforgery Breaking and Fixing Data Authenticity in Sigfox.eng.vtt

20.2 KB

SoK Communication Across Distributed Ledgers.eng.json

1.3 MB

SoK Communication Across Distributed Ledgers.eng.lrc

32.3 KB

SoK Communication Across Distributed Ledgers.eng.srt

34.6 KB

SoK Communication Across Distributed Ledgers.eng.text

27.2 KB

SoK Communication Across Distributed Ledgers.eng.tsv

30.1 KB

SoK Communication Across Distributed Ledgers.eng.txt

32.5 KB

SoK Communication Across Distributed Ledgers.eng.vtt

32.5 KB

SoK Securing Email-A Stakeholder-Based Analysis.eng.json

1.4 MB

SoK Securing Email-A Stakeholder-Based Analysis.eng.lrc

35.3 KB

SoK Securing Email-A Stakeholder-Based Analysis.eng.srt

38.6 KB

SoK Securing Email-A Stakeholder-Based Analysis.eng.text

28.0 KB

SoK Securing Email-A Stakeholder-Based Analysis.eng.tsv

32.1 KB

SoK Securing Email-A Stakeholder-Based Analysis.eng.txt

35.6 KB

SoK Securing Email-A Stakeholder-Based Analysis.eng.vtt

35.6 KB

Somewhere Statistically Binding Commitment Schemes with Applications.eng.json

608.6 KB

Somewhere Statistically Binding Commitment Schemes with Applications.eng.lrc

16.5 KB

Somewhere Statistically Binding Commitment Schemes with Applications.eng.srt

17.8 KB

Somewhere Statistically Binding Commitment Schemes with Applications.eng.text

13.5 KB

Somewhere Statistically Binding Commitment Schemes with Applications.eng.tsv

15.1 KB

Somewhere Statistically Binding Commitment Schemes with Applications.eng.txt

16.6 KB

Somewhere Statistically Binding Commitment Schemes with Applications.eng.vtt

16.6 KB

Specfuscator Evaluating Branch Removal as a Spectre Mitigation.eng.json

793.3 KB

Specfuscator Evaluating Branch Removal as a Spectre Mitigation.eng.lrc

19.6 KB

Specfuscator Evaluating Branch Removal as a Spectre Mitigation.eng.srt

21.4 KB

Specfuscator Evaluating Branch Removal as a Spectre Mitigation.eng.text

15.3 KB

Specfuscator Evaluating Branch Removal as a Spectre Mitigation.eng.tsv

17.7 KB

Specfuscator Evaluating Branch Removal as a Spectre Mitigation.eng.txt

19.7 KB

Specfuscator Evaluating Branch Removal as a Spectre Mitigation.eng.vtt

19.7 KB

Speculative Dereferencing of Registers Reviving Foreshadow.eng.json

832.0 KB

Speculative Dereferencing of Registers Reviving Foreshadow.eng.lrc

20.5 KB

Speculative Dereferencing of Registers Reviving Foreshadow.eng.srt

22.3 KB

Speculative Dereferencing of Registers Reviving Foreshadow.eng.text

16.3 KB

Speculative Dereferencing of Registers Reviving Foreshadow.eng.tsv

18.6 KB

Speculative Dereferencing of Registers Reviving Foreshadow.eng.txt

20.7 KB

Speculative Dereferencing of Registers Reviving Foreshadow.eng.vtt

20.7 KB

The Complex Shape of Anonymity in Cryptocurrencies Case Studies from a Systematic Approa.eng.json

807.8 KB

The Complex Shape of Anonymity in Cryptocurrencies Case Studies from a Systematic Approa.eng.lrc

20.7 KB

The Complex Shape of Anonymity in Cryptocurrencies Case Studies from a Systematic Approa.eng.srt

22.7 KB

The Complex Shape of Anonymity in Cryptocurrencies Case Studies from a Systematic Approa.eng.text

16.3 KB

The Complex Shape of Anonymity in Cryptocurrencies Case Studies from a Systematic Approa.eng.tsv

18.8 KB

The Complex Shape of Anonymity in Cryptocurrencies Case Studies from a Systematic Approa.eng.txt

20.9 KB

The Complex Shape of Anonymity in Cryptocurrencies Case Studies from a Systematic Approa.eng.vtt

20.9 KB

The Eye of Horus Spotting and Analyzing Attacks on Ethereum Smart Contracts.eng.json

966.0 KB

The Eye of Horus Spotting and Analyzing Attacks on Ethereum Smart Contracts.eng.lrc

25.3 KB

The Eye of Horus Spotting and Analyzing Attacks on Ethereum Smart Contracts.eng.srt

27.4 KB

The Eye of Horus Spotting and Analyzing Attacks on Ethereum Smart Contracts.eng.text

20.5 KB

The Eye of Horus Spotting and Analyzing Attacks on Ethereum Smart Contracts.eng.tsv

23.1 KB

The Eye of Horus Spotting and Analyzing Attacks on Ethereum Smart Contracts.eng.txt

25.5 KB

The Eye of Horus Spotting and Analyzing Attacks on Ethereum Smart Contracts.eng.vtt

25.5 KB

Timelocked Bribing.eng.json

956.3 KB

Timelocked Bribing.eng.lrc

22.4 KB

Timelocked Bribing.eng.srt

24.2 KB

Timelocked Bribing.eng.text

18.3 KB

Timelocked Bribing.eng.tsv

20.6 KB

Timelocked Bribing.eng.txt

22.6 KB

Timelocked Bribing.eng.vtt

22.6 KB

Under the Hood of the Ethereum Gossip Protocol.eng.json

1.0 MB

Under the Hood of the Ethereum Gossip Protocol.eng.lrc

24.6 KB

Under the Hood of the Ethereum Gossip Protocol.eng.srt

26.6 KB

Under the Hood of the Ethereum Gossip Protocol.eng.text

20.1 KB

Under the Hood of the Ethereum Gossip Protocol.eng.tsv

22.7 KB

Under the Hood of the Ethereum Gossip Protocol.eng.txt

24.8 KB

Under the Hood of the Ethereum Gossip Protocol.eng.vtt

24.8 KB

What's in Score for Website Users A Data-Driven Long-Term Study on Risk-Based Authentica.eng.json

1.1 MB

What's in Score for Website Users A Data-Driven Long-Term Study on Risk-Based Authentica.eng.lrc

29.3 KB

What's in Score for Website Users A Data-Driven Long-Term Study on Risk-Based Authentica.eng.srt

32.4 KB

What's in Score for Website Users A Data-Driven Long-Term Study on Risk-Based Authentica.eng.text

22.3 KB

What's in Score for Website Users A Data-Driven Long-Term Study on Risk-Based Authentica.eng.tsv

26.2 KB

What's in Score for Website Users A Data-Driven Long-Term Study on Risk-Based Authentica.eng.txt

29.5 KB

What's in Score for Website Users A Data-Driven Long-Term Study on Risk-Based Authentica.eng.vtt

29.5 KB

WTSC 2021 - Absentia secure function evaluation on Ethereum.eng.json

752.2 KB

WTSC 2021 - Absentia secure function evaluation on Ethereum.eng.lrc

19.6 KB

WTSC 2021 - Absentia secure function evaluation on Ethereum.eng.srt

21.5 KB

WTSC 2021 - Absentia secure function evaluation on Ethereum.eng.text

15.2 KB

WTSC 2021 - Absentia secure function evaluation on Ethereum.eng.tsv

17.6 KB

WTSC 2021 - Absentia secure function evaluation on Ethereum.eng.txt

19.8 KB

WTSC 2021 - Absentia secure function evaluation on Ethereum.eng.vtt

19.8 KB

WTSC 2021 - Coins Covid Keynes and K-Shaped Recovery.eng.json

1.2 MB

WTSC 2021 - Coins Covid Keynes and K-Shaped Recovery.eng.lrc

28.0 KB

WTSC 2021 - Coins Covid Keynes and K-Shaped Recovery.eng.srt

30.0 KB

WTSC 2021 - Coins Covid Keynes and K-Shaped Recovery.eng.text

23.5 KB

WTSC 2021 - Coins Covid Keynes and K-Shaped Recovery.eng.tsv

26.1 KB

WTSC 2021 - Coins Covid Keynes and K-Shaped Recovery.eng.txt

28.2 KB

WTSC 2021 - Coins Covid Keynes and K-Shaped Recovery.eng.vtt

28.2 KB

WTSC 2021 - Empirical Analysis of On-chain Voting with Smart Contracts.eng.json

456.5 KB

WTSC 2021 - Empirical Analysis of On-chain Voting with Smart Contracts.eng.lrc

12.3 KB

WTSC 2021 - Empirical Analysis of On-chain Voting with Smart Contracts.eng.srt

13.4 KB

WTSC 2021 - Empirical Analysis of On-chain Voting with Smart Contracts.eng.text

9.6 KB

WTSC 2021 - Empirical Analysis of On-chain Voting with Smart Contracts.eng.tsv

11.0 KB

WTSC 2021 - Empirical Analysis of On-chain Voting with Smart Contracts.eng.txt

12.4 KB

WTSC 2021 - Empirical Analysis of On-chain Voting with Smart Contracts.eng.vtt

12.4 KB

WTSC 2021 - EthVer Formal verification of randomized Ethereum smart contracts.eng.json

719.3 KB

WTSC 2021 - EthVer Formal verification of randomized Ethereum smart contracts.eng.lrc

18.0 KB

WTSC 2021 - EthVer Formal verification of randomized Ethereum smart contracts.eng.srt

19.6 KB

WTSC 2021 - EthVer Formal verification of randomized Ethereum smart contracts.eng.text

14.2 KB

WTSC 2021 - EthVer Formal verification of randomized Ethereum smart contracts.eng.tsv

16.3 KB

WTSC 2021 - EthVer Formal verification of randomized Ethereum smart contracts.eng.txt

18.1 KB

WTSC 2021 - EthVer Formal verification of randomized Ethereum smart contracts.eng.vtt

18.1 KB

WTSC 2021 - Fairness in ERC token markets A Case Study of CryptoKitties.eng.json

746.2 KB

WTSC 2021 - Fairness in ERC token markets A Case Study of CryptoKitties.eng.lrc

22.0 KB

WTSC 2021 - Fairness in ERC token markets A Case Study of CryptoKitties.eng.srt

24.5 KB

WTSC 2021 - Fairness in ERC token markets A Case Study of CryptoKitties.eng.text

16.1 KB

WTSC 2021 - Fairness in ERC token markets A Case Study of CryptoKitties.eng.tsv

19.4 KB

WTSC 2021 - Fairness in ERC token markets A Case Study of CryptoKitties.eng.txt

22.2 KB

WTSC 2021 - Fairness in ERC token markets A Case Study of CryptoKitties.eng.vtt

22.2 KB

WTSC 2021 - Merkle Trees Optimized for Stateless Clients inBitcoin.eng.json

735.0 KB

WTSC 2021 - Merkle Trees Optimized for Stateless Clients inBitcoin.eng.lrc

18.1 KB

WTSC 2021 - Merkle Trees Optimized for Stateless Clients inBitcoin.eng.srt

19.5 KB

WTSC 2021 - Merkle Trees Optimized for Stateless Clients inBitcoin.eng.text

14.7 KB

WTSC 2021 - Merkle Trees Optimized for Stateless Clients inBitcoin.eng.tsv

16.5 KB

WTSC 2021 - Merkle Trees Optimized for Stateless Clients inBitcoin.eng.txt

18.2 KB

WTSC 2021 - Merkle Trees Optimized for Stateless Clients inBitcoin.eng.vtt

18.2 KB

WTSC 2021 - Mirroring Public Key Infrastructures to Blockchains for On-chain Authentication.eng.json

1.0 MB

WTSC 2021 - Mirroring Public Key Infrastructures to Blockchains for On-chain Authentication.eng.lrc

26.5 KB

WTSC 2021 - Mirroring Public Key Infrastructures to Blockchains for On-chain Authentication.eng.srt

28.7 KB

WTSC 2021 - Mirroring Public Key Infrastructures to Blockchains for On-chain Authentication.eng.text

21.4 KB

WTSC 2021 - Mirroring Public Key Infrastructures to Blockchains for On-chain Authentication.eng.tsv

24.3 KB

WTSC 2021 - Mirroring Public Key Infrastructures to Blockchains for On-chain Authentication.eng.txt

26.7 KB

WTSC 2021 - Mirroring Public Key Infrastructures to Blockchains for On-chain Authentication.eng.vtt

26.7 KB

WTSC 2021 - On-Chain Smart Contract Verification over Tendermint.eng.json

749.2 KB

WTSC 2021 - On-Chain Smart Contract Verification over Tendermint.eng.lrc

19.4 KB

WTSC 2021 - On-Chain Smart Contract Verification over Tendermint.eng.srt

20.8 KB

WTSC 2021 - On-Chain Smart Contract Verification over Tendermint.eng.text

16.1 KB

WTSC 2021 - On-Chain Smart Contract Verification over Tendermint.eng.tsv

18.0 KB

WTSC 2021 - On-Chain Smart Contract Verification over Tendermint.eng.txt

19.5 KB

WTSC 2021 - On-Chain Smart Contract Verification over Tendermint.eng.vtt

19.5 KB

WTSC 2021 - Pay To Win Cheap, Cross-chain Bribing Attacks on PoW Cryptocurrencies.eng.json

1.2 MB

WTSC 2021 - Pay To Win Cheap, Cross-chain Bribing Attacks on PoW Cryptocurrencies.eng.lrc

30.0 KB

WTSC 2021 - Pay To Win Cheap, Cross-chain Bribing Attacks on PoW Cryptocurrencies.eng.srt

32.0 KB

WTSC 2021 - Pay To Win Cheap, Cross-chain Bribing Attacks on PoW Cryptocurrencies.eng.text

25.5 KB

WTSC 2021 - Pay To Win Cheap, Cross-chain Bribing Attacks on PoW Cryptocurrencies.eng.tsv

28.1 KB

WTSC 2021 - Pay To Win Cheap, Cross-chain Bribing Attacks on PoW Cryptocurrencies.eng.txt

30.2 KB

WTSC 2021 - Pay To Win Cheap, Cross-chain Bribing Attacks on PoW Cryptocurrencies.eng.vtt

30.2 KB

WTSC 2021 - Privacy-preserving Resource Sharing using Permissioned Blockchains (the Case of Smart Neighbour.eng.json

787.7 KB

WTSC 2021 - Privacy-preserving Resource Sharing using Permissioned Blockchains (the Case of Smart Neighbour.eng.lrc

19.2 KB

WTSC 2021 - Privacy-preserving Resource Sharing using Permissioned Blockchains (the Case of Smart Neighbour.eng.srt

20.7 KB

WTSC 2021 - Privacy-preserving Resource Sharing using Permissioned Blockchains (the Case of Smart Neighbour.eng.text

15.7 KB

WTSC 2021 - Privacy-preserving Resource Sharing using Permissioned Blockchains (the Case of Smart Neighbour.eng.tsv

17.6 KB

WTSC 2021 - Privacy-preserving Resource Sharing using Permissioned Blockchains (the Case of Smart Neighbour.eng.txt

19.4 KB

WTSC 2021 - Privacy-preserving Resource Sharing using Permissioned Blockchains (the Case of Smart Neighbour.eng.vtt

19.4 KB

WTSC 2021 - Publicly Verifiable and Secrecy Preserving Periodic Auctions.eng.json

973.0 KB

WTSC 2021 - Publicly Verifiable and Secrecy Preserving Periodic Auctions.eng.lrc

23.5 KB

WTSC 2021 - Publicly Verifiable and Secrecy Preserving Periodic Auctions.eng.srt

25.3 KB

WTSC 2021 - Publicly Verifiable and Secrecy Preserving Periodic Auctions.eng.text

19.4 KB

WTSC 2021 - Publicly Verifiable and Secrecy Preserving Periodic Auctions.eng.tsv

21.7 KB

WTSC 2021 - Publicly Verifiable and Secrecy Preserving Periodic Auctions.eng.txt

23.7 KB

WTSC 2021 - Publicly Verifiable and Secrecy Preserving Periodic Auctions.eng.vtt

23.7 KB

WTSC 2021 - Reactive Key-Loss Protection in Blockchains.eng.json

1.1 MB

WTSC 2021 - Reactive Key-Loss Protection in Blockchains.eng.lrc

27.5 KB

WTSC 2021 - Reactive Key-Loss Protection in Blockchains.eng.srt

30.1 KB

WTSC 2021 - Reactive Key-Loss Protection in Blockchains.eng.text

21.5 KB

WTSC 2021 - Reactive Key-Loss Protection in Blockchains.eng.tsv

24.8 KB

WTSC 2021 - Reactive Key-Loss Protection in Blockchains.eng.txt

27.7 KB

WTSC 2021 - Reactive Key-Loss Protection in Blockchains.eng.vtt

27.7 KB

WTSC 2021 - SoK Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies.eng.json

1.1 MB

WTSC 2021 - SoK Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies.eng.lrc

27.8 KB

WTSC 2021 - SoK Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies.eng.srt

30.0 KB

WTSC 2021 - SoK Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies.eng.text

22.9 KB

WTSC 2021 - SoK Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies.eng.tsv

25.7 KB

WTSC 2021 - SoK Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies.eng.txt

28.0 KB

WTSC 2021 - SoK Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies.eng.vtt

28.0 KB

WTSC 2021 - Standardized crypto-loans on the Cardano blockchain.eng.json

998.4 KB

WTSC 2021 - Standardized crypto-loans on the Cardano blockchain.eng.lrc

22.4 KB

WTSC 2021 - Standardized crypto-loans on the Cardano blockchain.eng.srt

24.4 KB

WTSC 2021 - Standardized crypto-loans on the Cardano blockchain.eng.text

17.8 KB

WTSC 2021 - Standardized crypto-loans on the Cardano blockchain.eng.tsv

20.3 KB

WTSC 2021 - Standardized crypto-loans on the Cardano blockchain.eng.txt

22.5 KB

WTSC 2021 - Standardized crypto-loans on the Cardano blockchain.eng.vtt

22.6 KB

WTSC 2021 - Towards a Formal Theory of DeFi.eng.json

812.5 KB

WTSC 2021 - Towards a Formal Theory of DeFi.eng.lrc

19.9 KB

WTSC 2021 - Towards a Formal Theory of DeFi.eng.srt

21.6 KB

WTSC 2021 - Towards a Formal Theory of DeFi.eng.text

16.0 KB

WTSC 2021 - Towards a Formal Theory of DeFi.eng.tsv

18.1 KB

WTSC 2021 - Towards a Formal Theory of DeFi.eng.txt

20.0 KB

WTSC 2021 - Towards a Formal Theory of DeFi.eng.vtt

20.0 KB

Zero-Knowledge Proofs for Set Membership Efficient, Succinct, Modular.eng.json

1.2 MB

Zero-Knowledge Proofs for Set Membership Efficient, Succinct, Modular.eng.lrc

27.3 KB

Zero-Knowledge Proofs for Set Membership Efficient, Succinct, Modular.eng.srt

29.2 KB

Zero-Knowledge Proofs for Set Membership Efficient, Succinct, Modular.eng.text

22.8 KB

Zero-Knowledge Proofs for Set Membership Efficient, Succinct, Modular.eng.tsv

25.4 KB

Zero-Knowledge Proofs for Set Membership Efficient, Succinct, Modular.eng.txt

27.4 KB

Zero-Knowledge Proofs for Set Membership Efficient, Succinct, Modular.eng.vtt

27.4 KB

FC 2022/

ABSNFT Securitization and Repurchase Scheme for Non-Fungible Tokens Based on Game Theore.mp4

13.5 MB

Achieving Almost All Blockchain Functionalities with Polylogarithmic Storage.mp4

12.9 MB

An empirical study of two Bitcoin artifacts through deep learning.mp4

16.8 MB

Analysis and Probing of Parallel Channels in the Lightning Network.mp4

13.5 MB

Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing.mp4

13.1 MB

Arbitrage attack Miners of the world, unite.mp4

10.3 MB

Be Aware of Your Leaders.mp4

10.6 MB

Decentralization Conscious Players And System Reliability.mp4

17.9 MB

Differential Privacy in Constant Function Market Makers.mp4

19.3 MB

Explainable Arguments.mp4

11.2 MB

Hide & Seek Privacy-Preserving Rebalancing on Payment Channel Networks.mp4

19.8 MB

India’s Aadhaar Biometric ID Structure, Security, and Vulnerabilities.mp4

7.1 MB

Jolteon and Ditto Network-Adaptive Efficient Consensus with Asynchronous Fallback.mp4

10.3 MB

Kicking-the-Bucket Fast Privacy-Preserving Trading Using Buckets.mp4

12.2 MB

Maximizing Extractable Value from Automated Market Makers.mp4

11.0 MB

MPCCache Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge.mp4

10.3 MB

Multi-party Updatable Delegated Private Set Intersection.mp4

15.4 MB

On Interactive Oracle Proofs for Boolean R1CS Statements.mp4

9.2 MB

Permissionless Consensus in the Resource Model.mp4

18.1 MB

Plumo An Ultralight Blockchain Client.mp4

11.6 MB

Quick Order Fairness.mp4

12.1 MB

Resurrecting Address Clustering in Bitcoin.mp4

10.2 MB

Short Paper A Centrality Analysis of the Lightning Network.mp4

8.2 MB

Short Paper On Game-Theoretically-Fair Leader Election.mp4

7.2 MB

Short Paper On the Claims of Weak Block Synchronization in Bitcoin.mp4

12.5 MB

Short Paper What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network.mp4

8.3 MB

Sliding Window Challenge Process for Congestion Detection.mp4

11.6 MB

SnarkPack Practical SNARK Aggregation.mp4

13.2 MB

SoK Blockchain Light Clients.mp4

11.6 MB

Speculative Multipliers on DeFi Quantifying On-Chain Leverage Risks.mp4

12.9 MB

Suborn Channels Incentives Against Timelock Bribes.mp4

14.4 MB

The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets.mp4

10.2 MB

The Effect of False Positives Why Fuzzy Message Detection Leads to Fuzzy Privacy Guarantees.mp4

19.8 MB

Three Attacks on Proof-of-Stake Ethereum.mp4

20.6 MB

Towards Overcoming the Undercutting Problem.mp4

18.5 MB

WTSC 2022 - Dispute-free Scalable Open Vote Network using zk-SNARKs.mp4

8.1 MB

WTSC 2022 - Fides A System for Verifiable Computation Using Smart Contracts.mp4

15.5 MB

WTSC 2022 - Lelantus Spark Secure and Flexible Private Transactions.mp4

10.6 MB

WTSC 2022 - Lissy Experimenting with On-chain Order Books.mp4

18.1 MB

WTSC 2022 - Not All Code are Create2 Equal.mp4

25.2 MB

WTSC 2022 - Not so immutable Upgradeability of Smart Contracts on Ethereum.mp4

12.7 MB

WTSC 2022 - Protocol-based smart contract generation.mp4

8.3 MB

WTSC 2022 - UTS the Universal Token Swapper.mp4

7.6 MB

Zero Knowledge Proofs towards Verifiable Decentralized AI.mp4

11.4 MB

/.../FC 2022 captions/

ABSNFT Securitization and Repurchase Scheme for Non-Fungible Tokens Based on Game Theore.eng.json

562.6 KB

ABSNFT Securitization and Repurchase Scheme for Non-Fungible Tokens Based on Game Theore.eng.lrc

15.0 KB

ABSNFT Securitization and Repurchase Scheme for Non-Fungible Tokens Based on Game Theore.eng.srt

16.7 KB

ABSNFT Securitization and Repurchase Scheme for Non-Fungible Tokens Based on Game Theore.eng.text

11.2 KB

ABSNFT Securitization and Repurchase Scheme for Non-Fungible Tokens Based on Game Theore.eng.tsv

13.3 KB

ABSNFT Securitization and Repurchase Scheme for Non-Fungible Tokens Based on Game Theore.eng.txt

15.2 KB

ABSNFT Securitization and Repurchase Scheme for Non-Fungible Tokens Based on Game Theore.eng.vtt

15.2 KB

Achieving Almost All Blockchain Functionalities with Polylogarithmic Storage.eng.json

754.4 KB

Achieving Almost All Blockchain Functionalities with Polylogarithmic Storage.eng.lrc

19.4 KB

Achieving Almost All Blockchain Functionalities with Polylogarithmic Storage.eng.srt

21.1 KB

Achieving Almost All Blockchain Functionalities with Polylogarithmic Storage.eng.text

15.5 KB

Achieving Almost All Blockchain Functionalities with Polylogarithmic Storage.eng.tsv

17.6 KB

Achieving Almost All Blockchain Functionalities with Polylogarithmic Storage.eng.txt

19.6 KB

Achieving Almost All Blockchain Functionalities with Polylogarithmic Storage.eng.vtt

19.6 KB

An empirical study of two Bitcoin artifacts through deep learning.eng.json

868.3 KB

An empirical study of two Bitcoin artifacts through deep learning.eng.lrc

21.0 KB

An empirical study of two Bitcoin artifacts through deep learning.eng.srt

22.9 KB

An empirical study of two Bitcoin artifacts through deep learning.eng.text

16.6 KB

An empirical study of two Bitcoin artifacts through deep learning.eng.tsv

19.0 KB

An empirical study of two Bitcoin artifacts through deep learning.eng.txt

21.1 KB

An empirical study of two Bitcoin artifacts through deep learning.eng.vtt

21.2 KB

Analysis and Probing of Parallel Channels in the Lightning Network.eng.json

1.2 MB

Analysis and Probing of Parallel Channels in the Lightning Network.eng.lrc

30.6 KB

Analysis and Probing of Parallel Channels in the Lightning Network.eng.srt

33.2 KB

Analysis and Probing of Parallel Channels in the Lightning Network.eng.text

24.7 KB

Analysis and Probing of Parallel Channels in the Lightning Network.eng.tsv

28.0 KB

Analysis and Probing of Parallel Channels in the Lightning Network.eng.txt

30.8 KB

Analysis and Probing of Parallel Channels in the Lightning Network.eng.vtt

30.9 KB

Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing.eng.json

573.1 KB

Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing.eng.lrc

14.4 KB

Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing.eng.srt

15.8 KB

Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing.eng.text

11.1 KB

Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing.eng.tsv

12.9 KB

Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing.eng.txt

14.5 KB

Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing.eng.vtt

14.5 KB

Arbitrage attack Miners of the world, unite.eng.json

844.1 KB

Arbitrage attack Miners of the world, unite.eng.lrc

21.1 KB

Arbitrage attack Miners of the world, unite.eng.srt

22.5 KB

Arbitrage attack Miners of the world, unite.eng.text

17.7 KB

Arbitrage attack Miners of the world, unite.eng.tsv

19.6 KB

Arbitrage attack Miners of the world, unite.eng.txt

21.2 KB

Arbitrage attack Miners of the world, unite.eng.vtt

21.2 KB

Be Aware of Your Leaders.eng.json

594.8 KB

Be Aware of Your Leaders.eng.lrc

15.5 KB

Be Aware of Your Leaders.eng.srt

17.1 KB

Be Aware of Your Leaders.eng.text

11.8 KB

Be Aware of Your Leaders.eng.tsv

13.8 KB

Be Aware of Your Leaders.eng.txt

15.7 KB

Be Aware of Your Leaders.eng.vtt

15.7 KB

Decentralization Conscious Players And System Reliability.eng.json

798.7 KB

Decentralization Conscious Players And System Reliability.eng.lrc

20.2 KB

Decentralization Conscious Players And System Reliability.eng.srt

22.1 KB

Decentralization Conscious Players And System Reliability.eng.text

15.9 KB

Decentralization Conscious Players And System Reliability.eng.tsv

18.3 KB

Decentralization Conscious Players And System Reliability.eng.txt

20.4 KB

Decentralization Conscious Players And System Reliability.eng.vtt

20.4 KB

Differential Privacy in Constant Function Market Makers.eng.json

1.1 MB

Differential Privacy in Constant Function Market Makers.eng.lrc

24.5 KB

Differential Privacy in Constant Function Market Makers.eng.srt

26.4 KB

Differential Privacy in Constant Function Market Makers.eng.text

20.3 KB

Differential Privacy in Constant Function Market Makers.eng.tsv

22.7 KB

Differential Privacy in Constant Function Market Makers.eng.txt

24.7 KB

Differential Privacy in Constant Function Market Makers.eng.vtt

24.7 KB

Explainable Arguments.eng.json

881.4 KB

Explainable Arguments.eng.lrc

22.9 KB

Explainable Arguments.eng.srt

25.0 KB

Explainable Arguments.eng.text

18.1 KB

Explainable Arguments.eng.tsv

20.8 KB

Explainable Arguments.eng.txt

23.1 KB

Explainable Arguments.eng.vtt

23.1 KB

Hide & Seek Privacy-Preserving Rebalancing on Payment Channel Networks.eng.json

1.2 MB

Hide & Seek Privacy-Preserving Rebalancing on Payment Channel Networks.eng.lrc

26.3 KB

Hide & Seek Privacy-Preserving Rebalancing on Payment Channel Networks.eng.srt

28.5 KB

Hide & Seek Privacy-Preserving Rebalancing on Payment Channel Networks.eng.text

21.2 KB

Hide & Seek Privacy-Preserving Rebalancing on Payment Channel Networks.eng.tsv

24.0 KB

Hide & Seek Privacy-Preserving Rebalancing on Payment Channel Networks.eng.txt

26.5 KB

Hide & Seek Privacy-Preserving Rebalancing on Payment Channel Networks.eng.vtt

26.5 KB

India’s Aadhaar Biometric ID Structure, Security, and Vulnerabilities.eng.json

596.3 KB

India’s Aadhaar Biometric ID Structure, Security, and Vulnerabilities.eng.lrc

16.4 KB

India’s Aadhaar Biometric ID Structure, Security, and Vulnerabilities.eng.srt

17.7 KB

India’s Aadhaar Biometric ID Structure, Security, and Vulnerabilities.eng.text

13.1 KB

India’s Aadhaar Biometric ID Structure, Security, and Vulnerabilities.eng.tsv

14.9 KB

India’s Aadhaar Biometric ID Structure, Security, and Vulnerabilities.eng.txt

16.5 KB

India’s Aadhaar Biometric ID Structure, Security, and Vulnerabilities.eng.vtt

16.5 KB

Jolteon and Ditto Network-Adaptive Efficient Consensus with Asynchronous Fallback.eng.json

633.2 KB

Jolteon and Ditto Network-Adaptive Efficient Consensus with Asynchronous Fallback.eng.lrc

15.4 KB

Jolteon and Ditto Network-Adaptive Efficient Consensus with Asynchronous Fallback.eng.srt

16.6 KB

Jolteon and Ditto Network-Adaptive Efficient Consensus with Asynchronous Fallback.eng.text

12.5 KB

Jolteon and Ditto Network-Adaptive Efficient Consensus with Asynchronous Fallback.eng.tsv

14.1 KB

Jolteon and Ditto Network-Adaptive Efficient Consensus with Asynchronous Fallback.eng.txt

15.5 KB

Jolteon and Ditto Network-Adaptive Efficient Consensus with Asynchronous Fallback.eng.vtt

15.5 KB

Kicking-the-Bucket Fast Privacy-Preserving Trading Using Buckets.eng.json

1.2 MB

Kicking-the-Bucket Fast Privacy-Preserving Trading Using Buckets.eng.lrc

26.8 KB

Kicking-the-Bucket Fast Privacy-Preserving Trading Using Buckets.eng.srt

29.0 KB

Kicking-the-Bucket Fast Privacy-Preserving Trading Using Buckets.eng.text

21.8 KB

Kicking-the-Bucket Fast Privacy-Preserving Trading Using Buckets.eng.tsv

24.6 KB

Kicking-the-Bucket Fast Privacy-Preserving Trading Using Buckets.eng.txt

27.0 KB

Kicking-the-Bucket Fast Privacy-Preserving Trading Using Buckets.eng.vtt

27.0 KB

Maximizing Extractable Value from Automated Market Makers.eng.json

812.8 KB

Maximizing Extractable Value from Automated Market Makers.eng.lrc

19.7 KB

Maximizing Extractable Value from Automated Market Makers.eng.srt

21.2 KB

Maximizing Extractable Value from Automated Market Makers.eng.text

16.3 KB

Maximizing Extractable Value from Automated Market Makers.eng.tsv

18.2 KB

Maximizing Extractable Value from Automated Market Makers.eng.txt

19.9 KB

Maximizing Extractable Value from Automated Market Makers.eng.vtt

19.9 KB

MPCCache Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge.eng.json

580.1 KB

MPCCache Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge.eng.lrc

14.4 KB

MPCCache Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge.eng.srt

16.1 KB

MPCCache Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge.eng.text

10.3 KB

MPCCache Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge.eng.tsv

12.5 KB

MPCCache Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge.eng.txt

14.5 KB

MPCCache Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge.eng.vtt

14.5 KB

Multi-party Updatable Delegated Private Set Intersection.eng.json

749.6 KB

Multi-party Updatable Delegated Private Set Intersection.eng.lrc

18.0 KB

Multi-party Updatable Delegated Private Set Intersection.eng.srt

19.7 KB

Multi-party Updatable Delegated Private Set Intersection.eng.text

14.1 KB

Multi-party Updatable Delegated Private Set Intersection.eng.tsv

16.3 KB

Multi-party Updatable Delegated Private Set Intersection.eng.txt

18.1 KB

Multi-party Updatable Delegated Private Set Intersection.eng.vtt

18.1 KB

On Interactive Oracle Proofs for Boolean R1CS Statements.eng.json

961.9 KB

On Interactive Oracle Proofs for Boolean R1CS Statements.eng.lrc

20.2 KB

On Interactive Oracle Proofs for Boolean R1CS Statements.eng.srt

21.4 KB

On Interactive Oracle Proofs for Boolean R1CS Statements.eng.text

17.2 KB

On Interactive Oracle Proofs for Boolean R1CS Statements.eng.tsv

18.8 KB

On Interactive Oracle Proofs for Boolean R1CS Statements.eng.txt

20.3 KB

On Interactive Oracle Proofs for Boolean R1CS Statements.eng.vtt

20.3 KB

Permissionless Consensus in the Resource Model.eng.json

1.2 MB

Permissionless Consensus in the Resource Model.eng.lrc

28.6 KB

Permissionless Consensus in the Resource Model.eng.srt

30.6 KB

Permissionless Consensus in the Resource Model.eng.text

24.0 KB

Permissionless Consensus in the Resource Model.eng.tsv

26.6 KB

Permissionless Consensus in the Resource Model.eng.txt

28.7 KB

Permissionless Consensus in the Resource Model.eng.vtt

28.7 KB

Plumo An Ultralight Blockchain Client.eng.json

970.5 KB

Plumo An Ultralight Blockchain Client.eng.lrc

24.8 KB

Plumo An Ultralight Blockchain Client.eng.srt

27.5 KB

Plumo An Ultralight Blockchain Client.eng.text

18.6 KB

Plumo An Ultralight Blockchain Client.eng.tsv

22.1 KB

Plumo An Ultralight Blockchain Client.eng.txt

25.0 KB

Plumo An Ultralight Blockchain Client.eng.vtt

25.0 KB

Quick Order Fairness.eng.json

755.4 KB

Quick Order Fairness.eng.lrc

19.6 KB

Quick Order Fairness.eng.srt

21.2 KB

Quick Order Fairness.eng.text

15.8 KB

Quick Order Fairness.eng.tsv

17.9 KB

Quick Order Fairness.eng.txt

19.7 KB

Quick Order Fairness.eng.vtt

19.7 KB

Resurrecting Address Clustering in Bitcoin.eng.json

489.0 KB

Resurrecting Address Clustering in Bitcoin.eng.lrc

12.4 KB

Resurrecting Address Clustering in Bitcoin.eng.srt

13.4 KB

Resurrecting Address Clustering in Bitcoin.eng.text

10.3 KB

Resurrecting Address Clustering in Bitcoin.eng.tsv

11.4 KB

Resurrecting Address Clustering in Bitcoin.eng.txt

12.5 KB

Resurrecting Address Clustering in Bitcoin.eng.vtt

12.5 KB

Short Paper A Centrality Analysis of the Lightning Network.eng.json

577.6 KB

Short Paper A Centrality Analysis of the Lightning Network.eng.lrc

14.4 KB

Short Paper A Centrality Analysis of the Lightning Network.eng.srt

15.3 KB

Short Paper A Centrality Analysis of the Lightning Network.eng.text

12.1 KB

Short Paper A Centrality Analysis of the Lightning Network.eng.tsv

13.3 KB

Short Paper A Centrality Analysis of the Lightning Network.eng.txt

14.5 KB

Short Paper A Centrality Analysis of the Lightning Network.eng.vtt

14.5 KB

Short Paper On Game-Theoretically-Fair Leader Election.eng.json

395.8 KB

Short Paper On Game-Theoretically-Fair Leader Election.eng.lrc

10.2 KB

Short Paper On Game-Theoretically-Fair Leader Election.eng.srt

11.1 KB

Short Paper On Game-Theoretically-Fair Leader Election.eng.text

8.0 KB

Short Paper On Game-Theoretically-Fair Leader Election.eng.tsv

9.1 KB

Short Paper On Game-Theoretically-Fair Leader Election.eng.txt

10.2 KB

Short Paper On Game-Theoretically-Fair Leader Election.eng.vtt

10.3 KB

Short Paper On the Claims of Weak Block Synchronization in Bitcoin.eng.json

519.5 KB

Short Paper On the Claims of Weak Block Synchronization in Bitcoin.eng.lrc

13.9 KB

Short Paper On the Claims of Weak Block Synchronization in Bitcoin.eng.srt

15.2 KB

Short Paper On the Claims of Weak Block Synchronization in Bitcoin.eng.text

10.7 KB

Short Paper On the Claims of Weak Block Synchronization in Bitcoin.eng.tsv

12.4 KB

Short Paper On the Claims of Weak Block Synchronization in Bitcoin.eng.txt

14.0 KB

Short Paper On the Claims of Weak Block Synchronization in Bitcoin.eng.vtt

14.0 KB

Short Paper What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network.eng.json

392.4 KB

Short Paper What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network.eng.lrc

9.9 KB

Short Paper What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network.eng.srt

10.8 KB

Short Paper What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network.eng.text

8.0 KB

Short Paper What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network.eng.tsv

9.0 KB

Short Paper What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network.eng.txt

10.0 KB

Short Paper What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network.eng.vtt

10.0 KB

Sliding Window Challenge Process for Congestion Detection.eng.json

886.4 KB

Sliding Window Challenge Process for Congestion Detection.eng.lrc

22.4 KB

Sliding Window Challenge Process for Congestion Detection.eng.srt

24.2 KB

Sliding Window Challenge Process for Congestion Detection.eng.text

18.4 KB

Sliding Window Challenge Process for Congestion Detection.eng.tsv

20.6 KB

Sliding Window Challenge Process for Congestion Detection.eng.txt

22.6 KB

Sliding Window Challenge Process for Congestion Detection.eng.vtt

22.6 KB

SnarkPack Practical SNARK Aggregation.eng.json

784.6 KB

SnarkPack Practical SNARK Aggregation.eng.lrc

18.4 KB

SnarkPack Practical SNARK Aggregation.eng.srt

19.6 KB

SnarkPack Practical SNARK Aggregation.eng.text

15.3 KB

SnarkPack Practical SNARK Aggregation.eng.tsv

17.0 KB

SnarkPack Practical SNARK Aggregation.eng.txt

18.5 KB

SnarkPack Practical SNARK Aggregation.eng.vtt

18.5 KB

SoK Blockchain Light Clients.eng.json

603.9 KB

SoK Blockchain Light Clients.eng.lrc

15.3 KB

SoK Blockchain Light Clients.eng.srt

16.5 KB

SoK Blockchain Light Clients.eng.text

12.4 KB

SoK Blockchain Light Clients.eng.tsv

13.9 KB

SoK Blockchain Light Clients.eng.txt

15.4 KB

SoK Blockchain Light Clients.eng.vtt

15.4 KB

Speculative Multipliers on DeFi Quantifying On-Chain Leverage Risks.eng.json

765.4 KB

Speculative Multipliers on DeFi Quantifying On-Chain Leverage Risks.eng.lrc

19.1 KB

Speculative Multipliers on DeFi Quantifying On-Chain Leverage Risks.eng.srt

21.0 KB

Speculative Multipliers on DeFi Quantifying On-Chain Leverage Risks.eng.text

14.8 KB

Speculative Multipliers on DeFi Quantifying On-Chain Leverage Risks.eng.tsv

17.2 KB

Speculative Multipliers on DeFi Quantifying On-Chain Leverage Risks.eng.txt

19.3 KB

Speculative Multipliers on DeFi Quantifying On-Chain Leverage Risks.eng.vtt

19.3 KB

Suborn Channels Incentives Against Timelock Bribes.eng.json

1.0 MB

Suborn Channels Incentives Against Timelock Bribes.eng.lrc

24.5 KB

Suborn Channels Incentives Against Timelock Bribes.eng.srt

26.5 KB

Suborn Channels Incentives Against Timelock Bribes.eng.text

20.0 KB

Suborn Channels Incentives Against Timelock Bribes.eng.tsv

22.5 KB

Suborn Channels Incentives Against Timelock Bribes.eng.txt

24.7 KB

Suborn Channels Incentives Against Timelock Bribes.eng.vtt

24.7 KB

The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets.eng.json

1.0 MB

The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets.eng.lrc

24.5 KB

The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets.eng.srt

26.6 KB

The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets.eng.text

19.7 KB

The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets.eng.tsv

22.4 KB

The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets.eng.txt

24.7 KB

The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets.eng.vtt

24.7 KB

The Effect of False Positives Why Fuzzy Message Detection Leads to Fuzzy Privacy Guarantees.eng.json

600.0 KB

The Effect of False Positives Why Fuzzy Message Detection Leads to Fuzzy Privacy Guarantees.eng.lrc

16.8 KB

The Effect of False Positives Why Fuzzy Message Detection Leads to Fuzzy Privacy Guarantees.eng.srt

18.7 KB

The Effect of False Positives Why Fuzzy Message Detection Leads to Fuzzy Privacy Guarantees.eng.text

12.4 KB

The Effect of False Positives Why Fuzzy Message Detection Leads to Fuzzy Privacy Guarantees.eng.tsv

14.8 KB

The Effect of False Positives Why Fuzzy Message Detection Leads to Fuzzy Privacy Guarantees.eng.txt

17.0 KB

The Effect of False Positives Why Fuzzy Message Detection Leads to Fuzzy Privacy Guarantees.eng.vtt

17.0 KB

Three Attacks on Proof-of-Stake Ethereum.eng.json

1.2 MB

Three Attacks on Proof-of-Stake Ethereum.eng.lrc

28.8 KB

Three Attacks on Proof-of-Stake Ethereum.eng.srt

31.2 KB

Three Attacks on Proof-of-Stake Ethereum.eng.text

23.2 KB

Three Attacks on Proof-of-Stake Ethereum.eng.tsv

26.4 KB

Three Attacks on Proof-of-Stake Ethereum.eng.txt

29.0 KB

Three Attacks on Proof-of-Stake Ethereum.eng.vtt

29.0 KB

Towards Overcoming the Undercutting Problem.eng.json

1.3 MB

Towards Overcoming the Undercutting Problem.eng.lrc

32.4 KB

Towards Overcoming the Undercutting Problem.eng.srt

35.5 KB

Towards Overcoming the Undercutting Problem.eng.text

25.6 KB

Towards Overcoming the Undercutting Problem.eng.tsv

29.4 KB

Towards Overcoming the Undercutting Problem.eng.txt

32.7 KB

Towards Overcoming the Undercutting Problem.eng.vtt

32.7 KB

WTSC 2022 - Dispute-free Scalable Open Vote Network using zk-SNARKs.eng.json

622.9 KB

WTSC 2022 - Dispute-free Scalable Open Vote Network using zk-SNARKs.eng.lrc

16.5 KB

WTSC 2022 - Dispute-free Scalable Open Vote Network using zk-SNARKs.eng.srt

17.8 KB

WTSC 2022 - Dispute-free Scalable Open Vote Network using zk-SNARKs.eng.text

13.2 KB

WTSC 2022 - Dispute-free Scalable Open Vote Network using zk-SNARKs.eng.tsv

15.0 KB

WTSC 2022 - Dispute-free Scalable Open Vote Network using zk-SNARKs.eng.txt

16.6 KB

WTSC 2022 - Dispute-free Scalable Open Vote Network using zk-SNARKs.eng.vtt

16.6 KB

WTSC 2022 - Fides A System for Verifiable Computation Using Smart Contracts.eng.json

889.1 KB

WTSC 2022 - Fides A System for Verifiable Computation Using Smart Contracts.eng.lrc

24.5 KB

WTSC 2022 - Fides A System for Verifiable Computation Using Smart Contracts.eng.srt

26.2 KB

WTSC 2022 - Fides A System for Verifiable Computation Using Smart Contracts.eng.text

20.4 KB

WTSC 2022 - Fides A System for Verifiable Computation Using Smart Contracts.eng.tsv

22.6 KB

WTSC 2022 - Fides A System for Verifiable Computation Using Smart Contracts.eng.txt

24.6 KB

WTSC 2022 - Fides A System for Verifiable Computation Using Smart Contracts.eng.vtt

24.6 KB

WTSC 2022 - Lelantus Spark Secure and Flexible Private Transactions.eng.json

958.5 KB

WTSC 2022 - Lelantus Spark Secure and Flexible Private Transactions.eng.lrc

23.8 KB

WTSC 2022 - Lelantus Spark Secure and Flexible Private Transactions.eng.srt

25.9 KB

WTSC 2022 - Lelantus Spark Secure and Flexible Private Transactions.eng.text

19.1 KB

WTSC 2022 - Lelantus Spark Secure and Flexible Private Transactions.eng.tsv

21.7 KB

WTSC 2022 - Lelantus Spark Secure and Flexible Private Transactions.eng.txt

24.0 KB

WTSC 2022 - Lelantus Spark Secure and Flexible Private Transactions.eng.vtt

24.0 KB

WTSC 2022 - Lissy Experimenting with On-chain Order Books.eng.json

896.0 KB

WTSC 2022 - Lissy Experimenting with On-chain Order Books.eng.lrc

21.8 KB

WTSC 2022 - Lissy Experimenting with On-chain Order Books.eng.srt

23.5 KB

WTSC 2022 - Lissy Experimenting with On-chain Order Books.eng.text

17.7 KB

WTSC 2022 - Lissy Experimenting with On-chain Order Books.eng.tsv

20.0 KB

WTSC 2022 - Lissy Experimenting with On-chain Order Books.eng.txt

21.9 KB

WTSC 2022 - Lissy Experimenting with On-chain Order Books.eng.vtt

21.9 KB

WTSC 2022 - Not All Code are Create2 Equal.eng.json

756.2 KB

WTSC 2022 - Not All Code are Create2 Equal.eng.lrc

20.4 KB

WTSC 2022 - Not All Code are Create2 Equal.eng.srt

22.6 KB

WTSC 2022 - Not All Code are Create2 Equal.eng.text

15.5 KB

WTSC 2022 - Not All Code are Create2 Equal.eng.tsv

18.2 KB

WTSC 2022 - Not All Code are Create2 Equal.eng.txt

20.6 KB

WTSC 2022 - Not All Code are Create2 Equal.eng.vtt

20.6 KB

WTSC 2022 - Not so immutable Upgradeability of Smart Contracts on Ethereum.eng.json

1.0 MB

WTSC 2022 - Not so immutable Upgradeability of Smart Contracts on Ethereum.eng.lrc

25.2 KB

WTSC 2022 - Not so immutable Upgradeability of Smart Contracts on Ethereum.eng.srt

27.5 KB

WTSC 2022 - Not so immutable Upgradeability of Smart Contracts on Ethereum.eng.text

20.1 KB

WTSC 2022 - Not so immutable Upgradeability of Smart Contracts on Ethereum.eng.tsv

23.0 KB

WTSC 2022 - Not so immutable Upgradeability of Smart Contracts on Ethereum.eng.txt

25.4 KB

WTSC 2022 - Not so immutable Upgradeability of Smart Contracts on Ethereum.eng.vtt

25.4 KB

WTSC 2022 - Protocol-based smart contract generation.eng.json

635.7 KB

WTSC 2022 - Protocol-based smart contract generation.eng.lrc

15.0 KB

WTSC 2022 - Protocol-based smart contract generation.eng.srt

15.9 KB

WTSC 2022 - Protocol-based smart contract generation.eng.text

12.7 KB

WTSC 2022 - Protocol-based smart contract generation.eng.tsv

13.9 KB

WTSC 2022 - Protocol-based smart contract generation.eng.txt

15.1 KB

WTSC 2022 - Protocol-based smart contract generation.eng.vtt

15.1 KB

WTSC 2022 - UTS the Universal Token Swapper.eng.json

474.9 KB

WTSC 2022 - UTS the Universal Token Swapper.eng.lrc

11.7 KB

WTSC 2022 - UTS the Universal Token Swapper.eng.srt

12.7 KB

WTSC 2022 - UTS the Universal Token Swapper.eng.text

9.4 KB

WTSC 2022 - UTS the Universal Token Swapper.eng.tsv

10.6 KB

WTSC 2022 - UTS the Universal Token Swapper.eng.txt

11.8 KB

WTSC 2022 - UTS the Universal Token Swapper.eng.vtt

11.8 KB

Zero Knowledge Proofs towards Verifiable Decentralized AI.eng.json

1.0 MB

Zero Knowledge Proofs towards Verifiable Decentralized AI.eng.lrc

24.5 KB

Zero Knowledge Proofs towards Verifiable Decentralized AI.eng.srt

26.5 KB

Zero Knowledge Proofs towards Verifiable Decentralized AI.eng.text

20.0 KB

Zero Knowledge Proofs towards Verifiable Decentralized AI.eng.tsv

22.5 KB

Zero Knowledge Proofs towards Verifiable Decentralized AI.eng.txt

24.7 KB

Zero Knowledge Proofs towards Verifiable Decentralized AI.eng.vtt

24.7 KB

FC 2024/

A Transaction-Level Model for Blockchain Privacy.mp4

9.0 MB

Anonymous Reputation Systems with Revocation, Revisited.mp4

15.0 MB

Deep Selfish Proposing in Longest-Chain Proof-of-Stake Protocols.mp4

18.0 MB

DeFi composability as MEV non-interference.mp4

15.4 MB

Does Proposer-Builder Separation Preserve Decentralization.mp4

18.4 MB

Efficient Agreement Over Byzantine Gossip.mp4

12.5 MB

Foundations of Anonymous Signatures.mp4

18.0 MB

Goldfish No More Attacks on Ethereum.mp4

8.9 MB

Improved YOSO Randomness Generation with Worst-Case Corruptions.mp4

9.4 MB

LedgerHedger Gas Reservation for Smart Contract Security.mp4

17.5 MB

Light Clients for Lazy Blockchains.mp4

7.6 MB

On-Chain Timestamps Are Accurate.mp4

12.3 MB

Optimal Dynamic Fees for Blockchain Resources.mp4

7.7 MB

Optimal Publishing Strategies on a Base Layer.mp4

12.6 MB

Owl An Augmented Password-Authenticated Key Exchange Scheme.mp4

16.2 MB

Privacy-preserving Anti-Money Laundering using Secure Multi-Party Computation.mp4

17.3 MB

Proactive Refresh for Accountable Threshold Signatures.mp4

18.3 MB

Remote Scheduler Contention Attacks.mp4

12.9 MB

SAVER SNARK-compatible Verifiable Encryption.mp4

15.2 MB

Shoal Improving DAG-BFT Latency And Robustness.mp4

16.6 MB

Short Paper Accountable Safety Implies Finality.mp4

6.0 MB

Short Paper Breaking X-VRF, a Post-Quantum Verifiable Random Function.mp4

19.6 MB

Short paper Naysayer proofs.mp4

11.0 MB

Short Paper Onion Messages on Leash.mp4

14.4 MB

Short Paper Shared Sequencing and Latency Competition as a Noisy Contest.mp4

15.1 MB

SoK A Stratified Approach to Blockchain Decentralization.mp4

19.0 MB

Subset-optimized BLS Multi-signature with Key Aggregation.mp4

13.5 MB

Subverting Cryptographic Hardware used in Blockchain Consensus.mp4

12.4 MB

The Costs of Swapping on the Uniswap Protocol.mp4

26.0 MB

The Power of Default Measuring the Effect of Slippage Tolerance in Decentralized Exchanges.mp4

15.4 MB

Towards Practical Doubly-Efficient Private Information Retrieval.mp4

30.3 MB

Truncator Time-space Tradeoff of Cryptographic Primitives.mp4

19.7 MB

ZeroSwap Data-driven Optimal Market Making in Decentralized Finance.mp4

16.1 MB

/.../FC 2024 captions/

A Transaction-Level Model for Blockchain Privacy.eng.json

543.9 KB

A Transaction-Level Model for Blockchain Privacy.eng.lrc

13.6 KB

A Transaction-Level Model for Blockchain Privacy.eng.srt

15.0 KB

A Transaction-Level Model for Blockchain Privacy.eng.text

10.4 KB

A Transaction-Level Model for Blockchain Privacy.eng.tsv

12.2 KB

A Transaction-Level Model for Blockchain Privacy.eng.txt

13.8 KB

A Transaction-Level Model for Blockchain Privacy.eng.vtt

13.8 KB

Anonymous Reputation Systems with Revocation, Revisited.eng.json

657.0 KB

Anonymous Reputation Systems with Revocation, Revisited.eng.lrc

16.6 KB

Anonymous Reputation Systems with Revocation, Revisited.eng.srt

18.1 KB

Anonymous Reputation Systems with Revocation, Revisited.eng.text

13.2 KB

Anonymous Reputation Systems with Revocation, Revisited.eng.tsv

15.0 KB

Anonymous Reputation Systems with Revocation, Revisited.eng.txt

16.7 KB

Anonymous Reputation Systems with Revocation, Revisited.eng.vtt

16.7 KB

Deep Selfish Proposing in Longest-Chain Proof-of-Stake Protocols.eng.json

999.9 KB

Deep Selfish Proposing in Longest-Chain Proof-of-Stake Protocols.eng.lrc

25.2 KB

Deep Selfish Proposing in Longest-Chain Proof-of-Stake Protocols.eng.srt

27.2 KB

Deep Selfish Proposing in Longest-Chain Proof-of-Stake Protocols.eng.text

20.5 KB

Deep Selfish Proposing in Longest-Chain Proof-of-Stake Protocols.eng.tsv

23.1 KB

Deep Selfish Proposing in Longest-Chain Proof-of-Stake Protocols.eng.txt

25.4 KB

Deep Selfish Proposing in Longest-Chain Proof-of-Stake Protocols.eng.vtt

25.4 KB

DeFi composability as MEV non-interference.eng.json

885.7 KB

DeFi composability as MEV non-interference.eng.lrc

20.8 KB

DeFi composability as MEV non-interference.eng.srt

22.1 KB

DeFi composability as MEV non-interference.eng.text

17.7 KB

DeFi composability as MEV non-interference.eng.tsv

19.4 KB

DeFi composability as MEV non-interference.eng.txt

20.9 KB

DeFi composability as MEV non-interference.eng.vtt

20.9 KB

Does Proposer-Builder Separation Preserve Decentralization.eng.json

1.0 MB

Does Proposer-Builder Separation Preserve Decentralization.eng.lrc

24.7 KB

Does Proposer-Builder Separation Preserve Decentralization.eng.srt

26.3 KB

Does Proposer-Builder Separation Preserve Decentralization.eng.text

21.0 KB

Does Proposer-Builder Separation Preserve Decentralization.eng.tsv

23.1 KB

Does Proposer-Builder Separation Preserve Decentralization.eng.txt

24.9 KB

Does Proposer-Builder Separation Preserve Decentralization.eng.vtt

24.9 KB

Efficient Agreement Over Byzantine Gossip.eng.json

775.3 KB

Efficient Agreement Over Byzantine Gossip.eng.lrc

19.8 KB

Efficient Agreement Over Byzantine Gossip.eng.srt

21.6 KB

Efficient Agreement Over Byzantine Gossip.eng.text

15.7 KB

Efficient Agreement Over Byzantine Gossip.eng.tsv

17.9 KB

Efficient Agreement Over Byzantine Gossip.eng.txt

20.0 KB

Efficient Agreement Over Byzantine Gossip.eng.vtt

20.0 KB

Foundations of Anonymous Signatures.eng.json

1.3 MB

Foundations of Anonymous Signatures.eng.lrc

30.9 KB

Foundations of Anonymous Signatures.eng.srt

33.2 KB

Foundations of Anonymous Signatures.eng.text

25.7 KB

Foundations of Anonymous Signatures.eng.tsv

28.7 KB

Foundations of Anonymous Signatures.eng.txt

31.1 KB

Foundations of Anonymous Signatures.eng.vtt

31.1 KB

Goldfish No More Attacks on Ethereum.eng.json

736.8 KB

Goldfish No More Attacks on Ethereum.eng.lrc

18.6 KB

Goldfish No More Attacks on Ethereum.eng.srt

20.2 KB

Goldfish No More Attacks on Ethereum.eng.text

15.0 KB

Goldfish No More Attacks on Ethereum.eng.tsv

16.9 KB

Goldfish No More Attacks on Ethereum.eng.txt

18.7 KB

Goldfish No More Attacks on Ethereum.eng.vtt

18.8 KB

Improved YOSO Randomness Generation with Worst-Case Corruptions.eng.json

717.0 KB

Improved YOSO Randomness Generation with Worst-Case Corruptions.eng.lrc

17.2 KB

Improved YOSO Randomness Generation with Worst-Case Corruptions.eng.srt

18.6 KB

Improved YOSO Randomness Generation with Worst-Case Corruptions.eng.text

14.0 KB

Improved YOSO Randomness Generation with Worst-Case Corruptions.eng.tsv

15.8 KB

Improved YOSO Randomness Generation with Worst-Case Corruptions.eng.txt

17.4 KB

Improved YOSO Randomness Generation with Worst-Case Corruptions.eng.vtt

17.4 KB

LedgerHedger Gas Reservation for Smart Contract Security.eng.json

1.1 MB

LedgerHedger Gas Reservation for Smart Contract Security.eng.lrc

26.6 KB

LedgerHedger Gas Reservation for Smart Contract Security.eng.srt

29.3 KB

LedgerHedger Gas Reservation for Smart Contract Security.eng.text

20.4 KB

LedgerHedger Gas Reservation for Smart Contract Security.eng.tsv

23.8 KB

LedgerHedger Gas Reservation for Smart Contract Security.eng.txt

26.8 KB

LedgerHedger Gas Reservation for Smart Contract Security.eng.vtt

26.8 KB

Light Clients for Lazy Blockchains.eng.json

693.0 KB

Light Clients for Lazy Blockchains.eng.lrc

17.3 KB

Light Clients for Lazy Blockchains.eng.srt

18.7 KB

Light Clients for Lazy Blockchains.eng.text

14.1 KB

Light Clients for Lazy Blockchains.eng.tsv

15.9 KB

Light Clients for Lazy Blockchains.eng.txt

17.5 KB

Light Clients for Lazy Blockchains.eng.vtt

17.5 KB

On-Chain Timestamps Are Accurate.eng.json

1.1 MB

On-Chain Timestamps Are Accurate.eng.lrc

28.4 KB

On-Chain Timestamps Are Accurate.eng.srt

30.9 KB

On-Chain Timestamps Are Accurate.eng.text

22.5 KB

On-Chain Timestamps Are Accurate.eng.tsv

25.8 KB

On-Chain Timestamps Are Accurate.eng.txt

28.6 KB

On-Chain Timestamps Are Accurate.eng.vtt

28.6 KB

Optimal Dynamic Fees for Blockchain Resources.eng.json

664.6 KB

Optimal Dynamic Fees for Blockchain Resources.eng.lrc

17.0 KB

Optimal Dynamic Fees for Blockchain Resources.eng.srt

18.5 KB

Optimal Dynamic Fees for Blockchain Resources.eng.text

13.5 KB

Optimal Dynamic Fees for Blockchain Resources.eng.tsv

15.5 KB

Optimal Dynamic Fees for Blockchain Resources.eng.txt

17.2 KB

Optimal Dynamic Fees for Blockchain Resources.eng.vtt

17.2 KB

Optimal Publishing Strategies on a Base Layer.eng.json

540.8 KB

Optimal Publishing Strategies on a Base Layer.eng.lrc

12.6 KB

Optimal Publishing Strategies on a Base Layer.eng.srt

13.5 KB

Optimal Publishing Strategies on a Base Layer.eng.text

10.7 KB

Optimal Publishing Strategies on a Base Layer.eng.tsv

11.7 KB

Optimal Publishing Strategies on a Base Layer.eng.txt

12.7 KB

Optimal Publishing Strategies on a Base Layer.eng.vtt

12.7 KB

Owl An Augmented Password-Authenticated Key Exchange Scheme.eng.json

861.6 KB

Owl An Augmented Password-Authenticated Key Exchange Scheme.eng.lrc

21.9 KB

Owl An Augmented Password-Authenticated Key Exchange Scheme.eng.srt

24.4 KB

Owl An Augmented Password-Authenticated Key Exchange Scheme.eng.text

16.2 KB

Owl An Augmented Password-Authenticated Key Exchange Scheme.eng.tsv

19.4 KB

Owl An Augmented Password-Authenticated Key Exchange Scheme.eng.txt

22.1 KB

Owl An Augmented Password-Authenticated Key Exchange Scheme.eng.vtt

22.1 KB

Privacy-preserving Anti-Money Laundering using Secure Multi-Party Computation.eng.json

718.0 KB

Privacy-preserving Anti-Money Laundering using Secure Multi-Party Computation.eng.lrc

18.2 KB

Privacy-preserving Anti-Money Laundering using Secure Multi-Party Computation.eng.srt

19.9 KB

Privacy-preserving Anti-Money Laundering using Secure Multi-Party Computation.eng.text

14.2 KB

Privacy-preserving Anti-Money Laundering using Secure Multi-Party Computation.eng.tsv

16.4 KB

Privacy-preserving Anti-Money Laundering using Secure Multi-Party Computation.eng.txt

18.3 KB

Privacy-preserving Anti-Money Laundering using Secure Multi-Party Computation.eng.vtt

18.3 KB

Proactive Refresh for Accountable Threshold Signatures.eng.json

1.3 MB

Proactive Refresh for Accountable Threshold Signatures.eng.lrc

31.9 KB

Proactive Refresh for Accountable Threshold Signatures.eng.srt

34.7 KB

Proactive Refresh for Accountable Threshold Signatures.eng.text

25.5 KB

Proactive Refresh for Accountable Threshold Signatures.eng.tsv

29.1 KB

Proactive Refresh for Accountable Threshold Signatures.eng.txt

32.1 KB

Proactive Refresh for Accountable Threshold Signatures.eng.vtt

32.1 KB

Remote Scheduler Contention Attacks.eng.json

630.9 KB

Remote Scheduler Contention Attacks.eng.lrc

15.8 KB

Remote Scheduler Contention Attacks.eng.srt

17.3 KB

Remote Scheduler Contention Attacks.eng.text

12.4 KB

Remote Scheduler Contention Attacks.eng.tsv

14.2 KB

Remote Scheduler Contention Attacks.eng.txt

16.0 KB

Remote Scheduler Contention Attacks.eng.vtt

16.0 KB

SAVER SNARK-compatible Verifiable Encryption.eng.json

766.1 KB

SAVER SNARK-compatible Verifiable Encryption.eng.lrc

18.9 KB

SAVER SNARK-compatible Verifiable Encryption.eng.srt

20.3 KB

SAVER SNARK-compatible Verifiable Encryption.eng.text

15.6 KB

SAVER SNARK-compatible Verifiable Encryption.eng.tsv

17.4 KB

SAVER SNARK-compatible Verifiable Encryption.eng.txt

19.0 KB

SAVER SNARK-compatible Verifiable Encryption.eng.vtt

19.0 KB

Shoal Improving DAG-BFT Latency And Robustness.eng.json

1.7 MB

Shoal Improving DAG-BFT Latency And Robustness.eng.lrc

37.1 KB

Shoal Improving DAG-BFT Latency And Robustness.eng.srt

40.7 KB

Shoal Improving DAG-BFT Latency And Robustness.eng.text

29.0 KB

Shoal Improving DAG-BFT Latency And Robustness.eng.tsv

33.6 KB

Shoal Improving DAG-BFT Latency And Robustness.eng.txt

37.4 KB

Shoal Improving DAG-BFT Latency And Robustness.eng.vtt

37.4 KB

Short Paper Accountable Safety Implies Finality.eng.json

486.9 KB

Short Paper Accountable Safety Implies Finality.eng.lrc

12.8 KB

Short Paper Accountable Safety Implies Finality.eng.srt

13.7 KB

Short Paper Accountable Safety Implies Finality.eng.text

10.5 KB

Short Paper Accountable Safety Implies Finality.eng.tsv

11.7 KB

Short Paper Accountable Safety Implies Finality.eng.txt

12.8 KB

Short Paper Accountable Safety Implies Finality.eng.vtt

12.9 KB

Short Paper Breaking X-VRF, a Post-Quantum Verifiable Random Function.eng.json

1.1 MB

Short Paper Breaking X-VRF, a Post-Quantum Verifiable Random Function.eng.lrc

26.6 KB

Short Paper Breaking X-VRF, a Post-Quantum Verifiable Random Function.eng.srt

28.9 KB

Short Paper Breaking X-VRF, a Post-Quantum Verifiable Random Function.eng.text

21.5 KB

Short Paper Breaking X-VRF, a Post-Quantum Verifiable Random Function.eng.tsv

24.3 KB

Short Paper Breaking X-VRF, a Post-Quantum Verifiable Random Function.eng.txt

26.8 KB

Short Paper Breaking X-VRF, a Post-Quantum Verifiable Random Function.eng.vtt

26.8 KB

Short paper Naysayer proofs.eng.json

618.9 KB

Short paper Naysayer proofs.eng.lrc

14.9 KB

Short paper Naysayer proofs.eng.srt

15.9 KB

Short paper Naysayer proofs.eng.text

12.4 KB

Short paper Naysayer proofs.eng.tsv

13.7 KB

Short paper Naysayer proofs.eng.txt

14.9 KB

Short paper Naysayer proofs.eng.vtt

15.0 KB

Short Paper Onion Messages on Leash.eng.json

704.7 KB

Short Paper Onion Messages on Leash.eng.lrc

17.0 KB

Short Paper Onion Messages on Leash.eng.srt

18.3 KB

Short Paper Onion Messages on Leash.eng.text

14.1 KB

Short Paper Onion Messages on Leash.eng.tsv

15.7 KB

Short Paper Onion Messages on Leash.eng.txt

17.1 KB

Short Paper Onion Messages on Leash.eng.vtt

17.2 KB

Short Paper Shared Sequencing and Latency Competition as a Noisy Contest.eng.json

939.4 KB

Short Paper Shared Sequencing and Latency Competition as a Noisy Contest.eng.lrc

23.7 KB

Short Paper Shared Sequencing and Latency Competition as a Noisy Contest.eng.srt

25.6 KB

Short Paper Shared Sequencing and Latency Competition as a Noisy Contest.eng.text

19.2 KB

Short Paper Shared Sequencing and Latency Competition as a Noisy Contest.eng.tsv

21.7 KB

Short Paper Shared Sequencing and Latency Competition as a Noisy Contest.eng.txt

23.8 KB

Short Paper Shared Sequencing and Latency Competition as a Noisy Contest.eng.vtt

23.8 KB

SoK A Stratified Approach to Blockchain Decentralization.eng.json

641.3 KB

SoK A Stratified Approach to Blockchain Decentralization.eng.lrc

16.9 KB

SoK A Stratified Approach to Blockchain Decentralization.eng.srt

18.1 KB

SoK A Stratified Approach to Blockchain Decentralization.eng.text

14.1 KB

SoK A Stratified Approach to Blockchain Decentralization.eng.tsv

15.6 KB

SoK A Stratified Approach to Blockchain Decentralization.eng.txt

17.0 KB

SoK A Stratified Approach to Blockchain Decentralization.eng.vtt

17.0 KB

Subset-optimized BLS Multi-signature with Key Aggregation.eng.json

800.1 KB

Subset-optimized BLS Multi-signature with Key Aggregation.eng.lrc

19.5 KB

Subset-optimized BLS Multi-signature with Key Aggregation.eng.srt

20.8 KB

Subset-optimized BLS Multi-signature with Key Aggregation.eng.text

16.4 KB

Subset-optimized BLS Multi-signature with Key Aggregation.eng.tsv

18.1 KB

Subset-optimized BLS Multi-signature with Key Aggregation.eng.txt

19.6 KB

Subset-optimized BLS Multi-signature with Key Aggregation.eng.vtt

19.6 KB

Subverting Cryptographic Hardware used in Blockchain Consensus.eng.json

1.0 MB

Subverting Cryptographic Hardware used in Blockchain Consensus.eng.lrc

25.3 KB

Subverting Cryptographic Hardware used in Blockchain Consensus.eng.srt

27.2 KB

Subverting Cryptographic Hardware used in Blockchain Consensus.eng.text

20.8 KB

Subverting Cryptographic Hardware used in Blockchain Consensus.eng.tsv

23.3 KB

Subverting Cryptographic Hardware used in Blockchain Consensus.eng.txt

25.4 KB

Subverting Cryptographic Hardware used in Blockchain Consensus.eng.vtt

25.4 KB

The Costs of Swapping on the Uniswap Protocol.eng.json

1.2 MB

The Costs of Swapping on the Uniswap Protocol.eng.lrc

30.3 KB

The Costs of Swapping on the Uniswap Protocol.eng.srt

33.4 KB

The Costs of Swapping on the Uniswap Protocol.eng.text

23.4 KB

The Costs of Swapping on the Uniswap Protocol.eng.tsv

27.3 KB

The Costs of Swapping on the Uniswap Protocol.eng.txt

30.5 KB

The Costs of Swapping on the Uniswap Protocol.eng.vtt

30.6 KB

The Power of Default Measuring the Effect of Slippage Tolerance in Decentralized Exchanges.eng.json

837.8 KB

The Power of Default Measuring the Effect of Slippage Tolerance in Decentralized Exchanges.eng.lrc

20.7 KB

The Power of Default Measuring the Effect of Slippage Tolerance in Decentralized Exchanges.eng.srt

22.5 KB

The Power of Default Measuring the Effect of Slippage Tolerance in Decentralized Exchanges.eng.text

16.5 KB

The Power of Default Measuring the Effect of Slippage Tolerance in Decentralized Exchanges.eng.tsv

18.8 KB

The Power of Default Measuring the Effect of Slippage Tolerance in Decentralized Exchanges.eng.txt

20.9 KB

The Power of Default Measuring the Effect of Slippage Tolerance in Decentralized Exchanges.eng.vtt

20.9 KB

Towards Practical Doubly-Efficient Private Information Retrieval.eng.json

1.3 MB

Towards Practical Doubly-Efficient Private Information Retrieval.eng.lrc

27.9 KB

Towards Practical Doubly-Efficient Private Information Retrieval.eng.srt

30.0 KB

Towards Practical Doubly-Efficient Private Information Retrieval.eng.text

23.1 KB

Towards Practical Doubly-Efficient Private Information Retrieval.eng.tsv

25.9 KB

Towards Practical Doubly-Efficient Private Information Retrieval.eng.txt

28.1 KB

Towards Practical Doubly-Efficient Private Information Retrieval.eng.vtt

28.1 KB

Truncator Time-space Tradeoff of Cryptographic Primitives.eng.json

1.2 MB

Truncator Time-space Tradeoff of Cryptographic Primitives.eng.lrc

25.2 KB

Truncator Time-space Tradeoff of Cryptographic Primitives.eng.srt

26.8 KB

Truncator Time-space Tradeoff of Cryptographic Primitives.eng.text

21.5 KB

Truncator Time-space Tradeoff of Cryptographic Primitives.eng.tsv

23.6 KB

Truncator Time-space Tradeoff of Cryptographic Primitives.eng.txt

25.4 KB

Truncator Time-space Tradeoff of Cryptographic Primitives.eng.vtt

25.4 KB

ZeroSwap Data-driven Optimal Market Making in Decentralized Finance.eng.json

854.7 KB

ZeroSwap Data-driven Optimal Market Making in Decentralized Finance.eng.lrc

21.3 KB

ZeroSwap Data-driven Optimal Market Making in Decentralized Finance.eng.srt

23.1 KB

ZeroSwap Data-driven Optimal Market Making in Decentralized Finance.eng.text

17.0 KB

ZeroSwap Data-driven Optimal Market Making in Decentralized Finance.eng.tsv

19.4 KB

ZeroSwap Data-driven Optimal Market Making in Decentralized Finance.eng.txt

21.4 KB

ZeroSwap Data-driven Optimal Market Making in Decentralized Finance.eng.vtt

21.4 KB

FC 2025/

A Formally Verified Lightning Network.mp4

25.6 MB

A Framework for Combined Transaction Posting and Pricing for Layer 2 Blockchains.mp4

15.8 MB

Anthemius Efficient & Modular Block Assembly for Concurrent Execution.mp4

12.0 MB

Consensus Under Adversary Majority Done Right.mp4

17.1 MB

Do Compilers Break Constant-time Guarantees.mp4

20.1 MB

Lixom Protecting Encryption Keys with Execute-Only Memory.mp4

12.2 MB

Overlapped Bootstrapping for FHEW TFHE and Its Application to SHA3.mp4

18.9 MB

Piercing the Veil of TVL DeFi Reappraised.mp4

16.3 MB

Quantifying the Value of Revert Protection.mp4

13.5 MB

/.../FC 2025 captions/

A Formally Verified Lightning Network.eng.json

1.1 MB

A Formally Verified Lightning Network.eng.lrc

27.1 KB

A Formally Verified Lightning Network.eng.srt

29.5 KB

A Formally Verified Lightning Network.eng.text

21.8 KB

A Formally Verified Lightning Network.eng.tsv

24.8 KB

A Formally Verified Lightning Network.eng.txt

27.3 KB

A Formally Verified Lightning Network.eng.vtt

27.3 KB

A Framework for Combined Transaction Posting and Pricing for Layer 2 Blockchains.eng.json

619.9 KB

A Framework for Combined Transaction Posting and Pricing for Layer 2 Blockchains.eng.lrc

16.9 KB

A Framework for Combined Transaction Posting and Pricing for Layer 2 Blockchains.eng.srt

18.3 KB

A Framework for Combined Transaction Posting and Pricing for Layer 2 Blockchains.eng.text

13.6 KB

A Framework for Combined Transaction Posting and Pricing for Layer 2 Blockchains.eng.tsv

15.4 KB

A Framework for Combined Transaction Posting and Pricing for Layer 2 Blockchains.eng.txt

17.0 KB

A Framework for Combined Transaction Posting and Pricing for Layer 2 Blockchains.eng.vtt

17.0 KB

Anthemius Efficient & Modular Block Assembly for Concurrent Execution.eng.json

733.0 KB

Anthemius Efficient & Modular Block Assembly for Concurrent Execution.eng.lrc

16.2 KB

Anthemius Efficient & Modular Block Assembly for Concurrent Execution.eng.srt

17.2 KB

Anthemius Efficient & Modular Block Assembly for Concurrent Execution.eng.text

13.6 KB

Anthemius Efficient & Modular Block Assembly for Concurrent Execution.eng.tsv

15.0 KB

Anthemius Efficient & Modular Block Assembly for Concurrent Execution.eng.txt

16.3 KB

Anthemius Efficient & Modular Block Assembly for Concurrent Execution.eng.vtt

16.3 KB

Consensus Under Adversary Majority Done Right.eng.json

853.9 KB

Consensus Under Adversary Majority Done Right.eng.lrc

21.7 KB

Consensus Under Adversary Majority Done Right.eng.srt

23.6 KB

Consensus Under Adversary Majority Done Right.eng.text

17.3 KB

Consensus Under Adversary Majority Done Right.eng.tsv

19.8 KB

Consensus Under Adversary Majority Done Right.eng.txt

21.9 KB

Consensus Under Adversary Majority Done Right.eng.vtt

21.9 KB

Do Compilers Break Constant-time Guarantees.eng.json

958.1 KB

Do Compilers Break Constant-time Guarantees.eng.lrc

22.1 KB

Do Compilers Break Constant-time Guarantees.eng.srt

23.6 KB

Do Compilers Break Constant-time Guarantees.eng.text

18.5 KB

Do Compilers Break Constant-time Guarantees.eng.tsv

20.5 KB

Do Compilers Break Constant-time Guarantees.eng.txt

22.2 KB

Do Compilers Break Constant-time Guarantees.eng.vtt

22.2 KB

Lixom Protecting Encryption Keys with Execute-Only Memory.eng.json

1.1 MB

Lixom Protecting Encryption Keys with Execute-Only Memory.eng.lrc

24.1 KB

Lixom Protecting Encryption Keys with Execute-Only Memory.eng.srt

26.2 KB

Lixom Protecting Encryption Keys with Execute-Only Memory.eng.text

19.4 KB

Lixom Protecting Encryption Keys with Execute-Only Memory.eng.tsv

22.0 KB

Lixom Protecting Encryption Keys with Execute-Only Memory.eng.txt

24.3 KB

Lixom Protecting Encryption Keys with Execute-Only Memory.eng.vtt

24.3 KB

Overlapped Bootstrapping for FHEW TFHE and Its Application to SHA3.eng.json

639.7 KB

Overlapped Bootstrapping for FHEW TFHE and Its Application to SHA3.eng.lrc

16.5 KB

Overlapped Bootstrapping for FHEW TFHE and Its Application to SHA3.eng.srt

17.9 KB

Overlapped Bootstrapping for FHEW TFHE and Its Application to SHA3.eng.text

13.1 KB

Overlapped Bootstrapping for FHEW TFHE and Its Application to SHA3.eng.tsv

14.9 KB

Overlapped Bootstrapping for FHEW TFHE and Its Application to SHA3.eng.txt

16.6 KB

Overlapped Bootstrapping for FHEW TFHE and Its Application to SHA3.eng.vtt

16.6 KB

Piercing the Veil of TVL DeFi Reappraised.eng.json

556.4 KB

Piercing the Veil of TVL DeFi Reappraised.eng.lrc

14.3 KB

Piercing the Veil of TVL DeFi Reappraised.eng.srt

15.5 KB

Piercing the Veil of TVL DeFi Reappraised.eng.text

11.5 KB

Piercing the Veil of TVL DeFi Reappraised.eng.tsv

13.0 KB

Piercing the Veil of TVL DeFi Reappraised.eng.txt

14.4 KB

Piercing the Veil of TVL DeFi Reappraised.eng.vtt

14.4 KB

Quantifying the Value of Revert Protection.eng.json

655.0 KB

Quantifying the Value of Revert Protection.eng.lrc

16.0 KB

Quantifying the Value of Revert Protection.eng.srt

17.1 KB

Quantifying the Value of Revert Protection.eng.text

13.3 KB

Quantifying the Value of Revert Protection.eng.tsv

14.8 KB

Quantifying the Value of Revert Protection.eng.txt

16.1 KB

Quantifying the Value of Revert Protection.eng.vtt

16.1 KB

 

Total files 1476


Copyright © 2026 FileMood.com