Follow
Ethan Heilman
Ethan Heilman
Boston University, BastionZero
Verified email at bu.edu - Homepage
Title
Cited by
Cited by
Year
Eclipse attacks on Bitcoin’s peer-to-peer network
E Heilman, A Kendler, A Zohar, S Goldberg
24th USENIX security symposium (USENIX security 15), 129-144, 2015
10572015
Tumblebit: An untrusted bitcoin-compatible anonymous payment hub
E Heilman, L Alshenibr, F Baldimtsi, A Scafuro, S Goldberg
Network and distributed system security symposium, 2017
3462017
An empirical analysis of traceability in the monero blockchain
M Möser, K Soska, E Heilman, K Lee, H Heffan, S Srivastava, K Hogan, ...
arXiv preprint arXiv:1704.04299, 2017
3362017
Blindly signed contracts: Anonymous on-blockchain and off-blockchain bitcoin transactions
E Heilman, F Baldimtsi, S Goldberg
International conference on financial cryptography and data security, 43-60, 2016
2402016
Low-resource eclipse attacks on ethereum's peer-to-peer network
Y Marcus, E Heilman, S Goldberg
Cryptology ePrint Archive, 2018
2142018
One weird trick to stop selfish miners: Fresh bitcoins, a solution for the honest miner
E Heilman
Financial Cryptography and Data Security: FC 2014 Workshops, BITCOIN and …, 2014
1752014
On the risk of misbehaving RPKI authorities
D Cooper, E Heilman, K Brogle, L Reyzin, S Goldberg
Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, 1-7, 2013
1082013
Cryptanalysis of curl-p and other attacks on the iota cryptocurrency
E Heilman, N Narula, G Tanzer, J Lovejoy, M Colavita, M Virza, T Dryja
Cryptology ePrint Archive, 2019
75*2019
From the Consent of the Routed: Improving the Transparency of the RPKI
E Heilman, D Cooper, L Reyzin, S Goldberg
Proceedings of the 2014 ACM conference on SIGCOMM, 51-62, 2014
692014
The arwen trading protocols
E Heilman, S Lipmann, S Goldberg
Financial Cryptography and Data Security: 24th International Conference, FC …, 2020
39*2020
Atomically trading with roger: Gambling on the success of a hardfork
P McCorry, E Heilman, A Miller
Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS …, 2017
322017
Restoring the differential resistance of MD6
E Heilman
Cryptology ePrint Archive, 2011
8*2011
IOTA Vunerability Report: Cryptanalysis of the Curl Hash Function Enabling Practical Signature Forgery Attacks on the IOTA Cryptocurrency. 2017
E Heilman, N Narula, T Dryja, M Virza
62017
Technical perspective: The rewards of selfish mining
S Goldberg, E Heilman
Communications of the ACM 61 (7), 94-94, 2018
52018
OpenPubkey: Augmenting OpenID Connect with User held Signing Keys
E Heilman, L Mugnier, A Filippidis, S Goldberg, S Lipman, Y Marcus, ...
Cryptology ePrint Archive, 2023
32023
Attacks against permute-transform-Xor compression functions and spectral hash
E Heilman
Cryptology ePrint Archive, 2009
32009
Zero trust authentication
E Heilman, L Mugnier, S Goldberg, Y Marcus, S Lipman
US Patent App. 17/590,657, 2023
2023
Mirror worlds, eclipse attacks and the security of Bitcoin and the RPKI
E Heilman
Boston University, 2022
2022
Preimage Attacks Against Spectral Hash and PTX Functions.
E Heilman
Tiny Trans. Comput. Sci. 3, 2015
2015
Poster: Developing low-cost AVL and Web Mapping for Real-Time Intermodal Customer Information Using a GPS Cell Phones and Google Maps
U Shama, L Harman, E Heilman, J Baltikauskas
2007
The system can't perform the operation now. Try again later.
Articles 1–20