Files
Variable_MLS/ccs-sample.bib
emmanuelle.anceaume 9dafb6a8ad Update on Overleaf.
2023-06-22 13:31:34 +00:00

253 lines
8.2 KiB
BibTeX
Raw Blame History

This file contains ambiguous Unicode characters
This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.
@article{nakamoto2008bitcoin,
title={Bitcoin: A peer-to-peer electronic cash system},
author={Nakamoto, Satoshi},
journal={Decentralized Business Review},
pages={21260},
year={2008}
}
@inproceedings{kiayias2021mining,
title={Mining in Logarithmic Space},
author={Kiayias, Aggelos and Leonardos, Nikos and Zindros, Dionysis},
booktitle={Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security},
pages={3487--3501},
year={2021}
}
@inproceedings{garay2015bitcoin,
title={The bitcoin backbone protocol: Analysis and applications},
author={Garay, Juan and Kiayias, Aggelos and Leonardos, Nikos},
booktitle={Annual international conference on the theory and applications of cryptographic techniques},
pages={281--310},
year={2015},
organization={Springer}
}
@inproceedings{garay2017bitcoin,
title={The bitcoin backbone protocol with chains of variable difficulty},
author={Garay, Juan and Kiayias, Aggelos and Leonardos, Nikos},
booktitle={Annual International Cryptology Conference},
pages={291--323},
year={2017},
organization={Springer}
}
@inproceedings{AM2017,
title={The blockchain consensus layer and BFT},
author={I. Abraham and D. Malkhi},
booktitle={Bulletin of the EATCS},
% https://people.irisa.fr/Emmanuelle.Anceaume/Manuscript.pdf#page=43
%pages={291--323},
% 3(123):123
year={2017}
}
@phdthesis{zindros2020decentralized,
title={Decentralized Blockchain Interoperability},
author={Zindros, Dionysis},
year={2020},
school={National and Kapodistrian
University of Athens}
}
@INPROCEEDINGS{AGLS18,
AUTHOR = {Anceaume, E. and Guellier, A. and Ludinard, R. and Sericola, B.},
SHORTAUTHOR = {1111},
URL = {https://hal.archives-ouvertes.fr/hal-01888265/document},
BOOKTITLE = {{17th IEEE International Symposium on Network Computing and Applications}},
YEAR = {2018},
SERIES = {NCA},
SORTYEAR = {2018},
TITLE = {{Sycomore : a Permissionless Distributed Ledger that self-adapts to Transactions Demand}},
}
@MISC{byteball,
AUTHOR = {Churyumov, A.},
SHORTAUTHOR = {1111},
URL = {https://byteball.org/Byteball.pdf},
YEAR = {2017},
SORTYEAR = {2017},
TITLE = {{ByteBall : A Decentralized System for Storage and Transfer of Value}},
}
@MISC{iota,
AUTHOR = {Popov, S.},
SHORTAUTHOR = {1111},
URL = {https://assets.ctfassets.net/r1dr6vzfxhev/2t4uxvsIqk0EUau6g2sw0g/45eae33637ca92f85dd9f4a3a218e1ec/iota1_4_3.pdf},
YEAR = {2017},
SORTYEAR = {2017},
TITLE = {The tangle},
}
@MISC{hashgraph,
AUTHOR = {Baird, L.},
SHORTAUTHOR = {1111},
URL = {http://www.swirlds.com/downloads/SWIRLDS-TR-2016-01.pdf},
DATE = {2016},
SORTYEAR = {2016},
TITLE = {{The SWIRLDS Hashgraph Consensus Algorithm: Fair, Fast, Byzantine Fault Tolerance}},
}
@misc{rocket2020scalable,
title={Scalable and Probabilistic Leaderless BFT Consensus through Metastability},
author={Team Rocket and Maofan Yin and Kevin Sekniqi and Robbert van Renesse and Emin Gün Sirer},
year={2020},
eprint={1906.08936},
archivePrefix={arXiv},
primaryClass={cs.DC}
}
@MISC{Back02hashcash,
AUTHOR = {Back, Adam},
SHORTAUTHOR = {1111},
URL = {http://www.hashcash.org/hashcash.pdf},
DATE = {2002},
SORTYEAR = {2002},
TITLE = {Hashcash - A Denial of Service Counter-Measure},
}
@INPROCEEDINGS{9152680,
author={B\"{u}nz, B. and Kiffer, L. and Luu, L. and Zamani, M.},
booktitle={IEEE Symposium on Security and Privacy (S\&P)},
title={FlyClient: Super-Light Clients for Cryptocurrencies},
year={2020}
}
@article{coinprune,
author = {R. Matzutt and B. Kalde and J. Pennekamp and A. Drichel and M. Henze and K. Wehrle},
title = {Shrinking Bitcoins Blockchain Retrospectively},
journal = {IEEE Transactions on Network and Service Management},
volume = {18},
number = {3},
year = {2021},
}
@Misc{coda2020,
author = {J. Bonneau and I. Meckler and V. Rao and E. Shapiro},
title = {Coda: Decentralized Cryptocurrency at Scale},
url = {https://eprint.iacr.org/2020/352.pdf},
year = {2020},
}
@Misc{nakamoto2012bitcoin,
added-at = {2014-04-17T08:33:06.000+0200},
author = {Nakamoto, S.},
biburl = {https://www.bibsonomy.org/bibtex/23db66df0fc9fa2b5033f096a901f1c36/ngnn},
interhash = {423c2cdff70ba0cd0bca55ebb164d770},
intrahash = {3db66df0fc9fa2b5033f096a901f1c36},
keywords = {imported},
timestamp = {2014-04-17T08:33:06.000+0200},
title = {Bitcoin: A peer-to-peer electronic cash system},
howpublished = {http://www.bitcoin.org/bitcoin.pdf},
year = 2009
}
@InProceedings{10.1007/978-3-662-53357-4_5,
author="Kiayias, A.
and Lamprou, N.
and Stouka, A.-P.",
editor="Clark, J.
and Meiklejohn, S.
and R., Peter Y.A.
and Wallach, D.
and Brenner, M.
and Rohloff, K.",
title="Proofs of Proofs of Work with Sublinear Complexity",
booktitle="Financial Cryptography and Data Security",
year="2016",
publisher="Springer Berlin Heidelberg",
}
@inproceedings{10.1145/3460120.3484784,
author = {Kiayias, A. and Leonardos, N. and Zindros, D.},
title = {Mining in Logarithmic Space},
year = {2021},
isbn = {9781450384544},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/3460120.3484784},
doi = {10.1145/3460120.3484784},
booktitle = {Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (CCS)},
pages = {34873501},
numpages = {15},
keywords = {superlight clients, blockchains, nipopows, superblocks, logspace mining, proof-of-work},
}
@InProceedings{cryptoeprint:2014:765,
author="Garay, J.
and Kiayias, A.
and Leonardos, N.",
editor="Oswald, E.
and Fischlin, M.",
title="The Bitcoin Backbone Protocol: Analysis and Applications",
booktitle="Advances in Cryptology - EUROCRYPT 2015",
year="2015"
}
@inproceedings{heilman2015eclipse,
title={Eclipse attacks on bitcoins peer-to-peer network},
author={Heilman, Ethan and Kendler, Alison and Zohar, Aviv and Goldberg, Sharon},
booktitle={24th $\{$USENIX$\}$ Security Symposium ($\{$USENIX$\}$ Security 15)},
pages={129--144},
year={2015}
}
@techreport{wust2016ethereum,
title={Ethereum eclipse attacks},
author={W{\"u}st, Karl and Gervais, Arthur},
year={2016},
institution={ETH Zurich}
}
@article{jain2022extending,
title={Extending The Boundaries and Exploring The Limits Of Blockchain Compression},
author={Jain, Anurag and Anceaume, Emmanuelle and Gujar, Sujit},
year={2022}
}
@inproceedings{random-oracle,
author = {M. Bellare and P. Rogaway},
title = {Random oracles are practical: A paradigm
for designing efficient protocols},
booktitle ={ACM conference on
Computer and Communications Security (CCS)},
year = {1993}
}
@incollection{karantias2020compact,
title={Compact storage of superblocks for NIPoPoW applications},
author={Karantias, K. and Kiayias, A. and Zindros, D.},
booktitle={Mathematical Research for Blockchain Economy},
pages={77--91},
year={2020},
publisher={Springer}
}
@InProceedings{10.1007/978-3-030-51280-4_27,
author="Kiayias, A.
and Miller, A.
and Zindros, D.",
editor="Bonneau, J.
and Heninger, N.",
title="Non-interactive Proofs of Proof-of-Work",
booktitle="Financial Cryptography and Data Security",
year="2020",
publisher="Springer International Publishing",
address="Cham",
pages="505--522",
isbn="978-3-030-51280-4"
}
@book{10.5555/3002702,
author = {Wattenhofer, Roger},
title = {The Science of the Blockchain},
year = {2016},
isbn = {1522751831},
publisher = {CreateSpace Independent Publishing Platform},
address = {North Charleston, SC, USA},
edition = {1st},
abstract = {FinTech developers and managers understand that the blockchain has the potential to disrupt the financial world. The blockchain allows the participants of a distributed system to agree on a common view of the system, to track changes in the system, in a reliable way. In the distributed systems community, agreement techniques have been known long before cryptocurrencies such as Bitcoin (where the term blockchain is borrowed) emerged. Various concepts and protocols exist, each with its own advantages and disadvantages. This book introduces the basic techniques when building fault-tolerant distributed systems, in a scientific way. We will present different protocols and algorithms that allow for fault-tolerant operation, and we will discuss practical systems that implement these techniques.}
}