The other side of the coin: User experiences with bitcoin security and privacy K Krombholz, A Judmayer, M Gusenbauer, E Weippl International conference on financial cryptography and data security, 555-580, 2016 | 77 | 2016 |
Blocks and chains: introduction to bitcoin, cryptocurrencies, and their consensus mechanisms A Judmayer, N Stifter, K Krombholz, E Weippl Synthesis Lectures on Information Security, Privacy, & Trust 9 (1), 1-123, 2017 | 55 | 2017 |
Merged mining: Curse or cure? A Judmayer, A Zamyatin, N Stifter, AG Voyiatzis, E Weippl Data Privacy Management, Cryptocurrencies and Blockchain Technology, 316-333, 2017 | 33 | 2017 |
A wild velvet fork appears! inclusive blockchain protocol changes in practice A Zamyatin, N Stifter, A Judmayer, P Schindler, E Weippl, WJ Knottenbelt International Conference on Financial Cryptography and Data Security, 31-42, 2018 | 30 | 2018 |
Agreement with satoshi–on the formalization of nakamoto consensus N Stifter, A Judmayer, P Schindler, A Zamyatin, E Weippl | 28 | 2018 |
Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies. A Judmayer, N Stifter, A Zamyatin, I Tsabary, I Eyal, P Gazi, S Meiklejohn, ... IACR Cryptol. ePrint Arch. 2019, 775, 2019 | 22 | 2019 |
Hydrand: Practical continuous distributed randomness P Schindler, A Judmayer, N Stifter, E Weippl | 19 | 2020 |
A deep dive into bitcoin mining pools: An empirical analysis of mining shares M Romiti, A Judmayer, A Zamyatin, B Haslhofer arXiv preprint arXiv:1905.05999, 2019 | 18 | 2019 |
On the security of security extensions for IP-based KNX networks A Judmayer, L Krammer, W Kastner 2014 10th IEEE Workshop on Factory Communication Systems (WFCS 2014), 1-10, 2014 | 15 | 2014 |
ETHDKG: Distributed Key Generation with Ethereum Smart Contracts. P Schindler, A Judmayer, N Stifter, ER Weippl IACR Cryptol. ePrint Arch. 2019, 985, 2019 | 10 | 2019 |
Pitchforks in cryptocurrencies A Judmayer, N Stifter, P Schindler, E Weippl Data privacy management, cryptocurrencies and blockchain technology, 197-206, 2018 | 9 | 2018 |
Hydrand: Efficient continuous distributed randomness P Schindler, A Judmayer, N Stifter, E Weippl 2020 IEEE Symposium on Security and Privacy (SP), 73-89, 2020 | 7 | 2020 |
Lightweight address hopping for defending the IPv6 IoT A Judmayer, J Ullrich, G Merzdovnik, AG Voyiatzis, E Weippl Proceedings of the 12th international conference on availability …, 2017 | 7 | 2017 |
Echoes of the past: Recovering blockchain metrics from merged mining N Stifter, P Schindler, A Judmayer, A Zamyatin, A Kern, E Weippl International Conference on Financial Cryptography and Data Security, 527-549, 2019 | 5 | 2019 |
& Weippl, E.(2019) A Judmayer, N Stifter, A Zamyatin, I Tsabary, I Eyal, P Gaži Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies, 0 | 5 | |
Proof-of-blackouts? how proof-of-work cryptocurrencies could affect power grids J Ullrich, N Stifter, A Judmayer, A Dabrowski, E Weippl International Symposium on Research in Attacks, Intrusions, and Defenses …, 2018 | 4 | 2018 |
A holistic approach to smart contract security N Stifter, A Judmayer, E Weippl Blockchain Engineering, 17, 2017 | 4 | 2017 |
Condensed cryptographic currencies crash course (c5) A Judmayer, E Weippl Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 4 | 2016 |
Revisiting practical byzantine fault tolerance through blockchain technologies N Stifter, A Judmayer, E Weippl Security and Quality in Cyber-Physical Systems Engineering, 471-495, 2019 | 3 | 2019 |
Randrunner: Distributed randomness from trapdoor vdfs with strong uniqueness P Schindler, A Judmayer, M Hittmeir, N Stifter, E Weippl | 2 | 2021 |