Cryptoeconomics
Double-Spend Counterattacks: Threat of Retaliation in Proof-of-Work Systems.” CoRR abs/2002.10736.
. Working Paper. “
Credible Decentralized Exchange Design via Verifiable Sequencing Rules.” In Proceedings of the 55th Annual ACM Symposium on Theory of Computing (STOC 2023), Pp. 723-736 .
. 2023. “
Differential Liquidity Provision in Uniswap v3 and Implications for Contract Design.” In Proc. of Association for Computing Machinery (ACM) International Conference on Artificial Intelligence in Finance (ICAIF) , Pp. 9-17 .
. 2022. “
Dynamic posted-price mechanisms for the blockchain transaction-fee market.” In AFT 2021, Pp. 86-99.
. 2021. “
Low-cost attacks on Ethereum 2.0 by sub-1/3 stakeholders.” In In Proc. of WINE 2020 Workshop on Game Theory in Blockchain.
. 2020. “
Double-Spend Counterattacks: Threat of Retaliation in Proof-of-Work Systems.” In Cryptoeconomic Systems (CES) Conference 2020.
. 2020. “
Selfish Behavior in the Tezos Proof-of-Stake Protocol.” In Cryptoeconomic Systems (CES) Conference 2020.
. 2020. “
Defending against malicious reorgs in tezos proof-of-stake.” In AFT ’20: 2nd ACM Conference on Advances in Financial Technologies (ACM ’20), Pp. 46–58.
. 2020. “
Thwarting Vote Buying Through Decoy Ballots.” In Proceedings of the 26th International Joint Conference on Artificial Intelligence (IJCAI 2017).
. 2017. “
Thwarting Vote Buying Through Decoy Ballots.” In Proc. of the 16th International Conference on Autonomous Agents and Multiagent Systems (AAMAS).
. 2017. “
Achieving Trust without Disclosure: Dark Pools and a Role for Secrecy-Preserving Verification.” In Proceedings of the Third Conference on Auctions, Market Mechanisms and Their Applications (AMMA’15).
. 2015. “
Fairness with an Honest Minority and a Rational Majority.” In Sixth Theory of Cryptography Conference (TCC’09), 5444: Pp. 36-53.
. 2009. “
Cryptographic Combinatorial Securities Exchanges.” In Financial Cryptography and Data Security (FC’09), Pp. 285–304.
. 2009. “