Majority is not enough: Bitcoin mining is vulnerable I Eyal, EG Sirer Eighteenth International Conference on Financial Cryptography and Data …, 2014 | 2980* | 2014 |
Bitcoin-NG: A Scalable Blockchain Protocol I Eyal, AE Gencer, EG Sirer, R Van Renesse 13th USENIX symposium on networked systems design and implementation (NSDI …, 2016 | 1768 | 2016 |
On Scaling Decentralized Blockchains: (A Position Paper) K Croman, C Decker, I Eyal, AE Gencer, A Juels, A Kosba, A Miller, ... International conference on financial cryptography and data security, 106-125, 2016 | 1612 | 2016 |
The Miner's Dilemma I Eyal Proceedings of the 36th IEEE Symposium on Security and Privacy (Oakland), 2015 | 571 | 2015 |
Decentralization in bitcoin and ethereum networks AE Gencer, S Basu, I Eyal, R Van Renesse, EG Sirer Financial Cryptography and Data Security: 22nd International Conference, FC …, 2018 | 493 | 2018 |
Blockchain technology: Transforming libertarian cryptocurrency dreams to finance and banking realities I Eyal Computer 50 (9), 38-49, 2017 | 398 | 2017 |
Teechain: a secure payment network with asynchronous blockchain access J Lind, O Naor, I Eyal, F Kelbert, EG Sirer, P Pietzuch Proceedings of the 27th ACM Symposium on Operating Systems Principles, 63-79, 2019 | 294* | 2019 |
Design choices for central bank digital currency: Policy and technical considerations S Allen, S Čapkun, I Eyal, G Fanti, BA Ford, J Grimmelmann, A Juels, ... National Bureau of Economic Research, 2020 | 177 | 2020 |
REM: Resource-Efficient Mining for Blockchains F Zhang, I Eyal, R Escriva, A Juels, R van Renesse 26th USENIX Security Symposium (USENIX Security 17), 1427--1444, 2017 | 169 | 2017 |
The gap game I Tsabary, I Eyal Proceedings of the 2018 ACM SIGSAC conference on Computer and Communications …, 2018 | 121 | 2018 |
BDoS: Blockchain Denial of Service M Mirkin, Y Ji, J Pang, A Klages-Mundt, I Eyal, A Juels arXiv preprint arXiv:1912.07497, 2019 | 101 | 2019 |
Teechan: Payment channels using trusted execution environments J Lind, I Eyal, P Pietzuch, EG Sirer arXiv preprint arXiv:1612.07766, 2016 | 99 | 2016 |
Bitcoin covenants M Möser, I Eyal, E Gün Sirer Financial Cryptography and Data Security: FC 2016 International Workshops …, 2016 | 89 | 2016 |
Robust data sharing with key-value stores C Basescu, C Cachin, I Eyal, R Haas, M Vukolic Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of …, 2011 | 83 | 2011 |
MAD-HTLC: because HTLC is crazy-cheap to attack I Tsabary, M Yechieli, A Manuskin, I Eyal 2021 IEEE Symposium on Security and Privacy (SP), 1230-1248, 2021 | 65 | 2021 |
How to disincentivize large bitcoin mining pools I Eyal, EG Sirer Blog post: http://hackingdistributed. com/2014/06/18/how-to-disincentivize …, 2014 | 63 | 2014 |
Ostraka: Secure blockchain scaling by node sharding A Manuskin, M Mirkin, I Eyal 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020 | 60 | 2020 |
Blockchain payment channels with trusted execution environments I Eyal, EG Sirer, PR Pietzuch, JD Lind US Patent App. 16/100,689, 2019 | 56 | 2019 |
Pay-To-Win: Cheap, Crowdfundable, Cross-chain Incentive Manipulation Attacks on Cryptocurrencies A Judmayer, N Stifter, A Zamyatin, I Tsabary, I Eyal, P Gazi, S Meiklejohn, ... IACR Cryptol ePrint Arch 775, 2019 | 47* | 2019 |
Efficient MDP analysis for selfish-mining in blockchains R Bar-Zur, I Eyal, A Tamar Proceedings of the 2nd ACM Conference on Advances in Financial Technologies …, 2020 | 39 | 2020 |