Blocks and chains: introduction to bitcoin, cryptocurrencies, and their consensus mechanisms A Judmayer, N Stifter, K Krombholz, E Weippl Morgan & Claypool Publishers, 2017 | 133 | 2017 |
Hydrand: Efficient continuous distributed randomness P Schindler, A Judmayer, N Stifter, E Weippl 2020 IEEE Symposium on Security and Privacy (SP), 73-89, 2020 | 126 | 2020 |
A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice: (Short Paper) A Zamyatin, N Stifter, A Judmayer, P Schindler, E Weippl, WJ Knottenbelt Financial Cryptography and Data Security: FC 2018 International Workshops …, 2019 | 87 | 2019 |
Merged mining: Curse or cure? A Judmayer, A Zamyatin, N Stifter, AG Voyiatzis, E Weippl Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS …, 2017 | 58 | 2017 |
Randrunner: Distributed randomness from trapdoor vdfs with strong uniqueness P Schindler, A Judmayer, M Hittmeir, N Stifter, E Weippl | 57 | 2021 |
Ethdkg: Distributed key generation with ethereum smart contracts P Schindler, A Judmayer, N Stifter, E Weippl Cryptology ePrint Archive, 2019 | 54 | 2019 |
Agreement with satoshi–on the formalization of nakamoto consensus N Stifter, A Judmayer, P Schindler, A Zamyatin, E Weippl Cryptology ePrint Archive, 2018 | 48 | 2018 |
Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies. A Judmayer, N Stifter, A Zamyatin, I Tsabary, I Eyal, P Gazi, S Meiklejohn, ... IACR Cryptol. ePrint Arch. 2019, 775, 2019 | 47 | 2019 |
Estimating (miner) extractable value is hard, let’s go shopping! A Judmayer, N Stifter, P Schindler, E Weippl International Conference on Financial Cryptography and Data Security, 74-92, 2022 | 28 | 2022 |
Revisiting practical byzantine fault tolerance through blockchain technologies N Stifter, A Judmayer, E Weippl Security and Quality in Cyber-Physical Systems Engineering: With Forewords …, 2019 | 24 | 2019 |
Methods for decentralized identities: Evaluation and insights W Fdhila, N Stifter, K Kostal, C Saglam, M Sabadello Business Process Management: Blockchain and Robotic Process Automation Forum …, 2021 | 22 | 2021 |
Flux: Revisiting near blocks for proof-of-work blockchains A Zamyatin, N Stifter, P Schindler, E Weippl, WJ Knottenbelt Cryptology ePrint Archive, 2018 | 21 | 2018 |
Sok: Algorithmic incentive manipulation attacks on permissionless pow cryptocurrencies A Judmayer, N Stifter, A Zamyatin, I Tsabary, I Eyal, P Gaži, S Meiklejohn, ... Financial Cryptography and Data Security. FC 2021 International Workshops …, 2021 | 20 | 2021 |
Pitchforks in cryptocurrencies: enforcing rule changes through offensive forking-and consensus techniques (short paper) A Judmayer, N Stifter, P Schindler, E Weippl Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS …, 2018 | 17 | 2018 |
Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies.(2019) A Judmayer, N Stifter, A Zamyatin, I Tsabary, I Eyal, P Gaži, S Meiklejohn, ... | 16* | 2019 |
Pay to win: Cheap, crowdfundable, cross-chain algorithmic incentive manipulation attacks on pow cryptocurrencies A Judmayer, N Stifter, A Zamyatin, I Tsabary, I Eyal, P Gazi, S Meiklejohn, ... Cryptology ePrint Archive, 2019 | 15 | 2019 |
Proof-of-blackouts? how proof-of-work cryptocurrencies could affect power grids J Ullrich, N Stifter, A Judmayer, A Dabrowski, E Weippl Research in Attacks, Intrusions, and Defenses: 21st International Symposium …, 2018 | 15 | 2018 |
Avoiding Risky Designs When Using Blockchain Technologies in Cyber-Physical Systems N Stifter, M Eckhart, B Brenner, E Weippl 24th IEEE Conference on Emerging Technologies and Factory Automation, 2019 | 9 | 2019 |
Echoes of the past: Recovering blockchain metrics from merged mining N Stifter, P Schindler, A Judmayer, A Zamyatin, A Kern, E Weippl Financial Cryptography and Data Security: 23rd International Conference, FC …, 2019 | 7 | 2019 |
What is Meant by Permissionless Blockchains? N Stifter, A Judmayer, P Schindler, A Kern, W Fdhila https://eprint.iacr.org/2021/023.pdf, 2021 | 6 | 2021 |