default search action
Ittay Eyal
Person information
- affiliation: Technion, Haifa, Israel
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c36]Michael Mirkin, Lulu Zhou, Ittay Eyal, Fan Zhang:
Sprints: Intermittent Blockchain PoW Mining. USENIX Security Symposium 2024 - [i34]Hongyin Chen, Amit Vaisman, Ittay Eyal:
SAMM: Sharded Automated Market Makers. CoRR abs/2406.05568 (2024) - [i33]Yogev Bar-On, Roi Bar Zur, Omer Ben-Porat, Nimrod Cohen, Ittay Eyal, Matan Sitbon:
Aegis: A Decentralized Expansion Blockchain. CoRR abs/2406.05904 (2024) - 2023
- [c35]James Hsin-yu Chiang, Bernardo David, Ittay Eyal, Tiantian Gong:
FairPoS: Input Fairness in Permissionless Consensus. AFT 2023: 10:1-10:23 - [c34]Roi Bar Zur, Danielle Dori, Sharon Vardi, Ittay Eyal, Aviv Tamar:
Deep Bribe: Predicting the Rise of Bribery in Blockchain Mining with Deep RL. SP (Workshops) 2023: 29-37 - [c33]Roi Bar Zur, Ameer Abu-Hanna, Ittay Eyal, Aviv Tamar:
WeRLman: To Tackle Whale (Transactions), Go Deep (RL). SP 2023: 93-110 - [c32]Ittai Abraham, Danny Dolev, Ittay Eyal, Joseph Y. Halpern:
Colordag: An Incentive-Compatible Blockchain. DISC 2023: 1:1-1:22 - [c31]Youer Pu, Ali Farahbakhsh, Lorenzo Alvisi, Ittay Eyal:
Gorilla: Safe Permissionless Byzantine Consensus. DISC 2023: 31:1-31:16 - [i32]Youer Pu, Ali Farahbakhsh, Lorenzo Alvisi, Ittay Eyal:
Gorilla: Safe Permissionless Byzantine Consensus. CoRR abs/2308.04080 (2023) - [i31]Ittai Abraham, Danny Dolev, Ittay Eyal, Joseph Y. Halpern:
Colordag: An Incentive-Compatible Blockchain. CoRR abs/2308.11379 (2023) - [i30]Marwa Mouallem, Ittay Eyal:
Asynchronous Authentication. CoRR abs/2312.13967 (2023) - [i29]Roi Bar Zur, Danielle Dori, Sharon Vardi, Ittay Eyal, Aviv Tamar:
Deep Bribe: Predicting the Rise of Bribery in Blockchain Mining with Deep RL. IACR Cryptol. ePrint Arch. 2023: 472 (2023) - [i28]Michael Mirkin, Lulu Zhou, Ittay Eyal, Fan Zhang:
Sprints: Intermittent Blockchain PoW Mining. IACR Cryptol. ePrint Arch. 2023: 626 (2023) - 2022
- [c30]Roi Bar Zur, Ameer Abu-Hanna, Ittay Eyal, Aviv Tamar:
WeRLman: to tackle whale (transactions), go deep (RL). SYSTOR 2022: 148 - [c29]Youer Pu, Lorenzo Alvisi, Ittay Eyal:
Safe Permissionless Consensus. DISC 2022: 33:1-33:15 - [e2]Ittay Eyal, Juan A. Garay:
Financial Cryptography and Data Security - 26th International Conference, FC 2022, Grenada, May 2-6, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13411, Springer 2022, ISBN 978-3-031-18282-2 [contents] - [i27]Itay Tsabary, Alex Manuskin, Ittay Eyal:
LedgerHedger: Gas Reservation for Smart-Contract Security. IACR Cryptol. ePrint Arch. 2022: 56 (2022) - [i26]Roi Bar Zur, Ameer Abu-Hanna, Ittay Eyal, Aviv Tamar:
WeRLman: To Tackle Whale (Transactions), Go Deep (RL). IACR Cryptol. ePrint Arch. 2022: 175 (2022) - [i25]Ittai Abraham, Danny Dolev, Ittay Eyal, Joseph Y. Halpern:
Colordag: An Incentive-Compatible Blockchain. IACR Cryptol. ePrint Arch. 2022: 308 (2022) - [i24]Youer Pu, Lorenzo Alvisi, Ittay Eyal:
Safe Permissionless Consensus. IACR Cryptol. ePrint Arch. 2022: 796 (2022) - [i23]James Hsin-yu Chiang, Bernardo David, Ittay Eyal, Tiantian Gong:
FairPoS: Input Fairness in Proof-of-Stake with Adaptive Security. IACR Cryptol. ePrint Arch. 2022: 1442 (2022) - [i22]Deepak Maram, Mahimna Kelkar, Ittay Eyal:
Interactive Authentication. IACR Cryptol. ePrint Arch. 2022: 1682 (2022) - 2021
- [c28]Aljosha Judmayer, Nicholas Stifter, Alexei Zamyatin, Itay Tsabary, Ittay Eyal, Peter Gazi, Sarah Meiklejohn, Edgar R. Weippl:
SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies. Financial Cryptography Workshops 2021: 507-532 - [c27]Aljosha Judmayer, Nicholas Stifter, Alexei Zamyatin, Itay Tsabary, Ittay Eyal, Peter Gazi, Sarah Meiklejohn, Edgar R. Weippl:
Pay to Win: Cheap, Cross-Chain Bribing Attacks on PoW Cryptocurrencies. Financial Cryptography Workshops 2021: 533-549 - [c26]Itay Tsabary, Matan Yechieli, Alex Manuskin, Ittay Eyal:
MAD-HTLC: Because HTLC is Crazy-Cheap to Attack. SP 2021: 1230-1248 - [c25]Itay Tsabary, Alexander Spiegelman, Ittay Eyal:
Tuning PoW with Hybrid Expenditure. Tokenomics 2021: 3:1-3:17 - [c24]Ittay Eyal:
On Cryptocurrency Wallet Design. Tokenomics 2021: 4:1-4:16 - [i21]Uri Kirstein, Shelly Grossman, Michael Mirkin, James Wilcox, Ittay Eyal, Mooly Sagiv:
Phoenix: A Formally Verified Regenerating Vault. CoRR abs/2106.01240 (2021) - [i20]Ittay Eyal:
On Cryptocurrency Wallet Design. IACR Cryptol. ePrint Arch. 2021: 1522 (2021) - 2020
- [c23]Roi Bar Zur, Ittay Eyal, Aviv Tamar:
Efficient MDP Analysis for Selfish-Mining in Blockchains. AFT 2020: 113-131 - [c22]Michael Mirkin, Yan Ji, Jonathan Pang, Ariah Klages-Mundt, Ittay Eyal, Ari Juels:
BDoS: Blockchain Denial-of-Service. CCS 2020: 601-619 - [c21]Alex Manuskin, Michael Mirkin, Ittay Eyal:
Ostraka: Secure Blockchain Scaling by Node Sharding. EuroS&P Workshops 2020: 397-406 - [c20]Fatemeh Rezaei, Shahrzad Naseri, Ittay Eyal, Amir Houmansadr:
The Bitcoin Hunter: Detecting Bitcoin Traffic over Encrypted Channels. SecureComm (1) 2020: 152-171 - [i19]Yael Doweck, Ittay Eyal:
Multi-Party Timed Commitments. CoRR abs/2005.04883 (2020) - [i18]Itay Tsabary, Matan Yechieli, Ittay Eyal:
MAD-HTLC: Because HTLC is Crazy-Cheap to Attack. CoRR abs/2006.12031 (2020) - [i17]Roi Bar Zur, Ittay Eyal, Aviv Tamar:
Efficient MDP Analysis for Selfish-Mining in Blockchains. CoRR abs/2007.05614 (2020) - [i16]Aljosha Judmayer, Nicholas Stifter, Alexei Zamyatin, Itay Tsabary, Ittay Eyal, Peter Gazi, Sarah Meiklejohn, Edgar R. Weippl:
SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies. IACR Cryptol. ePrint Arch. 2020: 1614 (2020)
2010 – 2019
- 2019
- [c19]Joshua Lind, Oded Naor, Ittay Eyal, Florian Kelbert, Emin Gün Sirer, Peter R. Pietzuch:
Teechain: a secure payment network with asynchronous blockchain access. SOSP 2019: 63-79 - [e1]Aviv Zohar, Ittay Eyal, Vanessa Teague, Jeremy Clark, Andrea Bracciali, Federico Pintore, Massimiliano Sala:
Financial Cryptography and Data Security - FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Curaçao, March 2, 2018, Revised Selected Papers. Lecture Notes in Computer Science 10958, Springer 2019, ISBN 978-3-662-58819-2 [contents] - [i15]Alex Manuskin, Michael Mirkin, Ittay Eyal:
Ostraka: Secure Blockchain Scaling by Node Sharding. CoRR abs/1907.03331 (2019) - [i14]Itay Tsabary, Alexander Spiegelman, Ittay Eyal:
Just Enough Security: Reducing Proof-of-Work Ecological Footprint. CoRR abs/1911.04124 (2019) - [i13]Michael Mirkin, Yan Ji, Jonathan Pang, Ariah Klages-Mundt, Ittay Eyal, Ari Juels:
BDoS: Blockchain Denial of Service. CoRR abs/1912.07497 (2019) - [i12]Aljosha Judmayer, Nicholas Stifter, Alexei Zamyatin, Itay Tsabary, Ittay Eyal, Peter Gazi, Sarah Meiklejohn, Edgar R. Weippl:
Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies. IACR Cryptol. ePrint Arch. 2019: 775 (2019) - 2018
- [j5]Ittay Eyal, Emin Gün Sirer:
Majority is not enough: bitcoin mining is vulnerable. Commun. ACM 61(7): 95-102 (2018) - [c18]Itay Tsabary, Ittay Eyal:
The Gap Game. CCS 2018: 713-728 - [c17]Adem Efe Gencer, Soumya Basu, Ittay Eyal, Robbert van Renesse, Emin Gün Sirer:
Decentralization in Bitcoin and Ethereum Networks. Financial Cryptography 2018: 439-457 - [c16]Joshua Lind, Oded Naor, Ittay Eyal, Florian Kelbert, Peter R. Pietzuch, Emin Gün Sirer:
Teechain: Reducing Storage Costs on the Blockchain With Offline Payment Channels. SYSTOR 2018: 125 - [c15]Itay Tsabary, Ittay Eyal:
The Gap Game. SYSTOR 2018: 132 - [i11]Adem Efe Gencer, Soumya Basu, Ittay Eyal, Robbert van Renesse, Emin Gün Sirer:
Decentralization in Bitcoin and Ethereum Networks. CoRR abs/1801.03998 (2018) - [i10]Itay Tsabary, Ittay Eyal:
The Gap Game. CoRR abs/1805.05288 (2018) - [i9]Rainer Böhme, Joseph Bonneau, Ittay Eyal:
Blockchain Security at Scale (Dagstuhl Seminar 18461). Dagstuhl Reports 8(11): 21-34 (2018) - [i8]Seb Neumayer, Mayank Varia, Ittay Eyal:
An Analysis of Acceptance Policies For Blockchain Transactions. IACR Cryptol. ePrint Arch. 2018: 40 (2018) - 2017
- [j4]Ittay Eyal:
Blockchain Technology: Transforming Libertarian Cryptocurrency Dreams to Finance and Banking Realities. Computer 50(9): 38-49 (2017) - [c14]Philip Daian, Ittay Eyal, Ari Juels, Emin Gün Sirer:
(Short Paper) PieceWork: Generalized Outsourcing Control for Proofs of Work. Financial Cryptography Workshops 2017: 182-190 - [c13]Fan Zhang, Ittay Eyal, Robert Escriva, Ari Juels, Robbert van Renesse:
REM: Resource-Efficient Mining for Blockchains. USENIX Security Symposium 2017: 1427-1444 - [i7]Joshua Lind, Ittay Eyal, Florian Kelbert, Oded Naor, Peter R. Pietzuch, Emin Gün Sirer:
Teechain: Scalable Blockchain Payments using Trusted Execution Environments. CoRR abs/1707.05454 (2017) - [i6]Fan Zhang, Ittay Eyal, Robert Escriva, Ari Juels, Robbert van Renesse:
REM: Resource-Efficient Mining for Blockchains. IACR Cryptol. ePrint Arch. 2017: 179 (2017) - 2016
- [c12]Kyle Croman, Christian Decker, Ittay Eyal, Adem Efe Gencer, Ari Juels, Ahmed E. Kosba, Andrew Miller, Prateek Saxena, Elaine Shi, Emin Gün Sirer, Dawn Song, Roger Wattenhofer:
On Scaling Decentralized Blockchains - (A Position Paper). Financial Cryptography Workshops 2016: 106-125 - [c11]Malte Möser, Ittay Eyal, Emin Gün Sirer:
Bitcoin Covenants. Financial Cryptography Workshops 2016: 126-141 - [c10]Ittay Eyal, Adem Efe Gencer, Emin Gün Sirer, Robbert van Renesse:
Bitcoin-NG: A Scalable Blockchain Protocol. NSDI 2016: 45-59 - [i5]Joshua Lind, Ittay Eyal, Peter R. Pietzuch, Emin Gün Sirer:
Teechan: Payment Channels Using Trusted Execution Environments. CoRR abs/1612.07766 (2016) - 2015
- [c9]Ittay Eyal, Ken Birman, Robbert van Renesse:
Cache Serializability: Reducing Inconsistency in Edge Transactions. ICDCS 2015: 686-695 - [c8]Ittay Eyal:
The Miner's Dilemma. IEEE Symposium on Security and Privacy 2015: 89-103 - [i4]Ittay Eyal, Adem Efe Gencer, Emin Gün Sirer, Robbert van Renesse:
Bitcoin-NG: A Scalable Blockchain Protocol. CoRR abs/1510.02037 (2015) - 2014
- [j3]Ittay Eyal, Idit Keidar, Raphael Rom:
LiMoSense: live monitoring in dynamic sensor networks. Distributed Comput. 27(5): 313-328 (2014) - [c7]Ittay Eyal, Emin Gün Sirer:
Majority Is Not Enough: Bitcoin Mining Is Vulnerable. Financial Cryptography 2014: 436-454 - [i3]Ittay Eyal, Ken Birman, Robbert van Renesse:
Controlled Transactional Consistency for Web Caching. CoRR abs/1409.8324 (2014) - [i2]Ittay Eyal:
The Miner's Dilemma. CoRR abs/1411.7099 (2014) - 2013
- [j2]Ittay Eyal:
Fault tolerant transaction architectures. SIGACT News 44(3): 78-84 (2013) - [c6]Ittay Eyal, Flavio Junqueira, Idit Keidar:
Thinner Clouds with Preallocation. HotCloud 2013 - [c5]Ittay Eyal, Idit Keidar, Stacy Patterson, Raphi Rom:
In-Network Analytics for Ubiquitous Sensing. DISC 2013: 507-521 - [i1]Ittay Eyal, Emin Gün Sirer:
Majority is not Enough: Bitcoin Mining is Vulnerable. CoRR abs/1311.0243 (2013) - 2012
- [c4]Cristina Basescu, Christian Cachin, Ittay Eyal, Robert Haas, Alessandro Sorniotti, Marko Vukolic, Ido Zachevsky:
Robust data sharing with key-value stores. DSN 2012: 1-12 - 2011
- [j1]Ittay Eyal, Idit Keidar, Raphael Rom:
Distributed data clustering in sensor networks. Distributed Comput. 24(5): 207-222 (2011) - [c3]Ittay Eyal, Idit Keidar, Raphael Rom:
LiMoSense - Live Monitoring in Dynamic Sensor Networks. ALGOSENSORS 2011: 72-85 - [c2]Cristina Basescu, Christian Cachin, Ittay Eyal, Robert Haas, Marko Vukolic:
Robust data sharing with key-value stores. PODC 2011: 221-222 - 2010
- [c1]Ittay Eyal, Idit Keidar, Raphael Rom:
Distributed data classification in sensor networks. PODC 2010: 151-160
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint