|
/
|
|
Financial Cryptography thank you.txt
|
0.9 KB
|
|
|
|
HEADER.md
|
0.5 KB
|
|
IFCA Logo 1.gif
|
6.2 KB
|
|
IFCA Logo 2.jpg
|
9.0 KB
|
|
CoDecFin 2021/
|
|
Analyzing the United States Financial Crimes Enforcement Network’s Proposed Regulation Relating.mp4
|
5.3 MB
|
|
Collaborative Deanonymization.mp4
|
19.0 MB
|
|
FinCEN Docket Number FINCEN-2020-0020 - RIN 1506-AB47 - Requirements for Certain Transactions Inv.mp4
|
18.6 MB
|
|
Regulatory Considerations on Centralized Aspects of DeFi managed by DAOs.mp4
|
12.9 MB
|
|
Risk Framework for Bitcoin Custody Operation with the Revault Protocol.mp4
|
17.3 MB
|
|
/.../CoDecFin 2021 captions/
|
|
Analyzing the United States Financial Crimes Enforcement Network’s Proposed Regulation Relating.eng.json
|
459.2 KB
|
|
Analyzing the United States Financial Crimes Enforcement Network’s Proposed Regulation Relating.eng.lrc
|
12.6 KB
|
|
Analyzing the United States Financial Crimes Enforcement Network’s Proposed Regulation Relating.eng.srt
|
13.4 KB
|
|
Analyzing the United States Financial Crimes Enforcement Network’s Proposed Regulation Relating.eng.text
|
10.7 KB
|
|
Analyzing the United States Financial Crimes Enforcement Network’s Proposed Regulation Relating.eng.tsv
|
11.7 KB
|
|
Analyzing the United States Financial Crimes Enforcement Network’s Proposed Regulation Relating.eng.txt
|
12.7 KB
|
|
Analyzing the United States Financial Crimes Enforcement Network’s Proposed Regulation Relating.eng.vtt
|
12.7 KB
|
|
Collaborative Deanonymization.eng.json
|
871.7 KB
|
|
Collaborative Deanonymization.eng.lrc
|
23.5 KB
|
|
Collaborative Deanonymization.eng.srt
|
25.8 KB
|
|
Collaborative Deanonymization.eng.text
|
18.3 KB
|
|
Collaborative Deanonymization.eng.tsv
|
21.2 KB
|
|
Collaborative Deanonymization.eng.txt
|
23.7 KB
|
|
Collaborative Deanonymization.eng.vtt
|
23.7 KB
|
|
FinCEN Docket Number FINCEN-2020-0020 - RIN 1506-AB47 - Requirements for Certain Transactions Inv.eng.json
|
1.1 MB
|
|
FinCEN Docket Number FINCEN-2020-0020 - RIN 1506-AB47 - Requirements for Certain Transactions Inv.eng.lrc
|
28.4 KB
|
|
FinCEN Docket Number FINCEN-2020-0020 - RIN 1506-AB47 - Requirements for Certain Transactions Inv.eng.srt
|
30.7 KB
|
|
FinCEN Docket Number FINCEN-2020-0020 - RIN 1506-AB47 - Requirements for Certain Transactions Inv.eng.text
|
23.3 KB
|
|
FinCEN Docket Number FINCEN-2020-0020 - RIN 1506-AB47 - Requirements for Certain Transactions Inv.eng.tsv
|
26.2 KB
|
|
FinCEN Docket Number FINCEN-2020-0020 - RIN 1506-AB47 - Requirements for Certain Transactions Inv.eng.txt
|
28.6 KB
|
|
FinCEN Docket Number FINCEN-2020-0020 - RIN 1506-AB47 - Requirements for Certain Transactions Inv.eng.vtt
|
28.6 KB
|
|
Regulatory Considerations on Centralized Aspects of DeFi managed by DAOs.eng.json
|
649.1 KB
|
|
Regulatory Considerations on Centralized Aspects of DeFi managed by DAOs.eng.lrc
|
16.9 KB
|
|
Regulatory Considerations on Centralized Aspects of DeFi managed by DAOs.eng.srt
|
18.2 KB
|
|
Regulatory Considerations on Centralized Aspects of DeFi managed by DAOs.eng.text
|
14.0 KB
|
|
Regulatory Considerations on Centralized Aspects of DeFi managed by DAOs.eng.tsv
|
15.6 KB
|
|
Regulatory Considerations on Centralized Aspects of DeFi managed by DAOs.eng.txt
|
17.0 KB
|
|
Regulatory Considerations on Centralized Aspects of DeFi managed by DAOs.eng.vtt
|
17.0 KB
|
|
Risk Framework for Bitcoin Custody Operation with the Revault Protocol.eng.json
|
670.1 KB
|
|
Risk Framework for Bitcoin Custody Operation with the Revault Protocol.eng.lrc
|
18.0 KB
|
|
Risk Framework for Bitcoin Custody Operation with the Revault Protocol.eng.srt
|
19.4 KB
|
|
Risk Framework for Bitcoin Custody Operation with the Revault Protocol.eng.text
|
14.7 KB
|
|
Risk Framework for Bitcoin Custody Operation with the Revault Protocol.eng.tsv
|
16.5 KB
|
|
Risk Framework for Bitcoin Custody Operation with the Revault Protocol.eng.txt
|
18.1 KB
|
|
Risk Framework for Bitcoin Custody Operation with the Revault Protocol.eng.vtt
|
18.1 KB
|
|
DeFi 2021/
|
|
Cyclic Arbitrage in Decentralized Exchange Markets.mp4
|
3.2 MB
|
|
Formal Analysis of Composable DeFi Protocols.mp4
|
9.0 MB
|
|
How to Exploit a DeFi Project.mp4
|
13.4 MB
|
|
Market Based Mechanisms for Incentivising Exchange Liquidity Provision.mp4
|
5.5 MB
|
|
Measuring Asset Composability as a Proxy for DeFi Ecosystem Integration.mp4
|
4.0 MB
|
|
Project Wallfacer Demystifying Generalized Frontrunning Bots.mp4
|
12.2 MB
|
|
Red-Black Coins.mp4
|
6.6 MB
|
|
Taming MEV - Implementing a policy framework for transaction orders on blockchains.mp4
|
19.0 MB
|
|
Towards a Formal Theory of DeFi.mp4
|
10.1 MB
|
|
Trading on-chain how feasible is regulators’ worst-case scenario.mp4
|
19.9 MB
|
|
/.../DeFi 2021 captions/
|
|
Cyclic Arbitrage in Decentralized Exchange Markets.eng.json
|
342.1 KB
|
|
Cyclic Arbitrage in Decentralized Exchange Markets.eng.lrc
|
8.6 KB
|
|
Cyclic Arbitrage in Decentralized Exchange Markets.eng.srt
|
9.3 KB
|
|
Cyclic Arbitrage in Decentralized Exchange Markets.eng.text
|
6.8 KB
|
|
Cyclic Arbitrage in Decentralized Exchange Markets.eng.tsv
|
7.7 KB
|
|
Cyclic Arbitrage in Decentralized Exchange Markets.eng.txt
|
8.6 KB
|
|
Cyclic Arbitrage in Decentralized Exchange Markets.eng.vtt
|
8.6 KB
|
|
Formal Analysis of Composable DeFi Protocols.eng.json
|
572.5 KB
|
|
Formal Analysis of Composable DeFi Protocols.eng.lrc
|
14.4 KB
|
|
Formal Analysis of Composable DeFi Protocols.eng.srt
|
15.4 KB
|
|
Formal Analysis of Composable DeFi Protocols.eng.text
|
12.1 KB
|
|
Formal Analysis of Composable DeFi Protocols.eng.tsv
|
13.3 KB
|
|
Formal Analysis of Composable DeFi Protocols.eng.txt
|
14.5 KB
|
|
Formal Analysis of Composable DeFi Protocols.eng.vtt
|
14.5 KB
|
|
How to Exploit a DeFi Project.eng.json
|
548.2 KB
|
|
How to Exploit a DeFi Project.eng.lrc
|
13.7 KB
|
|
How to Exploit a DeFi Project.eng.srt
|
14.8 KB
|
|
How to Exploit a DeFi Project.eng.text
|
11.0 KB
|
|
How to Exploit a DeFi Project.eng.tsv
|
12.5 KB
|
|
How to Exploit a DeFi Project.eng.txt
|
13.8 KB
|
|
How to Exploit a DeFi Project.eng.vtt
|
13.8 KB
|
|
Market Based Mechanisms for Incentivising Exchange Liquidity Provision.eng.json
|
420.7 KB
|
|
Market Based Mechanisms for Incentivising Exchange Liquidity Provision.eng.lrc
|
10.5 KB
|
|
Market Based Mechanisms for Incentivising Exchange Liquidity Provision.eng.srt
|
11.1 KB
|
|
Market Based Mechanisms for Incentivising Exchange Liquidity Provision.eng.text
|
9.0 KB
|
|
Market Based Mechanisms for Incentivising Exchange Liquidity Provision.eng.tsv
|
9.8 KB
|
|
Market Based Mechanisms for Incentivising Exchange Liquidity Provision.eng.txt
|
10.5 KB
|
|
Market Based Mechanisms for Incentivising Exchange Liquidity Provision.eng.vtt
|
10.5 KB
|
|
Measuring Asset Composability as a Proxy for DeFi Ecosystem Integration.eng.json
|
238.9 KB
|
|
Measuring Asset Composability as a Proxy for DeFi Ecosystem Integration.eng.lrc
|
6.3 KB
|
|
Measuring Asset Composability as a Proxy for DeFi Ecosystem Integration.eng.srt
|
6.8 KB
|
|
Measuring Asset Composability as a Proxy for DeFi Ecosystem Integration.eng.text
|
5.3 KB
|
|
Measuring Asset Composability as a Proxy for DeFi Ecosystem Integration.eng.tsv
|
5.8 KB
|
|
Measuring Asset Composability as a Proxy for DeFi Ecosystem Integration.eng.txt
|
6.4 KB
|
|
Measuring Asset Composability as a Proxy for DeFi Ecosystem Integration.eng.vtt
|
6.4 KB
|
|
Project Wallfacer Demystifying Generalized Frontrunning Bots.eng.json
|
847.9 KB
|
|
Project Wallfacer Demystifying Generalized Frontrunning Bots.eng.lrc
|
20.1 KB
|
|
Project Wallfacer Demystifying Generalized Frontrunning Bots.eng.srt
|
21.6 KB
|
|
Project Wallfacer Demystifying Generalized Frontrunning Bots.eng.text
|
16.6 KB
|
|
Project Wallfacer Demystifying Generalized Frontrunning Bots.eng.tsv
|
18.5 KB
|
|
Project Wallfacer Demystifying Generalized Frontrunning Bots.eng.txt
|
20.2 KB
|
|
Project Wallfacer Demystifying Generalized Frontrunning Bots.eng.vtt
|
20.2 KB
|
|
Red-Black Coins.eng.json
|
562.6 KB
|
|
Red-Black Coins.eng.lrc
|
13.6 KB
|
|
Red-Black Coins.eng.srt
|
14.6 KB
|
|
Red-Black Coins.eng.text
|
11.0 KB
|
|
Red-Black Coins.eng.tsv
|
12.4 KB
|
|
Red-Black Coins.eng.txt
|
13.7 KB
|
|
Red-Black Coins.eng.vtt
|
13.7 KB
|
|
Taming MEV - Implementing a policy framework for transaction orders on blockchains.eng.json
|
818.0 KB
|
|
Taming MEV - Implementing a policy framework for transaction orders on blockchains.eng.lrc
|
20.5 KB
|
|
Taming MEV - Implementing a policy framework for transaction orders on blockchains.eng.srt
|
22.3 KB
|
|
Taming MEV - Implementing a policy framework for transaction orders on blockchains.eng.text
|
16.3 KB
|
|
Taming MEV - Implementing a policy framework for transaction orders on blockchains.eng.tsv
|
18.6 KB
|
|
Taming MEV - Implementing a policy framework for transaction orders on blockchains.eng.txt
|
20.6 KB
|
|
Taming MEV - Implementing a policy framework for transaction orders on blockchains.eng.vtt
|
20.6 KB
|
|
Towards a Formal Theory of DeFi.eng.json
|
811.6 KB
|
|
Towards a Formal Theory of DeFi.eng.lrc
|
19.8 KB
|
|
Towards a Formal Theory of DeFi.eng.srt
|
21.4 KB
|
|
Towards a Formal Theory of DeFi.eng.text
|
16.0 KB
|
|
Towards a Formal Theory of DeFi.eng.tsv
|
18.1 KB
|
|
Towards a Formal Theory of DeFi.eng.txt
|
19.9 KB
|
|
Towards a Formal Theory of DeFi.eng.vtt
|
19.9 KB
|
|
Trading on-chain how feasible is regulators’ worst-case scenario.eng.json
|
1.2 MB
|
|
Trading on-chain how feasible is regulators’ worst-case scenario.eng.lrc
|
26.5 KB
|
|
Trading on-chain how feasible is regulators’ worst-case scenario.eng.srt
|
29.1 KB
|
|
Trading on-chain how feasible is regulators’ worst-case scenario.eng.text
|
20.7 KB
|
|
Trading on-chain how feasible is regulators’ worst-case scenario.eng.tsv
|
24.0 KB
|
|
Trading on-chain how feasible is regulators’ worst-case scenario.eng.txt
|
26.8 KB
|
|
Trading on-chain how feasible is regulators’ worst-case scenario.eng.vtt
|
26.8 KB
|
|
DeFi 2022/
|
|
A Closer Look at the Building Blocks of DeFi Compositions.mp4
|
14.5 MB
|
|
A Short Survey on Business Models of Decentralized Finance DeFi Protocols.mp4
|
18.4 MB
|
|
An Empirical Study of Market Inefficiencies in Uniswap and SushiSwap.mp4
|
12.1 MB
|
|
Beyond Staking - An Aphoristic Design for Staking and Rewards.mp4
|
26.5 MB
|
|
Centralized Governance in Decentralized Finance DeFi - A Case Study of MakerDAO.mp4
|
28.7 MB
|
|
Gyroscope P AMM - Designing an Autonomous Primary Market for Stabilizing Non custodial Stablecoins.mp4
|
18.8 MB
|
|
KEYNOTE - MEV Definitions - Wat Do Next.mp4
|
57.6 MB
|
|
NFT Wash Trading - Quantifying suspicious behaviour in NFT markets.mp4
|
9.4 MB
|
|
On Chain Auction with Deposits.mp4
|
28.1 MB
|
|
Oracle Counterpoint - Relationships Between On chain and Off chain Market Data.mp4
|
7.4 MB
|
|
Privacy Preserving Decentralized Netting.mp4
|
30.1 MB
|
|
Replicating Monotonic Payoffs Without Oracles.mp4
|
8.4 MB
|
|
Smart Contracts Upgradeability in DeFi Protocols.mp4
|
26.5 MB
|
|
SoK - Mitigation of Front running in Decentralized Finance.mp4
|
22.7 MB
|
|
The Case for Variable Fees in Constant Product Markets - An Agent Based Simulation.mp4
|
24.6 MB
|
|
/.../DeFi 2022 captions/
|
|
A Closer Look at the Building Blocks of DeFi Compositions.eng.json
|
586.9 KB
|
|
A Closer Look at the Building Blocks of DeFi Compositions.eng.lrc
|
14.9 KB
|
|
A Closer Look at the Building Blocks of DeFi Compositions.eng.srt
|
16.0 KB
|
|
A Closer Look at the Building Blocks of DeFi Compositions.eng.text
|
12.2 KB
|
|
A Closer Look at the Building Blocks of DeFi Compositions.eng.tsv
|
13.7 KB
|
|
A Closer Look at the Building Blocks of DeFi Compositions.eng.txt
|
15.0 KB
|
|
A Closer Look at the Building Blocks of DeFi Compositions.eng.vtt
|
15.0 KB
|
|
A Short Survey on Business Models of Decentralized Finance DeFi Protocols.eng.json
|
534.1 KB
|
|
A Short Survey on Business Models of Decentralized Finance DeFi Protocols.eng.lrc
|
11.7 KB
|
|
A Short Survey on Business Models of Decentralized Finance DeFi Protocols.eng.srt
|
12.7 KB
|
|
A Short Survey on Business Models of Decentralized Finance DeFi Protocols.eng.text
|
9.4 KB
|
|
A Short Survey on Business Models of Decentralized Finance DeFi Protocols.eng.tsv
|
10.6 KB
|
|
A Short Survey on Business Models of Decentralized Finance DeFi Protocols.eng.txt
|
11.8 KB
|
|
A Short Survey on Business Models of Decentralized Finance DeFi Protocols.eng.vtt
|
11.8 KB
|
|
An Empirical Study of Market Inefficiencies in Uniswap and SushiSwap.eng.json
|
861.6 KB
|
|
An Empirical Study of Market Inefficiencies in Uniswap and SushiSwap.eng.lrc
|
19.4 KB
|
|
An Empirical Study of Market Inefficiencies in Uniswap and SushiSwap.eng.srt
|
21.1 KB
|
|
An Empirical Study of Market Inefficiencies in Uniswap and SushiSwap.eng.text
|
15.5 KB
|
|
An Empirical Study of Market Inefficiencies in Uniswap and SushiSwap.eng.tsv
|
17.6 KB
|
|
An Empirical Study of Market Inefficiencies in Uniswap and SushiSwap.eng.txt
|
19.5 KB
|
|
An Empirical Study of Market Inefficiencies in Uniswap and SushiSwap.eng.vtt
|
19.5 KB
|
|
Beyond Staking - An Aphoristic Design for Staking and Rewards.eng.json
|
794.8 KB
|
|
Beyond Staking - An Aphoristic Design for Staking and Rewards.eng.lrc
|
18.7 KB
|
|
Beyond Staking - An Aphoristic Design for Staking and Rewards.eng.srt
|
20.3 KB
|
|
Beyond Staking - An Aphoristic Design for Staking and Rewards.eng.text
|
14.9 KB
|
|
Beyond Staking - An Aphoristic Design for Staking and Rewards.eng.tsv
|
16.9 KB
|
|
Beyond Staking - An Aphoristic Design for Staking and Rewards.eng.txt
|
18.8 KB
|
|
Beyond Staking - An Aphoristic Design for Staking and Rewards.eng.vtt
|
18.8 KB
|
|
Centralized Governance in Decentralized Finance DeFi - A Case Study of MakerDAO.eng.json
|
765.1 KB
|
|
Centralized Governance in Decentralized Finance DeFi - A Case Study of MakerDAO.eng.lrc
|
19.8 KB
|
|
Centralized Governance in Decentralized Finance DeFi - A Case Study of MakerDAO.eng.srt
|
22.1 KB
|
|
Centralized Governance in Decentralized Finance DeFi - A Case Study of MakerDAO.eng.text
|
14.6 KB
|
|
Centralized Governance in Decentralized Finance DeFi - A Case Study of MakerDAO.eng.tsv
|
17.4 KB
|
|
Centralized Governance in Decentralized Finance DeFi - A Case Study of MakerDAO.eng.txt
|
20.0 KB
|
|
Centralized Governance in Decentralized Finance DeFi - A Case Study of MakerDAO.eng.vtt
|
20.0 KB
|
|
Gyroscope P AMM - Designing an Autonomous Primary Market for Stabilizing Non custodial Stablecoins.eng.json
|
760.0 KB
|
|
Gyroscope P AMM - Designing an Autonomous Primary Market for Stabilizing Non custodial Stablecoins.eng.lrc
|
18.8 KB
|
|
Gyroscope P AMM - Designing an Autonomous Primary Market for Stabilizing Non custodial Stablecoins.eng.srt
|
20.4 KB
|
|
Gyroscope P AMM - Designing an Autonomous Primary Market for Stabilizing Non custodial Stablecoins.eng.text
|
14.9 KB
|
|
Gyroscope P AMM - Designing an Autonomous Primary Market for Stabilizing Non custodial Stablecoins.eng.tsv
|
17.0 KB
|
|
Gyroscope P AMM - Designing an Autonomous Primary Market for Stabilizing Non custodial Stablecoins.eng.txt
|
18.9 KB
|
|
Gyroscope P AMM - Designing an Autonomous Primary Market for Stabilizing Non custodial Stablecoins.eng.vtt
|
18.9 KB
|
|
KEYNOTE - MEV Definitions - Wat Do Next.eng.json
|
1.8 MB
|
|
KEYNOTE - MEV Definitions - Wat Do Next.eng.lrc
|
44.6 KB
|
|
KEYNOTE - MEV Definitions - Wat Do Next.eng.srt
|
49.0 KB
|
|
KEYNOTE - MEV Definitions - Wat Do Next.eng.text
|
34.8 KB
|
|
KEYNOTE - MEV Definitions - Wat Do Next.eng.tsv
|
40.4 KB
|
|
KEYNOTE - MEV Definitions - Wat Do Next.eng.txt
|
44.9 KB
|
|
KEYNOTE - MEV Definitions - Wat Do Next.eng.vtt
|
44.9 KB
|
|
NFT Wash Trading - Quantifying suspicious behaviour in NFT markets.eng.json
|
502.6 KB
|
|
NFT Wash Trading - Quantifying suspicious behaviour in NFT markets.eng.lrc
|
13.7 KB
|
|
NFT Wash Trading - Quantifying suspicious behaviour in NFT markets.eng.srt
|
15.0 KB
|
|
NFT Wash Trading - Quantifying suspicious behaviour in NFT markets.eng.text
|
10.7 KB
|
|
NFT Wash Trading - Quantifying suspicious behaviour in NFT markets.eng.tsv
|
12.3 KB
|
|
NFT Wash Trading - Quantifying suspicious behaviour in NFT markets.eng.txt
|
13.8 KB
|
|
NFT Wash Trading - Quantifying suspicious behaviour in NFT markets.eng.vtt
|
13.9 KB
|
|
On Chain Auction with Deposits.eng.json
|
688.1 KB
|
|
On Chain Auction with Deposits.eng.lrc
|
17.8 KB
|
|
On Chain Auction with Deposits.eng.srt
|
19.8 KB
|
|
On Chain Auction with Deposits.eng.text
|
13.4 KB
|
|
On Chain Auction with Deposits.eng.tsv
|
15.8 KB
|
|
On Chain Auction with Deposits.eng.txt
|
18.0 KB
|
|
On Chain Auction with Deposits.eng.vtt
|
18.0 KB
|
|
Oracle Counterpoint - Relationships Between On chain and Off chain Market Data.eng.json
|
264.5 KB
|
|
Oracle Counterpoint - Relationships Between On chain and Off chain Market Data.eng.lrc
|
6.3 KB
|
|
Oracle Counterpoint - Relationships Between On chain and Off chain Market Data.eng.srt
|
6.8 KB
|
|
Oracle Counterpoint - Relationships Between On chain and Off chain Market Data.eng.text
|
5.2 KB
|
|
Oracle Counterpoint - Relationships Between On chain and Off chain Market Data.eng.tsv
|
5.8 KB
|
|
Oracle Counterpoint - Relationships Between On chain and Off chain Market Data.eng.txt
|
6.4 KB
|
|
Oracle Counterpoint - Relationships Between On chain and Off chain Market Data.eng.vtt
|
6.4 KB
|
|
Privacy Preserving Decentralized Netting.eng.json
|
877.3 KB
|
|
Privacy Preserving Decentralized Netting.eng.lrc
|
22.2 KB
|
|
Privacy Preserving Decentralized Netting.eng.srt
|
23.9 KB
|
|
Privacy Preserving Decentralized Netting.eng.text
|
18.3 KB
|
|
Privacy Preserving Decentralized Netting.eng.tsv
|
20.4 KB
|
|
Privacy Preserving Decentralized Netting.eng.txt
|
22.3 KB
|
|
Privacy Preserving Decentralized Netting.eng.vtt
|
22.3 KB
|
|
Replicating Monotonic Payoffs Without Oracles.eng.json
|
1.0 MB
|
|
Replicating Monotonic Payoffs Without Oracles.eng.lrc
|
23.8 KB
|
|
Replicating Monotonic Payoffs Without Oracles.eng.srt
|
25.6 KB
|
|
Replicating Monotonic Payoffs Without Oracles.eng.text
|
19.7 KB
|
|
Replicating Monotonic Payoffs Without Oracles.eng.tsv
|
21.9 KB
|
|
Replicating Monotonic Payoffs Without Oracles.eng.txt
|
24.0 KB
|
|
Replicating Monotonic Payoffs Without Oracles.eng.vtt
|
24.0 KB
|
|
Smart Contracts Upgradeability in DeFi Protocols.eng.json
|
749.7 KB
|
|
Smart Contracts Upgradeability in DeFi Protocols.eng.lrc
|
18.6 KB
|
|
Smart Contracts Upgradeability in DeFi Protocols.eng.srt
|
20.3 KB
|
|
Smart Contracts Upgradeability in DeFi Protocols.eng.text
|
14.6 KB
|
|
Smart Contracts Upgradeability in DeFi Protocols.eng.tsv
|
16.7 KB
|
|
Smart Contracts Upgradeability in DeFi Protocols.eng.txt
|
18.8 KB
|
|
Smart Contracts Upgradeability in DeFi Protocols.eng.vtt
|
18.8 KB
|
|
SoK - Mitigation of Front running in Decentralized Finance.eng.json
|
912.0 KB
|
|
SoK - Mitigation of Front running in Decentralized Finance.eng.lrc
|
22.7 KB
|
|
SoK - Mitigation of Front running in Decentralized Finance.eng.srt
|
25.1 KB
|
|
SoK - Mitigation of Front running in Decentralized Finance.eng.text
|
17.2 KB
|
|
SoK - Mitigation of Front running in Decentralized Finance.eng.tsv
|
20.2 KB
|
|
SoK - Mitigation of Front running in Decentralized Finance.eng.txt
|
22.9 KB
|
|
SoK - Mitigation of Front running in Decentralized Finance.eng.vtt
|
22.9 KB
|
|
The Case for Variable Fees in Constant Product Markets - An Agent Based Simulation.eng.json
|
817.3 KB
|
|
The Case for Variable Fees in Constant Product Markets - An Agent Based Simulation.eng.lrc
|
19.5 KB
|
|
The Case for Variable Fees in Constant Product Markets - An Agent Based Simulation.eng.srt
|
21.3 KB
|
|
The Case for Variable Fees in Constant Product Markets - An Agent Based Simulation.eng.text
|
15.4 KB
|
|
The Case for Variable Fees in Constant Product Markets - An Agent Based Simulation.eng.tsv
|
17.7 KB
|
|
The Case for Variable Fees in Constant Product Markets - An Agent Based Simulation.eng.txt
|
19.7 KB
|
|
The Case for Variable Fees in Constant Product Markets - An Agent Based Simulation.eng.vtt
|
19.7 KB
|
|
FC 2021/
|
|
A Formal Model of Algorand Smart Contracts.mp4
|
23.0 MB
|
|
ACeD Scalable Data Availability Oracle.mp4
|
11.3 MB
|
|
An Empirical Analysis of Privacy in the Lightning Network.mp4
|
6.5 MB
|
|
Another Look at Extraction and Randomization of Groth's zk-SNARK.mp4
|
20.6 MB
|
|
Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit.mp4
|
13.0 MB
|
|
Blockchain CAP Theorem Allows User-Dependent Adaptivity and Finality.mp4
|
13.2 MB
|
|
BooLigero Improved Sublinear Zero Knowledge Proofs for Boolean Circuits.mp4
|
13.8 MB
|
|
Brick Asynchronous Incentive-Compatible Payment Channels.mp4
|
10.2 MB
|
|
Congestion Attacks in Payment Channel Networks.mp4
|
18.1 MB
|
|
Cross-Layer Deanonymization Methods in the Lightning Protocol.mp4
|
22.0 MB
|
|
DAHash Distribution Aware Tuning of Password Hashing Costs.mp4
|
20.6 MB
|
|
Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Mu.mp4
|
18.3 MB
|
|
Efficient State Management in Distributed Ledgers.mp4
|
13.8 MB
|
|
Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask).mp4
|
15.9 MB
|
|
Fast Isomorphic State Channels.mp4
|
16.1 MB
|
|
Faster Homomorphic Encryption over GPGPUs via hierarchical DGT.mp4
|
21.7 MB
|
|
Fine-Grained Forward Secrecy Allow-List Deny-List Encryption and Applications.mp4
|
15.1 MB
|
|
FPPW A Fair and Privacy Preserving Watchtower for Bitcoin.mp4
|
13.3 MB
|
|
Fraud and Data Availability Proofs Detecting Invalid Blocks in Light Clients.mp4
|
14.7 MB
|
|
Generic Plaintext Equality and Inequality Proofs.mp4
|
5.4 MB
|
|
HaPPY-mine Designing a Mining Reward Function.mp4
|
16.4 MB
|
|
High-Threshold AVSS with Optimal Communication Complexity.mp4
|
16.9 MB
|
|
Ignore the Extra Zeroes Variance-Optimal Mining Pools.mp4
|
11.6 MB
|
|
Improving the Efficiency of AES Protocols in Multi-Party Computation.mp4
|
15.5 MB
|
|
Instant Block Confirmation in the Sleepy Model.mp4
|
18.3 MB
|
|
Liquidations DeFi on a Knife-Edge.mp4
|
13.2 MB
|
|
Lost in Transmission Investigating Filtering of COVID-19 Websites.mp4
|
6.9 MB
|
|
Mining for Privacy How to Bootstrap a Snarky Blockchain.mp4
|
22.5 MB
|
|
Multi-Instance Publicly Verifiable Time-Lock Puzzle and Its Applications.mp4
|
9.0 MB
|
|
Payment Trees Low Collateral Payments for Payment Channel Networks.mp4
|
16.1 MB
|
|
PERIMETER A Network-Layer Attack on the Anonymity of Cryptocurrencies.mp4
|
8.8 MB
|
|
PoSAT Proof-of-Work Dynamic Availability and Unpredictability, without the Work.mp4
|
13.9 MB
|
|
Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments.mp4
|
12.8 MB
|
|
Practical Post-Quantum Few-Time Verifiable Random Function with Applications to Algorand.mp4
|
19.0 MB
|
|
Practical Witness-Key-Agreement for Blockchain-Based Dark Pools Financial Trading.mp4
|
17.0 MB
|
|
Rabbit Efficient Comparison for Secure Multi-Party Computation.mp4
|
22.6 MB
|
|
Reparo Publicly Verifiable Layer to Repair Blockchains.mp4
|
16.1 MB
|
|
Shielded Computations in Smart Contracts Overcoming Forks.mp4
|
13.3 MB
|
|
Short Paper Debt representation in UTXO blockchains.mp4
|
9.1 MB
|
|
Short Paper Selfish Mining Attacks Exacerbated by Elastic Hash Supply.mp4
|
12.4 MB
|
|
Short Paper Terrorist Fraud in Distance Bounding Getting Around the Models.mp4
|
8.7 MB
|
|
Sigforgery Breaking and Fixing Data Authenticity in Sigfox.mp4
|
12.5 MB
|
|
SoK Communication Across Distributed Ledgers.mp4
|
13.0 MB
|
|
SoK Securing Email-A Stakeholder-Based Analysis.mp4
|
14.3 MB
|
|
Somewhere Statistically Binding Commitment Schemes with Applications.mp4
|
11.2 MB
|
|
Specfuscator Evaluating Branch Removal as a Spectre Mitigation.mp4
|
13.9 MB
|
|
Speculative Dereferencing of Registers Reviving Foreshadow.mp4
|
13.3 MB
|
|
The Complex Shape of Anonymity in Cryptocurrencies Case Studies from a Systematic Approa.mp4
|
10.9 MB
|
|
The Eye of Horus Spotting and Analyzing Attacks on Ethereum Smart Contracts.mp4
|
14.4 MB
|
|
Timelocked Bribing.mp4
|
15.8 MB
|
|
Under the Hood of the Ethereum Gossip Protocol.mp4
|
15.2 MB
|
|
What's in Score for Website Users A Data-Driven Long-Term Study on Risk-Based Authentica.mp4
|
37.2 MB
|
|
WTSC 2021 - Absentia secure function evaluation on Ethereum.mp4
|
11.4 MB
|
|
WTSC 2021 - Coins Covid Keynes and K-Shaped Recovery.mp4
|
13.5 MB
|
|
WTSC 2021 - Empirical Analysis of On-chain Voting with Smart Contracts.mp4
|
6.7 MB
|
|
WTSC 2021 - EthVer Formal verification of randomized Ethereum smart contracts.mp4
|
10.9 MB
|
|
WTSC 2021 - Fairness in ERC token markets A Case Study of CryptoKitties.mp4
|
18.3 MB
|
|
WTSC 2021 - Merkle Trees Optimized for Stateless Clients inBitcoin.mp4
|
13.7 MB
|
|
WTSC 2021 - Mirroring Public Key Infrastructures to Blockchains for On-chain Authentication.mp4
|
27.9 MB
|
|
WTSC 2021 - On-Chain Smart Contract Verification over Tendermint.mp4
|
21.8 MB
|
|
WTSC 2021 - Pay To Win Cheap, Cross-chain Bribing Attacks on PoW Cryptocurrencies.mp4
|
18.4 MB
|
|
WTSC 2021 - Privacy-preserving Resource Sharing using Permissioned Blockchains (the Case of Smart Neighbour.mp4
|
12.4 MB
|
|
WTSC 2021 - Publicly Verifiable and Secrecy Preserving Periodic Auctions.mp4
|
17.8 MB
|
|
WTSC 2021 - Reactive Key-Loss Protection in Blockchains.mp4
|
17.2 MB
|
|
WTSC 2021 - SoK Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies.mp4
|
16.6 MB
|
|
WTSC 2021 - Standardized crypto-loans on the Cardano blockchain.mp4
|
10.2 MB
|
|
WTSC 2021 - Towards a Formal Theory of DeFi.mp4
|
10.2 MB
|
|
Zero-Knowledge Proofs for Set Membership Efficient, Succinct, Modular.mp4
|
14.4 MB
|
|
/.../FC 2021 captions/
|
|
A Formal Model of Algorand Smart Contracts.eng.json
|
1.1 MB
|
|
A Formal Model of Algorand Smart Contracts.eng.lrc
|
26.3 KB
|
|
A Formal Model of Algorand Smart Contracts.eng.srt
|
29.0 KB
|
|
A Formal Model of Algorand Smart Contracts.eng.text
|
20.4 KB
|
|
A Formal Model of Algorand Smart Contracts.eng.tsv
|
23.8 KB
|
|
A Formal Model of Algorand Smart Contracts.eng.txt
|
26.6 KB
|
|
A Formal Model of Algorand Smart Contracts.eng.vtt
|
26.6 KB
|
|
ACeD Scalable Data Availability Oracle.eng.json
|
974.5 KB
|
|
ACeD Scalable Data Availability Oracle.eng.lrc
|
25.1 KB
|
|
ACeD Scalable Data Availability Oracle.eng.srt
|
27.2 KB
|
|
ACeD Scalable Data Availability Oracle.eng.text
|
20.2 KB
|
|
ACeD Scalable Data Availability Oracle.eng.tsv
|
22.9 KB
|
|
ACeD Scalable Data Availability Oracle.eng.txt
|
25.3 KB
|
|
ACeD Scalable Data Availability Oracle.eng.vtt
|
25.3 KB
|
|
An Empirical Analysis of Privacy in the Lightning Network.eng.json
|
5.0 KB
|
|
An Empirical Analysis of Privacy in the Lightning Network.eng.lrc
|
0.1 KB
|
|
An Empirical Analysis of Privacy in the Lightning Network.eng.srt
|
0.1 KB
|
|
An Empirical Analysis of Privacy in the Lightning Network.eng.text
|
0.1 KB
|
|
An Empirical Analysis of Privacy in the Lightning Network.eng.tsv
|
0.1 KB
|
|
An Empirical Analysis of Privacy in the Lightning Network.eng.txt
|
0.1 KB
|
|
An Empirical Analysis of Privacy in the Lightning Network.eng.vtt
|
0.1 KB
|
|
Another Look at Extraction and Randomization of Groth's zk-SNARK.eng.json
|
1.2 MB
|
|
Another Look at Extraction and Randomization of Groth's zk-SNARK.eng.lrc
|
28.8 KB
|
|
Another Look at Extraction and Randomization of Groth's zk-SNARK.eng.srt
|
31.3 KB
|
|
Another Look at Extraction and Randomization of Groth's zk-SNARK.eng.text
|
23.1 KB
|
|
Another Look at Extraction and Randomization of Groth's zk-SNARK.eng.tsv
|
26.3 KB
|
|
Another Look at Extraction and Randomization of Groth's zk-SNARK.eng.txt
|
29.0 KB
|
|
Another Look at Extraction and Randomization of Groth's zk-SNARK.eng.vtt
|
29.0 KB
|
|
Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit.eng.json
|
662.3 KB
|
|
Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit.eng.lrc
|
16.5 KB
|
|
Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit.eng.srt
|
18.0 KB
|
|
Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit.eng.text
|
12.9 KB
|
|
Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit.eng.tsv
|
14.9 KB
|
|
Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit.eng.txt
|
16.6 KB
|
|
Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit.eng.vtt
|
16.6 KB
|
|
Blockchain CAP Theorem Allows User-Dependent Adaptivity and Finality.eng.json
|
526.7 KB
|
|
Blockchain CAP Theorem Allows User-Dependent Adaptivity and Finality.eng.lrc
|
13.8 KB
|
|
Blockchain CAP Theorem Allows User-Dependent Adaptivity and Finality.eng.srt
|
14.9 KB
|
|
Blockchain CAP Theorem Allows User-Dependent Adaptivity and Finality.eng.text
|
11.1 KB
|
|
Blockchain CAP Theorem Allows User-Dependent Adaptivity and Finality.eng.tsv
|
12.5 KB
|
|
Blockchain CAP Theorem Allows User-Dependent Adaptivity and Finality.eng.txt
|
13.9 KB
|
|
Blockchain CAP Theorem Allows User-Dependent Adaptivity and Finality.eng.vtt
|
13.9 KB
|
|
BooLigero Improved Sublinear Zero Knowledge Proofs for Boolean Circuits.eng.json
|
1.0 MB
|
|
BooLigero Improved Sublinear Zero Knowledge Proofs for Boolean Circuits.eng.lrc
|
24.3 KB
|
|
BooLigero Improved Sublinear Zero Knowledge Proofs for Boolean Circuits.eng.srt
|
26.5 KB
|
|
BooLigero Improved Sublinear Zero Knowledge Proofs for Boolean Circuits.eng.text
|
19.4 KB
|
|
BooLigero Improved Sublinear Zero Knowledge Proofs for Boolean Circuits.eng.tsv
|
22.2 KB
|
|
BooLigero Improved Sublinear Zero Knowledge Proofs for Boolean Circuits.eng.txt
|
24.5 KB
|
|
BooLigero Improved Sublinear Zero Knowledge Proofs for Boolean Circuits.eng.vtt
|
24.5 KB
|
|
Brick Asynchronous Incentive-Compatible Payment Channels.eng.json
|
832.2 KB
|
|
Brick Asynchronous Incentive-Compatible Payment Channels.eng.lrc
|
20.6 KB
|
|
Brick Asynchronous Incentive-Compatible Payment Channels.eng.srt
|
22.3 KB
|
|
Brick Asynchronous Incentive-Compatible Payment Channels.eng.text
|
16.7 KB
|
|
Brick Asynchronous Incentive-Compatible Payment Channels.eng.tsv
|
18.8 KB
|
|
Brick Asynchronous Incentive-Compatible Payment Channels.eng.txt
|
20.8 KB
|
|
Brick Asynchronous Incentive-Compatible Payment Channels.eng.vtt
|
20.8 KB
|
|
Congestion Attacks in Payment Channel Networks.eng.json
|
1.3 MB
|
|
Congestion Attacks in Payment Channel Networks.eng.lrc
|
34.0 KB
|
|
Congestion Attacks in Payment Channel Networks.eng.srt
|
36.9 KB
|
|
Congestion Attacks in Payment Channel Networks.eng.text
|
27.7 KB
|
|
Congestion Attacks in Payment Channel Networks.eng.tsv
|
31.3 KB
|
|
Congestion Attacks in Payment Channel Networks.eng.txt
|
34.3 KB
|
|
Congestion Attacks in Payment Channel Networks.eng.vtt
|
34.3 KB
|
|
Cross-Layer Deanonymization Methods in the Lightning Protocol.eng.json
|
1.2 MB
|
|
Cross-Layer Deanonymization Methods in the Lightning Protocol.eng.lrc
|
28.8 KB
|
|
Cross-Layer Deanonymization Methods in the Lightning Protocol.eng.srt
|
31.2 KB
|
|
Cross-Layer Deanonymization Methods in the Lightning Protocol.eng.text
|
23.3 KB
|
|
Cross-Layer Deanonymization Methods in the Lightning Protocol.eng.tsv
|
26.5 KB
|
|
Cross-Layer Deanonymization Methods in the Lightning Protocol.eng.txt
|
29.0 KB
|
|
Cross-Layer Deanonymization Methods in the Lightning Protocol.eng.vtt
|
29.0 KB
|
|
DAHash Distribution Aware Tuning of Password Hashing Costs.eng.json
|
1.3 MB
|
|
DAHash Distribution Aware Tuning of Password Hashing Costs.eng.lrc
|
32.7 KB
|
|
DAHash Distribution Aware Tuning of Password Hashing Costs.eng.srt
|
35.8 KB
|
|
DAHash Distribution Aware Tuning of Password Hashing Costs.eng.text
|
25.8 KB
|
|
DAHash Distribution Aware Tuning of Password Hashing Costs.eng.tsv
|
29.7 KB
|
|
DAHash Distribution Aware Tuning of Password Hashing Costs.eng.txt
|
33.0 KB
|
|
DAHash Distribution Aware Tuning of Password Hashing Costs.eng.vtt
|
33.0 KB
|
|
Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Mu.eng.json
|
762.9 KB
|
|
Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Mu.eng.lrc
|
20.4 KB
|
|
Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Mu.eng.srt
|
22.1 KB
|
|
Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Mu.eng.text
|
16.5 KB
|
|
Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Mu.eng.tsv
|
18.7 KB
|
|
Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Mu.eng.txt
|
20.6 KB
|
|
Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Mu.eng.vtt
|
20.6 KB
|
|
Efficient State Management in Distributed Ledgers.eng.json
|
807.9 KB
|
|
Efficient State Management in Distributed Ledgers.eng.lrc
|
19.7 KB
|
|
Efficient State Management in Distributed Ledgers.eng.srt
|
21.3 KB
|
|
Efficient State Management in Distributed Ledgers.eng.text
|
16.0 KB
|
|
Efficient State Management in Distributed Ledgers.eng.tsv
|
18.0 KB
|
|
Efficient State Management in Distributed Ledgers.eng.txt
|
19.8 KB
|
|
Efficient State Management in Distributed Ledgers.eng.vtt
|
19.8 KB
|
|
Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask).eng.json
|
949.5 KB
|
|
Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask).eng.lrc
|
24.6 KB
|
|
Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask).eng.srt
|
26.7 KB
|
|
Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask).eng.text
|
19.7 KB
|
|
Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask).eng.tsv
|
22.4 KB
|
|
Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask).eng.txt
|
24.8 KB
|
|
Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask).eng.vtt
|
24.8 KB
|
|
Fast Isomorphic State Channels.eng.json
|
929.7 KB
|
|
Fast Isomorphic State Channels.eng.lrc
|
22.5 KB
|
|
Fast Isomorphic State Channels.eng.srt
|
24.1 KB
|
|
Fast Isomorphic State Channels.eng.text
|
18.7 KB
|
|
Fast Isomorphic State Channels.eng.tsv
|
20.9 KB
|
|
Fast Isomorphic State Channels.eng.txt
|
22.6 KB
|
|
Fast Isomorphic State Channels.eng.vtt
|
22.7 KB
|
|
Faster Homomorphic Encryption over GPGPUs via hierarchical DGT.eng.json
|
948.3 KB
|
|
Faster Homomorphic Encryption over GPGPUs via hierarchical DGT.eng.lrc
|
24.1 KB
|
|
Faster Homomorphic Encryption over GPGPUs via hierarchical DGT.eng.srt
|
26.3 KB
|
|
Faster Homomorphic Encryption over GPGPUs via hierarchical DGT.eng.text
|
19.2 KB
|
|
Faster Homomorphic Encryption over GPGPUs via hierarchical DGT.eng.tsv
|
22.0 KB
|
|
Faster Homomorphic Encryption over GPGPUs via hierarchical DGT.eng.txt
|
24.3 KB
|
|
Faster Homomorphic Encryption over GPGPUs via hierarchical DGT.eng.vtt
|
24.3 KB
|
|
Fine-Grained Forward Secrecy Allow-List Deny-List Encryption and Applications.eng.json
|
918.8 KB
|
|
Fine-Grained Forward Secrecy Allow-List Deny-List Encryption and Applications.eng.lrc
|
23.5 KB
|
|
Fine-Grained Forward Secrecy Allow-List Deny-List Encryption and Applications.eng.srt
|
25.3 KB
|
|
Fine-Grained Forward Secrecy Allow-List Deny-List Encryption and Applications.eng.text
|
19.3 KB
|
|
Fine-Grained Forward Secrecy Allow-List Deny-List Encryption and Applications.eng.tsv
|
21.6 KB
|
|
Fine-Grained Forward Secrecy Allow-List Deny-List Encryption and Applications.eng.txt
|
23.6 KB
|
|
Fine-Grained Forward Secrecy Allow-List Deny-List Encryption and Applications.eng.vtt
|
23.6 KB
|
|
FPPW A Fair and Privacy Preserving Watchtower for Bitcoin.eng.json
|
848.5 KB
|
|
FPPW A Fair and Privacy Preserving Watchtower for Bitcoin.eng.lrc
|
21.2 KB
|
|
FPPW A Fair and Privacy Preserving Watchtower for Bitcoin.eng.srt
|
22.7 KB
|
|
FPPW A Fair and Privacy Preserving Watchtower for Bitcoin.eng.text
|
17.6 KB
|
|
FPPW A Fair and Privacy Preserving Watchtower for Bitcoin.eng.tsv
|
19.6 KB
|
|
FPPW A Fair and Privacy Preserving Watchtower for Bitcoin.eng.txt
|
21.3 KB
|
|
FPPW A Fair and Privacy Preserving Watchtower for Bitcoin.eng.vtt
|
21.3 KB
|
|
Fraud and Data Availability Proofs Detecting Invalid Blocks in Light Clients.eng.json
|
1.1 MB
|
|
Fraud and Data Availability Proofs Detecting Invalid Blocks in Light Clients.eng.lrc
|
26.3 KB
|
|
Fraud and Data Availability Proofs Detecting Invalid Blocks in Light Clients.eng.srt
|
28.0 KB
|
|
Fraud and Data Availability Proofs Detecting Invalid Blocks in Light Clients.eng.text
|
22.4 KB
|
|
Fraud and Data Availability Proofs Detecting Invalid Blocks in Light Clients.eng.tsv
|
24.6 KB
|
|
Fraud and Data Availability Proofs Detecting Invalid Blocks in Light Clients.eng.txt
|
26.4 KB
|
|
Fraud and Data Availability Proofs Detecting Invalid Blocks in Light Clients.eng.vtt
|
26.5 KB
|
|
Generic Plaintext Equality and Inequality Proofs.eng.json
|
532.2 KB
|
|
Generic Plaintext Equality and Inequality Proofs.eng.lrc
|
13.6 KB
|
|
Generic Plaintext Equality and Inequality Proofs.eng.srt
|
14.8 KB
|
|
Generic Plaintext Equality and Inequality Proofs.eng.text
|
11.0 KB
|
|
Generic Plaintext Equality and Inequality Proofs.eng.tsv
|
12.4 KB
|
|
Generic Plaintext Equality and Inequality Proofs.eng.txt
|
13.7 KB
|
|
Generic Plaintext Equality and Inequality Proofs.eng.vtt
|
13.7 KB
|
|
HaPPY-mine Designing a Mining Reward Function.eng.json
|
938.5 KB
|
|
HaPPY-mine Designing a Mining Reward Function.eng.lrc
|
21.9 KB
|
|
HaPPY-mine Designing a Mining Reward Function.eng.srt
|
23.6 KB
|
|
HaPPY-mine Designing a Mining Reward Function.eng.text
|
18.0 KB
|
|
HaPPY-mine Designing a Mining Reward Function.eng.tsv
|
20.1 KB
|
|
HaPPY-mine Designing a Mining Reward Function.eng.txt
|
22.0 KB
|
|
HaPPY-mine Designing a Mining Reward Function.eng.vtt
|
22.0 KB
|
|
High-Threshold AVSS with Optimal Communication Complexity.eng.json
|
1.1 MB
|
|
High-Threshold AVSS with Optimal Communication Complexity.eng.lrc
|
27.3 KB
|
|
High-Threshold AVSS with Optimal Communication Complexity.eng.srt
|
29.8 KB
|
|
High-Threshold AVSS with Optimal Communication Complexity.eng.text
|
21.7 KB
|
|
High-Threshold AVSS with Optimal Communication Complexity.eng.tsv
|
24.8 KB
|
|
High-Threshold AVSS with Optimal Communication Complexity.eng.txt
|
27.5 KB
|
|
High-Threshold AVSS with Optimal Communication Complexity.eng.vtt
|
27.5 KB
|
|
Ignore the Extra Zeroes Variance-Optimal Mining Pools.eng.json
|
777.0 KB
|
|
Ignore the Extra Zeroes Variance-Optimal Mining Pools.eng.lrc
|
17.9 KB
|
|
Ignore the Extra Zeroes Variance-Optimal Mining Pools.eng.srt
|
19.4 KB
|
|
Ignore the Extra Zeroes Variance-Optimal Mining Pools.eng.text
|
14.4 KB
|
|
Ignore the Extra Zeroes Variance-Optimal Mining Pools.eng.tsv
|
16.4 KB
|
|
Ignore the Extra Zeroes Variance-Optimal Mining Pools.eng.txt
|
18.0 KB
|
|
Ignore the Extra Zeroes Variance-Optimal Mining Pools.eng.vtt
|
18.0 KB
|
|
Improving the Efficiency of AES Protocols in Multi-Party Computation.eng.json
|
1.0 MB
|
|
Improving the Efficiency of AES Protocols in Multi-Party Computation.eng.lrc
|
24.9 KB
|
|
Improving the Efficiency of AES Protocols in Multi-Party Computation.eng.srt
|
26.9 KB
|
|
Improving the Efficiency of AES Protocols in Multi-Party Computation.eng.text
|
20.3 KB
|
|
Improving the Efficiency of AES Protocols in Multi-Party Computation.eng.tsv
|
22.9 KB
|
|
Improving the Efficiency of AES Protocols in Multi-Party Computation.eng.txt
|
25.1 KB
|
|
Improving the Efficiency of AES Protocols in Multi-Party Computation.eng.vtt
|
25.1 KB
|
|
Instant Block Confirmation in the Sleepy Model.eng.json
|
1.0 MB
|
|
Instant Block Confirmation in the Sleepy Model.eng.lrc
|
25.0 KB
|
|
Instant Block Confirmation in the Sleepy Model.eng.srt
|
27.2 KB
|
|
Instant Block Confirmation in the Sleepy Model.eng.text
|
20.0 KB
|
|
Instant Block Confirmation in the Sleepy Model.eng.tsv
|
22.8 KB
|
|
Instant Block Confirmation in the Sleepy Model.eng.txt
|
25.2 KB
|
|
Instant Block Confirmation in the Sleepy Model.eng.vtt
|
25.2 KB
|
|
Liquidations DeFi on a Knife-Edge.eng.json
|
898.7 KB
|
|
Liquidations DeFi on a Knife-Edge.eng.lrc
|
21.3 KB
|
|
Liquidations DeFi on a Knife-Edge.eng.srt
|
22.9 KB
|
|
Liquidations DeFi on a Knife-Edge.eng.text
|
17.6 KB
|
|
Liquidations DeFi on a Knife-Edge.eng.tsv
|
19.7 KB
|
|
Liquidations DeFi on a Knife-Edge.eng.txt
|
21.5 KB
|
|
Liquidations DeFi on a Knife-Edge.eng.vtt
|
21.5 KB
|
|
Lost in Transmission Investigating Filtering of COVID-19 Websites.eng.json
|
899.9 KB
|
|
Lost in Transmission Investigating Filtering of COVID-19 Websites.eng.lrc
|
20.4 KB
|
|
Lost in Transmission Investigating Filtering of COVID-19 Websites.eng.srt
|
22.0 KB
|
|
Lost in Transmission Investigating Filtering of COVID-19 Websites.eng.text
|
16.8 KB
|
|
Lost in Transmission Investigating Filtering of COVID-19 Websites.eng.tsv
|
18.7 KB
|
|
Lost in Transmission Investigating Filtering of COVID-19 Websites.eng.txt
|
20.6 KB
|
|
Lost in Transmission Investigating Filtering of COVID-19 Websites.eng.vtt
|
20.6 KB
|
|
Mining for Privacy How to Bootstrap a Snarky Blockchain.eng.json
|
1.1 MB
|
|
Mining for Privacy How to Bootstrap a Snarky Blockchain.eng.lrc
|
26.1 KB
|
|
Mining for Privacy How to Bootstrap a Snarky Blockchain.eng.srt
|
28.2 KB
|
|
Mining for Privacy How to Bootstrap a Snarky Blockchain.eng.text
|
21.2 KB
|
|
Mining for Privacy How to Bootstrap a Snarky Blockchain.eng.tsv
|
24.0 KB
|
|
Mining for Privacy How to Bootstrap a Snarky Blockchain.eng.txt
|
26.2 KB
|
|
Mining for Privacy How to Bootstrap a Snarky Blockchain.eng.vtt
|
26.2 KB
|
|
Multi-Instance Publicly Verifiable Time-Lock Puzzle and Its Applications.eng.json
|
546.7 KB
|
|
Multi-Instance Publicly Verifiable Time-Lock Puzzle and Its Applications.eng.lrc
|
14.2 KB
|
|
Multi-Instance Publicly Verifiable Time-Lock Puzzle and Its Applications.eng.srt
|
15.5 KB
|
|
Multi-Instance Publicly Verifiable Time-Lock Puzzle and Its Applications.eng.text
|
11.2 KB
|
|
Multi-Instance Publicly Verifiable Time-Lock Puzzle and Its Applications.eng.tsv
|
12.8 KB
|
|
Multi-Instance Publicly Verifiable Time-Lock Puzzle and Its Applications.eng.txt
|
14.3 KB
|
|
Multi-Instance Publicly Verifiable Time-Lock Puzzle and Its Applications.eng.vtt
|
14.3 KB
|
|
Payment Trees Low Collateral Payments for Payment Channel Networks.eng.json
|
968.7 KB
|
|
Payment Trees Low Collateral Payments for Payment Channel Networks.eng.lrc
|
24.0 KB
|
|
Payment Trees Low Collateral Payments for Payment Channel Networks.eng.srt
|
26.0 KB
|
|
Payment Trees Low Collateral Payments for Payment Channel Networks.eng.text
|
19.3 KB
|
|
Payment Trees Low Collateral Payments for Payment Channel Networks.eng.tsv
|
21.9 KB
|
|
Payment Trees Low Collateral Payments for Payment Channel Networks.eng.txt
|
24.1 KB
|
|
Payment Trees Low Collateral Payments for Payment Channel Networks.eng.vtt
|
24.1 KB
|
|
PERIMETER A Network-Layer Attack on the Anonymity of Cryptocurrencies.eng.json
|
901.6 KB
|
|
PERIMETER A Network-Layer Attack on the Anonymity of Cryptocurrencies.eng.lrc
|
18.6 KB
|
|
PERIMETER A Network-Layer Attack on the Anonymity of Cryptocurrencies.eng.srt
|
20.2 KB
|
|
PERIMETER A Network-Layer Attack on the Anonymity of Cryptocurrencies.eng.text
|
14.9 KB
|
|
PERIMETER A Network-Layer Attack on the Anonymity of Cryptocurrencies.eng.tsv
|
16.9 KB
|
|
PERIMETER A Network-Layer Attack on the Anonymity of Cryptocurrencies.eng.txt
|
18.8 KB
|
|
PERIMETER A Network-Layer Attack on the Anonymity of Cryptocurrencies.eng.vtt
|
18.8 KB
|
|
PoSAT Proof-of-Work Dynamic Availability and Unpredictability, without the Work.eng.json
|
694.0 KB
|
|
PoSAT Proof-of-Work Dynamic Availability and Unpredictability, without the Work.eng.lrc
|
17.9 KB
|
|
PoSAT Proof-of-Work Dynamic Availability and Unpredictability, without the Work.eng.srt
|
19.4 KB
|
|
PoSAT Proof-of-Work Dynamic Availability and Unpredictability, without the Work.eng.text
|
14.6 KB
|
|
PoSAT Proof-of-Work Dynamic Availability and Unpredictability, without the Work.eng.tsv
|
16.5 KB
|
|
PoSAT Proof-of-Work Dynamic Availability and Unpredictability, without the Work.eng.txt
|
18.1 KB
|
|
PoSAT Proof-of-Work Dynamic Availability and Unpredictability, without the Work.eng.vtt
|
18.1 KB
|
|
Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments.eng.json
|
965.5 KB
|
|
Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments.eng.lrc
|
24.0 KB
|
|
Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments.eng.srt
|
25.7 KB
|
|
Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments.eng.text
|
20.0 KB
|
|
Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments.eng.tsv
|
22.1 KB
|
|
Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments.eng.txt
|
24.1 KB
|
|
Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments.eng.vtt
|
24.1 KB
|
|
Practical Post-Quantum Few-Time Verifiable Random Function with Applications to Algorand.eng.json
|
1.3 MB
|
|
Practical Post-Quantum Few-Time Verifiable Random Function with Applications to Algorand.eng.lrc
|
29.9 KB
|
|
Practical Post-Quantum Few-Time Verifiable Random Function with Applications to Algorand.eng.srt
|
31.9 KB
|
|
Practical Post-Quantum Few-Time Verifiable Random Function with Applications to Algorand.eng.text
|
25.3 KB
|
|
Practical Post-Quantum Few-Time Verifiable Random Function with Applications to Algorand.eng.tsv
|
28.0 KB
|
|
Practical Post-Quantum Few-Time Verifiable Random Function with Applications to Algorand.eng.txt
|
30.1 KB
|
|
Practical Post-Quantum Few-Time Verifiable Random Function with Applications to Algorand.eng.vtt
|
30.1 KB
|
|
Practical Witness-Key-Agreement for Blockchain-Based Dark Pools Financial Trading.eng.json
|
755.5 KB
|
|
Practical Witness-Key-Agreement for Blockchain-Based Dark Pools Financial Trading.eng.lrc
|
19.0 KB
|
|
Practical Witness-Key-Agreement for Blockchain-Based Dark Pools Financial Trading.eng.srt
|
20.4 KB
|
|
Practical Witness-Key-Agreement for Blockchain-Based Dark Pools Financial Trading.eng.text
|
15.7 KB
|
|
Practical Witness-Key-Agreement for Blockchain-Based Dark Pools Financial Trading.eng.tsv
|
17.5 KB
|
|
Practical Witness-Key-Agreement for Blockchain-Based Dark Pools Financial Trading.eng.txt
|
19.1 KB
|
|
Practical Witness-Key-Agreement for Blockchain-Based Dark Pools Financial Trading.eng.vtt
|
19.1 KB
|
|
Rabbit Efficient Comparison for Secure Multi-Party Computation.eng.json
|
1.1 MB
|
|
Rabbit Efficient Comparison for Secure Multi-Party Computation.eng.lrc
|
28.5 KB
|
|
Rabbit Efficient Comparison for Secure Multi-Party Computation.eng.srt
|
31.2 KB
|
|
Rabbit Efficient Comparison for Secure Multi-Party Computation.eng.text
|
22.5 KB
|
|
Rabbit Efficient Comparison for Secure Multi-Party Computation.eng.tsv
|
26.0 KB
|
|
Rabbit Efficient Comparison for Secure Multi-Party Computation.eng.txt
|
28.7 KB
|
|
Rabbit Efficient Comparison for Secure Multi-Party Computation.eng.vtt
|
28.7 KB
|
|
Reparo Publicly Verifiable Layer to Repair Blockchains.eng.json
|
858.9 KB
|
|
Reparo Publicly Verifiable Layer to Repair Blockchains.eng.lrc
|
22.7 KB
|
|
Reparo Publicly Verifiable Layer to Repair Blockchains.eng.srt
|
25.0 KB
|
|
Reparo Publicly Verifiable Layer to Repair Blockchains.eng.text
|
17.6 KB
|
|
Reparo Publicly Verifiable Layer to Repair Blockchains.eng.tsv
|
20.4 KB
|
|
Reparo Publicly Verifiable Layer to Repair Blockchains.eng.txt
|
22.9 KB
|
|
Reparo Publicly Verifiable Layer to Repair Blockchains.eng.vtt
|
22.9 KB
|
|
Shielded Computations in Smart Contracts Overcoming Forks.eng.json
|
720.9 KB
|
|
Shielded Computations in Smart Contracts Overcoming Forks.eng.lrc
|
18.3 KB
|
|
Shielded Computations in Smart Contracts Overcoming Forks.eng.srt
|
19.9 KB
|
|
Shielded Computations in Smart Contracts Overcoming Forks.eng.text
|
14.6 KB
|
|
Shielded Computations in Smart Contracts Overcoming Forks.eng.tsv
|
16.6 KB
|
|
Shielded Computations in Smart Contracts Overcoming Forks.eng.txt
|
18.4 KB
|
|
Shielded Computations in Smart Contracts Overcoming Forks.eng.vtt
|
18.4 KB
|
|
Short Paper Debt representation in UTXO blockchains.eng.json
|
615.5 KB
|
|
Short Paper Debt representation in UTXO blockchains.eng.lrc
|
16.3 KB
|
|
Short Paper Debt representation in UTXO blockchains.eng.srt
|
17.7 KB
|
|
Short Paper Debt representation in UTXO blockchains.eng.text
|
13.1 KB
|
|
Short Paper Debt representation in UTXO blockchains.eng.tsv
|
14.8 KB
|
|
Short Paper Debt representation in UTXO blockchains.eng.txt
|
16.5 KB
|
|
Short Paper Debt representation in UTXO blockchains.eng.vtt
|
16.5 KB
|
|
Short Paper Selfish Mining Attacks Exacerbated by Elastic Hash Supply.eng.json
|
597.5 KB
|
|
Short Paper Selfish Mining Attacks Exacerbated by Elastic Hash Supply.eng.lrc
|
15.4 KB
|
|
Short Paper Selfish Mining Attacks Exacerbated by Elastic Hash Supply.eng.srt
|
16.7 KB
|
|
Short Paper Selfish Mining Attacks Exacerbated by Elastic Hash Supply.eng.text
|
12.4 KB
|
|
Short Paper Selfish Mining Attacks Exacerbated by Elastic Hash Supply.eng.tsv
|
14.0 KB
|
|
Short Paper Selfish Mining Attacks Exacerbated by Elastic Hash Supply.eng.txt
|
15.5 KB
|
|
Short Paper Selfish Mining Attacks Exacerbated by Elastic Hash Supply.eng.vtt
|
15.5 KB
|
|
Short Paper Terrorist Fraud in Distance Bounding Getting Around the Models.eng.json
|
862.9 KB
|
|
Short Paper Terrorist Fraud in Distance Bounding Getting Around the Models.eng.lrc
|
20.7 KB
|
|
Short Paper Terrorist Fraud in Distance Bounding Getting Around the Models.eng.srt
|
22.4 KB
|
|
Short Paper Terrorist Fraud in Distance Bounding Getting Around the Models.eng.text
|
16.6 KB
|
|
Short Paper Terrorist Fraud in Distance Bounding Getting Around the Models.eng.tsv
|
18.8 KB
|
|
Short Paper Terrorist Fraud in Distance Bounding Getting Around the Models.eng.txt
|
20.8 KB
|
|
Short Paper Terrorist Fraud in Distance Bounding Getting Around the Models.eng.vtt
|
20.8 KB
|
|
Sigforgery Breaking and Fixing Data Authenticity in Sigfox.eng.json
|
796.7 KB
|
|
Sigforgery Breaking and Fixing Data Authenticity in Sigfox.eng.lrc
|
20.0 KB
|
|
Sigforgery Breaking and Fixing Data Authenticity in Sigfox.eng.srt
|
21.7 KB
|
|
Sigforgery Breaking and Fixing Data Authenticity in Sigfox.eng.text
|
16.0 KB
|
|
Sigforgery Breaking and Fixing Data Authenticity in Sigfox.eng.tsv
|
18.2 KB
|
|
Sigforgery Breaking and Fixing Data Authenticity in Sigfox.eng.txt
|
20.1 KB
|
|
Sigforgery Breaking and Fixing Data Authenticity in Sigfox.eng.vtt
|
20.2 KB
|
|
SoK Communication Across Distributed Ledgers.eng.json
|
1.3 MB
|
|
SoK Communication Across Distributed Ledgers.eng.lrc
|
32.3 KB
|
|
SoK Communication Across Distributed Ledgers.eng.srt
|
34.6 KB
|
|
SoK Communication Across Distributed Ledgers.eng.text
|
27.2 KB
|
|
SoK Communication Across Distributed Ledgers.eng.tsv
|
30.1 KB
|
|
SoK Communication Across Distributed Ledgers.eng.txt
|
32.5 KB
|
|
SoK Communication Across Distributed Ledgers.eng.vtt
|
32.5 KB
|
|
SoK Securing Email-A Stakeholder-Based Analysis.eng.json
|
1.4 MB
|
|
SoK Securing Email-A Stakeholder-Based Analysis.eng.lrc
|
35.3 KB
|
|
SoK Securing Email-A Stakeholder-Based Analysis.eng.srt
|
38.6 KB
|
|
SoK Securing Email-A Stakeholder-Based Analysis.eng.text
|
28.0 KB
|
|
SoK Securing Email-A Stakeholder-Based Analysis.eng.tsv
|
32.1 KB
|
|
SoK Securing Email-A Stakeholder-Based Analysis.eng.txt
|
35.6 KB
|
|
SoK Securing Email-A Stakeholder-Based Analysis.eng.vtt
|
35.6 KB
|
|
Somewhere Statistically Binding Commitment Schemes with Applications.eng.json
|
608.6 KB
|
|
Somewhere Statistically Binding Commitment Schemes with Applications.eng.lrc
|
16.5 KB
|
|
Somewhere Statistically Binding Commitment Schemes with Applications.eng.srt
|
17.8 KB
|
|
Somewhere Statistically Binding Commitment Schemes with Applications.eng.text
|
13.5 KB
|
|
Somewhere Statistically Binding Commitment Schemes with Applications.eng.tsv
|
15.1 KB
|
|
Somewhere Statistically Binding Commitment Schemes with Applications.eng.txt
|
16.6 KB
|
|
Somewhere Statistically Binding Commitment Schemes with Applications.eng.vtt
|
16.6 KB
|
|
Specfuscator Evaluating Branch Removal as a Spectre Mitigation.eng.json
|
793.3 KB
|
|
Specfuscator Evaluating Branch Removal as a Spectre Mitigation.eng.lrc
|
19.6 KB
|
|
Specfuscator Evaluating Branch Removal as a Spectre Mitigation.eng.srt
|
21.4 KB
|
|
Specfuscator Evaluating Branch Removal as a Spectre Mitigation.eng.text
|
15.3 KB
|
|
Specfuscator Evaluating Branch Removal as a Spectre Mitigation.eng.tsv
|
17.7 KB
|
|
Specfuscator Evaluating Branch Removal as a Spectre Mitigation.eng.txt
|
19.7 KB
|
|
Specfuscator Evaluating Branch Removal as a Spectre Mitigation.eng.vtt
|
19.7 KB
|
|
Speculative Dereferencing of Registers Reviving Foreshadow.eng.json
|
832.0 KB
|
|
Speculative Dereferencing of Registers Reviving Foreshadow.eng.lrc
|
20.5 KB
|
|
Speculative Dereferencing of Registers Reviving Foreshadow.eng.srt
|
22.3 KB
|
|
Speculative Dereferencing of Registers Reviving Foreshadow.eng.text
|
16.3 KB
|
|
Speculative Dereferencing of Registers Reviving Foreshadow.eng.tsv
|
18.6 KB
|
|
Speculative Dereferencing of Registers Reviving Foreshadow.eng.txt
|
20.7 KB
|
|
Speculative Dereferencing of Registers Reviving Foreshadow.eng.vtt
|
20.7 KB
|
|
The Complex Shape of Anonymity in Cryptocurrencies Case Studies from a Systematic Approa.eng.json
|
807.8 KB
|
|
The Complex Shape of Anonymity in Cryptocurrencies Case Studies from a Systematic Approa.eng.lrc
|
20.7 KB
|
|
The Complex Shape of Anonymity in Cryptocurrencies Case Studies from a Systematic Approa.eng.srt
|
22.7 KB
|
|
The Complex Shape of Anonymity in Cryptocurrencies Case Studies from a Systematic Approa.eng.text
|
16.3 KB
|
|
The Complex Shape of Anonymity in Cryptocurrencies Case Studies from a Systematic Approa.eng.tsv
|
18.8 KB
|
|
The Complex Shape of Anonymity in Cryptocurrencies Case Studies from a Systematic Approa.eng.txt
|
20.9 KB
|
|
The Complex Shape of Anonymity in Cryptocurrencies Case Studies from a Systematic Approa.eng.vtt
|
20.9 KB
|
|
The Eye of Horus Spotting and Analyzing Attacks on Ethereum Smart Contracts.eng.json
|
966.0 KB
|
|
The Eye of Horus Spotting and Analyzing Attacks on Ethereum Smart Contracts.eng.lrc
|
25.3 KB
|
|
The Eye of Horus Spotting and Analyzing Attacks on Ethereum Smart Contracts.eng.srt
|
27.4 KB
|
|
The Eye of Horus Spotting and Analyzing Attacks on Ethereum Smart Contracts.eng.text
|
20.5 KB
|
|
The Eye of Horus Spotting and Analyzing Attacks on Ethereum Smart Contracts.eng.tsv
|
23.1 KB
|
|
The Eye of Horus Spotting and Analyzing Attacks on Ethereum Smart Contracts.eng.txt
|
25.5 KB
|
|
The Eye of Horus Spotting and Analyzing Attacks on Ethereum Smart Contracts.eng.vtt
|
25.5 KB
|
|
Timelocked Bribing.eng.json
|
956.3 KB
|
|
Timelocked Bribing.eng.lrc
|
22.4 KB
|
|
Timelocked Bribing.eng.srt
|
24.2 KB
|
|
Timelocked Bribing.eng.text
|
18.3 KB
|
|
Timelocked Bribing.eng.tsv
|
20.6 KB
|
|
Timelocked Bribing.eng.txt
|
22.6 KB
|
|
Timelocked Bribing.eng.vtt
|
22.6 KB
|
|
Under the Hood of the Ethereum Gossip Protocol.eng.json
|
1.0 MB
|
|
Under the Hood of the Ethereum Gossip Protocol.eng.lrc
|
24.6 KB
|
|
Under the Hood of the Ethereum Gossip Protocol.eng.srt
|
26.6 KB
|
|
Under the Hood of the Ethereum Gossip Protocol.eng.text
|
20.1 KB
|
|
Under the Hood of the Ethereum Gossip Protocol.eng.tsv
|
22.7 KB
|
|
Under the Hood of the Ethereum Gossip Protocol.eng.txt
|
24.8 KB
|
|
Under the Hood of the Ethereum Gossip Protocol.eng.vtt
|
24.8 KB
|
|
What's in Score for Website Users A Data-Driven Long-Term Study on Risk-Based Authentica.eng.json
|
1.1 MB
|
|
What's in Score for Website Users A Data-Driven Long-Term Study on Risk-Based Authentica.eng.lrc
|
29.3 KB
|
|
What's in Score for Website Users A Data-Driven Long-Term Study on Risk-Based Authentica.eng.srt
|
32.4 KB
|
|
What's in Score for Website Users A Data-Driven Long-Term Study on Risk-Based Authentica.eng.text
|
22.3 KB
|
|
What's in Score for Website Users A Data-Driven Long-Term Study on Risk-Based Authentica.eng.tsv
|
26.2 KB
|
|
What's in Score for Website Users A Data-Driven Long-Term Study on Risk-Based Authentica.eng.txt
|
29.5 KB
|
|
What's in Score for Website Users A Data-Driven Long-Term Study on Risk-Based Authentica.eng.vtt
|
29.5 KB
|
|
WTSC 2021 - Absentia secure function evaluation on Ethereum.eng.json
|
752.2 KB
|
|
WTSC 2021 - Absentia secure function evaluation on Ethereum.eng.lrc
|
19.6 KB
|
|
WTSC 2021 - Absentia secure function evaluation on Ethereum.eng.srt
|
21.5 KB
|
|
WTSC 2021 - Absentia secure function evaluation on Ethereum.eng.text
|
15.2 KB
|
|
WTSC 2021 - Absentia secure function evaluation on Ethereum.eng.tsv
|
17.6 KB
|
|
WTSC 2021 - Absentia secure function evaluation on Ethereum.eng.txt
|
19.8 KB
|
|
WTSC 2021 - Absentia secure function evaluation on Ethereum.eng.vtt
|
19.8 KB
|
|
WTSC 2021 - Coins Covid Keynes and K-Shaped Recovery.eng.json
|
1.2 MB
|
|
WTSC 2021 - Coins Covid Keynes and K-Shaped Recovery.eng.lrc
|
28.0 KB
|
|
WTSC 2021 - Coins Covid Keynes and K-Shaped Recovery.eng.srt
|
30.0 KB
|
|
WTSC 2021 - Coins Covid Keynes and K-Shaped Recovery.eng.text
|
23.5 KB
|
|
WTSC 2021 - Coins Covid Keynes and K-Shaped Recovery.eng.tsv
|
26.1 KB
|
|
WTSC 2021 - Coins Covid Keynes and K-Shaped Recovery.eng.txt
|
28.2 KB
|
|
WTSC 2021 - Coins Covid Keynes and K-Shaped Recovery.eng.vtt
|
28.2 KB
|
|
WTSC 2021 - Empirical Analysis of On-chain Voting with Smart Contracts.eng.json
|
456.5 KB
|
|
WTSC 2021 - Empirical Analysis of On-chain Voting with Smart Contracts.eng.lrc
|
12.3 KB
|
|
WTSC 2021 - Empirical Analysis of On-chain Voting with Smart Contracts.eng.srt
|
13.4 KB
|
|
WTSC 2021 - Empirical Analysis of On-chain Voting with Smart Contracts.eng.text
|
9.6 KB
|
|
WTSC 2021 - Empirical Analysis of On-chain Voting with Smart Contracts.eng.tsv
|
11.0 KB
|
|
WTSC 2021 - Empirical Analysis of On-chain Voting with Smart Contracts.eng.txt
|
12.4 KB
|
|
WTSC 2021 - Empirical Analysis of On-chain Voting with Smart Contracts.eng.vtt
|
12.4 KB
|
|
WTSC 2021 - EthVer Formal verification of randomized Ethereum smart contracts.eng.json
|
719.3 KB
|
|
WTSC 2021 - EthVer Formal verification of randomized Ethereum smart contracts.eng.lrc
|
18.0 KB
|
|
WTSC 2021 - EthVer Formal verification of randomized Ethereum smart contracts.eng.srt
|
19.6 KB
|
|
WTSC 2021 - EthVer Formal verification of randomized Ethereum smart contracts.eng.text
|
14.2 KB
|
|
WTSC 2021 - EthVer Formal verification of randomized Ethereum smart contracts.eng.tsv
|
16.3 KB
|
|
WTSC 2021 - EthVer Formal verification of randomized Ethereum smart contracts.eng.txt
|
18.1 KB
|
|
WTSC 2021 - EthVer Formal verification of randomized Ethereum smart contracts.eng.vtt
|
18.1 KB
|
|
WTSC 2021 - Fairness in ERC token markets A Case Study of CryptoKitties.eng.json
|
746.2 KB
|
|
WTSC 2021 - Fairness in ERC token markets A Case Study of CryptoKitties.eng.lrc
|
22.0 KB
|
|
WTSC 2021 - Fairness in ERC token markets A Case Study of CryptoKitties.eng.srt
|
24.5 KB
|
|
WTSC 2021 - Fairness in ERC token markets A Case Study of CryptoKitties.eng.text
|
16.1 KB
|
|
WTSC 2021 - Fairness in ERC token markets A Case Study of CryptoKitties.eng.tsv
|
19.4 KB
|
|
WTSC 2021 - Fairness in ERC token markets A Case Study of CryptoKitties.eng.txt
|
22.2 KB
|
|
WTSC 2021 - Fairness in ERC token markets A Case Study of CryptoKitties.eng.vtt
|
22.2 KB
|
|
WTSC 2021 - Merkle Trees Optimized for Stateless Clients inBitcoin.eng.json
|
735.0 KB
|
|
WTSC 2021 - Merkle Trees Optimized for Stateless Clients inBitcoin.eng.lrc
|
18.1 KB
|
|
WTSC 2021 - Merkle Trees Optimized for Stateless Clients inBitcoin.eng.srt
|
19.5 KB
|
|
WTSC 2021 - Merkle Trees Optimized for Stateless Clients inBitcoin.eng.text
|
14.7 KB
|
|
WTSC 2021 - Merkle Trees Optimized for Stateless Clients inBitcoin.eng.tsv
|
16.5 KB
|
|
WTSC 2021 - Merkle Trees Optimized for Stateless Clients inBitcoin.eng.txt
|
18.2 KB
|
|
WTSC 2021 - Merkle Trees Optimized for Stateless Clients inBitcoin.eng.vtt
|
18.2 KB
|
|
WTSC 2021 - Mirroring Public Key Infrastructures to Blockchains for On-chain Authentication.eng.json
|
1.0 MB
|
|
WTSC 2021 - Mirroring Public Key Infrastructures to Blockchains for On-chain Authentication.eng.lrc
|
26.5 KB
|
|
WTSC 2021 - Mirroring Public Key Infrastructures to Blockchains for On-chain Authentication.eng.srt
|
28.7 KB
|
|
WTSC 2021 - Mirroring Public Key Infrastructures to Blockchains for On-chain Authentication.eng.text
|
21.4 KB
|
|
WTSC 2021 - Mirroring Public Key Infrastructures to Blockchains for On-chain Authentication.eng.tsv
|
24.3 KB
|
|
WTSC 2021 - Mirroring Public Key Infrastructures to Blockchains for On-chain Authentication.eng.txt
|
26.7 KB
|
|
WTSC 2021 - Mirroring Public Key Infrastructures to Blockchains for On-chain Authentication.eng.vtt
|
26.7 KB
|
|
WTSC 2021 - On-Chain Smart Contract Verification over Tendermint.eng.json
|
749.2 KB
|
|
WTSC 2021 - On-Chain Smart Contract Verification over Tendermint.eng.lrc
|
19.4 KB
|
|
WTSC 2021 - On-Chain Smart Contract Verification over Tendermint.eng.srt
|
20.8 KB
|
|
WTSC 2021 - On-Chain Smart Contract Verification over Tendermint.eng.text
|
16.1 KB
|
|
WTSC 2021 - On-Chain Smart Contract Verification over Tendermint.eng.tsv
|
18.0 KB
|
|
WTSC 2021 - On-Chain Smart Contract Verification over Tendermint.eng.txt
|
19.5 KB
|
|
WTSC 2021 - On-Chain Smart Contract Verification over Tendermint.eng.vtt
|
19.5 KB
|
|
WTSC 2021 - Pay To Win Cheap, Cross-chain Bribing Attacks on PoW Cryptocurrencies.eng.json
|
1.2 MB
|
|
WTSC 2021 - Pay To Win Cheap, Cross-chain Bribing Attacks on PoW Cryptocurrencies.eng.lrc
|
30.0 KB
|
|
WTSC 2021 - Pay To Win Cheap, Cross-chain Bribing Attacks on PoW Cryptocurrencies.eng.srt
|
32.0 KB
|
|
WTSC 2021 - Pay To Win Cheap, Cross-chain Bribing Attacks on PoW Cryptocurrencies.eng.text
|
25.5 KB
|
|
WTSC 2021 - Pay To Win Cheap, Cross-chain Bribing Attacks on PoW Cryptocurrencies.eng.tsv
|
28.1 KB
|
|
WTSC 2021 - Pay To Win Cheap, Cross-chain Bribing Attacks on PoW Cryptocurrencies.eng.txt
|
30.2 KB
|
|
WTSC 2021 - Pay To Win Cheap, Cross-chain Bribing Attacks on PoW Cryptocurrencies.eng.vtt
|
30.2 KB
|
|
WTSC 2021 - Privacy-preserving Resource Sharing using Permissioned Blockchains (the Case of Smart Neighbour.eng.json
|
787.7 KB
|
|
WTSC 2021 - Privacy-preserving Resource Sharing using Permissioned Blockchains (the Case of Smart Neighbour.eng.lrc
|
19.2 KB
|
|
WTSC 2021 - Privacy-preserving Resource Sharing using Permissioned Blockchains (the Case of Smart Neighbour.eng.srt
|
20.7 KB
|
|
WTSC 2021 - Privacy-preserving Resource Sharing using Permissioned Blockchains (the Case of Smart Neighbour.eng.text
|
15.7 KB
|
|
WTSC 2021 - Privacy-preserving Resource Sharing using Permissioned Blockchains (the Case of Smart Neighbour.eng.tsv
|
17.6 KB
|
|
WTSC 2021 - Privacy-preserving Resource Sharing using Permissioned Blockchains (the Case of Smart Neighbour.eng.txt
|
19.4 KB
|
|
WTSC 2021 - Privacy-preserving Resource Sharing using Permissioned Blockchains (the Case of Smart Neighbour.eng.vtt
|
19.4 KB
|
|
WTSC 2021 - Publicly Verifiable and Secrecy Preserving Periodic Auctions.eng.json
|
973.0 KB
|
|
WTSC 2021 - Publicly Verifiable and Secrecy Preserving Periodic Auctions.eng.lrc
|
23.5 KB
|
|
WTSC 2021 - Publicly Verifiable and Secrecy Preserving Periodic Auctions.eng.srt
|
25.3 KB
|
|
WTSC 2021 - Publicly Verifiable and Secrecy Preserving Periodic Auctions.eng.text
|
19.4 KB
|
|
WTSC 2021 - Publicly Verifiable and Secrecy Preserving Periodic Auctions.eng.tsv
|
21.7 KB
|
|
WTSC 2021 - Publicly Verifiable and Secrecy Preserving Periodic Auctions.eng.txt
|
23.7 KB
|
|
WTSC 2021 - Publicly Verifiable and Secrecy Preserving Periodic Auctions.eng.vtt
|
23.7 KB
|
|
WTSC 2021 - Reactive Key-Loss Protection in Blockchains.eng.json
|
1.1 MB
|
|
WTSC 2021 - Reactive Key-Loss Protection in Blockchains.eng.lrc
|
27.5 KB
|
|
WTSC 2021 - Reactive Key-Loss Protection in Blockchains.eng.srt
|
30.1 KB
|
|
WTSC 2021 - Reactive Key-Loss Protection in Blockchains.eng.text
|
21.5 KB
|
|
WTSC 2021 - Reactive Key-Loss Protection in Blockchains.eng.tsv
|
24.8 KB
|
|
WTSC 2021 - Reactive Key-Loss Protection in Blockchains.eng.txt
|
27.7 KB
|
|
WTSC 2021 - Reactive Key-Loss Protection in Blockchains.eng.vtt
|
27.7 KB
|
|
WTSC 2021 - SoK Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies.eng.json
|
1.1 MB
|
|
WTSC 2021 - SoK Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies.eng.lrc
|
27.8 KB
|
|
WTSC 2021 - SoK Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies.eng.srt
|
30.0 KB
|
|
WTSC 2021 - SoK Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies.eng.text
|
22.9 KB
|
|
WTSC 2021 - SoK Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies.eng.tsv
|
25.7 KB
|
|
WTSC 2021 - SoK Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies.eng.txt
|
28.0 KB
|
|
WTSC 2021 - SoK Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies.eng.vtt
|
28.0 KB
|
|
WTSC 2021 - Standardized crypto-loans on the Cardano blockchain.eng.json
|
998.4 KB
|
|
WTSC 2021 - Standardized crypto-loans on the Cardano blockchain.eng.lrc
|
22.4 KB
|
|
WTSC 2021 - Standardized crypto-loans on the Cardano blockchain.eng.srt
|
24.4 KB
|
|
WTSC 2021 - Standardized crypto-loans on the Cardano blockchain.eng.text
|
17.8 KB
|
|
WTSC 2021 - Standardized crypto-loans on the Cardano blockchain.eng.tsv
|
20.3 KB
|
|
WTSC 2021 - Standardized crypto-loans on the Cardano blockchain.eng.txt
|
22.5 KB
|
|
WTSC 2021 - Standardized crypto-loans on the Cardano blockchain.eng.vtt
|
22.6 KB
|
|
WTSC 2021 - Towards a Formal Theory of DeFi.eng.json
|
812.5 KB
|
|
WTSC 2021 - Towards a Formal Theory of DeFi.eng.lrc
|
19.9 KB
|
|
WTSC 2021 - Towards a Formal Theory of DeFi.eng.srt
|
21.6 KB
|
|
WTSC 2021 - Towards a Formal Theory of DeFi.eng.text
|
16.0 KB
|
|
WTSC 2021 - Towards a Formal Theory of DeFi.eng.tsv
|
18.1 KB
|
|
WTSC 2021 - Towards a Formal Theory of DeFi.eng.txt
|
20.0 KB
|
|
WTSC 2021 - Towards a Formal Theory of DeFi.eng.vtt
|
20.0 KB
|
|
Zero-Knowledge Proofs for Set Membership Efficient, Succinct, Modular.eng.json
|
1.2 MB
|
|
Zero-Knowledge Proofs for Set Membership Efficient, Succinct, Modular.eng.lrc
|
27.3 KB
|
|
Zero-Knowledge Proofs for Set Membership Efficient, Succinct, Modular.eng.srt
|
29.2 KB
|
|
Zero-Knowledge Proofs for Set Membership Efficient, Succinct, Modular.eng.text
|
22.8 KB
|
|
Zero-Knowledge Proofs for Set Membership Efficient, Succinct, Modular.eng.tsv
|
25.4 KB
|
|
Zero-Knowledge Proofs for Set Membership Efficient, Succinct, Modular.eng.txt
|
27.4 KB
|
|
Zero-Knowledge Proofs for Set Membership Efficient, Succinct, Modular.eng.vtt
|
27.4 KB
|
|
FC 2022/
|
|
ABSNFT Securitization and Repurchase Scheme for Non-Fungible Tokens Based on Game Theore.mp4
|
13.5 MB
|
|
Achieving Almost All Blockchain Functionalities with Polylogarithmic Storage.mp4
|
12.9 MB
|
|
An empirical study of two Bitcoin artifacts through deep learning.mp4
|
16.8 MB
|
|
Analysis and Probing of Parallel Channels in the Lightning Network.mp4
|
13.5 MB
|
|
Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing.mp4
|
13.1 MB
|
|
Arbitrage attack Miners of the world, unite.mp4
|
10.3 MB
|
|
Be Aware of Your Leaders.mp4
|
10.6 MB
|
|
Decentralization Conscious Players And System Reliability.mp4
|
17.9 MB
|
|
Differential Privacy in Constant Function Market Makers.mp4
|
19.3 MB
|
|
Explainable Arguments.mp4
|
11.2 MB
|
|
Hide & Seek Privacy-Preserving Rebalancing on Payment Channel Networks.mp4
|
19.8 MB
|
|
India’s Aadhaar Biometric ID Structure, Security, and Vulnerabilities.mp4
|
7.1 MB
|
|
Jolteon and Ditto Network-Adaptive Efficient Consensus with Asynchronous Fallback.mp4
|
10.3 MB
|
|
Kicking-the-Bucket Fast Privacy-Preserving Trading Using Buckets.mp4
|
12.2 MB
|
|
Maximizing Extractable Value from Automated Market Makers.mp4
|
11.0 MB
|
|
MPCCache Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge.mp4
|
10.3 MB
|
|
Multi-party Updatable Delegated Private Set Intersection.mp4
|
15.4 MB
|
|
On Interactive Oracle Proofs for Boolean R1CS Statements.mp4
|
9.2 MB
|
|
Permissionless Consensus in the Resource Model.mp4
|
18.1 MB
|
|
Plumo An Ultralight Blockchain Client.mp4
|
11.6 MB
|
|
Quick Order Fairness.mp4
|
12.1 MB
|
|
Resurrecting Address Clustering in Bitcoin.mp4
|
10.2 MB
|
|
Short Paper A Centrality Analysis of the Lightning Network.mp4
|
8.2 MB
|
|
Short Paper On Game-Theoretically-Fair Leader Election.mp4
|
7.2 MB
|
|
Short Paper On the Claims of Weak Block Synchronization in Bitcoin.mp4
|
12.5 MB
|
|
Short Paper What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network.mp4
|
8.3 MB
|
|
Sliding Window Challenge Process for Congestion Detection.mp4
|
11.6 MB
|
|
SnarkPack Practical SNARK Aggregation.mp4
|
13.2 MB
|
|
SoK Blockchain Light Clients.mp4
|
11.6 MB
|
|
Speculative Multipliers on DeFi Quantifying On-Chain Leverage Risks.mp4
|
12.9 MB
|
|
Suborn Channels Incentives Against Timelock Bribes.mp4
|
14.4 MB
|
|
The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets.mp4
|
10.2 MB
|
|
The Effect of False Positives Why Fuzzy Message Detection Leads to Fuzzy Privacy Guarantees.mp4
|
19.8 MB
|
|
Three Attacks on Proof-of-Stake Ethereum.mp4
|
20.6 MB
|
|
Towards Overcoming the Undercutting Problem.mp4
|
18.5 MB
|
|
WTSC 2022 - Dispute-free Scalable Open Vote Network using zk-SNARKs.mp4
|
8.1 MB
|
|
WTSC 2022 - Fides A System for Verifiable Computation Using Smart Contracts.mp4
|
15.5 MB
|
|
WTSC 2022 - Lelantus Spark Secure and Flexible Private Transactions.mp4
|
10.6 MB
|
|
WTSC 2022 - Lissy Experimenting with On-chain Order Books.mp4
|
18.1 MB
|
|
WTSC 2022 - Not All Code are Create2 Equal.mp4
|
25.2 MB
|
|
WTSC 2022 - Not so immutable Upgradeability of Smart Contracts on Ethereum.mp4
|
12.7 MB
|
|
WTSC 2022 - Protocol-based smart contract generation.mp4
|
8.3 MB
|
|
WTSC 2022 - UTS the Universal Token Swapper.mp4
|
7.6 MB
|
|
Zero Knowledge Proofs towards Verifiable Decentralized AI.mp4
|
11.4 MB
|
|
/.../FC 2022 captions/
|
|
ABSNFT Securitization and Repurchase Scheme for Non-Fungible Tokens Based on Game Theore.eng.json
|
562.6 KB
|
|
ABSNFT Securitization and Repurchase Scheme for Non-Fungible Tokens Based on Game Theore.eng.lrc
|
15.0 KB
|
|
ABSNFT Securitization and Repurchase Scheme for Non-Fungible Tokens Based on Game Theore.eng.srt
|
16.7 KB
|
|
ABSNFT Securitization and Repurchase Scheme for Non-Fungible Tokens Based on Game Theore.eng.text
|
11.2 KB
|
|
ABSNFT Securitization and Repurchase Scheme for Non-Fungible Tokens Based on Game Theore.eng.tsv
|
13.3 KB
|
|
ABSNFT Securitization and Repurchase Scheme for Non-Fungible Tokens Based on Game Theore.eng.txt
|
15.2 KB
|
|
ABSNFT Securitization and Repurchase Scheme for Non-Fungible Tokens Based on Game Theore.eng.vtt
|
15.2 KB
|
|
Achieving Almost All Blockchain Functionalities with Polylogarithmic Storage.eng.json
|
754.4 KB
|
|
Achieving Almost All Blockchain Functionalities with Polylogarithmic Storage.eng.lrc
|
19.4 KB
|
|
Achieving Almost All Blockchain Functionalities with Polylogarithmic Storage.eng.srt
|
21.1 KB
|
|
Achieving Almost All Blockchain Functionalities with Polylogarithmic Storage.eng.text
|
15.5 KB
|
|
Achieving Almost All Blockchain Functionalities with Polylogarithmic Storage.eng.tsv
|
17.6 KB
|
|
Achieving Almost All Blockchain Functionalities with Polylogarithmic Storage.eng.txt
|
19.6 KB
|
|
Achieving Almost All Blockchain Functionalities with Polylogarithmic Storage.eng.vtt
|
19.6 KB
|
|
An empirical study of two Bitcoin artifacts through deep learning.eng.json
|
868.3 KB
|
|
An empirical study of two Bitcoin artifacts through deep learning.eng.lrc
|
21.0 KB
|
|
An empirical study of two Bitcoin artifacts through deep learning.eng.srt
|
22.9 KB
|
|
An empirical study of two Bitcoin artifacts through deep learning.eng.text
|
16.6 KB
|
|
An empirical study of two Bitcoin artifacts through deep learning.eng.tsv
|
19.0 KB
|
|
An empirical study of two Bitcoin artifacts through deep learning.eng.txt
|
21.1 KB
|
|
An empirical study of two Bitcoin artifacts through deep learning.eng.vtt
|
21.2 KB
|
|
Analysis and Probing of Parallel Channels in the Lightning Network.eng.json
|
1.2 MB
|
|
Analysis and Probing of Parallel Channels in the Lightning Network.eng.lrc
|
30.6 KB
|
|
Analysis and Probing of Parallel Channels in the Lightning Network.eng.srt
|
33.2 KB
|
|
Analysis and Probing of Parallel Channels in the Lightning Network.eng.text
|
24.7 KB
|
|
Analysis and Probing of Parallel Channels in the Lightning Network.eng.tsv
|
28.0 KB
|
|
Analysis and Probing of Parallel Channels in the Lightning Network.eng.txt
|
30.8 KB
|
|
Analysis and Probing of Parallel Channels in the Lightning Network.eng.vtt
|
30.9 KB
|
|
Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing.eng.json
|
573.1 KB
|
|
Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing.eng.lrc
|
14.4 KB
|
|
Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing.eng.srt
|
15.8 KB
|
|
Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing.eng.text
|
11.1 KB
|
|
Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing.eng.tsv
|
12.9 KB
|
|
Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing.eng.txt
|
14.5 KB
|
|
Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing.eng.vtt
|
14.5 KB
|
|
Arbitrage attack Miners of the world, unite.eng.json
|
844.1 KB
|
|
Arbitrage attack Miners of the world, unite.eng.lrc
|
21.1 KB
|
|
Arbitrage attack Miners of the world, unite.eng.srt
|
22.5 KB
|
|
Arbitrage attack Miners of the world, unite.eng.text
|
17.7 KB
|
|
Arbitrage attack Miners of the world, unite.eng.tsv
|
19.6 KB
|
|
Arbitrage attack Miners of the world, unite.eng.txt
|
21.2 KB
|
|
Arbitrage attack Miners of the world, unite.eng.vtt
|
21.2 KB
|
|
Be Aware of Your Leaders.eng.json
|
594.8 KB
|
|
Be Aware of Your Leaders.eng.lrc
|
15.5 KB
|
|
Be Aware of Your Leaders.eng.srt
|
17.1 KB
|
|
Be Aware of Your Leaders.eng.text
|
11.8 KB
|
|
Be Aware of Your Leaders.eng.tsv
|
13.8 KB
|
|
Be Aware of Your Leaders.eng.txt
|
15.7 KB
|
|
Be Aware of Your Leaders.eng.vtt
|
15.7 KB
|
|
Decentralization Conscious Players And System Reliability.eng.json
|
798.7 KB
|
|
Decentralization Conscious Players And System Reliability.eng.lrc
|
20.2 KB
|
|
Decentralization Conscious Players And System Reliability.eng.srt
|
22.1 KB
|
|
Decentralization Conscious Players And System Reliability.eng.text
|
15.9 KB
|
|
Decentralization Conscious Players And System Reliability.eng.tsv
|
18.3 KB
|
|
Decentralization Conscious Players And System Reliability.eng.txt
|
20.4 KB
|
|
Decentralization Conscious Players And System Reliability.eng.vtt
|
20.4 KB
|
|
Differential Privacy in Constant Function Market Makers.eng.json
|
1.1 MB
|
|
Differential Privacy in Constant Function Market Makers.eng.lrc
|
24.5 KB
|
|
Differential Privacy in Constant Function Market Makers.eng.srt
|
26.4 KB
|
|
Differential Privacy in Constant Function Market Makers.eng.text
|
20.3 KB
|
|
Differential Privacy in Constant Function Market Makers.eng.tsv
|
22.7 KB
|
|
Differential Privacy in Constant Function Market Makers.eng.txt
|
24.7 KB
|
|
Differential Privacy in Constant Function Market Makers.eng.vtt
|
24.7 KB
|
|
Explainable Arguments.eng.json
|
881.4 KB
|
|
Explainable Arguments.eng.lrc
|
22.9 KB
|
|
Explainable Arguments.eng.srt
|
25.0 KB
|
|
Explainable Arguments.eng.text
|
18.1 KB
|
|
Explainable Arguments.eng.tsv
|
20.8 KB
|
|
Explainable Arguments.eng.txt
|
23.1 KB
|
|
Explainable Arguments.eng.vtt
|
23.1 KB
|
|
Hide & Seek Privacy-Preserving Rebalancing on Payment Channel Networks.eng.json
|
1.2 MB
|
|
Hide & Seek Privacy-Preserving Rebalancing on Payment Channel Networks.eng.lrc
|
26.3 KB
|
|
Hide & Seek Privacy-Preserving Rebalancing on Payment Channel Networks.eng.srt
|
28.5 KB
|
|
Hide & Seek Privacy-Preserving Rebalancing on Payment Channel Networks.eng.text
|
21.2 KB
|
|
Hide & Seek Privacy-Preserving Rebalancing on Payment Channel Networks.eng.tsv
|
24.0 KB
|
|
Hide & Seek Privacy-Preserving Rebalancing on Payment Channel Networks.eng.txt
|
26.5 KB
|
|
Hide & Seek Privacy-Preserving Rebalancing on Payment Channel Networks.eng.vtt
|
26.5 KB
|
|
India’s Aadhaar Biometric ID Structure, Security, and Vulnerabilities.eng.json
|
596.3 KB
|
|
India’s Aadhaar Biometric ID Structure, Security, and Vulnerabilities.eng.lrc
|
16.4 KB
|
|
India’s Aadhaar Biometric ID Structure, Security, and Vulnerabilities.eng.srt
|
17.7 KB
|
|
India’s Aadhaar Biometric ID Structure, Security, and Vulnerabilities.eng.text
|
13.1 KB
|
|
India’s Aadhaar Biometric ID Structure, Security, and Vulnerabilities.eng.tsv
|
14.9 KB
|
|
India’s Aadhaar Biometric ID Structure, Security, and Vulnerabilities.eng.txt
|
16.5 KB
|
|
India’s Aadhaar Biometric ID Structure, Security, and Vulnerabilities.eng.vtt
|
16.5 KB
|
|
Jolteon and Ditto Network-Adaptive Efficient Consensus with Asynchronous Fallback.eng.json
|
633.2 KB
|
|
Jolteon and Ditto Network-Adaptive Efficient Consensus with Asynchronous Fallback.eng.lrc
|
15.4 KB
|
|
Jolteon and Ditto Network-Adaptive Efficient Consensus with Asynchronous Fallback.eng.srt
|
16.6 KB
|
|
Jolteon and Ditto Network-Adaptive Efficient Consensus with Asynchronous Fallback.eng.text
|
12.5 KB
|
|
Jolteon and Ditto Network-Adaptive Efficient Consensus with Asynchronous Fallback.eng.tsv
|
14.1 KB
|
|
Jolteon and Ditto Network-Adaptive Efficient Consensus with Asynchronous Fallback.eng.txt
|
15.5 KB
|
|
Jolteon and Ditto Network-Adaptive Efficient Consensus with Asynchronous Fallback.eng.vtt
|
15.5 KB
|
|
Kicking-the-Bucket Fast Privacy-Preserving Trading Using Buckets.eng.json
|
1.2 MB
|
|
Kicking-the-Bucket Fast Privacy-Preserving Trading Using Buckets.eng.lrc
|
26.8 KB
|
|
Kicking-the-Bucket Fast Privacy-Preserving Trading Using Buckets.eng.srt
|
29.0 KB
|
|
Kicking-the-Bucket Fast Privacy-Preserving Trading Using Buckets.eng.text
|
21.8 KB
|
|
Kicking-the-Bucket Fast Privacy-Preserving Trading Using Buckets.eng.tsv
|
24.6 KB
|
|
Kicking-the-Bucket Fast Privacy-Preserving Trading Using Buckets.eng.txt
|
27.0 KB
|
|
Kicking-the-Bucket Fast Privacy-Preserving Trading Using Buckets.eng.vtt
|
27.0 KB
|
|
Maximizing Extractable Value from Automated Market Makers.eng.json
|
812.8 KB
|
|
Maximizing Extractable Value from Automated Market Makers.eng.lrc
|
19.7 KB
|
|
Maximizing Extractable Value from Automated Market Makers.eng.srt
|
21.2 KB
|
|
Maximizing Extractable Value from Automated Market Makers.eng.text
|
16.3 KB
|
|
Maximizing Extractable Value from Automated Market Makers.eng.tsv
|
18.2 KB
|
|
Maximizing Extractable Value from Automated Market Makers.eng.txt
|
19.9 KB
|
|
Maximizing Extractable Value from Automated Market Makers.eng.vtt
|
19.9 KB
|
|
MPCCache Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge.eng.json
|
580.1 KB
|
|
MPCCache Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge.eng.lrc
|
14.4 KB
|
|
MPCCache Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge.eng.srt
|
16.1 KB
|
|
MPCCache Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge.eng.text
|
10.3 KB
|
|
MPCCache Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge.eng.tsv
|
12.5 KB
|
|
MPCCache Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge.eng.txt
|
14.5 KB
|
|
MPCCache Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge.eng.vtt
|
14.5 KB
|
|
Multi-party Updatable Delegated Private Set Intersection.eng.json
|
749.6 KB
|
|
Multi-party Updatable Delegated Private Set Intersection.eng.lrc
|
18.0 KB
|
|
Multi-party Updatable Delegated Private Set Intersection.eng.srt
|
19.7 KB
|
|
Multi-party Updatable Delegated Private Set Intersection.eng.text
|
14.1 KB
|
|
Multi-party Updatable Delegated Private Set Intersection.eng.tsv
|
16.3 KB
|
|
Multi-party Updatable Delegated Private Set Intersection.eng.txt
|
18.1 KB
|
|
Multi-party Updatable Delegated Private Set Intersection.eng.vtt
|
18.1 KB
|
|
On Interactive Oracle Proofs for Boolean R1CS Statements.eng.json
|
961.9 KB
|
|
On Interactive Oracle Proofs for Boolean R1CS Statements.eng.lrc
|
20.2 KB
|
|
On Interactive Oracle Proofs for Boolean R1CS Statements.eng.srt
|
21.4 KB
|
|
On Interactive Oracle Proofs for Boolean R1CS Statements.eng.text
|
17.2 KB
|
|
On Interactive Oracle Proofs for Boolean R1CS Statements.eng.tsv
|
18.8 KB
|
|
On Interactive Oracle Proofs for Boolean R1CS Statements.eng.txt
|
20.3 KB
|
|
On Interactive Oracle Proofs for Boolean R1CS Statements.eng.vtt
|
20.3 KB
|
|
Permissionless Consensus in the Resource Model.eng.json
|
1.2 MB
|
|
Permissionless Consensus in the Resource Model.eng.lrc
|
28.6 KB
|
|
Permissionless Consensus in the Resource Model.eng.srt
|
30.6 KB
|
|
Permissionless Consensus in the Resource Model.eng.text
|
24.0 KB
|
|
Permissionless Consensus in the Resource Model.eng.tsv
|
26.6 KB
|
|
Permissionless Consensus in the Resource Model.eng.txt
|
28.7 KB
|
|
Permissionless Consensus in the Resource Model.eng.vtt
|
28.7 KB
|
|
Plumo An Ultralight Blockchain Client.eng.json
|
970.5 KB
|
|
Plumo An Ultralight Blockchain Client.eng.lrc
|
24.8 KB
|
|
Plumo An Ultralight Blockchain Client.eng.srt
|
27.5 KB
|
|
Plumo An Ultralight Blockchain Client.eng.text
|
18.6 KB
|
|
Plumo An Ultralight Blockchain Client.eng.tsv
|
22.1 KB
|
|
Plumo An Ultralight Blockchain Client.eng.txt
|
25.0 KB
|
|
Plumo An Ultralight Blockchain Client.eng.vtt
|
25.0 KB
|
|
Quick Order Fairness.eng.json
|
755.4 KB
|
|
Quick Order Fairness.eng.lrc
|
19.6 KB
|
|
Quick Order Fairness.eng.srt
|
21.2 KB
|
|
Quick Order Fairness.eng.text
|
15.8 KB
|
|
Quick Order Fairness.eng.tsv
|
17.9 KB
|
|
Quick Order Fairness.eng.txt
|
19.7 KB
|
|
Quick Order Fairness.eng.vtt
|
19.7 KB
|
|
Resurrecting Address Clustering in Bitcoin.eng.json
|
489.0 KB
|
|
Resurrecting Address Clustering in Bitcoin.eng.lrc
|
12.4 KB
|
|
Resurrecting Address Clustering in Bitcoin.eng.srt
|
13.4 KB
|
|
Resurrecting Address Clustering in Bitcoin.eng.text
|
10.3 KB
|
|
Resurrecting Address Clustering in Bitcoin.eng.tsv
|
11.4 KB
|
|
Resurrecting Address Clustering in Bitcoin.eng.txt
|
12.5 KB
|
|
Resurrecting Address Clustering in Bitcoin.eng.vtt
|
12.5 KB
|
|
Short Paper A Centrality Analysis of the Lightning Network.eng.json
|
577.6 KB
|
|
Short Paper A Centrality Analysis of the Lightning Network.eng.lrc
|
14.4 KB
|
|
Short Paper A Centrality Analysis of the Lightning Network.eng.srt
|
15.3 KB
|
|
Short Paper A Centrality Analysis of the Lightning Network.eng.text
|
12.1 KB
|
|
Short Paper A Centrality Analysis of the Lightning Network.eng.tsv
|
13.3 KB
|
|
Short Paper A Centrality Analysis of the Lightning Network.eng.txt
|
14.5 KB
|
|
Short Paper A Centrality Analysis of the Lightning Network.eng.vtt
|
14.5 KB
|
|
Short Paper On Game-Theoretically-Fair Leader Election.eng.json
|
395.8 KB
|
|
Short Paper On Game-Theoretically-Fair Leader Election.eng.lrc
|
10.2 KB
|
|
Short Paper On Game-Theoretically-Fair Leader Election.eng.srt
|
11.1 KB
|
|
Short Paper On Game-Theoretically-Fair Leader Election.eng.text
|
8.0 KB
|
|
Short Paper On Game-Theoretically-Fair Leader Election.eng.tsv
|
9.1 KB
|
|
Short Paper On Game-Theoretically-Fair Leader Election.eng.txt
|
10.2 KB
|
|
Short Paper On Game-Theoretically-Fair Leader Election.eng.vtt
|
10.3 KB
|
|
Short Paper On the Claims of Weak Block Synchronization in Bitcoin.eng.json
|
519.5 KB
|
|
Short Paper On the Claims of Weak Block Synchronization in Bitcoin.eng.lrc
|
13.9 KB
|
|
Short Paper On the Claims of Weak Block Synchronization in Bitcoin.eng.srt
|
15.2 KB
|
|
Short Paper On the Claims of Weak Block Synchronization in Bitcoin.eng.text
|
10.7 KB
|
|
Short Paper On the Claims of Weak Block Synchronization in Bitcoin.eng.tsv
|
12.4 KB
|
|
Short Paper On the Claims of Weak Block Synchronization in Bitcoin.eng.txt
|
14.0 KB
|
|
Short Paper On the Claims of Weak Block Synchronization in Bitcoin.eng.vtt
|
14.0 KB
|
|
Short Paper What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network.eng.json
|
392.4 KB
|
|
Short Paper What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network.eng.lrc
|
9.9 KB
|
|
Short Paper What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network.eng.srt
|
10.8 KB
|
|
Short Paper What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network.eng.text
|
8.0 KB
|
|
Short Paper What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network.eng.tsv
|
9.0 KB
|
|
Short Paper What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network.eng.txt
|
10.0 KB
|
|
Short Paper What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network.eng.vtt
|
10.0 KB
|
|
Sliding Window Challenge Process for Congestion Detection.eng.json
|
886.4 KB
|
|
Sliding Window Challenge Process for Congestion Detection.eng.lrc
|
22.4 KB
|
|
Sliding Window Challenge Process for Congestion Detection.eng.srt
|
24.2 KB
|
|
Sliding Window Challenge Process for Congestion Detection.eng.text
|
18.4 KB
|
|
Sliding Window Challenge Process for Congestion Detection.eng.tsv
|
20.6 KB
|
|
Sliding Window Challenge Process for Congestion Detection.eng.txt
|
22.6 KB
|
|
Sliding Window Challenge Process for Congestion Detection.eng.vtt
|
22.6 KB
|
|
SnarkPack Practical SNARK Aggregation.eng.json
|
784.6 KB
|
|
SnarkPack Practical SNARK Aggregation.eng.lrc
|
18.4 KB
|
|
SnarkPack Practical SNARK Aggregation.eng.srt
|
19.6 KB
|
|
SnarkPack Practical SNARK Aggregation.eng.text
|
15.3 KB
|
|
SnarkPack Practical SNARK Aggregation.eng.tsv
|
17.0 KB
|
|
SnarkPack Practical SNARK Aggregation.eng.txt
|
18.5 KB
|
|
SnarkPack Practical SNARK Aggregation.eng.vtt
|
18.5 KB
|
|
SoK Blockchain Light Clients.eng.json
|
603.9 KB
|
|
SoK Blockchain Light Clients.eng.lrc
|
15.3 KB
|
|
SoK Blockchain Light Clients.eng.srt
|
16.5 KB
|
|
SoK Blockchain Light Clients.eng.text
|
12.4 KB
|
|
SoK Blockchain Light Clients.eng.tsv
|
13.9 KB
|
|
SoK Blockchain Light Clients.eng.txt
|
15.4 KB
|
|
SoK Blockchain Light Clients.eng.vtt
|
15.4 KB
|
|
Speculative Multipliers on DeFi Quantifying On-Chain Leverage Risks.eng.json
|
765.4 KB
|
|
Speculative Multipliers on DeFi Quantifying On-Chain Leverage Risks.eng.lrc
|
19.1 KB
|
|
Speculative Multipliers on DeFi Quantifying On-Chain Leverage Risks.eng.srt
|
21.0 KB
|
|
Speculative Multipliers on DeFi Quantifying On-Chain Leverage Risks.eng.text
|
14.8 KB
|
|
Speculative Multipliers on DeFi Quantifying On-Chain Leverage Risks.eng.tsv
|
17.2 KB
|
|
Speculative Multipliers on DeFi Quantifying On-Chain Leverage Risks.eng.txt
|
19.3 KB
|
|
Speculative Multipliers on DeFi Quantifying On-Chain Leverage Risks.eng.vtt
|
19.3 KB
|
|
Suborn Channels Incentives Against Timelock Bribes.eng.json
|
1.0 MB
|
|
Suborn Channels Incentives Against Timelock Bribes.eng.lrc
|
24.5 KB
|
|
Suborn Channels Incentives Against Timelock Bribes.eng.srt
|
26.5 KB
|
|
Suborn Channels Incentives Against Timelock Bribes.eng.text
|
20.0 KB
|
|
Suborn Channels Incentives Against Timelock Bribes.eng.tsv
|
22.5 KB
|
|
Suborn Channels Incentives Against Timelock Bribes.eng.txt
|
24.7 KB
|
|
Suborn Channels Incentives Against Timelock Bribes.eng.vtt
|
24.7 KB
|
|
The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets.eng.json
|
1.0 MB
|
|
The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets.eng.lrc
|
24.5 KB
|
|
The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets.eng.srt
|
26.6 KB
|
|
The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets.eng.text
|
19.7 KB
|
|
The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets.eng.tsv
|
22.4 KB
|
|
The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets.eng.txt
|
24.7 KB
|
|
The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets.eng.vtt
|
24.7 KB
|
|
The Effect of False Positives Why Fuzzy Message Detection Leads to Fuzzy Privacy Guarantees.eng.json
|
600.0 KB
|
|
The Effect of False Positives Why Fuzzy Message Detection Leads to Fuzzy Privacy Guarantees.eng.lrc
|
16.8 KB
|
|
The Effect of False Positives Why Fuzzy Message Detection Leads to Fuzzy Privacy Guarantees.eng.srt
|
18.7 KB
|
|
The Effect of False Positives Why Fuzzy Message Detection Leads to Fuzzy Privacy Guarantees.eng.text
|
12.4 KB
|
|
The Effect of False Positives Why Fuzzy Message Detection Leads to Fuzzy Privacy Guarantees.eng.tsv
|
14.8 KB
|
|
The Effect of False Positives Why Fuzzy Message Detection Leads to Fuzzy Privacy Guarantees.eng.txt
|
17.0 KB
|
|
The Effect of False Positives Why Fuzzy Message Detection Leads to Fuzzy Privacy Guarantees.eng.vtt
|
17.0 KB
|
|
Three Attacks on Proof-of-Stake Ethereum.eng.json
|
1.2 MB
|
|
Three Attacks on Proof-of-Stake Ethereum.eng.lrc
|
28.8 KB
|
|
Three Attacks on Proof-of-Stake Ethereum.eng.srt
|
31.2 KB
|
|
Three Attacks on Proof-of-Stake Ethereum.eng.text
|
23.2 KB
|
|
Three Attacks on Proof-of-Stake Ethereum.eng.tsv
|
26.4 KB
|
|
Three Attacks on Proof-of-Stake Ethereum.eng.txt
|
29.0 KB
|
|
Three Attacks on Proof-of-Stake Ethereum.eng.vtt
|
29.0 KB
|
|
Towards Overcoming the Undercutting Problem.eng.json
|
1.3 MB
|
|
Towards Overcoming the Undercutting Problem.eng.lrc
|
32.4 KB
|
|
Towards Overcoming the Undercutting Problem.eng.srt
|
35.5 KB
|
|
Towards Overcoming the Undercutting Problem.eng.text
|
25.6 KB
|
|
Towards Overcoming the Undercutting Problem.eng.tsv
|
29.4 KB
|
|
Towards Overcoming the Undercutting Problem.eng.txt
|
32.7 KB
|
|
Towards Overcoming the Undercutting Problem.eng.vtt
|
32.7 KB
|
|
WTSC 2022 - Dispute-free Scalable Open Vote Network using zk-SNARKs.eng.json
|
622.9 KB
|
|
WTSC 2022 - Dispute-free Scalable Open Vote Network using zk-SNARKs.eng.lrc
|
16.5 KB
|
|
WTSC 2022 - Dispute-free Scalable Open Vote Network using zk-SNARKs.eng.srt
|
17.8 KB
|
|
WTSC 2022 - Dispute-free Scalable Open Vote Network using zk-SNARKs.eng.text
|
13.2 KB
|
|
WTSC 2022 - Dispute-free Scalable Open Vote Network using zk-SNARKs.eng.tsv
|
15.0 KB
|
|
WTSC 2022 - Dispute-free Scalable Open Vote Network using zk-SNARKs.eng.txt
|
16.6 KB
|
|
WTSC 2022 - Dispute-free Scalable Open Vote Network using zk-SNARKs.eng.vtt
|
16.6 KB
|
|
WTSC 2022 - Fides A System for Verifiable Computation Using Smart Contracts.eng.json
|
889.1 KB
|
|
WTSC 2022 - Fides A System for Verifiable Computation Using Smart Contracts.eng.lrc
|
24.5 KB
|
|
WTSC 2022 - Fides A System for Verifiable Computation Using Smart Contracts.eng.srt
|
26.2 KB
|
|
WTSC 2022 - Fides A System for Verifiable Computation Using Smart Contracts.eng.text
|
20.4 KB
|
|
WTSC 2022 - Fides A System for Verifiable Computation Using Smart Contracts.eng.tsv
|
22.6 KB
|
|
WTSC 2022 - Fides A System for Verifiable Computation Using Smart Contracts.eng.txt
|
24.6 KB
|
|
WTSC 2022 - Fides A System for Verifiable Computation Using Smart Contracts.eng.vtt
|
24.6 KB
|
|
WTSC 2022 - Lelantus Spark Secure and Flexible Private Transactions.eng.json
|
958.5 KB
|
|
WTSC 2022 - Lelantus Spark Secure and Flexible Private Transactions.eng.lrc
|
23.8 KB
|
|
WTSC 2022 - Lelantus Spark Secure and Flexible Private Transactions.eng.srt
|
25.9 KB
|
|
WTSC 2022 - Lelantus Spark Secure and Flexible Private Transactions.eng.text
|
19.1 KB
|
|
WTSC 2022 - Lelantus Spark Secure and Flexible Private Transactions.eng.tsv
|
21.7 KB
|
|
WTSC 2022 - Lelantus Spark Secure and Flexible Private Transactions.eng.txt
|
24.0 KB
|
|
WTSC 2022 - Lelantus Spark Secure and Flexible Private Transactions.eng.vtt
|
24.0 KB
|
|
WTSC 2022 - Lissy Experimenting with On-chain Order Books.eng.json
|
896.0 KB
|
|
WTSC 2022 - Lissy Experimenting with On-chain Order Books.eng.lrc
|
21.8 KB
|
|
WTSC 2022 - Lissy Experimenting with On-chain Order Books.eng.srt
|
23.5 KB
|
|
WTSC 2022 - Lissy Experimenting with On-chain Order Books.eng.text
|
17.7 KB
|
|
WTSC 2022 - Lissy Experimenting with On-chain Order Books.eng.tsv
|
20.0 KB
|
|
WTSC 2022 - Lissy Experimenting with On-chain Order Books.eng.txt
|
21.9 KB
|
|
WTSC 2022 - Lissy Experimenting with On-chain Order Books.eng.vtt
|
21.9 KB
|
|
WTSC 2022 - Not All Code are Create2 Equal.eng.json
|
756.2 KB
|
|
WTSC 2022 - Not All Code are Create2 Equal.eng.lrc
|
20.4 KB
|
|
WTSC 2022 - Not All Code are Create2 Equal.eng.srt
|
22.6 KB
|
|
WTSC 2022 - Not All Code are Create2 Equal.eng.text
|
15.5 KB
|
|
WTSC 2022 - Not All Code are Create2 Equal.eng.tsv
|
18.2 KB
|
|
WTSC 2022 - Not All Code are Create2 Equal.eng.txt
|
20.6 KB
|
|
WTSC 2022 - Not All Code are Create2 Equal.eng.vtt
|
20.6 KB
|
|
WTSC 2022 - Not so immutable Upgradeability of Smart Contracts on Ethereum.eng.json
|
1.0 MB
|
|
WTSC 2022 - Not so immutable Upgradeability of Smart Contracts on Ethereum.eng.lrc
|
25.2 KB
|
|
WTSC 2022 - Not so immutable Upgradeability of Smart Contracts on Ethereum.eng.srt
|
27.5 KB
|
|
WTSC 2022 - Not so immutable Upgradeability of Smart Contracts on Ethereum.eng.text
|
20.1 KB
|
|
WTSC 2022 - Not so immutable Upgradeability of Smart Contracts on Ethereum.eng.tsv
|
23.0 KB
|
|
WTSC 2022 - Not so immutable Upgradeability of Smart Contracts on Ethereum.eng.txt
|
25.4 KB
|
|
WTSC 2022 - Not so immutable Upgradeability of Smart Contracts on Ethereum.eng.vtt
|
25.4 KB
|
|
WTSC 2022 - Protocol-based smart contract generation.eng.json
|
635.7 KB
|
|
WTSC 2022 - Protocol-based smart contract generation.eng.lrc
|
15.0 KB
|
|
WTSC 2022 - Protocol-based smart contract generation.eng.srt
|
15.9 KB
|
|
WTSC 2022 - Protocol-based smart contract generation.eng.text
|
12.7 KB
|
|
WTSC 2022 - Protocol-based smart contract generation.eng.tsv
|
13.9 KB
|
|
WTSC 2022 - Protocol-based smart contract generation.eng.txt
|
15.1 KB
|
|
WTSC 2022 - Protocol-based smart contract generation.eng.vtt
|
15.1 KB
|
|
WTSC 2022 - UTS the Universal Token Swapper.eng.json
|
474.9 KB
|
|
WTSC 2022 - UTS the Universal Token Swapper.eng.lrc
|
11.7 KB
|
|
WTSC 2022 - UTS the Universal Token Swapper.eng.srt
|
12.7 KB
|
|
WTSC 2022 - UTS the Universal Token Swapper.eng.text
|
9.4 KB
|
|
WTSC 2022 - UTS the Universal Token Swapper.eng.tsv
|
10.6 KB
|
|
WTSC 2022 - UTS the Universal Token Swapper.eng.txt
|
11.8 KB
|
|
WTSC 2022 - UTS the Universal Token Swapper.eng.vtt
|
11.8 KB
|
|
Zero Knowledge Proofs towards Verifiable Decentralized AI.eng.json
|
1.0 MB
|
|
Zero Knowledge Proofs towards Verifiable Decentralized AI.eng.lrc
|
24.5 KB
|
|
Zero Knowledge Proofs towards Verifiable Decentralized AI.eng.srt
|
26.5 KB
|
|
Zero Knowledge Proofs towards Verifiable Decentralized AI.eng.text
|
20.0 KB
|
|
Zero Knowledge Proofs towards Verifiable Decentralized AI.eng.tsv
|
22.5 KB
|
|
Zero Knowledge Proofs towards Verifiable Decentralized AI.eng.txt
|
24.7 KB
|
|
Zero Knowledge Proofs towards Verifiable Decentralized AI.eng.vtt
|
24.7 KB
|
|
FC 2024/
|
|
A Transaction-Level Model for Blockchain Privacy.mp4
|
9.0 MB
|
|
Anonymous Reputation Systems with Revocation, Revisited.mp4
|
15.0 MB
|
|
Deep Selfish Proposing in Longest-Chain Proof-of-Stake Protocols.mp4
|
18.0 MB
|
|
DeFi composability as MEV non-interference.mp4
|
15.4 MB
|
|
Does Proposer-Builder Separation Preserve Decentralization.mp4
|
18.4 MB
|
|
Efficient Agreement Over Byzantine Gossip.mp4
|
12.5 MB
|
|
Foundations of Anonymous Signatures.mp4
|
18.0 MB
|
|
Goldfish No More Attacks on Ethereum.mp4
|
8.9 MB
|
|
Improved YOSO Randomness Generation with Worst-Case Corruptions.mp4
|
9.4 MB
|
|
LedgerHedger Gas Reservation for Smart Contract Security.mp4
|
17.5 MB
|
|
Light Clients for Lazy Blockchains.mp4
|
7.6 MB
|
|
On-Chain Timestamps Are Accurate.mp4
|
12.3 MB
|
|
Optimal Dynamic Fees for Blockchain Resources.mp4
|
7.7 MB
|
|
Optimal Publishing Strategies on a Base Layer.mp4
|
12.6 MB
|
|
Owl An Augmented Password-Authenticated Key Exchange Scheme.mp4
|
16.2 MB
|
|
Privacy-preserving Anti-Money Laundering using Secure Multi-Party Computation.mp4
|
17.3 MB
|
|
Proactive Refresh for Accountable Threshold Signatures.mp4
|
18.3 MB
|
|
Remote Scheduler Contention Attacks.mp4
|
12.9 MB
|
|
SAVER SNARK-compatible Verifiable Encryption.mp4
|
15.2 MB
|
|
Shoal Improving DAG-BFT Latency And Robustness.mp4
|
16.6 MB
|
|
Short Paper Accountable Safety Implies Finality.mp4
|
6.0 MB
|
|
Short Paper Breaking X-VRF, a Post-Quantum Verifiable Random Function.mp4
|
19.6 MB
|
|
Short paper Naysayer proofs.mp4
|
11.0 MB
|
|
Short Paper Onion Messages on Leash.mp4
|
14.4 MB
|
|
Short Paper Shared Sequencing and Latency Competition as a Noisy Contest.mp4
|
15.1 MB
|
|
SoK A Stratified Approach to Blockchain Decentralization.mp4
|
19.0 MB
|
|
Subset-optimized BLS Multi-signature with Key Aggregation.mp4
|
13.5 MB
|
|
Subverting Cryptographic Hardware used in Blockchain Consensus.mp4
|
12.4 MB
|
|
The Costs of Swapping on the Uniswap Protocol.mp4
|
26.0 MB
|
|
The Power of Default Measuring the Effect of Slippage Tolerance in Decentralized Exchanges.mp4
|
15.4 MB
|
|
Towards Practical Doubly-Efficient Private Information Retrieval.mp4
|
30.3 MB
|
|
Truncator Time-space Tradeoff of Cryptographic Primitives.mp4
|
19.7 MB
|
|
ZeroSwap Data-driven Optimal Market Making in Decentralized Finance.mp4
|
16.1 MB
|
|
/.../FC 2024 captions/
|
|
A Transaction-Level Model for Blockchain Privacy.eng.json
|
543.9 KB
|
|
A Transaction-Level Model for Blockchain Privacy.eng.lrc
|
13.6 KB
|
|
A Transaction-Level Model for Blockchain Privacy.eng.srt
|
15.0 KB
|
|
A Transaction-Level Model for Blockchain Privacy.eng.text
|
10.4 KB
|
|
A Transaction-Level Model for Blockchain Privacy.eng.tsv
|
12.2 KB
|
|
A Transaction-Level Model for Blockchain Privacy.eng.txt
|
13.8 KB
|
|
A Transaction-Level Model for Blockchain Privacy.eng.vtt
|
13.8 KB
|
|
Anonymous Reputation Systems with Revocation, Revisited.eng.json
|
657.0 KB
|
|
Anonymous Reputation Systems with Revocation, Revisited.eng.lrc
|
16.6 KB
|
|
Anonymous Reputation Systems with Revocation, Revisited.eng.srt
|
18.1 KB
|
|
Anonymous Reputation Systems with Revocation, Revisited.eng.text
|
13.2 KB
|
|
Anonymous Reputation Systems with Revocation, Revisited.eng.tsv
|
15.0 KB
|
|
Anonymous Reputation Systems with Revocation, Revisited.eng.txt
|
16.7 KB
|
|
Anonymous Reputation Systems with Revocation, Revisited.eng.vtt
|
16.7 KB
|
|
Deep Selfish Proposing in Longest-Chain Proof-of-Stake Protocols.eng.json
|
999.9 KB
|
|
Deep Selfish Proposing in Longest-Chain Proof-of-Stake Protocols.eng.lrc
|
25.2 KB
|
|
Deep Selfish Proposing in Longest-Chain Proof-of-Stake Protocols.eng.srt
|
27.2 KB
|
|
Deep Selfish Proposing in Longest-Chain Proof-of-Stake Protocols.eng.text
|
20.5 KB
|
|
Deep Selfish Proposing in Longest-Chain Proof-of-Stake Protocols.eng.tsv
|
23.1 KB
|
|
Deep Selfish Proposing in Longest-Chain Proof-of-Stake Protocols.eng.txt
|
25.4 KB
|
|
Deep Selfish Proposing in Longest-Chain Proof-of-Stake Protocols.eng.vtt
|
25.4 KB
|
|
DeFi composability as MEV non-interference.eng.json
|
885.7 KB
|
|
DeFi composability as MEV non-interference.eng.lrc
|
20.8 KB
|
|
DeFi composability as MEV non-interference.eng.srt
|
22.1 KB
|
|
DeFi composability as MEV non-interference.eng.text
|
17.7 KB
|
|
DeFi composability as MEV non-interference.eng.tsv
|
19.4 KB
|
|
DeFi composability as MEV non-interference.eng.txt
|
20.9 KB
|
|
DeFi composability as MEV non-interference.eng.vtt
|
20.9 KB
|
|
Does Proposer-Builder Separation Preserve Decentralization.eng.json
|
1.0 MB
|
|
Does Proposer-Builder Separation Preserve Decentralization.eng.lrc
|
24.7 KB
|
|
Does Proposer-Builder Separation Preserve Decentralization.eng.srt
|
26.3 KB
|
|
Does Proposer-Builder Separation Preserve Decentralization.eng.text
|
21.0 KB
|
|
Does Proposer-Builder Separation Preserve Decentralization.eng.tsv
|
23.1 KB
|
|
Does Proposer-Builder Separation Preserve Decentralization.eng.txt
|
24.9 KB
|
|
Does Proposer-Builder Separation Preserve Decentralization.eng.vtt
|
24.9 KB
|
|
Efficient Agreement Over Byzantine Gossip.eng.json
|
775.3 KB
|
|
Efficient Agreement Over Byzantine Gossip.eng.lrc
|
19.8 KB
|
|
Efficient Agreement Over Byzantine Gossip.eng.srt
|
21.6 KB
|
|
Efficient Agreement Over Byzantine Gossip.eng.text
|
15.7 KB
|
|
Efficient Agreement Over Byzantine Gossip.eng.tsv
|
17.9 KB
|
|
Efficient Agreement Over Byzantine Gossip.eng.txt
|
20.0 KB
|
|
Efficient Agreement Over Byzantine Gossip.eng.vtt
|
20.0 KB
|
|
Foundations of Anonymous Signatures.eng.json
|
1.3 MB
|
|
Foundations of Anonymous Signatures.eng.lrc
|
30.9 KB
|
|
Foundations of Anonymous Signatures.eng.srt
|
33.2 KB
|
|
Foundations of Anonymous Signatures.eng.text
|
25.7 KB
|
|
Foundations of Anonymous Signatures.eng.tsv
|
28.7 KB
|
|
Foundations of Anonymous Signatures.eng.txt
|
31.1 KB
|
|
Foundations of Anonymous Signatures.eng.vtt
|
31.1 KB
|
|
Goldfish No More Attacks on Ethereum.eng.json
|
736.8 KB
|
|
Goldfish No More Attacks on Ethereum.eng.lrc
|
18.6 KB
|
|
Goldfish No More Attacks on Ethereum.eng.srt
|
20.2 KB
|
|
Goldfish No More Attacks on Ethereum.eng.text
|
15.0 KB
|
|
Goldfish No More Attacks on Ethereum.eng.tsv
|
16.9 KB
|
|
Goldfish No More Attacks on Ethereum.eng.txt
|
18.7 KB
|
|
Goldfish No More Attacks on Ethereum.eng.vtt
|
18.8 KB
|
|
Improved YOSO Randomness Generation with Worst-Case Corruptions.eng.json
|
717.0 KB
|
|
Improved YOSO Randomness Generation with Worst-Case Corruptions.eng.lrc
|
17.2 KB
|
|
Improved YOSO Randomness Generation with Worst-Case Corruptions.eng.srt
|
18.6 KB
|
|
Improved YOSO Randomness Generation with Worst-Case Corruptions.eng.text
|
14.0 KB
|
|
Improved YOSO Randomness Generation with Worst-Case Corruptions.eng.tsv
|
15.8 KB
|
|
Improved YOSO Randomness Generation with Worst-Case Corruptions.eng.txt
|
17.4 KB
|
|
Improved YOSO Randomness Generation with Worst-Case Corruptions.eng.vtt
|
17.4 KB
|
|
LedgerHedger Gas Reservation for Smart Contract Security.eng.json
|
1.1 MB
|
|
LedgerHedger Gas Reservation for Smart Contract Security.eng.lrc
|
26.6 KB
|
|
LedgerHedger Gas Reservation for Smart Contract Security.eng.srt
|
29.3 KB
|
|
LedgerHedger Gas Reservation for Smart Contract Security.eng.text
|
20.4 KB
|
|
LedgerHedger Gas Reservation for Smart Contract Security.eng.tsv
|
23.8 KB
|
|
LedgerHedger Gas Reservation for Smart Contract Security.eng.txt
|
26.8 KB
|
|
LedgerHedger Gas Reservation for Smart Contract Security.eng.vtt
|
26.8 KB
|
|
Light Clients for Lazy Blockchains.eng.json
|
693.0 KB
|
|
Light Clients for Lazy Blockchains.eng.lrc
|
17.3 KB
|
|
Light Clients for Lazy Blockchains.eng.srt
|
18.7 KB
|
|
Light Clients for Lazy Blockchains.eng.text
|
14.1 KB
|
|
Light Clients for Lazy Blockchains.eng.tsv
|
15.9 KB
|
|
Light Clients for Lazy Blockchains.eng.txt
|
17.5 KB
|
|
Light Clients for Lazy Blockchains.eng.vtt
|
17.5 KB
|
|
On-Chain Timestamps Are Accurate.eng.json
|
1.1 MB
|
|
On-Chain Timestamps Are Accurate.eng.lrc
|
28.4 KB
|
|
On-Chain Timestamps Are Accurate.eng.srt
|
30.9 KB
|
|
On-Chain Timestamps Are Accurate.eng.text
|
22.5 KB
|
|
On-Chain Timestamps Are Accurate.eng.tsv
|
25.8 KB
|
|
On-Chain Timestamps Are Accurate.eng.txt
|
28.6 KB
|
|
On-Chain Timestamps Are Accurate.eng.vtt
|
28.6 KB
|
|
Optimal Dynamic Fees for Blockchain Resources.eng.json
|
664.6 KB
|
|
Optimal Dynamic Fees for Blockchain Resources.eng.lrc
|
17.0 KB
|
|
Optimal Dynamic Fees for Blockchain Resources.eng.srt
|
18.5 KB
|
|
Optimal Dynamic Fees for Blockchain Resources.eng.text
|
13.5 KB
|
|
Optimal Dynamic Fees for Blockchain Resources.eng.tsv
|
15.5 KB
|
|
Optimal Dynamic Fees for Blockchain Resources.eng.txt
|
17.2 KB
|
|
Optimal Dynamic Fees for Blockchain Resources.eng.vtt
|
17.2 KB
|
|
Optimal Publishing Strategies on a Base Layer.eng.json
|
540.8 KB
|
|
Optimal Publishing Strategies on a Base Layer.eng.lrc
|
12.6 KB
|
|
Optimal Publishing Strategies on a Base Layer.eng.srt
|
13.5 KB
|
|
Optimal Publishing Strategies on a Base Layer.eng.text
|
10.7 KB
|
|
Optimal Publishing Strategies on a Base Layer.eng.tsv
|
11.7 KB
|
|
Optimal Publishing Strategies on a Base Layer.eng.txt
|
12.7 KB
|
|
Optimal Publishing Strategies on a Base Layer.eng.vtt
|
12.7 KB
|
|
Owl An Augmented Password-Authenticated Key Exchange Scheme.eng.json
|
861.6 KB
|
|
Owl An Augmented Password-Authenticated Key Exchange Scheme.eng.lrc
|
21.9 KB
|
|
Owl An Augmented Password-Authenticated Key Exchange Scheme.eng.srt
|
24.4 KB
|
|
Owl An Augmented Password-Authenticated Key Exchange Scheme.eng.text
|
16.2 KB
|
|
Owl An Augmented Password-Authenticated Key Exchange Scheme.eng.tsv
|
19.4 KB
|
|
Owl An Augmented Password-Authenticated Key Exchange Scheme.eng.txt
|
22.1 KB
|
|
Owl An Augmented Password-Authenticated Key Exchange Scheme.eng.vtt
|
22.1 KB
|
|
Privacy-preserving Anti-Money Laundering using Secure Multi-Party Computation.eng.json
|
718.0 KB
|
|
Privacy-preserving Anti-Money Laundering using Secure Multi-Party Computation.eng.lrc
|
18.2 KB
|
|
Privacy-preserving Anti-Money Laundering using Secure Multi-Party Computation.eng.srt
|
19.9 KB
|
|
Privacy-preserving Anti-Money Laundering using Secure Multi-Party Computation.eng.text
|
14.2 KB
|
|
Privacy-preserving Anti-Money Laundering using Secure Multi-Party Computation.eng.tsv
|
16.4 KB
|
|
Privacy-preserving Anti-Money Laundering using Secure Multi-Party Computation.eng.txt
|
18.3 KB
|
|
Privacy-preserving Anti-Money Laundering using Secure Multi-Party Computation.eng.vtt
|
18.3 KB
|
|
Proactive Refresh for Accountable Threshold Signatures.eng.json
|
1.3 MB
|
|
Proactive Refresh for Accountable Threshold Signatures.eng.lrc
|
31.9 KB
|
|
Proactive Refresh for Accountable Threshold Signatures.eng.srt
|
34.7 KB
|
|
Proactive Refresh for Accountable Threshold Signatures.eng.text
|
25.5 KB
|
|
Proactive Refresh for Accountable Threshold Signatures.eng.tsv
|
29.1 KB
|
|
Proactive Refresh for Accountable Threshold Signatures.eng.txt
|
32.1 KB
|
|
Proactive Refresh for Accountable Threshold Signatures.eng.vtt
|
32.1 KB
|
|
Remote Scheduler Contention Attacks.eng.json
|
630.9 KB
|
|
Remote Scheduler Contention Attacks.eng.lrc
|
15.8 KB
|
|
Remote Scheduler Contention Attacks.eng.srt
|
17.3 KB
|
|
Remote Scheduler Contention Attacks.eng.text
|
12.4 KB
|
|
Remote Scheduler Contention Attacks.eng.tsv
|
14.2 KB
|
|
Remote Scheduler Contention Attacks.eng.txt
|
16.0 KB
|
|
Remote Scheduler Contention Attacks.eng.vtt
|
16.0 KB
|
|
SAVER SNARK-compatible Verifiable Encryption.eng.json
|
766.1 KB
|
|
SAVER SNARK-compatible Verifiable Encryption.eng.lrc
|
18.9 KB
|
|
SAVER SNARK-compatible Verifiable Encryption.eng.srt
|
20.3 KB
|
|
SAVER SNARK-compatible Verifiable Encryption.eng.text
|
15.6 KB
|
|
SAVER SNARK-compatible Verifiable Encryption.eng.tsv
|
17.4 KB
|
|
SAVER SNARK-compatible Verifiable Encryption.eng.txt
|
19.0 KB
|
|
SAVER SNARK-compatible Verifiable Encryption.eng.vtt
|
19.0 KB
|
|
Shoal Improving DAG-BFT Latency And Robustness.eng.json
|
1.7 MB
|
|
Shoal Improving DAG-BFT Latency And Robustness.eng.lrc
|
37.1 KB
|
|
Shoal Improving DAG-BFT Latency And Robustness.eng.srt
|
40.7 KB
|
|
Shoal Improving DAG-BFT Latency And Robustness.eng.text
|
29.0 KB
|
|
Shoal Improving DAG-BFT Latency And Robustness.eng.tsv
|
33.6 KB
|
|
Shoal Improving DAG-BFT Latency And Robustness.eng.txt
|
37.4 KB
|
|
Shoal Improving DAG-BFT Latency And Robustness.eng.vtt
|
37.4 KB
|
|
Short Paper Accountable Safety Implies Finality.eng.json
|
486.9 KB
|
|
Short Paper Accountable Safety Implies Finality.eng.lrc
|
12.8 KB
|
|
Short Paper Accountable Safety Implies Finality.eng.srt
|
13.7 KB
|
|
Short Paper Accountable Safety Implies Finality.eng.text
|
10.5 KB
|
|
Short Paper Accountable Safety Implies Finality.eng.tsv
|
11.7 KB
|
|
Short Paper Accountable Safety Implies Finality.eng.txt
|
12.8 KB
|
|
Short Paper Accountable Safety Implies Finality.eng.vtt
|
12.9 KB
|
|
Short Paper Breaking X-VRF, a Post-Quantum Verifiable Random Function.eng.json
|
1.1 MB
|
|
Short Paper Breaking X-VRF, a Post-Quantum Verifiable Random Function.eng.lrc
|
26.6 KB
|
|
Short Paper Breaking X-VRF, a Post-Quantum Verifiable Random Function.eng.srt
|
28.9 KB
|
|
Short Paper Breaking X-VRF, a Post-Quantum Verifiable Random Function.eng.text
|
21.5 KB
|
|
Short Paper Breaking X-VRF, a Post-Quantum Verifiable Random Function.eng.tsv
|
24.3 KB
|
|
Short Paper Breaking X-VRF, a Post-Quantum Verifiable Random Function.eng.txt
|
26.8 KB
|
|
Short Paper Breaking X-VRF, a Post-Quantum Verifiable Random Function.eng.vtt
|
26.8 KB
|
|
Short paper Naysayer proofs.eng.json
|
618.9 KB
|
|
Short paper Naysayer proofs.eng.lrc
|
14.9 KB
|
|
Short paper Naysayer proofs.eng.srt
|
15.9 KB
|
|
Short paper Naysayer proofs.eng.text
|
12.4 KB
|
|
Short paper Naysayer proofs.eng.tsv
|
13.7 KB
|
|
Short paper Naysayer proofs.eng.txt
|
14.9 KB
|
|
Short paper Naysayer proofs.eng.vtt
|
15.0 KB
|
|
Short Paper Onion Messages on Leash.eng.json
|
704.7 KB
|
|
Short Paper Onion Messages on Leash.eng.lrc
|
17.0 KB
|
|
Short Paper Onion Messages on Leash.eng.srt
|
18.3 KB
|
|
Short Paper Onion Messages on Leash.eng.text
|
14.1 KB
|
|
Short Paper Onion Messages on Leash.eng.tsv
|
15.7 KB
|
|
Short Paper Onion Messages on Leash.eng.txt
|
17.1 KB
|
|
Short Paper Onion Messages on Leash.eng.vtt
|
17.2 KB
|
|
Short Paper Shared Sequencing and Latency Competition as a Noisy Contest.eng.json
|
939.4 KB
|
|
Short Paper Shared Sequencing and Latency Competition as a Noisy Contest.eng.lrc
|
23.7 KB
|
|
Short Paper Shared Sequencing and Latency Competition as a Noisy Contest.eng.srt
|
25.6 KB
|
|
Short Paper Shared Sequencing and Latency Competition as a Noisy Contest.eng.text
|
19.2 KB
|
|
Short Paper Shared Sequencing and Latency Competition as a Noisy Contest.eng.tsv
|
21.7 KB
|
|
Short Paper Shared Sequencing and Latency Competition as a Noisy Contest.eng.txt
|
23.8 KB
|
|
Short Paper Shared Sequencing and Latency Competition as a Noisy Contest.eng.vtt
|
23.8 KB
|
|
SoK A Stratified Approach to Blockchain Decentralization.eng.json
|
641.3 KB
|
|
SoK A Stratified Approach to Blockchain Decentralization.eng.lrc
|
16.9 KB
|
|
SoK A Stratified Approach to Blockchain Decentralization.eng.srt
|
18.1 KB
|
|
SoK A Stratified Approach to Blockchain Decentralization.eng.text
|
14.1 KB
|
|
SoK A Stratified Approach to Blockchain Decentralization.eng.tsv
|
15.6 KB
|
|
SoK A Stratified Approach to Blockchain Decentralization.eng.txt
|
17.0 KB
|
|
SoK A Stratified Approach to Blockchain Decentralization.eng.vtt
|
17.0 KB
|
|
Subset-optimized BLS Multi-signature with Key Aggregation.eng.json
|
800.1 KB
|
|
Subset-optimized BLS Multi-signature with Key Aggregation.eng.lrc
|
19.5 KB
|
|
Subset-optimized BLS Multi-signature with Key Aggregation.eng.srt
|
20.8 KB
|
|
Subset-optimized BLS Multi-signature with Key Aggregation.eng.text
|
16.4 KB
|
|
Subset-optimized BLS Multi-signature with Key Aggregation.eng.tsv
|
18.1 KB
|
|
Subset-optimized BLS Multi-signature with Key Aggregation.eng.txt
|
19.6 KB
|
|
Subset-optimized BLS Multi-signature with Key Aggregation.eng.vtt
|
19.6 KB
|
|
Subverting Cryptographic Hardware used in Blockchain Consensus.eng.json
|
1.0 MB
|
|
Subverting Cryptographic Hardware used in Blockchain Consensus.eng.lrc
|
25.3 KB
|
|
Subverting Cryptographic Hardware used in Blockchain Consensus.eng.srt
|
27.2 KB
|
|
Subverting Cryptographic Hardware used in Blockchain Consensus.eng.text
|
20.8 KB
|
|
Subverting Cryptographic Hardware used in Blockchain Consensus.eng.tsv
|
23.3 KB
|
|
Subverting Cryptographic Hardware used in Blockchain Consensus.eng.txt
|
25.4 KB
|
|
Subverting Cryptographic Hardware used in Blockchain Consensus.eng.vtt
|
25.4 KB
|
|
The Costs of Swapping on the Uniswap Protocol.eng.json
|
1.2 MB
|
|
The Costs of Swapping on the Uniswap Protocol.eng.lrc
|
30.3 KB
|
|
The Costs of Swapping on the Uniswap Protocol.eng.srt
|
33.4 KB
|
|
The Costs of Swapping on the Uniswap Protocol.eng.text
|
23.4 KB
|
|
The Costs of Swapping on the Uniswap Protocol.eng.tsv
|
27.3 KB
|
|
The Costs of Swapping on the Uniswap Protocol.eng.txt
|
30.5 KB
|
|
The Costs of Swapping on the Uniswap Protocol.eng.vtt
|
30.6 KB
|
|
The Power of Default Measuring the Effect of Slippage Tolerance in Decentralized Exchanges.eng.json
|
837.8 KB
|
|
The Power of Default Measuring the Effect of Slippage Tolerance in Decentralized Exchanges.eng.lrc
|
20.7 KB
|
|
The Power of Default Measuring the Effect of Slippage Tolerance in Decentralized Exchanges.eng.srt
|
22.5 KB
|
|
The Power of Default Measuring the Effect of Slippage Tolerance in Decentralized Exchanges.eng.text
|
16.5 KB
|
|
The Power of Default Measuring the Effect of Slippage Tolerance in Decentralized Exchanges.eng.tsv
|
18.8 KB
|
|
The Power of Default Measuring the Effect of Slippage Tolerance in Decentralized Exchanges.eng.txt
|
20.9 KB
|
|
The Power of Default Measuring the Effect of Slippage Tolerance in Decentralized Exchanges.eng.vtt
|
20.9 KB
|
|
Towards Practical Doubly-Efficient Private Information Retrieval.eng.json
|
1.3 MB
|
|
Towards Practical Doubly-Efficient Private Information Retrieval.eng.lrc
|
27.9 KB
|
|
Towards Practical Doubly-Efficient Private Information Retrieval.eng.srt
|
30.0 KB
|
|
Towards Practical Doubly-Efficient Private Information Retrieval.eng.text
|
23.1 KB
|
|
Towards Practical Doubly-Efficient Private Information Retrieval.eng.tsv
|
25.9 KB
|
|
Towards Practical Doubly-Efficient Private Information Retrieval.eng.txt
|
28.1 KB
|
|
Towards Practical Doubly-Efficient Private Information Retrieval.eng.vtt
|
28.1 KB
|
|
Truncator Time-space Tradeoff of Cryptographic Primitives.eng.json
|
1.2 MB
|
|
Truncator Time-space Tradeoff of Cryptographic Primitives.eng.lrc
|
25.2 KB
|
|
Truncator Time-space Tradeoff of Cryptographic Primitives.eng.srt
|
26.8 KB
|
|
Truncator Time-space Tradeoff of Cryptographic Primitives.eng.text
|
21.5 KB
|
|
Truncator Time-space Tradeoff of Cryptographic Primitives.eng.tsv
|
23.6 KB
|
|
Truncator Time-space Tradeoff of Cryptographic Primitives.eng.txt
|
25.4 KB
|
|
Truncator Time-space Tradeoff of Cryptographic Primitives.eng.vtt
|
25.4 KB
|
|
ZeroSwap Data-driven Optimal Market Making in Decentralized Finance.eng.json
|
854.7 KB
|
|
ZeroSwap Data-driven Optimal Market Making in Decentralized Finance.eng.lrc
|
21.3 KB
|
|
ZeroSwap Data-driven Optimal Market Making in Decentralized Finance.eng.srt
|
23.1 KB
|
|
ZeroSwap Data-driven Optimal Market Making in Decentralized Finance.eng.text
|
17.0 KB
|
|
ZeroSwap Data-driven Optimal Market Making in Decentralized Finance.eng.tsv
|
19.4 KB
|
|
ZeroSwap Data-driven Optimal Market Making in Decentralized Finance.eng.txt
|
21.4 KB
|
|
ZeroSwap Data-driven Optimal Market Making in Decentralized Finance.eng.vtt
|
21.4 KB
|
|
FC 2025/
|
|
A Formally Verified Lightning Network.mp4
|
25.6 MB
|
|
A Framework for Combined Transaction Posting and Pricing for Layer 2 Blockchains.mp4
|
15.8 MB
|
|
Anthemius Efficient & Modular Block Assembly for Concurrent Execution.mp4
|
12.0 MB
|
|
Consensus Under Adversary Majority Done Right.mp4
|
17.1 MB
|
|
Do Compilers Break Constant-time Guarantees.mp4
|
20.1 MB
|
|
Lixom Protecting Encryption Keys with Execute-Only Memory.mp4
|
12.2 MB
|
|
Overlapped Bootstrapping for FHEW TFHE and Its Application to SHA3.mp4
|
18.9 MB
|
|
Piercing the Veil of TVL DeFi Reappraised.mp4
|
16.3 MB
|
|
Quantifying the Value of Revert Protection.mp4
|
13.5 MB
|
|
/.../FC 2025 captions/
|
|
A Formally Verified Lightning Network.eng.json
|
1.1 MB
|
|
A Formally Verified Lightning Network.eng.lrc
|
27.1 KB
|
|
A Formally Verified Lightning Network.eng.srt
|
29.5 KB
|
|
A Formally Verified Lightning Network.eng.text
|
21.8 KB
|
|
A Formally Verified Lightning Network.eng.tsv
|
24.8 KB
|
|
A Formally Verified Lightning Network.eng.txt
|
27.3 KB
|
|
A Formally Verified Lightning Network.eng.vtt
|
27.3 KB
|
|
A Framework for Combined Transaction Posting and Pricing for Layer 2 Blockchains.eng.json
|
619.9 KB
|
|
A Framework for Combined Transaction Posting and Pricing for Layer 2 Blockchains.eng.lrc
|
16.9 KB
|
|
A Framework for Combined Transaction Posting and Pricing for Layer 2 Blockchains.eng.srt
|
18.3 KB
|
|
A Framework for Combined Transaction Posting and Pricing for Layer 2 Blockchains.eng.text
|
13.6 KB
|
|
A Framework for Combined Transaction Posting and Pricing for Layer 2 Blockchains.eng.tsv
|
15.4 KB
|
|
A Framework for Combined Transaction Posting and Pricing for Layer 2 Blockchains.eng.txt
|
17.0 KB
|
|
A Framework for Combined Transaction Posting and Pricing for Layer 2 Blockchains.eng.vtt
|
17.0 KB
|
|
Anthemius Efficient & Modular Block Assembly for Concurrent Execution.eng.json
|
733.0 KB
|
|
Anthemius Efficient & Modular Block Assembly for Concurrent Execution.eng.lrc
|
16.2 KB
|
|
Anthemius Efficient & Modular Block Assembly for Concurrent Execution.eng.srt
|
17.2 KB
|
|
Anthemius Efficient & Modular Block Assembly for Concurrent Execution.eng.text
|
13.6 KB
|
|
Anthemius Efficient & Modular Block Assembly for Concurrent Execution.eng.tsv
|
15.0 KB
|
|
Anthemius Efficient & Modular Block Assembly for Concurrent Execution.eng.txt
|
16.3 KB
|
|
Anthemius Efficient & Modular Block Assembly for Concurrent Execution.eng.vtt
|
16.3 KB
|
|
Consensus Under Adversary Majority Done Right.eng.json
|
853.9 KB
|
|
Consensus Under Adversary Majority Done Right.eng.lrc
|
21.7 KB
|
|
Consensus Under Adversary Majority Done Right.eng.srt
|
23.6 KB
|
|
Consensus Under Adversary Majority Done Right.eng.text
|
17.3 KB
|
|
Consensus Under Adversary Majority Done Right.eng.tsv
|
19.8 KB
|
|
Consensus Under Adversary Majority Done Right.eng.txt
|
21.9 KB
|
|
Consensus Under Adversary Majority Done Right.eng.vtt
|
21.9 KB
|
|
Do Compilers Break Constant-time Guarantees.eng.json
|
958.1 KB
|
|
Do Compilers Break Constant-time Guarantees.eng.lrc
|
22.1 KB
|
|
Do Compilers Break Constant-time Guarantees.eng.srt
|
23.6 KB
|
|
Do Compilers Break Constant-time Guarantees.eng.text
|
18.5 KB
|
|
Do Compilers Break Constant-time Guarantees.eng.tsv
|
20.5 KB
|
|
Do Compilers Break Constant-time Guarantees.eng.txt
|
22.2 KB
|
|
Do Compilers Break Constant-time Guarantees.eng.vtt
|
22.2 KB
|
|
Lixom Protecting Encryption Keys with Execute-Only Memory.eng.json
|
1.1 MB
|
|
Lixom Protecting Encryption Keys with Execute-Only Memory.eng.lrc
|
24.1 KB
|
|
Lixom Protecting Encryption Keys with Execute-Only Memory.eng.srt
|
26.2 KB
|
|
Lixom Protecting Encryption Keys with Execute-Only Memory.eng.text
|
19.4 KB
|
|
Lixom Protecting Encryption Keys with Execute-Only Memory.eng.tsv
|
22.0 KB
|
|
Lixom Protecting Encryption Keys with Execute-Only Memory.eng.txt
|
24.3 KB
|
|
Lixom Protecting Encryption Keys with Execute-Only Memory.eng.vtt
|
24.3 KB
|
|
Overlapped Bootstrapping for FHEW TFHE and Its Application to SHA3.eng.json
|
639.7 KB
|
|
Overlapped Bootstrapping for FHEW TFHE and Its Application to SHA3.eng.lrc
|
16.5 KB
|
|
Overlapped Bootstrapping for FHEW TFHE and Its Application to SHA3.eng.srt
|
17.9 KB
|
|
Overlapped Bootstrapping for FHEW TFHE and Its Application to SHA3.eng.text
|
13.1 KB
|
|
Overlapped Bootstrapping for FHEW TFHE and Its Application to SHA3.eng.tsv
|
14.9 KB
|
|
Overlapped Bootstrapping for FHEW TFHE and Its Application to SHA3.eng.txt
|
16.6 KB
|
|
Overlapped Bootstrapping for FHEW TFHE and Its Application to SHA3.eng.vtt
|
16.6 KB
|
|
Piercing the Veil of TVL DeFi Reappraised.eng.json
|
556.4 KB
|
|
Piercing the Veil of TVL DeFi Reappraised.eng.lrc
|
14.3 KB
|
|
Piercing the Veil of TVL DeFi Reappraised.eng.srt
|
15.5 KB
|
|
Piercing the Veil of TVL DeFi Reappraised.eng.text
|
11.5 KB
|
|
Piercing the Veil of TVL DeFi Reappraised.eng.tsv
|
13.0 KB
|
|
Piercing the Veil of TVL DeFi Reappraised.eng.txt
|
14.4 KB
|
|
Piercing the Veil of TVL DeFi Reappraised.eng.vtt
|
14.4 KB
|
|
Quantifying the Value of Revert Protection.eng.json
|
655.0 KB
|
|
Quantifying the Value of Revert Protection.eng.lrc
|
16.0 KB
|
|
Quantifying the Value of Revert Protection.eng.srt
|
17.1 KB
|
|
Quantifying the Value of Revert Protection.eng.text
|
13.3 KB
|
|
Quantifying the Value of Revert Protection.eng.tsv
|
14.8 KB
|
|
Quantifying the Value of Revert Protection.eng.txt
|
16.1 KB
|
|
Quantifying the Value of Revert Protection.eng.vtt
|
16.1 KB
|
|
Total files 1476
|