Secure high-rate transaction processing in bitcoin Y Sompolinsky, A Zohar Financial Cryptography and Data Security: 19th International Conference, FC …, 2015 | 1263* | 2015 |
Eclipse attacks on {Bitcoin’s}{peer-to-peer} network E Heilman, A Kendler, A Zohar, S Goldberg 24th USENIX security symposium (USENIX security 15), 129-144, 2015 | 1090 | 2015 |
Optimal selfish mining strategies in bitcoin A Sapirshtein, Y Sompolinsky, A Zohar Financial Cryptography and Data Security: 20th International Conference, FC …, 2017 | 795 | 2017 |
Hijacking bitcoin: Routing attacks on cryptocurrencies M Apostolaki, A Zohar, L Vanbever 2017 IEEE symposium on security and privacy (SP), 375-392, 2017 | 660 | 2017 |
Inclusive block chain protocols Y Lewenberg, Y Sompolinsky, A Zohar Financial Cryptography and Data Security: 19th International Conference, FC …, 2015 | 458 | 2015 |
Bitcoin: under the hood A Zohar Communications of the ACM 58 (9), 104-113, 2015 | 400 | 2015 |
Spectre: A fast and scalable cryptocurrency protocol Y Sompolinsky, Y Lewenberg, A Zohar Cryptology ePrint Archive, 2016 | 396 | 2016 |
On bitcoin and red balloons M Babaioff, S Dobzinski, S Oren, A Zohar Proceedings of the 13th ACM conference on electronic commerce, 56-73, 2012 | 393 | 2012 |
Bitcoin mining pools: A cooperative game theoretic analysis Y Lewenberg, Y Bachrach, Y Sompolinsky, A Zohar, JS Rosenschein Proceedings of the 2015 international conference on autonomous agents and …, 2015 | 336 | 2015 |
PHANTOM GHOSTDAG: a scalable generalization of Nakamoto consensus: September 2, 2021 Y Sompolinsky, S Wyborski, A Zohar Proceedings of the 3rd ACM Conference on Advances in Financial Technologies …, 2021 | 313* | 2021 |
On the complexity of achieving proportional representation AD Procaccia, JS Rosenschein, A Zohar Social Choice and Welfare 30 (3), 353-362, 2008 | 201 | 2008 |
Complexity of strategic behavior in multi-winner elections R Meir, AD Procaccia, JS Rosenschein, A Zohar Journal of Artificial Intelligence Research 33, 149-178, 2008 | 131 | 2008 |
Mechanisms for multi-level marketing Y Emek, R Karidi, M Tennenholtz, A Zohar Proceedings of the 12th ACM conference on Electronic commerce, 209-218, 2011 | 126 | 2011 |
Interdomain routing and games H Levin, M Schapira, A Zohar Proceedings of the fortieth annual ACM symposium on Theory of computing, 57-66, 2008 | 113 | 2008 |
Redesigning bitcoin’s fee market R Lavi, O Sattath, A Zohar ACM Transactions on Economics and Computation 10 (1), 1-31, 2022 | 112 | 2022 |
Bitcoin's security model revisited Y Sompolinsky, A Zohar arXiv preprint arXiv:1605.09193, 2016 | 101 | 2016 |
Exploiting problem symmetries in state-based planners N Pochter, A Zohar, J Rosenschein Proceedings of the AAAI conference on artificial intelligence 25 (1), 1004-1009, 2011 | 96 | 2011 |
Survey on blockchain networking: Context, state-of-the-art, challenges M Dotan, YA Pignolet, S Schmid, S Tochner, A Zohar ACM Computing Surveys (CSUR) 54 (5), 1-34, 2021 | 87 | 2021 |
Congestion attacks in payment channel networks A Mizrahi, A Zohar International conference on financial cryptography and data security, 170-188, 2021 | 87 | 2021 |
Multi-Winner Elections: Complexity of Manipulation, Control and Winner-Determination. AD Procaccia, JS Rosenschein, A Zohar IJCAI 7, 1476-1481, 2007 | 78 | 2007 |