


default search action
Andrew Miller 0001
Person information
- affiliation: University of Illinois, Urbana-Champaign, USA
- affiliation (PhD 2016): University of Maryland, College Park, MD, USA
Other persons with the same name
- Andrew Miller — disambiguation page
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Nerla Jean-Louis, Yunqi Li, Yan Ji, Harjasleen Malvai, Thomas Yurek, Sylvain Bellemare, Andrew Miller:
SGXonerate:Finding (and Partially Fixing) Privacy Flaws in TEE-based Smart Contract Platforms Without Breaking the TEE. Proc. Priv. Enhancing Technol. 2024(1): 617-634 (2024) - [c42]Yunqi Li
, Kyle Soska
, Zhen Huang
, Sylvain Bellemare
, Mikerah Quintyne-Collins
, Lun Wang
, Xiaoyuan Liu
, Dawn Song
, Andrew Miller
:
Ratel: MPC-extensions for Smart Contracts. AsiaCCS 2024 - [c41]Tanusree Sharma, Yujin Potter, Kornrapat Pongmala, Henry Wang, Andrew Miller, Dawn Song, Yang Wang:
Unpacking How Decentralized Autonomous Organizations (DAOs) Work in Practice. ICBC 2024: 416-424 - [c40]Stephan van Schaik, Alexander Seto, Thomas Yurek, Adam Batori, Bader AlBassam, Daniel Genkin, Andrew Miller, Eyal Ronen, Yuval Yarom, Christina Garman:
SoK: SGX.Fail: How Stuff Gets eXposed. SP 2024: 4143-4162 - [i42]Kushal Babel, Nerla Jean-Louis, Yan Ji, Ujval Misra, Mahimna Kelkar, Kosala Yapa Mudiyanselage, Andrew Miller, Ari Juels:
PROF: Protected Order Flow in a Profit-Seeking World. CoRR abs/2408.02303 (2024) - [i41]Tanusree Sharma, Yujin Potter, Kornrapat Pongmala, Henry Wang, Andrew Miller, Dawn Song, Yang Wang:
Future of Algorithmic Organization: Large-Scale Analysis of Decentralized Autonomous Organizations (DAOs). CoRR abs/2410.13095 (2024) - [i40]Zerui Cheng, Edoardo Contente, Ben Finch, Oleg Golev, Jonathan Hayase, Andrew Miller, Niusha Moshrefi, Anshul Nasery, Sandeep Nailwal, Sewoong Oh, Himanshu Tyagi, Pramod Viswanath:
OML: Open, Monetizable, and Loyal AI. CoRR abs/2411.03887 (2024) - [i39]Harjasleen Malvai, Gregory Neven, Andrew Miller, Siam Hussain:
Practical Proofs of Parsing for Context-free Grammars. IACR Cryptol. ePrint Arch. 2024: 562 (2024) - [i38]Kushal Babel, Nerla Jean-Louis, Yan Ji, Ujval Misra, Mahimna Kelkar, Kosala Yapa Mudiyanselage, Andrew Miller, Ari Juels:
PROF: Protected Order Flow in a Profit-Seeking World. IACR Cryptol. ePrint Arch. 2024: 1241 (2024) - [i37]Zerui Cheng, Edoardo Contente, Ben Finch, Oleg Golev, Jonathan Hayase, Andrew Miller, Niusha Moshrefi, Anshul Nasery, Sandeep Nailwal, Sewoong Oh, Himanshu Tyagi, Pramod Viswanath:
OML: Open, Monetizable, and Loyal AI. IACR Cryptol. ePrint Arch. 2024: 1573 (2024) - [i36]Mahimna Kelkar, Yunqi Li, Nerla Jean-Louis, Carolina Ortega Pérez, Kushal Babel, Andrew Miller, Ari Juels:
The Sting Framework: Proving the Existence of Superclass Adversaries. IACR Cryptol. ePrint Arch. 2024: 1676 (2024) - 2023
- [c39]Jens Ernstberger, Jan Lauinger, Fatima Elsheimy, Liyi Zhou, Sebastian Steinhorst
, Ran Canetti, Andrew Miller, Arthur Gervais, Dawn Song:
SoK: Data Sovereignty. EuroS&P 2023: 122-143 - [c38]Tanusree Sharma, Kyrie Zhixuan Zhou, Andrew Miller, Yang Wang:
A Mixed-Methods Study of Security Practices of Smart Contract Developers. USENIX Security Symposium 2023: 2545-2562 - [c37]Thomas Yurek, Zhuolun Xiang, Yu Xia, Andrew Miller:
Long Live The Honey Badger: Robust Asynchronous DPSS and its Applications. USENIX Security Symposium 2023: 5413-5430 - [i35]Tanusree Sharma, Yujin Kwon, Kornrapat Pongmala, Henry Wang, Andrew Miller, Dawn Song, Yang Wang:
Unpacking How Decentralized Autonomous Organizations (DAOs) Work in Practice. CoRR abs/2304.09822 (2023) - [i34]Nerla Jean-Louis, Yunqi Li, Yan Ji, Harjasleen Malvai, Thomas Yurek, Sylvain Bellemare, Andrew Miller:
SGXonerated: Finding (and Partially Fixing) Privacy Flaws in TEE-based Smart Contract Platforms Without Breaking the TEE. IACR Cryptol. ePrint Arch. 2023: 378 (2023) - [i33]Jens Ernstberger, Jan Lauinger, Fatima Elsheimy, Liyi Zhou, Sebastian Steinhorst, Ran Canetti, Andrew Miller, Arthur Gervais, Dawn Song:
SoK: Data Sovereignty. IACR Cryptol. ePrint Arch. 2023: 967 (2023) - [i32]Yunqi Li, Kyle Soska, Zhen Huang, Sylvain Bellemare, Mikerah Quintyne-Collins, Lun Wang, Xiaoyuan Liu, Dawn Song, Andrew Miller:
Ratel: MPC-extensions for Smart Contracts. IACR Cryptol. ePrint Arch. 2023: 1909 (2023) - 2022
- [c36]Thomas Yurek, Licheng Luo, Jaiden Fairoze, Aniket Kate, Andrew Miller:
hbACSS: How to Robustly Share Many Secrets. NDSS 2022 - [c35]Sourav Das, Thomas Yurek, Zhuolun Xiang, Andrew Miller, Lefteris Kokoris-Kogias, Ling Ren:
Practical Asynchronous Distributed Key Generation. SP 2022: 2518-2534 - [i31]Tanusree Sharma, Kyrie Zhixuan Zhou, Andrew Miller, Yang Wang:
Exploring Security Practices of Smart Contract Developers. CoRR abs/2204.11193 (2022) - [i30]Thomas Yurek, Zhuolun Xiang, Yu Xia, Andrew Miller:
Long Live The Honey Badger: Robust Asynchronous DPSS and its Applications. IACR Cryptol. ePrint Arch. 2022: 971 (2022) - 2021
- [c34]Sanket Kanjalkar, Ye Zhang, Shreyas Gandlur, Andrew Miller:
Publicly Auditable MPC-as-a-Service with succinct verification and universal setup. EuroS&P Workshops 2021: 386-411 - [c33]George Kappos, Haaroon Yousaf
, Ania M. Piotrowska, Sanket Kanjalkar, Sergi Delgado-Segura, Andrew Miller, Sarah Meiklejohn:
An Empirical Analysis of Privacy in the Lightning Network. Financial Cryptography (1) 2021: 167-186 - [c32]Deepak Maram
, Harjasleen Malvai, Fan Zhang
, Nerla Jean-Louis, Alexander Frolov, Tyler Kell
, Tyrone Lobban, Christine Moy, Ari Juels, Andrew Miller:
CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability. SP 2021: 1348-1366 - [i29]Sanket Kanjalkar, Ye Zhang, Shreyas Gandlur, Andrew Miller:
Publicly Auditable MPC-as-a-Service with succinct verification and universal setup. CoRR abs/2107.04248 (2021) - [i28]Thomas Yurek, Licheng Luo, Jaiden Fairoze, Aniket Kate, Andrew Miller:
hbACSS: How to Robustly Share Many Secrets. IACR Cryptol. ePrint Arch. 2021: 159 (2021) - [i27]Sourav Das, Tom Yurek, Zhuolun Xiang, Andrew Miller, Lefteris Kokoris-Kogias, Ling Ren:
Practical Asynchronous Distributed Key Generation. IACR Cryptol. ePrint Arch. 2021: 1591 (2021) - 2020
- [j6]Fan Zhang
, Warren He, Raymond Cheng, Jernej Kos, Nicholas Hynes, Noah M. Johnson, Ari Juels, Andrew Miller, Dawn Song:
The Ekiden Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts. IEEE Secur. Priv. 18(3): 17-27 (2020) - [c31]Aggelos Kiayias, Andrew Miller, Dionysis Zindros:
Non-interactive Proofs of Proof-of-Work. Financial Cryptography 2020: 505-522 - [i26]George Kappos, Haaroon Yousaf, Ania M. Piotrowska, Sanket Kanjalkar, Sergi Delgado-Segura, Andrew Miller, Sarah Meiklejohn:
An Empirical Analysis of Privacy in the Lightning Network. CoRR abs/2003.12470 (2020) - [i25]Deepak Maram, Harjasleen Malvai, Fan Zhang, Nerla Jean-Louis, Alexander Frolov, Tyler Kell, Tyrone Lobban, Christine Moy, Ari Juels, Andrew Miller:
CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability. IACR Cryptol. ePrint Arch. 2020: 934 (2020)
2010 – 2019
- 2019
- [j5]Moritz Schneider
, Sinisa Matetic, Ari Juels, Andrew Miller, Srdjan Capkun:
Secure Brokered Delegation Through DelegaTEE. IEEE Secur. Priv. 17(4): 43-52 (2019) - [c30]Patrick McCorry, Surya Bakshi, Iddo Bentov, Sarah Meiklejohn, Andrew Miller:
Pisa: Arbitration Outsourcing for State Channels. AFT 2019: 16-30 - [c29]Donghang Lu, Thomas Yurek, Samarth Kulshreshtha, Rahul Govind
, Aniket Kate, Andrew Miller:
HoneyBadgerMPC and AsynchroMix: Practical Asynchronous MPC and its Application to Anonymous Communication. CCS 2019: 887-903 - [c28]Raymond Cheng, Fan Zhang
, Jernej Kos, Warren He, Nicholas Hynes, Noah M. Johnson, Ari Juels, Andrew Miller, Dawn Song:
Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts. EuroS&P 2019: 185-200 - [c27]Patrick McCorry, Chris Buckland, Surya Bakshi, Karl Wüst, Andrew Miller:
You Sank My Battleship! A Case Study to Evaluate State Channels as a Scaling Solution for Cryptocurrencies. Financial Cryptography Workshops 2019: 35-49 - [c26]Sanket Kanjalkar, Joseph Kuo, Yunqi Li, Andrew Miller:
Short Paper: I Can't Believe It's Not Stake! Resource Exhaustion Attacks on PoS. Financial Cryptography 2019: 62-69 - [c25]Andrew Miller, Iddo Bentov, Surya Bakshi, Ranjit Kumaresan, Patrick McCorry:
Sprites and State Channels: Payment Networks that Go Faster Than Lightning. Financial Cryptography 2019: 508-526 - [c24]Sergi Delgado-Segura, Surya Bakshi, Cristina Pérez-Solà
, James Litton, Andrew Pachulski, Andrew Miller, Bobby Bhattacharjee:
TxProbe: Discovering Bitcoin's Network Topology Using Orphan Transactions. Financial Cryptography 2019: 550-566 - [c23]Kevin Liao, Matthew A. Hammer, Andrew Miller:
ILC: a calculus for composable, computational cryptography. PLDI 2019: 640-654 - [c22]Amin Kharraz, Zane Ma, Paul Murley, Charles Lever, Joshua Mason, Andrew Miller, Nikita Borisov
, Manos Antonakakis, Michael D. Bailey:
Outguard: Detecting In-Browser Covert Cryptocurrency Mining in the Wild. WWW 2019: 840-852 - [i24]Aniket Kate, Andrew Miller, Tom Yurek:
Brief Note: Asynchronous Verifiable Secret Sharing with Optimal Resilience and Linear Amortized Overhead. CoRR abs/1902.06095 (2019) - [i23]Kevin Liao, Matthew A. Hammer, Andrew Miller:
ILC: A Calculus for Composable, Computational Cryptography. IACR Cryptol. ePrint Arch. 2019: 402 (2019) - [i22]Donghang Lu, Thomas Yurek, Samarth Kulshreshtha, Rahul Govind, Rahul Mahadev, Aniket Kate, Andrew Miller:
HoneyBadgerMPC and AsynchroMix: Practical AsynchronousMPC and its Application to Anonymous Communication. IACR Cryptol. ePrint Arch. 2019: 883 (2019) - 2018
- [j4]Giulia Fanti, Shaileshh Bojja Venkatakrishnan
, Surya Bakshi, Bradley Denby, Shruti Bhargava, Andrew Miller, Pramod Viswanath:
Dandelion++: Lightweight Cryptocurrency Networking with Formal Anonymity Guarantees. Proc. ACM Meas. Anal. Comput. Syst. 2(2): 29:1-29:35 (2018) - [j3]Malte Möser, Kyle Soska, Ethan Heilman, Kevin Lee
, Henry Heffan, Shashvat Srivastava, Kyle Hogan, Jason Hennessey, Andrew Miller, Arvind Narayanan, Nicolas Christin
:
An Empirical Analysis of Traceability in the Monero Blockchain. Proc. Priv. Enhancing Technol. 2018(3): 143-163 (2018) - [c21]Kevin Lee
, Andrew Miller:
Authenticated Data Structures for Privacy-Preserving Monero Light Clients. EuroS&P Workshops 2018: 20-28 - [c20]Seoung Kyun Kim, Zane Ma, Siddharth Murali, Joshua Mason, Andrew Miller, Michael D. Bailey:
Measuring Ethereum Network Peers. Internet Measurement Conference 2018: 91-104 - [c19]Andrew Miller, Zhicheng Cai, Somesh Jha:
Smart Contracts and Opportunities for Formal Methods. ISoLA (4) 2018: 280-299 - [c18]Giulia Fanti, Shaileshh Bojja Venkatakrishnan, Surya Bakshi, Bradley Denby, Shruti Bhargava, Andrew Miller, Pramod Viswanath:
Dandelion++: Lightweight Cryptocurrency Networking with Formal Anonymity Guarantees. SIGMETRICS (Abstracts) 2018: 5-7 - [c17]Yi Zhou, Deepak Kumar, Surya Bakshi, Joshua Mason, Andrew Miller, Michael D. Bailey:
Erays: Reverse Engineering Ethereum's Opaque Smart Contracts. USENIX Security Symposium 2018: 1371-1385 - [c16]Sinisa Matetic, Moritz Schneider, Andrew Miller, Ari Juels, Srdjan Capkun:
DelegaTEE: Brokered Delegation Using Trusted Execution Environments. USENIX Security Symposium 2018: 1387-1403 - [i21]Raymond Cheng, Fan Zhang, Jernej Kos, Warren He, Nicholas Hynes, Noah M. Johnson, Ari Juels, Andrew Miller, Dawn Song:
Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contract Execution. CoRR abs/1804.05141 (2018) - [i20]Giulia Fanti, Shaileshh Bojja Venkatakrishnan, Surya Bakshi, Bradley Denby, Shruti Bhargava, Andrew Miller, Pramod Viswanath:
Dandelion++: Lightweight Cryptocurrency Networking with Formal Anonymity Guarantees. CoRR abs/1805.11060 (2018) - [i19]Sergi Delgado-Segura, Surya Bakshi, Cristina Pérez-Solà, James Litton, Andrew Pachulski, Andrew Miller, Bobby Bhattacharjee:
TxProbe: Discovering Bitcoin's Network Topology Using Orphan Transactions. CoRR abs/1812.00942 (2018) - [i18]Sinisa Matetic, Moritz Schneider, Andrew Miller, Ari Juels, Srdjan Capkun:
DelegaTEE: Brokered Delegation Using Trusted Execution Environments. IACR Cryptol. ePrint Arch. 2018: 160 (2018) - [i17]Patrick McCorry, Surya Bakshi, Iddo Bentov, Andrew Miller, Sarah Meiklejohn:
Pisa: Arbitration Outsourcing for State Channels. IACR Cryptol. ePrint Arch. 2018: 582 (2018) - 2017
- [j2]Peter Bailis, Arvind Narayanan, Andrew Miller, Song Han:
Research for practice: cryptocurrencies, blockchains, and smart contracts; hardware for deep learning. Commun. ACM 60(5): 48-51 (2017) - [c15]Iddo Bentov, Ranjit Kumaresan, Andrew Miller:
Instantaneous Decentralized Poker. ASIACRYPT (2) 2017: 410-440 - [c14]Patrick McCorry, Ethan Heilman, Andrew Miller:
Atomically Trading with Roger: Gambling on the Success of a Hardfork. DPM/CBT@ESORICS 2017: 334-353 - [c13]Andrew Miller, Iddo Bentov:
Zero-Collateral Lotteries in Bitcoin and Ethereum. EuroS&P Workshops 2017: 4-13 - [c12]Abhiram Kothapalli, Andrew Miller, Nikita Borisov
:
SmartCast: An Incentive Compatible Consensus Protocol Using Smart Contracts. Financial Cryptography Workshops 2017: 536-552 - [e1]Michael Brenner, Kurt Rohloff, Joseph Bonneau, Andrew Miller, Peter Y. A. Ryan, Vanessa Teague, Andrea Bracciali, Massimiliano Sala, Federico Pintore, Markus Jakobsson:
Financial Cryptography and Data Security - FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10323, Springer 2017, ISBN 978-3-319-70277-3 [contents] - [i16]Iddo Bentov, Ranjit Kumaresan, Andrew Miller:
Instantaneous Decentralized Poker. CoRR abs/1701.06726 (2017) - [i15]Andrew Miller, Iddo Bentov, Ranjit Kumaresan, Patrick McCorry:
Sprites: Payment Channels that Go Faster than Lightning. CoRR abs/1702.05812 (2017) - [i14]Andrew Miller, Malte Möser, Kevin Lee, Arvind Narayanan:
An Empirical Analysis of Linkability in the Monero Blockchain. CoRR abs/1704.04299 (2017) - [i13]Patrick McCorry, Ethan Heilman, Andrew Miller:
Atomically Trading with Roger: Gambling on the success of a hardfork. IACR Cryptol. ePrint Arch. 2017: 694 (2017) - [i12]Iddo Bentov, Ranjit Kumaresan, Andrew Miller:
Instantaneous Decentralized Poker. IACR Cryptol. ePrint Arch. 2017: 875 (2017) - [i11]Aggelos Kiayias, Andrew Miller, Dionysis Zindros:
Non-Interactive Proofs of Proof-of-Work. IACR Cryptol. ePrint Arch. 2017: 963 (2017) - 2016
- [b2]Arvind Narayanan, Joseph Bonneau, Edward W. Felten, Andrew Miller, Steven Goldfeder:
Bitcoin and Cryptocurrency Technologies - A Comprehensive Introduction. Princeton University Press 2016, ISBN 978-0-691-17169-2, pp. I-XXVII, 1-304 - [b1]Andrew Miller:
Provable Security for Cryptocurrencies. University of Maryland, College Park, MD, USA, 2016 - [j1]Peter Bailis, Arvind Narayanan, Andrew Miller, Song Han:
Research for Practice: Cryptocurrencies, Blockchains, and Smart Contracts; Hardware for Deep Learning. ACM Queue 14(6): 43-55 (2016) - [c11]Andrew Miller, Yu Xia, Kyle Croman, Elaine Shi, Dawn Song:
The Honey Badger of BFT Protocols. CCS 2016: 31-42 - [c10]Kartik Nayak, Srijan Kumar
, Andrew Miller, Elaine Shi:
Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack. EuroS&P 2016: 305-320 - [c9]Kevin Delmolino, Mitchell Arnett, Ahmed E. Kosba, Andrew Miller, Elaine Shi:
Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab. Financial Cryptography Workshops 2016: 79-94 - [c8]Kyle Croman, Christian Decker
, Ittay Eyal, Adem Efe Gencer, Ari Juels, Ahmed E. Kosba, Andrew Miller, Prateek Saxena, Elaine Shi, Emin Gün Sirer, Dawn Song, Roger Wattenhofer:
On Scaling Decentralized Blockchains - (A Position Paper). Financial Cryptography Workshops 2016: 106-125 - [c7]Ahmed E. Kosba, Andrew Miller, Elaine Shi, Zikai Wen
, Charalampos Papamanthou:
Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. IEEE Symposium on Security and Privacy 2016: 839-858 - [i10]Andrew Miller, Iddo Bentov:
Zero-Collateral Lotteries in Bitcoin and Ethereum. CoRR abs/1612.05390 (2016) - [i9]Andrew Miller, Yu Xia, Kyle Croman, Elaine Shi, Dawn Song:
The Honey Badger of BFT Protocols. IACR Cryptol. ePrint Arch. 2016: 199 (2016) - 2015
- [c6]Andrew Miller, Ahmed E. Kosba, Jonathan Katz, Elaine Shi:
Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions. CCS 2015: 680-691 - [c5]Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, Edward W. Felten:
SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. IEEE Symposium on Security and Privacy 2015: 104-121 - [i8]Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, Edward W. Felten:
Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. IACR Cryptol. ePrint Arch. 2015: 261 (2015) - [i7]Kevin Delmolino, Mitchell Arnett, Ahmed E. Kosba, Andrew Miller, Elaine Shi:
Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab. IACR Cryptol. ePrint Arch. 2015: 460 (2015) - [i6]Ahmed E. Kosba, Andrew Miller, Elaine Shi, Zikai Wen, Charalampos Papamanthou:
Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. IACR Cryptol. ePrint Arch. 2015: 675 (2015) - [i5]Kartik Nayak, Srijan Kumar, Andrew Miller, Elaine Shi:
Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack. IACR Cryptol. ePrint Arch. 2015: 796 (2015) - [i4]Ahmed E. Kosba, Zhichao Zhao, Andrew Miller, Yi Qian, T.-H. Hubert Chan, Charalampos Papamanthou, Rafael Pass, Abhi Shelat, Elaine Shi:
How to Use SNARKs in Universally Composable Protocols. IACR Cryptol. ePrint Arch. 2015: 1093 (2015) - [i3]Andrew Miller, Michael W. Hicks, Jonathan Katz, Elaine Shi:
How to Authenticate any Data Structure. Adv. Math. Commun. 3 (2015) - 2014
- [c4]Joseph Bonneau, Arvind Narayanan, Andrew Miller, Jeremy Clark, Joshua A. Kroll, Edward W. Felten:
Mixcoin: Anonymity for Bitcoin with Accountable Mixes. Financial Cryptography 2014: 486-504 - [c3]Andrew Miller, Michael Hicks
, Jonathan Katz, Elaine Shi:
Authenticated data structures, generically. POPL 2014: 411-424 - [c2]Andrew Miller, Ari Juels, Elaine Shi, Bryan Parno, Jonathan Katz:
Permacoin: Repurposing Bitcoin Work for Data Preservation. IEEE Symposium on Security and Privacy 2014: 475-490 - [c1]Joseph Bonneau, Andrew Miller:
Fawkescoin - A Cryptocurrency Without Public-Key Cryptography. Security Protocols Workshop 2014: 350-358 - [i2]Joseph Bonneau, Arvind Narayanan, Andrew Miller, Jeremy Clark, Joshua A. Kroll, Edward W. Felten:
Mixcoin: Anonymity for Bitcoin with accountable mixes. IACR Cryptol. ePrint Arch. 2014: 77 (2014) - [i1]Jonathan Katz, Andrew Miller, Elaine Shi:
Pseudonymous Secure Computation from Time-Lock Puzzles. IACR Cryptol. ePrint Arch. 2014: 857 (2014)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-05 21:58 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint