MoneroResearch.info hosts a collection of research papers relevant to improving Monero, powered by the WIKINDX open source software.Anyone can browse the papers. To create new entries, edit existing one, and add annotations, you must be a registered user. To register as a user, message Rucknium on Matrix at Rucknium:monero.social . At this time there is no guarantee of stability or security of this website.
Recent additions or edits (WIKINDX Master Bibliography)
Hammad, N., & Victor, F. 2024. Monero Traceability Heuristics: Wallet Application Bugs and the Mordinal-P2Pool Perspective. | |
Added by: opal 25/09/2024, 21:35 | |
Zheng, J., Huang, H., Li, C., Zheng, Z., & Guo, S. 2021, Revisiting Double-Spending Attacks on the Bitcoin Blockchain: New Findings. Paper presented at 2021 IEEE/ACM 29th International Symposium on Quality of Service (IWQOS). | |
Added by: Jack Last edited by: Jack 25/09/2024, 21:33 | |
Jiang, Y., & Zhang, J. (2024). Profitability Analysis of Time-Restricted Double-Spending Attack on PoW-Based Large Scale Blockchain With the Aid of Multiple Types of Attacks, IEEE Transactions on Information Forensics and Security, 19, 8155–8171. | |
Added by: Jack Last edited by: Jack 19/09/2024, 22:59 | |
Grunspan, C., & Perez-Marco, R. (2022). On Profitability of Nakamoto Double Spend, Probability in the Engineering and Informational Sciences, 36(3), 732–746. | |
Added by: Rucknium Last edited by: Rucknium 14/09/2024, 14:08 | |
Grunspan, C., & Perez-Marco, R. 2017. Satoshi Risk Tables. | |
Added by: Rucknium Last edited by: Rucknium 13/09/2024, 13:39 | |
Feickert, A., & Isthmus. (2024). Monero output lock analysis. Unpublished manuscript. | |
Added by: Rucknium 04/09/2024, 16:56 | |
Goodell, B. (2024). History and state of Monero security analysis. Unpublished manuscript. | |
Added by: opal 20/08/2024, 14:44 | |
Feickert, A. (2024). Salvium review. Unpublished manuscript. | |
Added by: opal Last edited by: opal 20/08/2024, 14:33 | |
Franzoni, F., & Daza, V. (2022). SoK: Network-Level Attacks on the Bitcoin P2P Network, IEEE Access, 10, 94924–94962. | |
Added by: Rucknium 09/08/2024, 19:50 | |
Franzoni, F., Salleras, X., & Daza, V. (2022). AToM: Active topology monitoring for the bitcoin peer-to-peer network, Peer-to-Peer Networking and Applications, 15(1), 408–425. | |
Added by: Rucknium 09/08/2024, 18:32 | |
Feickert, A. (2024). Veridise divisor report review. Unpublished manuscript. | |
Added by: Rucknium 09/08/2024, 18:07 | |
Bassa, A. (2024). Soundness Proof for Eagen’s Proof of Sums of Points. Unpublished manuscript. | |
Added by: Rucknium 09/08/2024, 18:02 | |
Campanelli, M., Hall-Andersen, M., & Kamp, S. H. 2022. Curve Trees: Practical and Transparent Zero-Knowledge Accumulators. [Cryptology ePrint Archive, Paper 2022/756]. | |
Added by: Rucknium Last edited by: Rucknium 09/08/2024, 17:59 | |
Feickert, A. (2024). FCMP++ review. Unpublished manuscript. | |
Added by: Rucknium 09/08/2024, 17:54 | |
Parker, L. (2024). FCMP++. Unpublished manuscript. | |
Added by: Rucknium 09/08/2024, 17:45 | |
Feickert, A. (2024). Generalized Bulletproofs. Unpublished manuscript. | |
Added by: Rucknium Last edited by: Rucknium 09/08/2024, 17:41 | |
Fomenko, O., & Sokolov, M. (2024). Bulletproofs++. Construction and Examples. Unpublished manuscript. | |
Added by: Rucknium 09/08/2024, 17:33 | |
Fanti, G., & Viswanath, P. 2017. Anonymity Properties of the Bitcoin P2P Network. | |
Added by: Rucknium Last edited by: Rucknium 01/08/2024, 16:27 | |
Bojja Venkatakrishnan, S., Fanti, G., & Viswanath, P. (2017). Dandelion: Redesigning the Bitcoin Network for Anonymity, Proc. ACM Meas. Anal. Comput. Syst. 1(1). | |
Added by: Rucknium 01/08/2024, 16:22 | |
Franzoni, F., & Daza, V. (2022). Clover: An anonymous transaction relay protocol for the bitcoin P2P network, Peer-to-Peer Networking and Applications, 15(1), 290–303. | |
Added by: Rucknium 10/07/2024, 16:09 | |
Scala, E., & Mostarda, L. 2024, Efficient Inner-Product Argument from Compressed $Sigma$-Protocols and Applications. Paper presented at International Conference on Advanced Information Networking and Applications. | |
Added by: Jack Last edited by: Jack 12/06/2024, 12:50 | |
Yue, Z., Zhu, H., Chang, X., Mišić, J., Mišić, V. B., & Fan, J. 2024. MBCT: A Monero-Based Covert Transmission Approach with On-chain Dynamic Session Key Negotiation. | |
Added by: Rucknium Last edited by: Rucknium 23/05/2024, 18:07 | |
Jiang, P., Zhu, J., & Zhu, L. (2024). Balancing Privacy and Regulation of Cross-chain Transaction Systems via SoK-assisted Policy Enhancement, IEEE Transactions on Information Forensics and Security, 1–1. | |
Added by: Rucknium Last edited by: Rucknium 23/05/2024, 18:01 | |
Shi, R., Ge, Y., Lan, L., Peng, Z., Lin, S., & Li, L. 2024, Deanonymizing Transactions Originating from Monero Tor Hidden Service Nodes. Paper presented at Companion Proceedings of the ACM on Web Conference 2024. | |
Added by: Rucknium 23/05/2024, 17:47 | |
Eagen, L. Li. E. 2022. Bulletproofs++. [Cryptology ePrint Archive, Report 2022/510]. | |
Added by: Plowsof Last edited by: Rucknium 05/04/2024, 22:13 | |
Feickert, A. 2024. Bulletproofs++ review. Cypher Stack. [Peer review] | |
Added by: Rucknium 05/04/2024, 22:08 | |
Abreu, A. S. (2023). Esquemas de privacidade nas moedas criptográficas Monero e Zcash. Unpublished Bacharelado Thesis, Universidade de São Paulo, São Paulo, Brazil. | |
Added by: Rucknium 05/04/2024, 22:07 | |
Bobolz, J., Diaz, J., & Kohlweiss, M. 2024. Foundations of Anonymous Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions. [Cryptology ePrint Archive, Paper 2024/042]. | |
Added by: Rucknium Last edited by: Rucknium 05/04/2024, 21:33 | |
Amrollahi, A., & Mofrad, M. A. 2023, Towards unraveling power dynamics in Information Systems research: A systematic literature review through the lens of activity theory. Paper presented at ACIS 2023. | |
Added by: Rucknium 05/04/2024, 21:26 | |
Otávio Chervinski, J., Kreutz, D., & Yu, J. 2021, Analysis of transaction flooding attacks against Monero. Paper presented at 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). | |
Added by: Rucknium Last edited by: Rucknium 16/03/2024, 13:00 | |
Duan, J., Zheng, S., Wang, W., Wang, L., Hu, X., & Gu, L. (2024). Concise RingCT Protocol Based on Linkable Threshold Ring Signature, IEEE Transactions on Dependable and Secure Computing, (1), 1–15. | |
Added by: Jack Last edited by: Jack 27/02/2024, 13:42 | |
Scheid, E. J., Küng, S., Franco, M., & Stiller, B. 2023, Opening Pandora's Box: An Analysis of the Usage of the Data Field in Blockchains. Paper presented at 2023 Fifth International Conference on Blockchain Computing and Applications (BCCA). | |
Added by: Rucknium Last edited by: Rucknium 10/01/2024, 16:59 | |
Vijayakumaran, S. 2023, Analysis of CryptoNote Transaction Graphs using the Dulmage-Mendelsohn Decomposition. Paper presented at 5th Conference on Advances in Financial Technologies (AFT 2023). | |
Added by: Rucknium Last edited by: Rucknium 10/01/2024, 16:22 | |
Pitu, F., & Gaitan, N. C. 2023, July, Survey of security, performance, and profitability of Monero: a browser-based cryptocurrency. Paper presented at 2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME). | |
Added by: Rucknium 06/01/2024, 17:58 | |
Tiemann, T., Berndt, S., Eisenbarth, T., & Liśkiewicz, M. 2023, July, “Act natural!”: Exchanging Private Messages on Public Blockchains. Paper presented at 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P). | |
Added by: Rucknium 06/01/2024, 17:53 | |
Zhang, T. (2023). Privacy Evaluation of Blockchain Based Privacy Cryptocurrencies: A Comparative Analysis of Dash, Monero, Verge, Zcash, and Grin, IEEE Transactions on Sustainable Computing, 8(4), 574–582. | |
Added by: Rucknium 06/01/2024, 17:50 | |
Luo, M., Zhou, J., & Yang, P. (2023). RATS: A regulatory anonymous transaction system based on blockchain, Journal of Parallel and Distributed Computing, 182, 104751. | |
Added by: Rucknium 06/01/2024, 17:44 | |
Barj, S., Ouaddah, A., & Mezrioui, A. 2023, A Review of Privacy-Preserving Cryptographic Techniques Used in Blockchain Platforms. Paper presented at Digital Technologies and Applications. | |
Added by: Rucknium 06/01/2024, 17:36 | |
Yu, Q., Liao, S., Wang, L., Yu, Y., Zhang, L., & Zhao, Y. (2024). A regulated anonymous cryptocurrency with batch linkability, Computer Standards & Interfaces, 87, 103770. | |
Added by: Rucknium 06/01/2024, 17:26 | |
Raikwar, M., Wu, S., & Gjos*****, K. 2023, Security Model for Privacy-Preserving Blockchain-Based Cryptocurrency Systems. Paper presented at Network and System Security. | |
Added by: Rucknium 06/01/2024, 17:22 | |
Wicht, F.-X., Wang, Z., Le, D. V., & Cachin, C. 2023. A Transaction-Level Model for Blockchain Privacy. [Cryptology ePrint Archive, Paper 2023/1902]. | |
Added by: Rucknium 06/01/2024, 17:04 | |
Wang, X., Lin, C., Huang, X., & He, D. (2023). Anonymity-Enhancing Multi-Hop Locks for Monero-Enabled Payment Channel Networks, IEEE Transactions on Information Forensics and Security, 1–1. | |
Added by: Rucknium 06/01/2024, 16:59 | |
Zhang, J., Su, M., Liu, X., & Wang, G. 2024, May, Springproofs: Efficient Inner Product Arguments for Vectors of Arbitrary Length. Paper presented at 2024 IEEE Symposium on Security and Privacy (SP). | |
Added by: Rucknium 06/01/2024, 16:50 | |
Badertscher, C., Sedaghat, M., & Waldner, H. 2023. Fine-Grained Accountable Privacy via Unlinkable Policy-Compliant Signatures. [Cryptology ePrint Archive, Paper 2023/1070]. | |
Added by: Rucknium Last edited by: Rucknium 05/01/2024, 22:08 | |
Szalaty, Z. E. (2023). Privacy preserving blockchains and quantum safety. Unpublished Master's Thesis Universitat Oberta de Catalunya. | |
Added by: Rucknium Last edited by: Rucknium 05/01/2024, 22:01 | |
Buccafurri, F., De Angelis, V., & Lazzaro, S. 2023, May 25–26, A Traffic-Analysis Proof Solution to Allow K-Anonymous Payments in Pseudonymous Blockchains. Unpublished paper presented at 5th Distributed Ledger Technology Workshop. | |
Added by: Rucknium 05/01/2024, 20:51 | |
Dijk, A., & Schröder, D. (2023). Proof of concept for a Ethereum Virtual Machine on Cryptonote. Unpublished manuscript. | |
Added by: Rucknium 05/01/2024, 20:32 | |
Jin, R. (2023). The Advance of Ring Confidential Transactions, Highlights in Science, Engineering and Technology, 39, 1104–1110. | |
Added by: Rucknium Last edited by: Rucknium 05/01/2024, 19:46 | |
Zhang, T., Li, B., Zhu, Y., Han, T., & Wu, Q. (2023). Covert channels in blockchain and blockchain based covert communication: Overview, state-of-the-art, and future directions, Computer Communications, 205, 136–146. | |
Added by: Rucknium 05/01/2024, 19:23 | |
Huang, K., Mu, Y., Rezaeibagha, F., Zhang, X., & Li, X. (2023). Monero with Multi-Grained Redaction, IEEE Transactions on Dependable and Secure Computing, 1–13. | |
Added by: Rucknium 05/01/2024, 19:16 | |