Ittay Eyal
Ittay Eyal
Associate Professor, ECE, Technion
Verified email at - Homepage
Cited by
Cited by
Majority is not enough: Bitcoin mining is vulnerable
I Eyal, EG Sirer
Eighteenth International Conference on Financial Cryptography and Data …, 2014
Bitcoin-NG: A Scalable Blockchain Protocol
I Eyal, AE Gencer, EG Sirer, R Van Renesse
13th USENIX symposium on networked systems design and implementation (NSDI …, 2016
On Scaling Decentralized Blockchains: (A Position Paper)
K Croman, C Decker, I Eyal, AE Gencer, A Juels, A Kosba, A Miller, ...
International conference on financial cryptography and data security, 106-125, 2016
The Miner's Dilemma
I Eyal
Proceedings of the 36th IEEE Symposium on Security and Privacy (Oakland), 2015
Decentralization in bitcoin and ethereum networks
AE Gencer, S Basu, I Eyal, R Van Renesse, EG Sirer
Financial Cryptography and Data Security: 22nd International Conference, FC …, 2018
Blockchain technology: Transforming libertarian cryptocurrency dreams to finance and banking realities
I Eyal
Computer 50 (9), 38-49, 2017
Teechain: a secure payment network with asynchronous blockchain access
J Lind, O Naor, I Eyal, F Kelbert, EG Sirer, P Pietzuch
Proceedings of the 27th ACM Symposium on Operating Systems Principles, 63-79, 2019
Design choices for central bank digital currency: Policy and technical considerations
S Allen, S Čapkun, I Eyal, G Fanti, BA Ford, J Grimmelmann, A Juels, ...
National Bureau of Economic Research, 2020
REM: Resource-Efficient Mining for Blockchains
F Zhang, I Eyal, R Escriva, A Juels, R van Renesse
26th USENIX Security Symposium (USENIX Security 17), 1427--1444, 2017
The gap game
I Tsabary, I Eyal
Proceedings of the 2018 ACM SIGSAC conference on Computer and Communications …, 2018
BDoS: Blockchain Denial of Service
M Mirkin, Y Ji, J Pang, A Klages-Mundt, I Eyal, A Juels
arXiv preprint arXiv:1912.07497, 2019
Teechan: Payment channels using trusted execution environments
J Lind, I Eyal, P Pietzuch, EG Sirer
arXiv preprint arXiv:1612.07766, 2016
Bitcoin covenants
M Möser, I Eyal, E Gün Sirer
Financial Cryptography and Data Security: FC 2016 International Workshops …, 2016
Robust data sharing with key-value stores
C Basescu, C Cachin, I Eyal, R Haas, M Vukolic
Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of …, 2011
MAD-HTLC: because HTLC is crazy-cheap to attack
I Tsabary, M Yechieli, A Manuskin, I Eyal
2021 IEEE symposium on security and privacy (SP), 1230-1248, 2021
How to disincentivize large bitcoin mining pools
I Eyal, EG Sirer
Blog post: http://hackingdistributed. com/2014/06/18/how-to-disincentivize …, 2014
Ostraka: Secure blockchain scaling by node sharding
A Manuskin, M Mirkin, I Eyal
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020
Blockchain payment channels with trusted execution environments
I Eyal, EG Sirer, PR Pietzuch, JD Lind
US Patent App. 16/100,689, 2019
Pay-To-Win: Cheap, Crowdfundable, Cross-chain Incentive Manipulation Attacks on Cryptocurrencies
A Judmayer, N Stifter, A Zamyatin, I Tsabary, I Eyal, P Gazi, S Meiklejohn, ...
IACR Cryptol ePrint Arch 775, 2019
Efficient MDP analysis for selfish-mining in blockchains
R Bar-Zur, I Eyal, A Tamar
Proceedings of the 2nd ACM Conference on Advances in Financial Technologies …, 2020
The system can't perform the operation now. Try again later.
Articles 1–20