💀 The Wall of Shame

The most cited papers with no code. Sorted by the weight of their sins.

Page 2, showing 50 papers

# Paper Cause of Death Category Citations Published
51 Access Control Encryption: Enforcing Information Flow with Cryptography
Ivan Damgård, Helene Haagh, Claudio Orlandi
👻 Ghosted cs.CR 96 10 years ago
52 Wendy, the Good Little Fairness Widget
Klaus Kursawe
👻 Ghosted cs.CR 95 5 years ago
53 Formalizing Data Deletion in the Context of the Right to be Forgotten
Sanjam Garg, Shafi Goldwasser, Prashant Nalini Vasudevan
👻 Ghosted cs.CR 94 6 years ago
54 Characterizing Code Clones in the Ethereum Smart Contract Ecosystem
Ningyu He, Lei Wu, ... (+3 more)
👻 Ghosted cs.CR 94 6 years ago
55 A Classification Framework for Stablecoin Designs
Amani Moin, Emin Gün Sirer, Kevin Sekniqi
👻 Ghosted q-fin.GN 92 6 years ago
56 Towards practical key exchange from ordinary isogeny graphs
Luca De Feo, Jean Kieffer, Benjamin Smith
👻 Ghosted cs.CR 92 7 years ago
57 Congestion Attacks in Payment Channel Networks
Ayelet Mizrahi, Aviv Zohar
👻 Ghosted cs.CR 91 6 years ago
58 A New Chaos-Based Cryptosystem for Secure Transmitted Images
Abir Awad
👻 Ghosted cs.CR 91 11 years ago
59 Quantum Information Set Decoding Algorithms
Ghazal Kachigar, Jean-Pierre Tillich
👻 Ghosted cs.CR 90 9 years ago
60 Senate: A Maliciously-Secure MPC Platform for Collaborative Analytics
Rishabh Poddar, Sukrit Kalra, ... (+4 more)
👻 Ghosted cs.CR 89 5 years ago
61 PrivFL: Practical Privacy-preserving Federated Regressions on High-dimensional Data over Mobile Networks
Kalikinkar Mandal, Guang Gong
👻 Ghosted cs.CR 86 5 years ago
62 Some Bounds on Binary LCD Codes
Lucky Galvez, Jon-Lark Kim, ... (+3 more)
👻 Ghosted cs.IT 86 9 years ago
63 Watermarks in the Sand: Impossibility of Strong Watermarking for Generative Models
Hanlin Zhang, Benjamin L. Edelman, ... (+4 more)
💤 Eternal Rest cs.LG 85 2 years ago
64 DEEP-FRI: Sampling outside the box improves soundness
Eli Ben-Sasson, Lior Goldberg, ... (+2 more)
🔮 The Ethereal cs.CC 84 7 years ago
65 Raziel: Private and Verifiable Smart Contracts on Blockchains
David Cerezo Sánchez
👻 Ghosted cs.CR 84 7 years ago
66 An Algebraic Attack on Rank Metric Code-Based Cryptosystems
Magali Bardet, Pierre Briaud, ... (+5 more)
👻 Ghosted cs.CR 83 6 years ago
67 Verifier-on-a-Leash: new schemes for verifiable delegated quantum computation, with quasilinear resources
Andrea Coladangelo, Alex Grilo, ... (+2 more)
👻 Ghosted quant-ph 83 8 years ago
68 Semantic Security and Indistinguishability in the Quantum World
Tommaso Gagliardoni, Andreas Hülsing, Christian Schaffner
👻 Ghosted cs.CR 83 10 years ago
69 JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms
Zane Weissman, Thore Tiemann, ... (+4 more)
👻 Ghosted cs.CR 82 6 years ago
70 Coded Merkle Tree: Solving Data Availability Attacks in Blockchains
Mingchao Yu, Saeid Sahraei, ... (+4 more)
👻 Ghosted cs.CR 82 6 years ago
71 Phishing in an Academic Community: A Study of User Susceptibility and Behavior
Alejandra Diaz, Alan T. Sherman, Anupam Joshi
👻 Ghosted cs.CR 82 7 years ago
72 An Empirical Analysis of Privacy in the Lightning Network
George Kappos, Haaroon Yousaf, ... (+5 more)
👻 Ghosted cs.CR 80 6 years ago
73 Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers
Madura A Shelton, Niels Samwel, ... (+4 more)
👻 Ghosted cs.CR 79 6 years ago
74 Compounding of Wealth in Proof-of-Stake Cryptocurrencies
Giulia Fanti, Leonid Kogan, ... (+4 more)
👻 Ghosted cs.CR 78 7 years ago
75 Several Classes of Permutation Trinomials From Niho Exponents
Nian Li, Tor Helleseth
👻 Ghosted cs.IT 78 9 years ago
76 The Measure-and-Reprogram Technique 2.0: Multi-Round Fiat-Shamir and More
Jelle Don, Serge Fehr, Christian Majenz
👻 Ghosted cs.CR 77 6 years ago
77 NFT Wash Trading: Quantifying suspicious behaviour in NFT markets
Victor von Wachter, Johannes Rude Jensen, ... (+2 more)
👻 Ghosted cs.CR 77 4 years ago
78 SoK: Lending Pools in Decentralized Finance
Massimo Bartoletti, James Hsin-yu Chiang, Alberto Lluch-Lafuente
👻 Ghosted cs.CR 76 5 years ago
79 Publicly-Detectable Watermarking for Language Models
Jaiden Fairoze, Sanjam Garg, ... (+4 more)
👻 Ghosted cs.LG 76 2 years ago
80 Privacy-Preserving Contact Tracing: current solutions and open questions
Qiang Tang
👻 Ghosted cs.CR 75 5 years ago
81 Complete Weight Enumerators of a Family of Three-Weight Linear Codes
Shudi Yang, Zheng-An Yao
👻 Ghosted cs.IT 75 10 years ago
82 MDS or NMDS self-dual codes from twisted generalized Reed-Solomon codes
Daitao Huang, Qin Yue, ... (+2 more)
👻 Ghosted cs.IT 72 5 years ago
83 Shoal: Improving DAG-BFT Latency And Robustness
Alexander Spiegelman, Balaji Arun, ... (+2 more)
👻 Ghosted cs.DC 71 2 years ago
84 Trustee: Full Privacy Preserving Vickrey Auction on top of Ethereum
Hisham S. Galal, Amr M. Youssef
👻 Ghosted cs.CR 71 6 years ago
85 Differential Privacy for Eye Tracking with Temporal Correlations
Efe Bozkir, Onur Günlü, ... (+3 more)
👻 Ghosted cs.CR 70 6 years ago
86 Quantum Tokens for Digital Signatures
Shalev Ben-David, Or Sattath
👻 Ghosted quant-ph 70 9 years ago
87 A Cryptoeconomic Traffic Analysis of Bitcoin's Lightning Network
Ferenc Beres, Istvan Andras Seres, Andras A. Benczur
👻 Ghosted cs.CR 69 6 years ago
88 Oblivious Transfer is in MiniQCrypt
Alex B. Grilo, Huijia Lin, ... (+2 more)
👻 Ghosted quant-ph 68 5 years ago
89 Alert Correlation Algorithms: A Survey and Taxonomy
Seyed Ali Mirheidari, Sajjad Arshad, Rasool Jalili
👻 Ghosted cs.CR 68 7 years ago
90 DeepMarks: A Digital Fingerprinting Framework for Deep Neural Networks
Huili Chen, Bita Darvish Rohani, Farinaz Koushanfar
👻 Ghosted cs.CR 68 7 years ago
91 Comparing the difficulty of factorization and discrete logarithm: a 240-digit experiment
Fabrice Boudot, Pierrick Gaudry, ... (+4 more)
👻 Ghosted cs.CR 67 5 years ago
92 Quantum Physical Unclonable Functions: Possibilities and Impossibilities
Myrto Arapinis, Mahshid Delavar, ... (+2 more)
👻 Ghosted quant-ph 67 6 years ago
93 SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search
Hao Chen, Ilaria Chillotti, ... (+4 more)
👻 Ghosted cs.DS 67 6 years ago
94 CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information
Lejla Batina, Shivam Bhasin, ... (+2 more)
👻 Ghosted cs.CR 67 7 years ago
95 On the computational hardness needed for quantum cryptography
Zvika Brakerski, Ran Canetti, Luowen Qian
👻 Ghosted quant-ph 67 3 years ago
96 (Pseudo) Random Quantum States with Binary Phase
Zvika Brakerski, Omri Shmueli
👻 Ghosted quant-ph 66 6 years ago
97 On the Genericity of Maximum Rank Distance and Gabidulin Codes
Alessandro Neri, Anna-Lena Horlemann-Trautmann, ... (+2 more)
👻 Ghosted cs.IT 66 9 years ago
98 Classical Cryptographic Protocols in a Quantum World
Sean Hallgren, Adam Smith, Fang Song
👻 Ghosted quant-ph 66 10 years ago
99 A Zero Knowledge Sumcheck and its Applications
Alessandro Chiesa, Michael A. Forbes, Nicholas Spooner
🔮 The Ethereal cs.CC 65 8 years ago
100 On self-dual negacirculant codes of index two and four
Minjia Shi, Qian Liqin, Patrick Sole
👻 Ghosted cs.IT 65 8 years ago