Eclipse attacks on Bitcoin’s peer-to-peer network E Heilman, A Kendler, A Zohar, S Goldberg 24th USENIX security symposium (USENIX security 15), 129-144, 2015 | 1091 | 2015 |
Tumblebit: An untrusted bitcoin-compatible anonymous payment hub E Heilman, L Alshenibr, F Baldimtsi, A Scafuro, S Goldberg Network and distributed system security symposium, 2017 | 355 | 2017 |
An empirical analysis of traceability in the monero blockchain M Möser, K Soska, E Heilman, K Lee, H Heffan, S Srivastava, K Hogan, ... arXiv preprint arXiv:1704.04299, 2017 | 343 | 2017 |
Blindly signed contracts: Anonymous on-blockchain and off-blockchain bitcoin transactions E Heilman, F Baldimtsi, S Goldberg International conference on financial cryptography and data security, 43-60, 2016 | 245 | 2016 |
Low-resource eclipse attacks on ethereum's peer-to-peer network Y Marcus, E Heilman, S Goldberg Cryptology ePrint Archive, 2018 | 222 | 2018 |
One weird trick to stop selfish miners: Fresh bitcoins, a solution for the honest miner E Heilman Financial Cryptography and Data Security: FC 2014 Workshops, BITCOIN and …, 2014 | 182 | 2014 |
On the risk of misbehaving RPKI authorities D Cooper, E Heilman, K Brogle, L Reyzin, S Goldberg Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, 1-7, 2013 | 111 | 2013 |
Cryptanalysis of curl-p and other attacks on the iota cryptocurrency E Heilman, N Narula, G Tanzer, J Lovejoy, M Colavita, M Virza, T Dryja Cryptology ePrint Archive, 2019 | 75* | 2019 |
From the Consent of the Routed: Improving the Transparency of the RPKI E Heilman, D Cooper, L Reyzin, S Goldberg Proceedings of the 2014 ACM conference on SIGCOMM, 51-62, 2014 | 69 | 2014 |
The arwen trading protocols E Heilman, S Lipmann, S Goldberg Financial Cryptography and Data Security: 24th International Conference, FC …, 2020 | 43* | 2020 |
Atomically trading with roger: Gambling on the success of a hardfork P McCorry, E Heilman, A Miller Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS …, 2017 | 32 | 2017 |
Restoring the differential resistance of MD6 E Heilman Cryptology ePrint Archive, 2011 | 9* | 2011 |
IOTA Vunerability Report: Cryptanalysis of the Curl Hash Function Enabling Practical Signature Forgery Attacks on the IOTA Cryptocurrency. 2017 E Heilman, N Narula, T Dryja, M Virza | 6 | 2017 |
Technical perspective: The rewards of selfish mining S Goldberg, E Heilman Communications of the ACM 61 (7), 94-94, 2018 | 5 | 2018 |
OpenPubkey: Augmenting OpenID connect with user held signing keys E Heilman, L Mugnier, A Filippidis, S Goldberg, S Lipman, Y Marcus, ... Cryptology ePrint Archive, 2023 | 3 | 2023 |
Attacks against permute-transform-Xor compression functions and spectral hash E Heilman Cryptology ePrint Archive, 2009 | 3 | 2009 |
Zero trust authentication E Heilman, L Mugnier, S Goldberg, Y Marcus, S Lipman US Patent App. 17/590,657, 2023 | 1 | 2023 |
Mirror worlds, eclipse attacks and the security of Bitcoin and the RPKI E Heilman Boston University, 2022 | 1 | 2022 |
MULTI-PARTY SPLIT-KEY AUTHENTICATION E Heilman, L Mugnier, S Goldberg, J Merfeld, Y Marcus, AM Samborski, ... US Patent App. 18/527,565, 2024 | | 2024 |
Preimage Attacks Against Spectral Hash and PTX Functions. E Heilman Tiny Trans. Comput. Sci. 3, 2015 | | 2015 |