Ittay Eyal
Title
Cited by
Cited by
Year
Majority is not enough: Bitcoin mining is vulnerable
I Eyal, EG Sirer
Eighteenth International Conference on Financial Cryptography and Data …, 2014
19132014
Bitcoin-ng: A scalable blockchain protocol
I Eyal, AE Gencer, EG Sirer, R Van Renesse
13th {USENIX} symposium on networked systems design and implementation …, 2016
11412016
On scaling decentralized blockchains
K Croman, C Decker, I Eyal, AE Gencer, A Juels, A Kosba, A Miller, ...
International conference on financial cryptography and data security, 106-125, 2016
10042016
The Miner's Dilemma
I Eyal
Proceedings of the 36th IEEE Symposium on Security and Privacy (Oakland), 2015
3902015
Decentralization in bitcoin and ethereum networks
AE Gencer, S Basu, I Eyal, R Van Renesse, EG Sirer
International Conference on Financial Cryptography and Data Security, 439-457, 2018
2432018
Blockchain technology: Transforming libertarian cryptocurrency dreams to finance and banking realities
I Eyal
Computer 50 (9), 38-49, 2017
1712017
{REM}: Resource-efficient mining for blockchains
F Zhang, I Eyal, R Escriva, A Juels, R Van Renesse
26th {USENIX} Security Symposium ({USENIX} Security 17), 1427-1444, 2017
1002017
Robust data sharing with key-value stores
C Băsescu, C Cachin, I Eyal, R Haas, A Sorniotti, M Vukolić, I Zachevsky
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN …, 2012
712012
The gap game
I Tsabary, I Eyal
Proceedings of the 2018 ACM SIGSAC conference on Computer and Communications …, 2018
672018
Teechan: Payment channels using trusted execution environments
J Lind, I Eyal, P Pietzuch, EG Sirer
arXiv preprint arXiv:1612.07766, 2016
662016
Bitcoin covenants
M Möser, I Eyal, EG Sirer
International conference on financial cryptography and data security, 126-141, 2016
522016
Teechain: Scalable blockchain payments using trusted execution environments
J Lind, I Eyal, F Kelbert, O Naor, P Pietzuch, EG Sirer
arXiv preprint arXiv:1707.05454, 2017
472017
How to disincentivize large bitcoin mining pools
I Eyal, EG Sirer
Blog post: http://hackingdistributed. com/2014/06/18/how-to-disincentivize …, 2014
452014
Teechain: a secure payment network with asynchronous blockchain access
J Lind, O Naor, I Eyal, F Kelbert, EG Sirer, P Pietzuch
Proceedings of the 27th ACM Symposium on Operating Systems Principles, 63-79, 2019
392019
LiMoSense: live monitoring in dynamic sensor networks
I Eyal, I Keidar, R Rom
Distributed computing 27 (5), 313-328, 2014
382014
Teechain: Reducing storage costs on the blockchain with offline payment channels
J Lind, O Naor, I Eyal, F Kelbert, P Pietzuch, EG Sirer
Proceedings of the 11th ACM International Systems and Storage Conference …, 2018
262018
Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies.
A Judmayer, N Stifter, A Zamyatin, I Tsabary, I Eyal, P Gazi, S Meiklejohn, ...
IACR Cryptol. ePrint Arch. 2019, 775, 2019
232019
Design Choices for Central Bank Digital Currency: Policy and Technical Considerations
S Allen, S Čapkun, I Eyal, G Fanti, BA Ford, J Grimmelmann, A Juels, ...
National Bureau of Economic Research Working Paper Series, 2020
222020
Distributed data clustering in sensor networks
I Eyal, I Keidar, R Rom
Distributed computing 24 (5), 207-222, 2011
212011
Cache serializability: Reducing inconsistency in edge transactions
I Eyal, K Birman, R Van Renesse
2015 IEEE 35th International Conference on Distributed Computing Systems …, 2015
192015
The system can't perform the operation now. Try again later.
Articles 1–20