


default search action
29th Financial Cryptography 2025: Miyakojima, Japan - Workshops, Part I
- Bernhard Haslhofer

, Java Xu
, Friedhelm Victor
, Massimo Bartoletti
, Andrea Bracciali
, Kanta Matsuura, Jarek Nabrzyski
, Vero Estrada-Galiñanes
, Claudio J. Tessone
, Jurlind Budurushi
, Karola Marky
:
Financial Cryptography and Data Security. FC 2025 International Workshops - CAAW 2025 and WTSC 2025, Miyakojima, Japan, April 18, 2025, Revised Selected Papers, Part I. Lecture Notes in Computer Science 15753, Springer 2026, ISBN 978-3-032-00491-8 - Florian Grötschla, Lioba Heimbach, Severin Richner, Roger Wattenhofer:

On the Lifecycle of a Lightning Network Payment Channel. 1-16 - Johnnatan Messias

, Krzysztof Gogol, Maria Inês Silva, Benjamin Livshits
:
The Writing Is on the Wall: Analyzing the Boom of Inscriptions and Its Impact on EVM-Compatible Blockchains. 17-31 - Robin Gansäuer, Hichem Ben Aoun, Jan Droll, Hannes Hartenstein

:
Price Oracle Accuracy Across Blockchains: A Measurement and Analysis. 32-46 - Maria Inês Silva, Johnnatan Messias

, Benjamin Livshits
:
A Public Dataset For the ZKsync Rollup. 47-62 - Jan Gorzny

, Phillip Kemper, Martin Derka
:
Early Observations of Based Rollups: A Case Study of Taiko. 63-77 - Brian Z. Zhu, Dingyue Liu, Xin Wan, Gordon Liao, Ciamac C. Moallemi, Brad Bachu:

What Drives Liquidity on Decentralized Exchanges? Evidence from the Uniswap Protocol. 78-93 - Krzysztof Gogol, Manvir Schneider, Claudio J. Tessone, Benjamin Livshits:

Liquidity Fragmentation or Optimization? Analyzing Automated Market Makers Across Ethereum and Rollups. 94-110 - Brad Bachu

, Xin Wan, Ciamac C. Moallemi
:
Quantifying Price Improvement in Order Flow Auctions. 111-126 - Maria Inês Silva, Benjamin Livshits

:
Short Paper: Atomic Execution is Not Enough for Arbitrage Profit Extraction in Shared Sequencers. 127-136 - Yogev Bar-On:

Revisiting Bitcoin's Merkle Tree Security: Practical Implications and an Attack on Core Chain. 137-146 - Emily Priyadarshini, Massimo Bartoletti:

A Quantitative Notion of Economic Security for Smart Contract Compositions. 147-163 - Suhyeon Lee:

Hollow Victory: How Malicious Proposers Exploit Validator Incentives in Optimistic Rollup Dispute Games. 164-179 - Fausto Spoto

:
A Formalization of Signum's Consensus. 180-199 - Yannik Kopyciok, Friedhelm Victor

, Stefan Schmid
:
Monero's Decentralized P2P Exchanges: Functionality, Adoption, and Privacy Risks. 200-215 - Mahmudun Nabi, Reihaneh Safavi-Naini:

Toward a Secure Tokenized Green Credit Management System: Case Study of WREGIS. 216-244 - Abdoulaye Ndiaye:

Parallel Execution Fee Mechanisms. 245-262 - Carlo Brunetta

, Massimiliano Sala
:
SoK: Modelling Data Storage and Availability. 263-280

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














