|
Deprecating BLS: Post-Quantum Recovery via Deposit Address
|
|
10
|
851
|
December 1, 2025
|
|
Trustless Consensus Manipulation Through Bribing Contracts
|
|
0
|
213
|
September 23, 2025
|
|
Economic Security of a Combination of Restaking Protocols (EigenLayer in combination with Symbiotic, Jito and others)
|
|
0
|
110
|
June 2, 2025
|
|
Hedged Signatures FTW
|
|
2
|
390
|
February 16, 2025
|
|
Unbundling at the Relay Level for frontrunning protocol hacks
|
|
1
|
382
|
January 24, 2025
|
|
Dynamic Finalization Considering 51% Attacks
|
|
2
|
572
|
December 1, 2024
|
|
Attestation Verification Optimization
|
|
1
|
493
|
October 1, 2024
|
|
A Threshold Network for “Human Keys” to solve privacy and custody issues
|
|
2
|
949
|
August 19, 2024
|
|
Suggestion for a new category: Security
|
|
1
|
2156
|
September 3, 2018
|
|
Compiler Attack / Deterministic builds
|
|
0
|
1314
|
June 26, 2020
|
|
Theory for Cryptoeconomics Mechanisms
|
|
1
|
1789
|
May 5, 2020
|
|
"Ethereum Casper FFG PoS, like all PoS consensus protocols, is vulnerable to bribery censorship attacks."
|
|
10
|
4319
|
March 11, 2020
|
|
Does ECDSA on FPGA solve the scaling problem?
|
|
3
|
2821
|
January 10, 2020
|
|
Shard security in the bribing model
|
|
6
|
4315
|
November 19, 2018
|
|
Dark crystal slides from devcon (secret sharding utility ontop of SSB)
|
|
3
|
3079
|
November 4, 2018
|
|
Go-ethereum network DoS, but main net is not vulnerable. Why?
|
|
3
|
1938
|
July 26, 2018
|
|
30% sharding attack
|
|
3
|
2537
|
March 10, 2018
|