Andrew Miller

Affiliations:
  • University of Illinois, Urbana-Champaign, USA
  • University of Maryland, College Park, MD, USA (PhD 2016)


According to our database1, Andrew Miller authored at least 58 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
SGXonerate:Finding (and Partially Fixing) Privacy Flaws in TEE-based Smart Contract Platforms Without Breaking the TEE.
Proc. Priv. Enhancing Technol., January, 2024

2023
Ratel: MPC-extensions for Smart Contracts.
IACR Cryptol. ePrint Arch., 2023

SGXonerated: Finding (and Partially Fixing) Privacy Flaws in TEE-based Smart Contract Platforms Without Breaking the TEE.
IACR Cryptol. ePrint Arch., 2023

SoK: Data Sovereignty.
IACR Cryptol. ePrint Arch., 2023

Unpacking How Decentralized Autonomous Organizations (DAOs) Work in Practice.
CoRR, 2023

A Mixed-Methods Study of Security Practices of Smart Contract Developers.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
Long Live The Honey Badger: Robust Asynchronous DPSS and its Applications.
IACR Cryptol. ePrint Arch., 2022

Exploring Security Practices of Smart Contract Developers.
CoRR, 2022

2021
hbACSS: How to Robustly Share Many Secrets.
IACR Cryptol. ePrint Arch., 2021

Practical Asynchronous Distributed Key Generation.
IACR Cryptol. ePrint Arch., 2021

An Empirical Analysis of Privacy in the Lightning Network.
Proceedings of the Financial Cryptography and Data Security, 2021

Publicly Auditable MPC-as-a-Service with succinct verification and universal setup.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2021

2020
The Ekiden Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts.
IEEE Secur. Priv., 2020

CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability.
IACR Cryptol. ePrint Arch., 2020

2019
Secure Brokered Delegation Through DelegaTEE.
IEEE Secur. Priv., 2019

HoneyBadgerMPC and AsynchroMix: Practical AsynchronousMPC and its Application to Anonymous Communication.
IACR Cryptol. ePrint Arch., 2019

ILC: A Calculus for Composable, Computational Cryptography.
IACR Cryptol. ePrint Arch., 2019

Brief Note: Asynchronous Verifiable Secret Sharing with Optimal Resilience and Linear Amortized Overhead.
CoRR, 2019

Outguard: Detecting In-Browser Covert Cryptocurrency Mining in the Wild.
Proceedings of the World Wide Web Conference, 2019

You Sank My Battleship! A Case Study to Evaluate State Channels as a Scaling Solution for Cryptocurrencies.
Proceedings of the Financial Cryptography and Data Security, 2019

Short Paper: I Can't Believe It's Not Stake! Resource Exhaustion Attacks on PoS.
Proceedings of the Financial Cryptography and Data Security, 2019

TxProbe: Discovering Bitcoin's Network Topology Using Orphan Transactions.
Proceedings of the Financial Cryptography and Data Security, 2019

Sprites and State Channels: Payment Networks that Go Faster Than Lightning.
Proceedings of the Financial Cryptography and Data Security, 2019

HoneyBadgerMPC and AsynchroMix: Practical Asynchronous MPC and its Application to Anonymous Communication.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
An Empirical Analysis of Traceability in the Monero Blockchain.
Proc. Priv. Enhancing Technol., 2018

Dandelion++: Lightweight Cryptocurrency Networking with Formal Anonymity Guarantees.
Proc. ACM Meas. Anal. Comput. Syst., 2018

Pisa: Arbitration Outsourcing for State Channels.
IACR Cryptol. ePrint Arch., 2018

DelegaTEE: Brokered Delegation Using Trusted Execution Environments.
IACR Cryptol. ePrint Arch., 2018

Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contract Execution.
CoRR, 2018

Erays: Reverse Engineering Ethereum's Opaque Smart Contracts.
Proceedings of the 27th USENIX Security Symposium, 2018

Smart Contracts and Opportunities for Formal Methods.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Industrial Practice, 2018

Measuring Ethereum Network Peers.
Proceedings of the Internet Measurement Conference 2018, 2018

Authenticated Data Structures for Privacy-Preserving Monero Light Clients.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy Workshops, 2018

2017
Atomically Trading with Roger: Gambling on the success of a hardfork.
IACR Cryptol. ePrint Arch., 2017

Non-Interactive Proofs of Proof-of-Work.
IACR Cryptol. ePrint Arch., 2017

Instantaneous Decentralized Poker.
IACR Cryptol. ePrint Arch., 2017

An Empirical Analysis of Linkability in the Monero Blockchain.
CoRR, 2017

Sprites: Payment Channels that Go Faster than Lightning.
CoRR, 2017

Research for practice: cryptocurrencies, blockchains, and smart contracts; hardware for deep learning.
Commun. ACM, 2017

SmartCast: An Incentive Compatible Consensus Protocol Using Smart Contracts.
Proceedings of the Financial Cryptography and Data Security, 2017

Zero-Collateral Lotteries in Bitcoin and Ethereum.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017

2016
Provable Security for Cryptocurrencies.
PhD thesis, 2016

The Honey Badger of BFT Protocols.
IACR Cryptol. ePrint Arch., 2016

On Scaling Decentralized Blockchains - (A Position Paper).
Proceedings of the Financial Cryptography and Data Security, 2016

Bitcoin and Cryptocurrency Technologies - A Comprehensive Introduction.
Princeton University Press, ISBN: 978-0-691-17169-2, 2016

2015
How to Authenticate any Data Structure.
Tiny Trans. Comput. Sci., 2015

Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack.
IACR Cryptol. ePrint Arch., 2015

How to Use SNARKs in Universally Composable Protocols.
IACR Cryptol. ePrint Arch., 2015

Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts.
IACR Cryptol. ePrint Arch., 2015

Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab.
IACR Cryptol. ePrint Arch., 2015

Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.
IACR Cryptol. ePrint Arch., 2015

SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Pseudonymous Secure Computation from Time-Lock Puzzles.
IACR Cryptol. ePrint Arch., 2014

Mixcoin: Anonymity for Bitcoin with accountable mixes.
IACR Cryptol. ePrint Arch., 2014

Fawkescoin - A Cryptocurrency Without Public-Key Cryptography.
Proceedings of the Security Protocols XXII, 2014

Permacoin: Repurposing Bitcoin Work for Data Preservation.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Authenticated data structures, generically.
Proceedings of the 41st Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2014


  Loading...