Andrew Miller

Orcid: 0000-0002-9910-0292

Affiliations:
  • University of Illinois, Urbana-Champaign, USA
  • University of Maryland, College Park, MD, USA (PhD 2016)


According to our database1, Andrew Miller authored at least 66 papers between 2014 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Constraint-Friendly Map-to-Elliptic-Curve-Group Relations and Their Applications.
IACR Cryptol. ePrint Arch., 2025

2024
SGXonerate:Finding (and Partially Fixing) Privacy Flaws in TEE-based Smart Contract Platforms Without Breaking the TEE.
Proc. Priv. Enhancing Technol., January, 2024

Practical Proofs of Parsing for Context-free Grammars.
IACR Cryptol. ePrint Arch., 2024

The Sting Framework: Proving the Existence of Superclass Adversaries.
IACR Cryptol. ePrint Arch., 2024

OML: Open, Monetizable, and Loyal AI.
IACR Cryptol. ePrint Arch., 2024

PROF: Protected Order Flow in a Profit-Seeking World.
IACR Cryptol. ePrint Arch., 2024

Future of Algorithmic Organization: Large-Scale Analysis of Decentralized Autonomous Organizations (DAOs).
CoRR, 2024

SoK: SGX.Fail: How Stuff Gets eXposed.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Unpacking How Decentralized Autonomous Organizations (DAOs) Work in Practice.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2024

Ratel: MPC-extensions for Smart Contracts.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
SGXonerated: Finding (and Partially Fixing) Privacy Flaws in TEE-based Smart Contract Platforms Without Breaking the TEE.
IACR Cryptol. ePrint Arch., 2023

Unpacking How Decentralized Autonomous Organizations (DAOs) Work in Practice.
CoRR, 2023

Long Live The Honey Badger: Robust Asynchronous DPSS and its Applications.
Proceedings of the 32nd USENIX Security Symposium, 2023

A Mixed-Methods Study of Security Practices of Smart Contract Developers.
Proceedings of the 32nd USENIX Security Symposium, 2023

SoK: Data Sovereignty.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

2022
Exploring Security Practices of Smart Contract Developers.
CoRR, 2022

Practical Asynchronous Distributed Key Generation.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

hbACSS: How to Robustly Share Many Secrets.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

2021
CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

An Empirical Analysis of Privacy in the Lightning Network.
Proceedings of the Financial Cryptography and Data Security, 2021

Publicly Auditable MPC-as-a-Service with succinct verification and universal setup.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2021

2020
Non-interactive Proofs of Proof-of-Work.
Proceedings of the Financial Cryptography and Data Security, 2020

2019
Secure Brokered Delegation Through DelegaTEE.
IEEE Secur. Priv., 2019

HoneyBadgerMPC and AsynchroMix: Practical AsynchronousMPC and its Application to Anonymous Communication.
IACR Cryptol. ePrint Arch., 2019

Brief Note: Asynchronous Verifiable Secret Sharing with Optimal Resilience and Linear Amortized Overhead.
CoRR, 2019

Outguard: Detecting In-Browser Covert Cryptocurrency Mining in the Wild.
Proceedings of the World Wide Web Conference, 2019

ILC: a calculus for composable, computational cryptography.
Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2019

You Sank My Battleship! A Case Study to Evaluate State Channels as a Scaling Solution for Cryptocurrencies.
Proceedings of the Financial Cryptography and Data Security, 2019

Short Paper: I Can't Believe It's Not Stake! Resource Exhaustion Attacks on PoS.
Proceedings of the Financial Cryptography and Data Security, 2019

TxProbe: Discovering Bitcoin's Network Topology Using Orphan Transactions.
Proceedings of the Financial Cryptography and Data Security, 2019

Sprites and State Channels: Payment Networks that Go Faster Than Lightning.
Proceedings of the Financial Cryptography and Data Security, 2019

Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

HoneyBadgerMPC and AsynchroMix: Practical Asynchronous MPC and its Application to Anonymous Communication.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Pisa: Arbitration Outsourcing for State Channels.
Proceedings of the 1st ACM Conference on Advances in Financial Technologies, 2019

2018
An Empirical Analysis of Traceability in the Monero Blockchain.
Proc. Priv. Enhancing Technol., 2018

Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contract Execution.
CoRR, 2018

Erays: Reverse Engineering Ethereum's Opaque Smart Contracts.
Proceedings of the 27th USENIX Security Symposium, 2018

DelegaTEE: Brokered Delegation Using Trusted Execution Environments.
Proceedings of the 27th USENIX Security Symposium, 2018

Dandelion++: Lightweight Cryptocurrency Networking with Formal Anonymity Guarantees.
Proceedings of the Abstracts of the 2018 ACM International Conference on Measurement and Modeling of Computer Systems, 2018

Smart Contracts and Opportunities for Formal Methods.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Industrial Practice, 2018

Measuring Ethereum Network Peers.
Proceedings of the Internet Measurement Conference 2018, 2018

Authenticated Data Structures for Privacy-Preserving Monero Light Clients.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy Workshops, 2018

2017
An Empirical Analysis of Linkability in the Monero Blockchain.
CoRR, 2017

Sprites: Payment Channels that Go Faster than Lightning.
CoRR, 2017

Research for practice: cryptocurrencies, blockchains, and smart contracts; hardware for deep learning.
Commun. ACM, 2017

SmartCast: An Incentive Compatible Consensus Protocol Using Smart Contracts.
Proceedings of the Financial Cryptography and Data Security, 2017

Zero-Collateral Lotteries in Bitcoin and Ethereum.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017

Atomically Trading with Roger: Gambling on the Success of a Hardfork.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017

Instantaneous Decentralized Poker.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
Provable Security for Cryptocurrencies.
PhD thesis, 2016

Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab.
Proceedings of the Financial Cryptography and Data Security, 2016

On Scaling Decentralized Blockchains - (A Position Paper).
Proceedings of the Financial Cryptography and Data Security, 2016

Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

The Honey Badger of BFT Protocols.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Bitcoin and Cryptocurrency Technologies - A Comprehensive Introduction.
Princeton University Press, ISBN: 978-0-691-17169-2, 2016

2015
How to Authenticate any Data Structure.
Tiny Trans. Comput. Sci., 2015

How to Use SNARKs in Universally Composable Protocols.
IACR Cryptol. ePrint Arch., 2015

Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.
IACR Cryptol. ePrint Arch., 2015

SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Pseudonymous Secure Computation from Time-Lock Puzzles.
IACR Cryptol. ePrint Arch., 2014

Fawkescoin - A Cryptocurrency Without Public-Key Cryptography.
Proceedings of the Security Protocols XXII, 2014

Permacoin: Repurposing Bitcoin Work for Data Preservation.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Authenticated data structures, generically.
Proceedings of the 41st Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2014

Mixcoin: Anonymity for Bitcoin with Accountable Mixes.
Proceedings of the Financial Cryptography and Data Security, 2014


  Loading...