Ittay Eyal
Title
Cited by
Cited by
Year
Majority is not enough: Bitcoin mining is vulnerable
I Eyal, EG Sirer
Eighteenth International Conference on Financial Cryptography and Data …, 2014
16542014
Bitcoin-ng: A scalable blockchain protocol
I Eyal, AE Gencer, EG Sirer, R Van Renesse
13th {USENIX} symposium on networked systems design and implementation …, 2016
9532016
On scaling decentralized blockchains
K Croman, C Decker, I Eyal, AE Gencer, A Juels, A Kosba, A Miller, ...
International conference on financial cryptography and data security, 106-125, 2016
8632016
The Miner's Dilemma
I Eyal
Proceedings of the 36th IEEE Symposium on Security and Privacy (Oakland), 2015
3542015
Decentralization in bitcoin and ethereum networks
AE Gencer, S Basu, I Eyal, R Van Renesse, EG Sirer
International Conference on Financial Cryptography and Data Security, 439-457, 2018
1962018
Blockchain technology: Transforming libertarian cryptocurrency dreams to finance and banking realities
I Eyal
Computer 50 (9), 38-49, 2017
1382017
{REM}: Resource-efficient mining for blockchains
F Zhang, I Eyal, R Escriva, A Juels, R Van Renesse
26th {USENIX} Security Symposium ({USENIX} Security 17), 1427-1444, 2017
812017
Robust data sharing with key-value stores
C Băsescu, C Cachin, I Eyal, R Haas, A Sorniotti, M Vukolić, I Zachevsky
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN …, 2012
702012
Teechan: Payment channels using trusted execution environments
J Lind, I Eyal, P Pietzuch, EG Sirer
arXiv preprint arXiv:1612.07766, 2016
602016
The gap game
I Tsabary, I Eyal
Proceedings of the 2018 ACM SIGSAC conference on Computer and Communications …, 2018
572018
Teechain: Scalable blockchain payments using trusted execution environments
J Lind, I Eyal, F Kelbert, O Naor, P Pietzuch, EG Sirer
arXiv preprint arXiv:1707.05454, 2017
442017
Bitcoin covenants
M Möser, I Eyal, EG Sirer
International Conference on Financial Cryptography and Data Security, 126-141, 2016
442016
How to disincentivize large bitcoin mining pools
I Eyal, EG Sirer
Blog post: http://hackingdistributed. com/2014/06/18/how-to-disincentivize …, 2014
442014
LiMoSense: live monitoring in dynamic sensor networks
I Eyal, I Keidar, R Rom
Distributed computing 27 (5), 313-328, 2014
362014
Teechain: a secure payment network with asynchronous blockchain access
J Lind, O Naor, I Eyal, F Kelbert, EG Sirer, P Pietzuch
Proceedings of the 27th ACM Symposium on Operating Systems Principles, 63-79, 2019
252019
Distributed data clustering in sensor networks
I Eyal, I Keidar, R Rom
Distributed computing 24 (5), 207-222, 2011
212011
Teechain: Reducing storage costs on the blockchain with offline payment channels
J Lind, O Naor, I Eyal, F Kelbert, P Pietzuch, EG Sirer
Proceedings of the 11th ACM International Systems and Storage Conference …, 2018
202018
Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies.
A Judmayer, N Stifter, A Zamyatin, I Tsabary, I Eyal, P Gazi, S Meiklejohn, ...
IACR Cryptol. ePrint Arch. 2019, 775, 2019
192019
(Short paper) Piecework: Generalized outsourcing control for proofs of work
P Daian, I Eyal, A Juels, EG Sirer
International Conference on Financial Cryptography and Data Security, 182-190, 2017
152017
It’s time for a hard Bitcoin fork
I Eyal, E Sirer
Hacking, Distributed 13, 2014
152014
The system can't perform the operation now. Try again later.
Articles 1–20