💀 The Wall of Shame

The most cited papers with no code. Sorted by the weight of their sins.

Page 1, showing 50 papers

# Paper Cause of Death Category Citations Published
1 Gazelle: A Low Latency Framework for Secure Neural Network Inference
Chiraag Juvekar, Vinod Vaikuntanathan, Anantha Chandrakasan
👻 Ghosted cs.CR 1.0K 8 years ago
2 Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds
Mark Bun, Thomas Steinke
👻 Ghosted cs.CR 932 9 years ago
3 Optimal Selfish Mining Strategies in Bitcoin
Ayelet Sapirshtein, Yonatan Sompolinsky, Aviv Zohar
👻 Ghosted cs.CR 645 10 years ago
4 Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications
M. Sadegh Riazi, Christian Weinert, ... (+4 more)
👻 Ghosted cs.CR 536 8 years ago
5 Decentralization in Bitcoin and Ethereum Networks
Adem Efe Gencer, Soumya Basu, ... (+3 more)
👻 Ghosted cs.CR 413 8 years ago
6 Distributed Differential Privacy via Shuffling
Albert Cheu, Adam Smith, ... (+3 more)
👻 Ghosted cs.CR 397 7 years ago
7 CacheZoom: How SGX Amplifies The Power of Cache Attacks
Ahmad Moghimi, Gorka Irazoqui, Thomas Eisenbarth
👻 Ghosted cs.CR 351 9 years ago
8 Breaking Symmetric Cryptosystems using Quantum Period Finding
Marc Kaplan, Gaëtan Leurent, ... (+2 more)
👻 Ghosted quant-ph 330 10 years ago
9 XONN: XNOR-based Oblivious Deep Neural Network Inference
M. Sadegh Riazi, Mohammad Samragh, ... (+4 more)
👻 Ghosted cs.CR 308 7 years ago
10 Concurrency and Privacy with Payment-Channel Networks
Giulio Malavolta, Pedro Moreno-Sanchez, ... (+3 more)
👻 Ghosted cs.CR 302 6 years ago
11 PassGAN: A Deep Learning Approach for Password Guessing
Briland Hitaj, Paolo Gasti, ... (+2 more)
💀 404 Not Found cs.CR 293 8 years ago
12 Constructions of Good Entanglement-Assisted Quantum Error Correcting Codes
Kenza Guenda, Somphong Jitman, T. Aaron Gulliver
👻 Ghosted cs.IT 271 9 years ago
13 The Privacy Blanket of the Shuffle Model
Borja Balle, James Bell, ... (+2 more)
👻 Ghosted cs.LG 268 7 years ago
14 SoK: Transparent Dishonesty: front-running attacks on Blockchain
Shayan Eskandari, Seyedehmahsa Moosavi, Jeremy Clark
👻 Ghosted cs.CR 263 7 years ago
15 Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit
Kaihua Qin, Liyi Zhou, ... (+2 more)
👻 Ghosted cs.CR 236 6 years ago
16 Indistinguishability Obfuscation from Well-Founded Assumptions
Aayush Jain, Huijia Lin, Amit Sahai
👻 Ghosted cs.CR 235 5 years ago
17 Designing Secure Ethereum Smart Contracts: A Finite State Machine Based Approach
Anastasia Mavridou, Aron Laszka
👻 Ghosted cs.CR 233 8 years ago
18 Trident: Efficient 4PC Framework for Privacy Preserving Machine Learning
Harsh Chaudhari, Rahul Rachuri, Ajith Suresh
👻 Ghosted cs.LG 231 6 years ago
19 Sapphire: A Configurable Crypto-Processor for Post-Quantum Lattice-based Protocols
Utsav Banerjee, Tenzin S. Ukyab, Anantha P. Chandrakasan
👻 Ghosted cs.CR 225 6 years ago
20 Undetectable Watermarks for Language Models
Miranda Christ, Sam Gunn, Or Zamir
👻 Ghosted cs.CR 224 2 years ago
21 BLAZE: Blazing Fast Privacy-Preserving Machine Learning
Arpita Patra, Ajith Suresh
👻 Ghosted cs.CR 223 5 years ago
22 Data mining for detecting Bitcoin Ponzi schemes
Massimo Bartoletti, Barbara Pes, Sergio Serusi
👻 Ghosted cs.CR 216 8 years ago
23 On the qubit routing problem
Alexander Cowtan, Silas Dilkes, ... (+4 more)
👻 Ghosted quant-ph 199 7 years ago
24 nGraph-HE2: A High-Throughput Framework for Neural Network Inference on Encrypted Data
Fabian Boemer, Anamaria Costache, ... (+2 more)
👻 Ghosted cs.CR 191 6 years ago
25 nGraph-HE: A Graph Compiler for Deep Learning on Homomorphically Encrypted Data
Fabian Boemer, Yixing Lao, ... (+2 more)
👻 Ghosted cs.CR 190 7 years ago
26 Linear Codes with Two or Three Weights From Quadratic Bent Functions
Zhengchun Zhou, Nian Li, ... (+2 more)
👻 Ghosted cs.IT 181 10 years ago
27 SWIFT: Super-fast and Robust Privacy-Preserving Machine Learning
Nishat Koti, Mahak Pancholi, ... (+2 more)
👻 Ghosted cs.CR 176 5 years ago
28 Cryptanalytic Extraction of Neural Network Models
Nicholas Carlini, Matthew Jagielski, Ilya Mironov
🌅 Old Age cs.LG 159 6 years ago
29 Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle Model
Jelle Don, Serge Fehr, ... (+2 more)
👻 Ghosted cs.CR 159 7 years ago
30 Secure Evaluation of Quantized Neural Networks
Anders Dalskov, Daniel Escudero, Marcel Keller
👻 Ghosted cs.CR 156 6 years ago
31 Faster computation of isogenies of large prime degree
Daniel Bernstein, Luca de Feo, ... (+2 more)
👻 Ghosted cs.CR 154 6 years ago
32 ASTRA: High Throughput 3PC over Rings with Application to Secure Prediction
Harsh Chaudhari, Ashish Choudhury, ... (+2 more)
👻 Ghosted cs.CR 151 6 years ago
33 Quantum Differential and Linear Cryptanalysis
Marc Kaplan, Gaëtan Leurent, ... (+2 more)
👻 Ghosted quant-ph 148 10 years ago
34 Euclidean and Hermitian LCD MDS codes
Claude Carlet, Sihem Mesnager, ... (+2 more)
👻 Ghosted cs.IT 140 9 years ago
35 A Concurrent Perspective on Smart Contracts
Ilya Sergey, Aquinas Hobor
👻 Ghosted cs.DC 137 9 years ago
36 An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices
Paul Kirchner, Pierre-Alain Fouque
👻 Ghosted cs.CR 135 10 years ago
37 CertLedger: A New PKI Model with Certificate Transparency Based on Blockchain
Murat Yasin Kubilay, Mehmet Sabir Kiraz, Haci Ali Mantar
👻 Ghosted cs.CR 133 7 years ago
38 VeriSolid: Correct-by-Design Smart Contracts for Ethereum
Anastasia Mavridou, Aron Laszka, ... (+2 more)
👻 Ghosted cs.CR 132 7 years ago
39 Circuit Transformations for Quantum Architectures
Andrew M. Childs, Eddie Schoute, Cem M. Unsal
👻 Ghosted quant-ph 126 7 years ago
40 Quantum homomorphic encryption for polynomial-sized circuits
Yfke Dulek, Christian Schaffner, Florian Speelman
👻 Ghosted quant-ph 121 9 years ago
41 Non-Malleable Extractors and Codes, with their Many Tampered Extensions
Eshan Chattopadhyay, Vipul Goyal, Xin Li
👻 Ghosted cs.CR 117 10 years ago
42 Galois Self-Dual Constacyclic Codes
Yun Fan, Liang Zgang
👻 Ghosted cs.IT 117 10 years ago
43 Everything is a Race and Nakamoto Always Wins
Amir Dembo, Sreeram Kannan, ... (+5 more)
👻 Ghosted cs.CR 116 5 years ago
44 An analysis of Bitcoin OP_RETURN metadata
Massimo Bartoletti, Livio Pompianu
👻 Ghosted cs.CR 116 9 years ago
45 IDMoB: IoT Data Marketplace on Blockchain
Kazım Rıfat Özyılmaz, Mehmet Doğan, Arda Yurdakul
👻 Ghosted cs.CR 114 7 years ago
46 Provably weak instances of Ring-LWE
Yara Elias, Kristin E. Lauter, ... (+2 more)
👻 Ghosted cs.CR 112 11 years ago
47 Quantum Attacks without Superposition Queries: the Offline Simon's Algorithm
Xavier Bonnetain, Akinori Hosoyamada, ... (+3 more)
👻 Ghosted quant-ph 111 6 years ago
48 Overview of Polkadot and its Design Considerations
Jeff Burdges, Alfonso Cevallos, ... (+9 more)
👻 Ghosted cs.CR 106 5 years ago
49 Quantum Lightning Never Strikes the Same State Twice
Mark Zhandry
👻 Ghosted cs.CR 106 8 years ago
50 TxProbe: Discovering Bitcoin's Network Topology Using Orphan Transactions
Sergi Delgado-Segura, Surya Bakshi, ... (+5 more)
👻 Ghosted cs.CR 96 7 years ago