The academic community was relatively slow to being research on Bitcoin. Here are the first academic papers written between 2008 and 2013 (5 years) on Bitcoin.
Bitcoin: A Peer-to-Peer Electronic Cash System
S. Nakamoto
Tech Report, 2008
An Analysis of Anonymity in the Bitcoin System
F. Reid and M. Harrigan
PASSAT 2011
On Bitcoin and Red Balloons
M. Babaioff, S. Dobzinski, S. Oren, and A. Zohar
SIGecon Exchanges, 10(3), 2011 (and ACM EC 2012)
CommitCoin: Carbon Dating Commitments with Bitcoin
J. Clark and A. Essex
Financial Cryptography 2012
Bitter to Better — How to Make Bitcoin a Better Currency
S. Barber, X. Boyen, E. Shi, and E. Uzun
Financial Cryptography 2012
Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by the Bitcoin Currency
J. Becker, D. Breuker, T. Heide, J. Holler, H. P. Rauer, and R. Bohme
WEIS 2012
Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin
G. O. Karame, E. Androulaki, and S. Capkun
CCS 2012
Quantitative Analysis of the Full Bitcoin Transaction Graph
D. Ron and A. Shamir
Financial Cryptography 2013
Evaluating User Privacy in Bitcoin
E. Androulaki, G. Karame, M. Roeschlin, T. Scherer and S. Capkun
Financial Cryptography 2013
Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk
T. Moore and N. Christin
Financial Cryptography 2013
Zerocoin: Anonymous Distributed e-Cash from Bitcoin
I. Miers, C. Garman, M. Green, and A. Rubin
IEEE SSP (Oakland) 2013
Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace
N. Christin
WWW 2013
Pinocchio Coin: Building Zerocoin from a Succinct Pairing-based Proof System
G. Danezis, C. Fournet, M. Kohlweiss, and B. Parno
PETShop 2013
The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries
J. Kroll, I. Davey, and E. Felten
WEIS 2013
Information Propagation in the Bitcoin Network
C. Decker and R. Wattenhofer
P2P 2013
Have a Snack, Pay with Bitcoins
T. Bamert, C. Decker, L. Elsen, R. Wattenhofer and S. Welten
P2P 2013
A Fistful of Bitcoins: Characterizing Payments Among Men with No Names
S. Meiklejohn, M. Pomarole, G. Jordan, K. Levchenko, D. McCoy, G.M. Voelker, and S. Savage
IMC 2013
-
2014 & 2015
On the Privacy Provisions of Bloom Filters in Lightweight Bitcoin Clients
A. Gervais, G.O. Karame, D. Gruber and S. Capkun
ACSAC 2014
Sybil-Resistant Mixing for Bitcoin
G. Bissias, A.P. Ozisik, B.N. Levine, and M. Liberatore
WPES 2014
How to Use Bitcoin to Incentivize Correct Computations
R. Kumaresan and I. Bentov
CCS 2014
Deanonymisation of clients in Bitcoin P2P network
A. Biryukov, D. Khovratovich and I. Pustogarov
CCS 2014
VerSum: Verifiable Computations over Large Public Logs
J. van del Hooff, M. F. Kaashoek and N. Zeldovich
CCS 2014
Modeling Bitcoin Contracts by Timed Automata
M. Andrychowicz, S. Dziembowski, D. Malinowski and L. Mazurek
FORMATS 2014
CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin
T. Ruffing, P. Moreno-Sanchez, and A. Kate
ESORICS 2014
Bitcoin Transaction Malleability and MtGox
C. Decker, and R. Wattenhofer
ESORICS 2014
BlueWallet: The Secure Bitcoin Wallet
T. Bamert, C. Decker, R. Wattenhofer and S. Welten
STM 2014
How to Use Bitcoin to Design Fair Protocols
I. Bentov and R. Kumaresan
CRYPTO 2014
Better in Practice than in Theory: Lessons from the Rise of Bitcoin
J. Bonneau and A. Narayanan
HotSec 2014 (Speakers)
From Onions to Shallots: Rewarding Tor Relays with TEARS
R. Jansen, A. Miller, P. Syverson and B. Ford
HotPETS 2014
A TorPath to TorCoin: Proof-of-Bandwidth Altcoins for Compensating Relays
M. Ghosh, M. Richardson, B. Ford and R. Jansen
HotPETS 2014
On Decentralizing Prediction Markets and Order Books
J. Clark, J. Bonneau, E.W. Felten, J.A. Kroll, A. Miller, and A. Narayanan
WEIS 2014
Competition in the Crypto-Currency Market
N. Gandal and H. Halaburda
WEIS 2014
Is Bitcoin a Decentralized Currency?
A. Gervais, G.O. Karame, S. Capkun and V. Capkun
IEEE S&P Magazine 12(3) 2014
Anonymous Byzantine Consensus from Moderately-Hard Puzzles: A Model for Bitcoin
A. Miller and J.J. LaViola
Tech Report 2014
Secure Multiparty Computations on Bitcoin
M. Andrychowicz, S. Dziembowski, D. Malinowski, and L. Mazurek
IEEE SSP (Oakland) 2014
Zerocash: Decentralized Anonymous Payments from Bitcoin
E. Ben-Sasson, A. Chiesa, C. Garman, M. Green, I. Miers, E. Tromer, and M. Virza
IEEE SSP (Oakland) 2014
PermaCoin: Repurposing Bitcoin Work for Data Preservation
A. Miller, A. Juels, E. Shi, B. Parno, and J. Katz
IEEE SSP (Oakland) 2014
Botcoin: Monetizing Stolen Cycles
D.Y. Huang, H. Dharmdasani, S. Meiklejohn, V. Dave, C. Grier, D. McCoy, S. Savage, N. Weaver, A.C. Snoeren and K. Levchenko
NDSS 2014
Decentralized Anonymous Credentials
C. Garman, M. Green, and I. Miers
NDSS 2014
Majority is not Enough: Bitcoin Mining is Vulnerable
I. Eyal and E.G. Sirer
Financial Cryptography 2014
BitIodine: Extracting Intelligence from the Bitcoin Network
M. Spagnuolo, F. Maggi and S. Zanero
Financial Cryptography 2014
Mixcoin: Anonymity for Bitcoin with accountable mixes
J. Bonneau, A. Narayanan, A. Miller, J. Clark, J.A. Kroll and E.W. Felten
Financial Cryptography 2014
An Analysis of Anonymity in Bitcoin Using P2P Network Traffic
P. Koshy, D. Koshy and P. McDaniel
Financial Cryptography 2014
Elliptic Curve Cryptography in Practice
J. Bos, J.A. Halderman, N. Heninger, J. Moore, M. Naehrig and E. Wustrow
Financial Cryptography 2014
Bitcoin and Cryptocurrency Research Conference
Entire Program
CITP, Princeton, 2014
BITCOIN 2014
(Entire Program)
Misbehavior in Bitcoin: A Study of Double-Spending and Accountability
G. O. Karame, E. Androulaki, M. Roeschlin, A. Gervais, S. Capkun
TISSEC, 18(1), 2015
Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges
G. Dagher, B. Bünz, J. Bonneau, J. Clark, D. Boneh
CCS 2015
Liar, Liar, Coins on Fire! — Penalizing Equivocation By Loss of Bitcoins
T. Ruffing, A. Kate, D. Schroeder
CCS 2015How to Use Bitcoin to Play Decentralized Poker
R. Kumaresan, T. Moran, I. Bentov
CCS 2015
Micropayments for Decentralized Currencies
R. Pass, a. shelat
CCS 2015Traitor Deterring Schemes: Using Bitcoin as Collateral for Digital Content
A. Kiayias, Q. Tang
CCS 2015Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions
A. Miller, A. Kosba, E. Shi, J. Katz
CCS 2015
Tampering with the Delivery of Blocks and Transactions in Bitcoin
A. Gervais, H. Ritzdorf, G. O. Karame, S. Capkun
CCS 2015
Making Bitcoin Exchanges Transparent
C. Decker, J. Guthrie, J. Seidel and R. Wattenhofer
ESORICS 2015PoW-Based Distributed Cryptography with no Trusted Setup
M. Andrychowicz, S. Dziembowski
CRYPTO 2015
Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem
K. Soska, N. Christin
USENIX Security 2015
Eclipse Attacks on Bitcoin's Peer-to-Peer Network
E. Heilman, A. Kendler, A. Zohar, S. Goldberg
USENIX Security 2015
Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications
A. Miller, R. Jansen
CSET 2015
An empirical study of Namecoin and lessons for decentralized namespace design
H. Kalodner, M. Carlsten, P. Ellenbogen, J. Bonneau, and A. Narayanan
WEIS 2015
Bitcoin and Second-generation Cryptocurrencies
J. Bonneau, A. Miller, J. Clark, A. Narayanan, J. Kroll, and E.W. Felten
IEEE SP (Oakland) 2015
Bitcoin over Tor isn't a Good Idea
A. Biryukov and I. Pustogarov
IEEE SP (Oakland) 2015
The Bitcoin Backbone Protocol: Analysis and Applications
J. Garay, A. Kiayias and N. Leonardos
EUROCRYPT 2015
A First Look at the Usability of Bitcoin Key Management
S. Eskandari, D, Barrera, E. Stobert, and J. Clark
USEC 2015
There's No Free Lunch, Even Using Bitcoin: Tracking the Popularity and Profits of Virtual Currency Scams
M. Vasek and T. Moore
Financial Cryptography 2015
Hierarchical deterministic Bitcoin wallets that tolerate key leakage
G. Gutoski and D. Stebila
Financial Cryptography 2015
Secure High-Rate Transaction Processing in Bitcoin
Y. Sompolinsky and A. Zohar
Financial Cryptography 2015
Inclusive Block Chain Protocols
Y. Lewenberg, Y. Sompolinsky and A. Zohar
Financial Cryptography 2015
BITCOIN 2015
(Entire Program)
