Ethan Heilman
Ethan Heilman
Boston University, Arwen
Verified email at bu.edu - Homepage
Title
Cited by
Cited by
Year
Eclipse attacks on bitcoin’s peer-to-peer network
E Heilman, A Kendler, A Zohar, S Goldberg
24th {USENIX} Security Symposium ({USENIX} Security 15), 129-144, 2015
5072015
Tumblebit: An untrusted bitcoin-compatible anonymous payment hub
E Heilman, L Alshenibr, F Baldimtsi, A Scafuro, S Goldberg
Network and Distributed System Security Symposium, 2017
1642017
Blindly signed contracts: Anonymous on-blockchain and off-blockchain bitcoin transactions
E Heilman, F Baldimtsi, S Goldberg
International conference on financial cryptography and data security, 43-60, 2016
1252016
An empirical analysis of traceability in the monero blockchain
M Möser, K Soska, E Heilman, K Lee, H Heffan, S Srivastava, K Hogan, ...
Proceedings on Privacy Enhancing Technologies 2018 (3), 143-163, 2018
1232018
One weird trick to stop selfish miners: Fresh bitcoins, a solution for the honest miner
E Heilman
International Conference on Financial Cryptography and Data Security, 161-162, 2014
842014
On the risk of misbehaving RPKI authorities
D Cooper, E Heilman, K Brogle, L Reyzin, S Goldberg
Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, 1-7, 2013
682013
Low-Resource Eclipse Attacks on Ethereum's Peer-to-Peer Network.
Y Marcus, E Heilman, S Goldberg
IACR Cryptol. ePrint Arch. 2018, 236, 2018
662018
From the Consent of the Routed: Improving the Transparency of the RPKI
E Heilman, D Cooper, L Reyzin, S Goldberg
Proceedings of the 2014 ACM conference on SIGCOMM, 51-62, 2014
482014
Cryptanalysis of curl-p and other attacks on the IOTA cryptocurrency
E Heilman, N Narula, G Tanzer, J Lovejoy, M Colavita, M Virza, T Dryja
IACR Transactions on Symmetric Cryptology, 367-391, 2020
32*2020
Atomically trading with roger: Gambling on the success of a hardfork
P McCorry, E Heilman, A Miller
Data Privacy Management, Cryptocurrencies and Blockchain Technology, 334-353, 2017
192017
The arwen trading protocols
E Heilman, S Lipmann, S Goldberg
International Conference on Financial Cryptography and Data Security, 156-173, 2020
11*2020
Restoring the Differential Resistance of MD6.
E Heilman
IACR Cryptol. ePrint Arch. 2011, 374, 2011
6*2011
Attacks Against Permute-Transform-Xor Compression Functions and Spectral Hash.
E Heilman
IACR Cryptol. ePrint Arch. 2009, 415, 2009
32009
Technical perspective: The rewards of selfish mining
S Goldberg, E Heilman
Communications of the ACM 61 (7), 94-94, 2018
12018
bitcoin peer to peer network
E Heilman
2018
Preimage Attacks Against Spectral Hash and PTX Functions.
E Heilman
TinyToCS 3, 2015
2015
Poster: Developing low-cost AVL and Web Mapping for Real-Time Intermodal Customer Information Using a GPS Cell Phones and Google Maps
U Shama, L Harman, E Heilman, J Baltikauskas
2007
Computer Game Design Collaboration between Art & Computer Science
J Baltikauskas, E Heilman, T Lorenzen, R Marchand, M Ponce
2006
Misleading Mathematicians
M Green, E Heilman
The system can't perform the operation now. Try again later.
Articles 1–19