


default search action
Financial Cryptography and Data Security 2025: Miyakojima, Japan - Part I
- Christina Garman, Pedro Moreno-Sanchez

:
Financial Cryptography and Data Security - 29th International Conference, FC 2025, Miyakojima, Japan, April 14-18, 2025, Revised Selected Papers, Part II. Lecture Notes in Computer Science 15752, Springer 2026, ISBN 978-3-032-07034-0
MEV
- Yichen Luo, Yebo Feng, Jiahua Xu, Paolo Tasca:

Piercing the Veil of TVL: DeFi Reappraised. 3-19 - Pranav Garimidi, Lioba Heimbach, Tim Roughgarden:

Transaction Fee Mechanism Design for Leaderless Blockchain Protocols. 20-35 - Ben Riva, Alberto Sonnino, Lefteris Kokoris-Kogias:

Seahorse: Efficiently Mixing Encrypted and Normal Transactions. 36-52 - Lioba Heimbach, Jason Milionis:

The Early Days of the Ethereum Blob Fee Market and Lessons Learnt. 53-71 - Brian Z. Zhu, Xin Wan, Ciamac C. Moallemi, Dan Robinson, Brad Bachu:

Quantifying the Value of Revert Protection. 72-88
Consensus
- Aaron Buchwald, Stephen Buttolph, Andrew Lewis-Pye, Patrick O'Grady, Kevin Sekniqi:

Frosty: Bringing Strong Liveness Guarantees to the Snow Family of Consensus Protocols. 91-107 - Srivatsan Sridhar, Ertem Nusret Tas, Joachim Neu, Dionysis Zindros, David Tse:

Consensus Under Adversary Majority Done Right. 108-126 - Mirza Ahad Baig, Krzysztof Pietrzak:

On the (in)security of Proofs-of-Space Based Longest-Chain Blockchains. 127-142 - Giuliano Losa, Yifan Mao, Shaileshh Bojja Venkatakrishnan, Yunqi Zhang:

Constellation: Peer-to-Peer Overlays for Federated Byzantine Agreement Systems. 143-159 - Simon Holmgaard Kamp:

Short Paper: A New Way to Achieve Round-Efficient Asynchronous Byzantine Agreement. 160-169
Proof-of-X and Rewards
- Lukas Aumayr, Zeta Avarikioti, Matteo Maffei, Giulia Scaffino, Dionysis Zindros:

Blink: An Optimal Proof of Proof-of-Work. 173-190 - Georgios Birmpas, Philip Lazos, Evangelos Markakis, Paolo Penna:

Reward Schemes and Committee Sizes in Proof of Stake Governance. 191-207 - Roozbeh Sarenche, Svetla Nikova, Bart Preneel:

Mining Power Destruction Attacks in the Presence of Petty-Compliant Mining Pools. 208-224 - Massimo Bartoletti, Roberto Zunino:

A Theoretical Basis for MEV. 225-242 - Gennaro Avitabile, Luisa Siniscalchi, Ivan Visconti:

Short Paper: Rewardable Naysayer Proofs. 243-252
Signatures and Threshold Cryptography
- Gaspard Anthoine, Daniele Cozzo, Dario Fiore:

Verification-Efficient Homomorphic Signatures for Verifiable Computation over Data Streams. 255-272 - Tiantian Gong, Zeyu Liu:

Rational Secret Sharing with Competition. 273-290 - Zhuolun Xiang, Sourav Das, Zekun Li, Zhoujun Ma, Alexander Spiegelman:

The Latency Price of Threshold Cryptosystem in Blockchains. 291-308 - Kazuki Yamamura, Tetsuya Okuda, Eiichiro Fujisaki:

On Non-Interactive Blind Signatures in the Plain Model Using Complexity Leveraging. 309-326 - Lukas Gerlach, Robert Pietsch, Michael Schwarz:

Do Compilers Break Constant-Time Guarantees? 327-344
Machine Learning
- Fuyi Wang, Zekai Chen, Mingyuan Fan, Jianying Zhou, Lei Pan, Leo Yu Zhang:

PrivGNN: High-Performance Secure Inference for Cryptographic Graph Neural Networks. 347-365 - Régnier Avice, Bernhard Haslhofer, Zhidong Li, Jianlong Zhou:

Linking Cryptoasset Attribution Tags to Knowledge Graph Entities: An LLM-Based Approach. 366-382 - Abele Malan, Thiago S. Guzella, Jérémie Decouchant, Lydia Y. Chen:

CCBNet : Confidential Collaborative Bayesian Networks Inference. 383-400

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














