Files
Variable_MLS/ccs-sample.bib
2023-06-20 15:04:03 +00:00

232 lines
7.3 KiB
BibTeX
Raw Blame History

This file contains ambiguous Unicode characters
This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.
@article{nakamoto2008bitcoin,
title={Bitcoin: A peer-to-peer electronic cash system},
author={Nakamoto, Satoshi},
journal={Decentralized Business Review},
pages={21260},
year={2008}
}
@inproceedings{kiayias2021mining,
title={Mining in Logarithmic Space},
author={Kiayias, Aggelos and Leonardos, Nikos and Zindros, Dionysis},
booktitle={Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security},
pages={3487--3501},
year={2021}
}
@inproceedings{garay2015bitcoin,
title={The bitcoin backbone protocol: Analysis and applications},
author={Garay, Juan and Kiayias, Aggelos and Leonardos, Nikos},
booktitle={Annual international conference on the theory and applications of cryptographic techniques},
pages={281--310},
year={2015},
organization={Springer}
}
@inproceedings{garay2017bitcoin,
title={The bitcoin backbone protocol with chains of variable difficulty},
author={Garay, Juan and Kiayias, Aggelos and Leonardos, Nikos},
booktitle={Annual International Cryptology Conference},
pages={291--323},
year={2017},
organization={Springer}
}
@phdthesis{zindros2020decentralized,
title={Decentralized Blockchain Interoperability},
author={Zindros, Dionysis},
year={2020},
school={E$\theta$$\nu$$\iota$$\kappa${\'o} $\kappa$$\alpha$$\iota$ K$\alpha$$\pi$o$\delta$$\iota$$\sigma$$\tau$$\rho$$\iota$$\alpha$$\kappa${\'o} $\Pi$$\alpha$$\nu$$\varepsilon$$\pi$$\iota$$\sigma$$\tau$$\acute{\eta}$$\mu$$\iota$o A$\theta$$\eta$$\nu$$\acute{\omega}$$\nu$ (EK$\Pi$A). $\Sigma$$\chi$o$\lambda$$\acute{\eta}$ $\Theta$$\varepsilon$$\tau$$\iota$$\kappa$$\acute{\omega}$$\nu$ E$\pi$$\iota$$\sigma$$\tau$$\eta$$\mu$$\acute{\omega}$$\nu$~…}
}
@INPROCEEDINGS{AGLS18,
AUTHOR = {Anceaume, E. and Guellier, A. and Ludinard, R. and Sericola, B.},
SHORTAUTHOR = {1111},
URL = {https://hal.archives-ouvertes.fr/hal-01888265/document},
BOOKTITLE = {{17th IEEE International Symposium on Network Computing and Applications}},
DATE = {2018},
SERIES = {NCA},
SORTYEAR = {2018},
TITLE = {{Sycomore : a Permissionless Distributed Ledger that self-adapts to Transactions Demand}},
}
@MISC{byteball,
AUTHOR = {Churyumov, A.},
SHORTAUTHOR = {1111},
URL = {https://byteball.org/Byteball.pdf},
DATE = {2017},
SORTYEAR = {2017},
TITLE = {{ByteBall : A Decentralized System for Storage and Transfer of Value}},
}
@MISC{iota,
AUTHOR = {Popov, S.},
SHORTAUTHOR = {1111},
URL = {https://assets.ctfassets.net/r1dr6vzfxhev/2t4uxvsIqk0EUau6g2sw0g/45eae33637ca92f85dd9f4a3a218e1ec/iota1_4_3.pdf},
DATE = {2017},
SORTYEAR = {2017},
TITLE = {The tangle},
}
@MISC{hashgraph,
AUTHOR = {Baird, L.},
SHORTAUTHOR = {1111},
URL = {http://www.swirlds.com/downloads/SWIRLDS-TR-2016-01.pdf},
DATE = {2016},
SORTYEAR = {2016},
TITLE = {{The SWIRLDS Hashgraph Consensus Algorithm: Fair, Fast, Byzantine Fault Tolerance}},
}
@misc{rocket2020scalable,
title={Scalable and Probabilistic Leaderless BFT Consensus through Metastability},
author={Team Rocket and Maofan Yin and Kevin Sekniqi and Robbert van Renesse and Emin Gün Sirer},
year={2020},
eprint={1906.08936},
archivePrefix={arXiv},
primaryClass={cs.DC}
}
@MISC{Back02hashcash,
AUTHOR = {Back, Adam},
SHORTAUTHOR = {1111},
URL = {http://www.hashcash.org/hashcash.pdf},
DATE = {2002},
SORTYEAR = {2002},
TITLE = {Hashcash - A Denial of Service Counter-Measure},
}
@INPROCEEDINGS{9152680,
author={B\"{u}nz, B. and Kiffer, L. and Luu, L. and Zamani, M.},
booktitle={IEEE Symposium on Security and Privacy (S\&P)},
title={FlyClient: Super-Light Clients for Cryptocurrencies},
year={2020}
}
@article{coinprune,
author = {R. Matzutt and B. Kalde and J. Pennekamp and A. Drichel and M. Henze and K. Wehrle},
title = {Shrinking Bitcoins Blockchain Retrospectively},
journal = {IEEE Transactions on Network and Service Management},
volume = {18},
number = {3},
year = {2021},
}
@Misc{coda2020,
author = {J. Bonneau and I. Meckler and V. Rao and E. Shapiro},
title = {Coda: Decentralized Cryptocurrency at Scale},
url = {https://eprint.iacr.org/2020/352.pdf},
year = {2020},
}
@Misc{nakamoto2012bitcoin,
added-at = {2014-04-17T08:33:06.000+0200},
author = {Nakamoto, S.},
biburl = {https://www.bibsonomy.org/bibtex/23db66df0fc9fa2b5033f096a901f1c36/ngnn},
interhash = {423c2cdff70ba0cd0bca55ebb164d770},
intrahash = {3db66df0fc9fa2b5033f096a901f1c36},
keywords = {imported},
timestamp = {2014-04-17T08:33:06.000+0200},
title = {Bitcoin: A peer-to-peer electronic cash system},
howpublished = {http://www.bitcoin.org/bitcoin.pdf},
year = 2009
}
@InProceedings{10.1007/978-3-662-53357-4_5,
author="Kiayias, A.
and Lamprou, N.
and Stouka, A.-P.",
editor="Clark, J.
and Meiklejohn, S.
and R., Peter Y.A.
and Wallach, D.
and Brenner, M.
and Rohloff, K.",
title="Proofs of Proofs of Work with Sublinear Complexity",
booktitle="Financial Cryptography and Data Security",
year="2016",
publisher="Springer Berlin Heidelberg",
}
@inproceedings{10.1145/3460120.3484784,
author = {Kiayias, A. and Leonardos, N. and Zindros, D.},
title = {Mining in Logarithmic Space},
year = {2021},
isbn = {9781450384544},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/3460120.3484784},
doi = {10.1145/3460120.3484784},
booktitle = {Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (CCS)},
pages = {34873501},
numpages = {15},
keywords = {superlight clients, blockchains, nipopows, superblocks, logspace mining, proof-of-work},
}
@InProceedings{cryptoeprint:2014:765,
author="Garay, J.
and Kiayias, A.
and Leonardos, N.",
editor="Oswald, E.
and Fischlin, M.",
title="The Bitcoin Backbone Protocol: Analysis and Applications",
booktitle="Advances in Cryptology - EUROCRYPT 2015",
year="2015"
}
@inproceedings{heilman2015eclipse,
title={Eclipse attacks on bitcoins peer-to-peer network},
author={Heilman, Ethan and Kendler, Alison and Zohar, Aviv and Goldberg, Sharon},
booktitle={24th $\{$USENIX$\}$ Security Symposium ($\{$USENIX$\}$ Security 15)},
pages={129--144},
year={2015}
}
@techreport{wust2016ethereum,
title={Ethereum eclipse attacks},
author={W{\"u}st, Karl and Gervais, Arthur},
year={2016},
institution={ETH Zurich}
}
@article{jain2022extending,
title={Extending The Boundaries and Exploring The Limits Of Blockchain Compression},
author={Jain, Anurag and Anceaume, Emmanuelle and Gujar, Sujit},
year={2022}
}
@inproceedings{random-oracle,
author = {M. Bellare and P. Rogaway},
title = {Random oracles are practical: A paradigm
for designing efficient protocols},
booktitle ={ACM conference on
Computer and Communications Security (CCS)},
year = {1993}
}
@incollection{karantias2020compact,
title={Compact storage of superblocks for NIPoPoW applications},
author={Karantias, K. and Kiayias, A. and Zindros, D.},
booktitle={Mathematical Research for Blockchain Economy},
pages={77--91},
year={2020},
publisher={Springer}
}
@InProceedings{10.1007/978-3-030-51280-4_27,
author="Kiayias, A.
and Miller, A.
and Zindros, D.",
editor="Bonneau, J.
and Heninger, N.",
title="Non-interactive Proofs of Proof-of-Work",
booktitle="Financial Cryptography and Data Security",
year="2020",
publisher="Springer International Publishing",
address="Cham",
pages="505--522",
isbn="978-3-030-51280-4"
}