Nicholas Stifter

According to our database1, Nicholas Stifter authored at least 32 papers between 2017 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
How much is the fork? Fast Probability and Profitability Calculation during Temporary Forks.
IACR Cryptol. ePrint Arch., 2022

Unnecessary Input Heuristics & PayJoin Transactions.
IACR Cryptol. ePrint Arch., 2022

Estimating (Miner) Extractable Value is Hard, Let's Go Shopping!
Proceedings of the Financial Cryptography and Data Security. FC 2022 International Workshops, 2022

Opportunistic Algorithmic Double-Spending: - How I Learned to Stop Worrying and Love the Fork.
Proceedings of the Computer Security - ESORICS 2022, 2022

Challenges and Opportunities of Blockchain for Auditable Processes in the Healthcare Sector.
Proceedings of the Business Process Management: Blockchain, Robotic Process Automation, and Central and Eastern Europe Forum, 2022

2021
Opportunistic Algorithmic Double-Spending: How I learned to stop worrying and hedge the Fork.
IACR Cryptol. ePrint Arch., 2021

What is Meant by Permissionless Blockchains?
IACR Cryptol. ePrint Arch., 2021

Estimating (Miner) Extractable Value is Hard, Let’s Go Shopping!
IACR Cryptol. ePrint Arch., 2021

Methods for Decentralized Identities: Evaluation and Insights.
IACR Cryptol. ePrint Arch., 2021

Unnecessary Input Heuristics and PayJoin Transactions.
Proceedings of the HCI International 2021 - Posters - 23rd HCI International Conference, 2021

Pay to Win: Cheap, Cross-Chain Bribing Attacks on PoW Cryptocurrencies.
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021

2020
RandRunner: Distributed Randomness from Trapdoor VDFs with Strong Uniqueness.
IACR Cryptol. ePrint Arch., 2020

SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies.
IACR Cryptol. ePrint Arch., 2020

HydRand: Efficient Continuous Distributed Randomness.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

2019
ETHDKG: Distributed Key Generation with Ethereum Smart Contracts.
IACR Cryptol. ePrint Arch., 2019

Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies.
IACR Cryptol. ePrint Arch., 2019

Avoiding Risky Designs When Using Blockchain Technologies in Cyber-Physical Systems.
Proceedings of the 24th IEEE International Conference on Emerging Technologies and Factory Automation, 2019

Revisiting Practical Byzantine Fault Tolerance Through Blockchain Technologies.
Proceedings of the Security and Quality in Cyber-Physical Systems Engineering, 2019

2018
Flux: Revisiting Near Blocks for Proof-of-Work Blockchains.
IACR Cryptol. ePrint Arch., 2018

(Short Paper) A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice.
IACR Cryptol. ePrint Arch., 2018

Echoes of the Past: Recovering Blockchain Metrics From Merged Mining.
IACR Cryptol. ePrint Arch., 2018

Agreement with Satoshi - On the Formalization of Nakamoto Consensus.
IACR Cryptol. ePrint Arch., 2018

HydRand: Practical Continuous Distributed Randomness.
IACR Cryptol. ePrint Arch., 2018

Pitchforks in Cryptocurrencies: Enforcing rule changes through offensive forking- and consensus techniques.
IACR Cryptol. ePrint Arch., 2018

Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice - (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2018

Pitchforks in Cryptocurrencies: - Enforcing Rule Changes Through Offensive Forking- and Consensus Techniques (Short Paper).
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018

2017
Blocks and Chains: Introduction to Bitcoin, Cryptocurrencies, and Their Consensus Mechanisms
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02352-1, 2017

Merged Mining: Curse of Cure?
IACR Cryptol. ePrint Arch., 2017

A Holistic Approach to Smart Contract Security.
ERCIM News, 2017

Bitcoin - Cryptocurrencies and Alternative Applications.
ERCIM News, 2017

Merged Mining: Curse or Cure?
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017


  Loading...