Ittay Eyal

Affiliations:
  • Technion, Haifa, Israel


According to our database1, Ittay Eyal authored at least 51 papers between 2010 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Deep Bribe: Predicting the Rise of Bribery in Blockchain Mining with Deep RL.
IACR Cryptol. ePrint Arch., 2023

Sprints: Intermittent Blockchain PoW Mining.
IACR Cryptol. ePrint Arch., 2023

Asynchronous Authentication.
CoRR, 2023

Gorilla: Safe Permissionless Byzantine Consensus.
Proceedings of the 37th International Symposium on Distributed Computing, 2023

FairPoS: Input Fairness in Permissionless Consensus.
Proceedings of the 5th Conference on Advances in Financial Technologies, 2023

2022
WeRLman: To Tackle Whale (Transactions), Go Deep (RL).
IACR Cryptol. ePrint Arch., 2022

LedgerHedger: Gas Reservation for Smart-Contract Security.
IACR Cryptol. ePrint Arch., 2022

Safe Permissionless Consensus.
IACR Cryptol. ePrint Arch., 2022

Interactive Authentication.
IACR Cryptol. ePrint Arch., 2022

FairPoS: Input Fairness in Proof-of-Stake with Adaptive Security.
IACR Cryptol. ePrint Arch., 2022

Colordag: An Incentive-Compatible Blockchain.
IACR Cryptol. ePrint Arch., 2022

2021
On Cryptocurrency Wallet Design.
IACR Cryptol. ePrint Arch., 2021

Phoenix: A Formally Verified Regenerating Vault.
CoRR, 2021

Tuning PoW with Hybrid Expenditure.
Proceedings of the 3rd International Conference on Blockchain Economics, 2021

MAD-HTLC: Because HTLC is Crazy-Cheap to Attack.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Pay to Win: Cheap, Cross-Chain Bribing Attacks on PoW Cryptocurrencies.
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021

2020
SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies.
IACR Cryptol. ePrint Arch., 2020

MAD-HTLC: Because HTLC is Crazy-Cheap to Attack.
CoRR, 2020

Multi-Party Timed Commitments.
CoRR, 2020

The Bitcoin Hunter: Detecting Bitcoin Traffic over Encrypted Channels.
Proceedings of the Security and Privacy in Communication Networks, 2020

Ostraka: Secure Blockchain Scaling by Node Sharding.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

BDoS: Blockchain Denial-of-Service.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Efficient MDP Analysis for Selfish-Mining in Blockchains.
Proceedings of the AFT '20: 2nd ACM Conference on Advances in Financial Technologies, 2020

2019
Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies.
IACR Cryptol. ePrint Arch., 2019

Just Enough Security: Reducing Proof-of-Work Ecological Footprint.
CoRR, 2019

Teechain: a secure payment network with asynchronous blockchain access.
Proceedings of the 27th ACM Symposium on Operating Systems Principles, 2019

2018
An Analysis of Acceptance Policies For Blockchain Transactions.
IACR Cryptol. ePrint Arch., 2018

Blockchain Security at Scale (Dagstuhl Seminar 18461).
Dagstuhl Reports, 2018

Majority is not enough: bitcoin mining is vulnerable.
Commun. ACM, 2018

Teechain: Reducing Storage Costs on the Blockchain With Offline Payment Channels.
Proceedings of the 11th ACM International Systems and Storage Conference, 2018

Decentralization in Bitcoin and Ethereum Networks.
Proceedings of the Financial Cryptography and Data Security, 2018

The Gap Game.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
REM: Resource-Efficient Mining for Blockchains.
IACR Cryptol. ePrint Arch., 2017

Teechain: Scalable Blockchain Payments using Trusted Execution Environments.
CoRR, 2017

Blockchain Technology: Transforming Libertarian Cryptocurrency Dreams to Finance and Banking Realities.
Computer, 2017

(Short Paper) PieceWork: Generalized Outsourcing Control for Proofs of Work.
Proceedings of the Financial Cryptography and Data Security, 2017

2016
Teechan: Payment Channels Using Trusted Execution Environments.
CoRR, 2016

Bitcoin-NG: A Scalable Blockchain Protocol.
Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation, 2016

Bitcoin Covenants.
Proceedings of the Financial Cryptography and Data Security, 2016

On Scaling Decentralized Blockchains - (A Position Paper).
Proceedings of the Financial Cryptography and Data Security, 2016

2015
The Miner's Dilemma.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Cache Serializability: Reducing Inconsistency in Edge Transactions.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

2014
LiMoSense: live monitoring in dynamic sensor networks.
Distributed Comput., 2014

Controlled Transactional Consistency for Web Caching.
CoRR, 2014

2013
Fault tolerant transaction architectures.
SIGACT News, 2013

In-Network Analytics for Ubiquitous Sensing.
Proceedings of the Distributed Computing - 27th International Symposium, 2013

Thinner Clouds with Preallocation.
Proceedings of the 5th USENIX Workshop on Hot Topics in Cloud Computing, 2013

2012
Robust data sharing with key-value stores.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

2011
Distributed data clustering in sensor networks.
Distributed Comput., 2011

Robust data sharing with key-value stores.
Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, 2011

2010
Distributed data classification in sensor networks.
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010


  Loading...