What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Roger Wattenhofer
Google Scholar
29
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/uss
Deanonymizing Ethereum Validators: The P2P Network Has a Privacy Issue.
Lioba Heimbach
Yann Vonlanthen
Juan Villacis
Lucianna Kiffer
Roger Wattenhofer
2024
conf/fc
Dissecting the EIP-2930 Optional Access Lists.
Lioba Heimbach
Quentin Kniep
Yann Vonlanthen
Roger Wattenhofer
Patrick Züst
2024
conf/fc
Short Paper: The PoW Landscape in the Aftermath of The Merge.
Lucianna Kiffer
Sophia Skorik
Yann Vonlanthen
Roger Wattenhofer
2024
conf/fc
Ethereum Proof-of-Stake Consensus Layer: Participation and Decentralization.
Dominic Grandjean
Lioba Heimbach
Roger Wattenhofer
2024
conf/esorics
Quantifying Liveness and Safety of Avalanche's Snowball.
Quentin Kniep
Maxime Laval
Jakub Sliwinski
Roger Wattenhofer
2024
conf/asiaccs
Byzantine Fault-Tolerant Aggregate Signatures.
Quentin Kniep
Roger Wattenhofer
2023
conf/fc
DeFi Auditing: Mechanisms, Effectiveness, and User Perceptions.
Ding Feng
Rupert Hitsch
Kaihua Qin
Arthur Gervais
Roger Wattenhofer
Yaxing Yao
Ye Wang
2023
conf/fc
DeFi and NFTs Hinder Blockchain Scalability.
Lioba Heimbach
Quentin Kniep
Yann Vonlanthen
Roger Wattenhofer
2023
conf/fc
Short Squeeze in DeFi Lending Market: Decentralization in Jeopardy?
Lioba Heimbach
Eric Schertenleib
Roger Wattenhofer
2023
conf/fc
The Hidden Shortcomings of (D)AOs - An Empirical Study of On-Chain Governance.
Rainer Feichtinger
Robin Fritsch
Yann Vonlanthen
Roger Wattenhofer
2023
conf/sp
SoK: Decentralized Finance (DeFi) Attacks.
Liyi Zhou
Xihan Xiong
Jens Ernstberger
Stefanos Chaliasos
Zhipeng Wang
Ye Wang
Kaihua Qin
Roger Wattenhofer
Dawn Song
Arthur Gervais
2022
conf/ccs
Exploring Price Accuracy on Uniswap V3 in Times of Distress.
Lioba Heimbach
Eric Schertenleib
Roger Wattenhofer
2022
conf/fc
An Empirical Study of Market Inefficiencies in Uniswap and SushiSwap.
Jan Arvid Berg
Robin Fritsch
Lioba Heimbach
Roger Wattenhofer
2022
conf/esorics
A Limitlessly Scalable Transaction System.
Max Mathys
Roland Schmid
Jakub Sliwinski
Roger Wattenhofer
2022
conf/asiaccs
Eliminating Sandwich Attacks with the Help of Game Theory.
Lioba Heimbach
Roger Wattenhofer
2022
conf/icbc2
TWAP Oracle Attacks: Easier Done than Said?
Torgin Mackinga
Tejaswi Nadahalli
Roger Wattenhofer
2022
conf/icbc2
Grief-free Atomic Swaps.
Tejaswi Nadahalli
Majid Khabbazian
Roger Wattenhofer
2021
conf/fc
Brick: Asynchronous Incentive-Compatible Payment Channels.
Zeta Avarikioti
Eleftherios Kokoris-Kogias
Roger Wattenhofer
Dionysis Zindros
2021
conf/fc
Timelocked Bribing.
Tejaswi Nadahalli
Majid Khabbazian
Roger Wattenhofer
2020
conf/fc
Cerberus Channels: Incentivizing Watchtowers for Bitcoin.
Zeta Avarikioti
Orfeas Stefanos Thyfronitis Litos
Roger Wattenhofer
2020
conf/fc
Ride the Lightning: The Game Theory of Payment Channels.
Zeta Avarikioti
Lioba Heimbach
Yuyi Wang
Roger Wattenhofer
2019
conf/fc
Bitcoin Security Under Temporary Dishonest Majority.
Georgia Avarikioti
Lukas Käppeli
Yuyi Wang
Roger Wattenhofer
2019
conf/esorics
12 Angry Miners.
Aryaz Eghbali
Roger Wattenhofer
2019
conf/esorics
Online Payment Network Design.
Georgia Avarikioti
Kenan Besic
Yuyi Wang
Roger Wattenhofer
2019
conf/esorics
Payment Networks as Creation Games.
Georgia Avarikioti
Rolf Scheuner
Roger Wattenhofer
2018
conf/esorics
Payment Network Design with Fees.
Georgia Avarikioti
Gerrit Janssen
Yuyi Wang
Roger Wattenhofer
2016
conf/fc
On Scaling Decentralized Blockchains - (A Position Paper).
Kyle Croman
Christian Decker
Ittay Eyal
Adem Efe Gencer
Ari Juels
Ahmed E. Kosba
Andrew Miller
Prateek Saxena
Elaine Shi
Emin Gün Sirer
Dawn Song
Roger Wattenhofer
2015
conf/esorics
Making Bitcoin Exchanges Transparent.
Christian Decker
James Guthrie
Jochen Seidel
Roger Wattenhofer
2014
conf/esorics
Bitcoin Transaction Malleability and MtGox.
Christian Decker
Roger Wattenhofer
Coauthors
Adem Efe Gencer
(1)
Ahmed E. Kosba
(1)
Andrew Miller
(1)
Ari Juels
(1)
Arthur Gervais
(2)
Aryaz Eghbali
(1)
Christian Decker
(3)
Dawn Song
(2)
Ding Feng
(1)
Dionysis Zindros
(1)
Dominic Grandjean
(1)
Elaine Shi
(1)
Eleftherios Kokoris-Kogias
(1)
Emin Gün Sirer
(1)
Eric Schertenleib
(2)
Georgia Avarikioti
(4)
Gerrit Janssen
(1)
Ittay Eyal
(1)
Jakub Sliwinski
(2)
James Guthrie
(1)
Jan Arvid Berg
(1)
Jens Ernstberger
(1)
Jochen Seidel
(1)
Juan Villacis
(1)
Kaihua Qin
(2)
Kenan Besic
(1)
Kyle Croman
(1)
Lioba Heimbach
(9)
Liyi Zhou
(1)
Lucianna Kiffer
(2)
Lukas Käppeli
(1)
Majid Khabbazian
(2)
Max Mathys
(1)
Maxime Laval
(1)
Orfeas Stefanos Thyfronitis Litos
(1)
Patrick Züst
(1)
Prateek Saxena
(1)
Quentin Kniep
(4)
Rainer Feichtinger
(1)
Robin Fritsch
(2)
Roger Wattenhofer
(29)
Roland Schmid
(1)
Rolf Scheuner
(1)
Rupert Hitsch
(1)
Sophia Skorik
(1)
Stefanos Chaliasos
(1)
Tejaswi Nadahalli
(3)
Torgin Mackinga
(1)
Xihan Xiong
(1)
Yann Vonlanthen
(5)
Yaxing Yao
(1)
Ye Wang
(2)
Yuyi Wang
(4)
Zeta Avarikioti
(3)
Zhipeng Wang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to