Follow
Nicholas Stifter
Nicholas Stifter
SBA Research, University of Vienna
Verified email at alumni.tuwien.ac.at
Title
Cited by
Cited by
Year
Blocks and chains: introduction to bitcoin, cryptocurrencies, and their consensus mechanisms
A Judmayer, N Stifter, K Krombholz, E Weippl
Springer Nature, 2022
1192022
Hydrand: Efficient continuous distributed randomness
P Schindler, A Judmayer, N Stifter, E Weippl
2020 IEEE Symposium on Security and Privacy (SP), 73-89, 2020
1072020
A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice: (Short Paper)
A Zamyatin, N Stifter, A Judmayer, P Schindler, E Weippl, WJ Knottenbelt
Financial Cryptography and Data Security: FC 2018 International Workshops …, 2019
782019
Merged mining: Curse or cure?
A Judmayer, A Zamyatin, N Stifter, AG Voyiatzis, E Weippl
Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS …, 2017
552017
Ethdkg: Distributed key generation with ethereum smart contracts
P Schindler, A Judmayer, N Stifter, E Weippl
Cryptology ePrint Archive, 2019
462019
Agreement with satoshi–on the formalization of nakamoto consensus
N Stifter, A Judmayer, P Schindler, A Zamyatin, E Weippl
Cryptology ePrint Archive, 2018
462018
Randrunner: Distributed randomness from trapdoor vdfs with strong uniqueness
P Schindler, A Judmayer, M Hittmeir, N Stifter, E Weippl
442021
Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies.
A Judmayer, N Stifter, A Zamyatin, I Tsabary, I Eyal, P Gazi, S Meiklejohn, ...
IACR Cryptol. ePrint Arch. 2019, 775, 2019
422019
Revisiting practical byzantine fault tolerance through blockchain technologies
N Stifter, A Judmayer, E Weippl
Security and Quality in Cyber-Physical Systems Engineering: With Forewords …, 2019
212019
Flux: Revisiting near blocks for proof-of-work blockchains
A Zamyatin, N Stifter, P Schindler, E Weippl, WJ Knottenbelt
Cryptology ePrint Archive, 2018
212018
Estimating (miner) extractable value is hard, let’s go shopping!
A Judmayer, N Stifter, P Schindler, E Weippl
International Conference on Financial Cryptography and Data Security, 74-92, 2022
182022
Sok: Algorithmic incentive manipulation attacks on permissionless pow cryptocurrencies
A Judmayer, N Stifter, A Zamyatin, I Tsabary, I Eyal, P Gaži, S Meiklejohn, ...
Financial Cryptography and Data Security. FC 2021 International Workshops …, 2021
182021
Pitchforks in cryptocurrencies: enforcing rule changes through offensive forking-and consensus techniques (short paper)
A Judmayer, N Stifter, P Schindler, E Weippl
Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS …, 2018
172018
Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies.(2019)
A Judmayer, N Stifter, A Zamyatin, I Tsabary, I Eyal, P Gaži, S Meiklejohn, ...
16*2019
Methods for decentralized identities: Evaluation and insights
W Fdhila, N Stifter, K Kostal, C Saglam, M Sabadello
Business Process Management: Blockchain and Robotic Process Automation Forum …, 2021
142021
Pay to win: Cheap, crowdfundable, cross-chain algorithmic incentive manipulation attacks on pow cryptocurrencies
A Judmayer, N Stifter, A Zamyatin, I Tsabary, I Eyal, P Gazi, S Meiklejohn, ...
Cryptology ePrint Archive, 2019
142019
Proof-of-blackouts? how proof-of-work cryptocurrencies could affect power grids
J Ullrich, N Stifter, A Judmayer, A Dabrowski, E Weippl
Research in Attacks, Intrusions, and Defenses: 21st International Symposium …, 2018
112018
Echoes of the past: Recovering blockchain metrics from merged mining
N Stifter, P Schindler, A Judmayer, A Zamyatin, A Kern, E Weippl
Financial Cryptography and Data Security: 23rd International Conference, FC …, 2019
72019
What is Meant by Permissionless Blockchains?
N Stifter, A Judmayer, P Schindler, A Kern, W Fdhila
https://eprint.iacr.org/2021/023.pdf, 2021
62021
Avoiding Risky Designs When Using Blockchain Technologies in Cyber-Physical Systems
N Stifter, M Eckhart, B Brenner, E Weippl
24th IEEE Conference on Emerging Technologies and Factory Automation, 2019
62019
The system can't perform the operation now. Try again later.
Articles 1–20