Aljosha Judmayer

According to our database1, Aljosha Judmayer authored at least 37 papers between 2014 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
How much is the fork? Fast Probability and Profitability Calculation during Temporary Forks.
IACR Cryptol. ePrint Arch., 2022

Unnecessary Input Heuristics & PayJoin Transactions.
IACR Cryptol. ePrint Arch., 2022

Estimating (Miner) Extractable Value is Hard, Let's Go Shopping!
Proceedings of the Financial Cryptography and Data Security. FC 2022 International Workshops, 2022

Opportunistic Algorithmic Double-Spending: - How I Learned to Stop Worrying and Love the Fork.
Proceedings of the Computer Security - ESORICS 2022, 2022

Challenges and Opportunities of Blockchain for Auditable Processes in the Healthcare Sector.
Proceedings of the Business Process Management: Blockchain, Robotic Process Automation, and Central and Eastern Europe Forum, 2022

2021
Opportunistic Algorithmic Double-Spending: How I learned to stop worrying and hedge the Fork.
IACR Cryptol. ePrint Arch., 2021

What is Meant by Permissionless Blockchains?
IACR Cryptol. ePrint Arch., 2021

Estimating (Miner) Extractable Value is Hard, Let’s Go Shopping!
IACR Cryptol. ePrint Arch., 2021

Unnecessary Input Heuristics and PayJoin Transactions.
Proceedings of the HCI International 2021 - Posters - 23rd HCI International Conference, 2021

Pay to Win: Cheap, Cross-Chain Bribing Attacks on PoW Cryptocurrencies.
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021

2020
RandRunner: Distributed Randomness from Trapdoor VDFs with Strong Uniqueness.
IACR Cryptol. ePrint Arch., 2020

SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies.
IACR Cryptol. ePrint Arch., 2020

HydRand: Efficient Continuous Distributed Randomness.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

2019
ETHDKG: Distributed Key Generation with Ethereum Smart Contracts.
IACR Cryptol. ePrint Arch., 2019

Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies.
IACR Cryptol. ePrint Arch., 2019

A Deep Dive into Bitcoin Mining Pools: An Empirical Analysis of Mining Shares.
CoRR, 2019

Revisiting Practical Byzantine Fault Tolerance Through Blockchain Technologies.
Proceedings of the Security and Quality in Cyber-Physical Systems Engineering, 2019

2018
(Short Paper) A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice.
IACR Cryptol. ePrint Arch., 2018

Echoes of the Past: Recovering Blockchain Metrics From Merged Mining.
IACR Cryptol. ePrint Arch., 2018

Agreement with Satoshi - On the Formalization of Nakamoto Consensus.
IACR Cryptol. ePrint Arch., 2018

HydRand: Practical Continuous Distributed Randomness.
IACR Cryptol. ePrint Arch., 2018

Pitchforks in Cryptocurrencies: Enforcing rule changes through offensive forking- and consensus techniques.
IACR Cryptol. ePrint Arch., 2018

Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice - (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2018

Pitchforks in Cryptocurrencies: - Enforcing Rule Changes Through Offensive Forking- and Consensus Techniques (Short Paper).
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018

2017
Blocks and Chains: Introduction to Bitcoin, Cryptocurrencies, and Their Consensus Mechanisms
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02352-1, 2017

Merged Mining: Curse of Cure?
IACR Cryptol. ePrint Arch., 2017

A Holistic Approach to Smart Contract Security.
ERCIM News, 2017

Bitcoin - Cryptocurrencies and Alternative Applications.
ERCIM News, 2017

A Performance Assessment of Network Address Shuffling in IoT Systems.
Proceedings of the Computer Aided Systems Theory - EUROCAST 2017, 2017

Merged Mining: Curse or Cure?
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017

Lightweight Address Hopping for Defending the IPv6 IoT.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Cryptographic Currencies Crash Course (C4): Tutorial.
Proceedings of the 25th International Conference on World Wide Web, 2016

Für bare Münze? NutzerInnenerfahrungen mit Sicherheit und Datenschutz bei Bitcoin.
Proceedings of the Sicherheit 2016: Sicherheit, 2016

The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy.
Proceedings of the Financial Cryptography and Data Security, 2016

Condensed Cryptographic Currencies Crash Course (C5).
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2014
On the security of security extensions for IP-based KNX networks.
Proceedings of the 10th IEEE Workshop on Factory Communication Systems, 2014


  Loading...