Ethan Heilman

According to our database1, Ethan Heilman authored at least 20 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
OpenPubkey: Augmenting OpenID Connect with User held Signing Keys.
IACR Cryptol. ePrint Arch., 2023

2022
Mirror worlds, eclipse attacks and the security of Bitcoin and the RPKI
PhD thesis, 2022

2020
The Arwen Trading Protocols (Full Version).
IACR Cryptol. ePrint Arch., 2020

The Arwen Trading Protocols.
Proceedings of the Financial Cryptography and Data Security, 2020

2019
Cryptanalysis of Curl-P and Other Attacks on the IOTA Cryptocurrency.
IACR Cryptol. ePrint Arch., 2019

2018
An Empirical Analysis of Traceability in the Monero Blockchain.
Proc. Priv. Enhancing Technol., 2018

Low-Resource Eclipse Attacks on Ethereum's Peer-to-Peer Network.
IACR Cryptol. ePrint Arch., 2018

Technical perspective: The rewards of selfish mining.
Commun. ACM, 2018

2017
Atomically Trading with Roger: Gambling on the success of a hardfork.
IACR Cryptol. ePrint Arch., 2017

TumbleBit: An Untrusted Bitcoin-Compatible Anonymous Payment Hub.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

2016
Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain Bitcoin Transactions.
IACR Cryptol. ePrint Arch., 2016

TumbleBit: An Untrusted Tumbler for Bitcoin-Compatible Anonymous Payments.
IACR Cryptol. ePrint Arch., 2016

2015
Preimage Attacks Against Spectral Hash and PTX Functions.
Tiny Trans. Comput. Sci., 2015

Eclipse Attacks on Bitcoin's Peer-to-Peer Network.
IACR Cryptol. ePrint Arch., 2015

2014
One Weird Trick to Stop Selfish Miners: Fresh Bitcoins, A Solution for the Honest Miner.
IACR Cryptol. ePrint Arch., 2014

From the consent of the routed: improving the transparency of the RPKI.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

One Weird Trick to Stop Selfish Miners: Fresh Bitcoins, A Solution for the Honest Miner (Poster Abstract).
Proceedings of the Financial Cryptography and Data Security, 2014

2013
On the risk of misbehaving RPKI authorities.
Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, 2013

2011
Restoring the Differential Resistance of MD6.
IACR Cryptol. ePrint Arch., 2011

2009
Attacks Against Permute-Transform-Xor Compression Functions and Spectral Hash.
IACR Cryptol. ePrint Arch., 2009


  Loading...