- Notifications
You must be signed in to change notification settings - Fork12
Ethereum cutting edge applications, protocols, cryptography, systems and more
License
manifoldfinance/awesome-ethereum-finance
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
title | Awesome Ethereum |
---|---|
summary | Ethereum Awesome list focused on Finance, Cutting Edge and Novel Works |
version | 2022.04.25 |
license | CC-1.0 |
tags | ["ethereum", "zero knowledge", "cryptography", "financial engineering", "solidity", "formal verification", "high assurance"] |
MIT Open Course: Blockchain and Money
Stanford Center for Blockchain Research
Stanford Blockchain Cluband itsonline seminar and activities
Tim Roughgarden's Youtube short course on incentives in CS
UCL Financial Computing and Analytics Group
Fedor Iskhakov's Lecture in ANU
- The 1st BIU Winter School SECURE COMPUTATION AND EFFICIENCY
- The 5th BIU Winter School ADVANCES IN PRACTICAL MULTIPARTY COMPUTATION
- Simons Securing Computation Workshop
- Simons Cryptography Boot Camp
- DIMACS/Columbia Data Science Institute Workshop on Cryptography for Big Data
- DIMACS/MACS Workshop on Cryptography for the RAM Model of Computation
- DIMACS/MACS Workshop on Usable, Efficient, and Formally Verified Secure Computation
- A performance benchmark on mempool services
- Escaping the Dark Forest
- Ethereum is a Dark Forest
- Ethereum Blockspace - Who Gets What and Why
- Ethology: A Safari Tour in Ethereum’s Dark Forest
- Five theses about transaction ordering, MEV, and front-running
- Flash Boys 2.0: Frontrunning, Transaction Reordering, and Consensus Instability in Decentralized Exchanges
- Flashbots: Frontrunning the MEV Crisis
- Frontrunner Jones and the Raiders of the Dark Forest: An Empirical Study of Frontrunning on the Ethereum Blockchain
- Front-Running as a Service
- Gas Gambits — Game Theory Example of Incentivized Collaboration
- High-Frequency Trading on Decentralized On-Chain Exchanges
- RETURN TO THE DARK FOREST
- MEV Auction: Auctioning transaction ordering rights as a solution to Miner Extractable Value
- MEV and Me
- MEV auctions considered harmful
- MEVA (What is it good for?)
- On the instability of Bitcoin without the block reward
- Quantifying Blockchain Extractable Value: How dark is the forest?
- Quantifying MEV
- Staring Into the Monster’s Eye: Analyzing a Generalized Front-Running Ethereum Arbitrage Bot Attack
- Surrogeth: Tricking frontrunners into being transaction relayers
- The enemy of your enemy is NOT your friend
- To Sink Frontrunners, Send in the Submarines
- Uncle Bandit Attack
- What Is Miner-Extractable Value (MEV)?
- Wrecking sandwich traders for fun and profit
###Flashbots Resources:
Flashbots Medium
Flashbots EthResearch post
Research roadmap
Research Fellowship
High-Frequency Trading on Decentralized On-Chain Exchanges by Zhou et. al
Fair Sequencing Services: Enabling a Provably Fair DeFi Ecosystem by Juels et. al. (Chainlink)
Blinder: MPC Based Scalable and Robust Anonymous Committed Broadcast by Ittai Abraham et. al.
Time, clocks, and the ordering of events in a distributed system by Leslie Lamport
On The Instability Of Bitcoin Without The Block Reward by Carlsten et. al.
SoK: Transparent Dishonesty: Front-running Attacks on Blockchain by Eskandari et. al.
MEV auctions considered harmful by Ed Felten (Offchain Labs)
Order-Fairness for Byzantine Consensus by Kelkar et. al.
Tesseract: Real-Time Cryptocurrency Exchange Using Trusted Hardware by Bentov et. al
Submarine Sends by Breidenbach et. al.
TEX – A Securely Scalable Trustless Exchange by Khalil et. al.
Spam resistant block creator selection via burn auction by Barry Whitehat
Ethereum is a Dark Forest by Dan Robinson
Escaping the Dark Forest by Sam Sun
Dark Forest Escape Route Starkware whiteboard session video recording
ETHOnline - 'Phil & Georgios Talk Miner Extractable Value'
IC3 Blockchain Camp 2020 - Phil Daian - "DeFi Composability - Friend or Foe?"
Gas Wars: Understanding Ethereum’s Mempool & Miner Extractable Value by Uncommon Core podcast
The Alchemy of Hashpower (Part II) by Leo Zhang
Exploring DeFi Trading Strategies: Arbitrage in DeFi by Alex Obadia
How to munch on pickles from a whale dinner by Tomasz Mierzwa
Portion of Daily Gas Used by [[Backrunning]] Bot Contracts by Phillipe Castonguay
Gas Gambits - Game Theory Example of Incentivized Collaboration by KeeperDAO
Phantom TX: a dark pool for Ethereum transactions
Scrooge-McEtherface: attack tool that loots Ether from vulnerable smart contracts
Surrogeth: Tricking frontrunners into being transaction relayers
B.Protocol: A Decentralized Backstop Liquidity Protocol
Gas Now (Sparkpool): ETH Gas Price quotation system based on Pending transactions
What diagrams exist to illustrate the Ethereum blockchain creation process?
- An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries, 2017paper
- Billion-Gate Secure Computation with Malicious Adversaries, 2012paper
- Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer, 2011paper
- Fast Cut-and-Choose-Based Protocols for Malicious and Covert Adversaries, 2013paper
- Two-Output Secure Computation with Malicious Adversaries, 2011paper
- Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose, 2013paper
- Amortizing Garbled Circuits, 2014paper
- Non-Interactive Secure Computation Based on Cut-and-Choosepaper
- LEGO for Two-Party Secure Computation, 2009paper
- MiniLEGO: Efficient Secure Two-Party Computation from General Assumptions, 2013paper
- TinyLEGO: An Interactive Garbling Scheme for Maliciously Secure Two-Party Computation, 2015paper
- Constant Round Maliciously Secure 2PC with Function-independent Preprocessing using LEGO, 2017paper
The value of 𝛿 (whale attack premium) that makes whale mining more profitable than honest mining,as a function of the lead of the original branch at the start of the racephase z, Alice’s mining power 𝛼 (rows), and m’s mining power 𝛽𝑚 (columns).For 𝑧=0, 𝛿 is always equal to 0.
**** | 0 | 0.05 | 0.1 | 0.15 | 0.2 | 0.25 | 0.3 | 0.35 | 0.4 | 0.45 |
---|---|---|---|---|---|---|---|---|---|---|
𝑧=6 | ||||||||||
0.05 | 47045879.95 | 503469.42 | 29624.2 | 3448.26 | 574.53 | 117.91 | 27.07 | 6.19 | 0.93 | 0 |
0.1 | 531439.89 | 31270.04 | 3639.89 | 606.5 | 124.52 | 28.63 | 6.59 | 1.04 | 0 | 0 |
0.15 | 33109.34 | 3854.04 | 642.23 | 131.9 | 30.37 | 7.04 | 1.16 | 0 | 0 | 0 |
0.2 | 4094.75 | 682.4 | 140.2 | 32.33 | 7.54 | 1.29 | 0 | 0 | 0 | 0 |
0.25 | 727.67 | 149.56 | 34.54 | 8.11 | 1.44 | 0 | 0 | 0 | 0 | 0 |
0.3 | 159.96 | 37 | 8.74 | 1.61 | 0 | 0 | 0 | 0 | 0 | 0 |
0.35 | 39.49 | 9.38 | 1.78 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
0.4 | 9.72 | 1.88 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
0.45 | 1.52 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
𝑧=5 | ||||||||||
0.05 | 2476097.95 | 55940.16 | 5226.98 | 861.32 | 190.84 | 49.96 | 14.12 | 3.8 | 0.58 | 0 |
0.1 | 59047.89 | 5517.41 | 909.22 | 201.5 | 52.79 | 14.95 | 4.06 | 0.67 | 0 | 0 |
0.15 | 5841.86 | 962.74 | 213.41 | 55.96 | 15.89 | 4.36 | 0.76 | 0 | 0 | 0 |
0.2 | 1022.75 | 226.76 | 59.5 | 16.95 | 4.69 | 0.87 | 0 | 0 | 0 | 0 |
0.25 | 241.67 | 63.47 | 18.12 | 5.07 | 1 | 0 | 0 | 0 | 0 | 0 |
0.3 | 67.74 | 19.39 | 5.47 | 1.13 | 0 | 0 | 0 | 0 | 0 | 0 |
0.35 | 20.55 | 5.84 | 1.25 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
0.4 | 5.93 | 1.28 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
0.45 | 0.91 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
𝑧=4 | ||||||||||
0.05 | 130319.95 | 6214.68 | 921.58 | 214.58 | 62.95 | 20.84 | 7.14 | 2.2 | 0.29 | 0 |
0.1 | 6559.89 | 972.82 | 226.55 | 66.5 | 22.05 | 7.59 | 2.37 | 0.36 | 0 | 0 |
0.15 | 1029.95 | 239.9 | 70.46 | 23.41 | 8.09 | 2.57 | 0.44 | 0 | 0 | 0 |
0.2 | 254.75 | 74.86 | 24.91 | 8.66 | 2.79 | 0.53 | 0 | 0 | 0 | 0 |
0.25 | 79.67 | 26.55 | 9.27 | 3.03 | 0.63 | 0 | 0 | 0 | 0 | 0 |
0.3 | 28.21 | 9.89 | 3.28 | 0.73 | 0 | 0 | 0 | 0 | 0 | 0 |
0.35 | 10.36 | 3.46 | 0.8 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
0.4 | 3.4 | 0.78 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
0.45 | 0.41 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
𝑧=3 | ||||||||||
0.05 | 6857.95 | 689.63 | 161.81 | 52.89 | 20.32 | 8.36 | 3.38 | 1.13 | 0.06 | 0 |
0.1 | 727.89 | 170.83 | 55.88 | 21.5 | 8.88 | 3.63 | 1.25 | 0.12 | 0 | 0 |
0.15 | 180.79 | 59.18 | 22.8 | 9.45 | 3.89 | 1.38 | 0.18 | 0 | 0 | 0 |
0.2 | 62.75 | 24.21 | 10.07 | 4.18 | 1.52 | 0.25 | 0 | 0 | 0 | 0 |
0.25 | 25.67 | 10.71 | 4.48 | 1.67 | 0.32 | 0 | 0 | 0 | 0 | 0 |
0.3 | 11.28 | 4.75 | 1.8 | 0.39 | 0 | 0 | 0 | 0 | 0 | 0 |
0.35 | 4.87 | 1.85 | 0.42 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
0.4 | 1.71 | 0.34 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
0.45 | 0.01 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
𝑧=2 | ||||||||||
0.05 | 359.95 | 75.72 | 27.73 | 12.47 | 6.1 | 3.01 | 1.36 | 0.42 | 0 | 0 |
0.1 | 79.89 | 29.29 | 13.2 | 6.49 | 3.23 | 1.49 | 0.5 | 0 | 0 | 0 |
0.15 | 30.93 | 13.98 | 6.9 | 3.46 | 1.62 | 0.58 | 0 | 0 | 0 | 0 |
0.2 | 14.75 | 7.31 | 3.69 | 1.76 | 0.66 | 0.01 | 0 | 0 | 0 | 0 |
0.25 | 7.67 | 3.89 | 1.88 | 0.73 | 0.05 | 0 | 0 | 0 | 0 | 0 |
0.3 | 4.02 | 1.95 | 0.78 | 0.08 | 0 | 0 | 0 | 0 | 0 | 0 |
0.35 | 1.91 | 0.75 | 0.07 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
0.4 | 0.58 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
0.45 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
𝑧=1 | ||||||||||
0.05 | 17.95 | 7.5 | 4.06 | 2.36 | 1.36 | 0.71 | 0.27 | 0 | 0 | 0 |
0.1 | 7.89 | 4.29 | 2.51 | 1.47 | 0.79 | 0.32 | 0 | 0 | 0 | 0 |
0.15 | 4.49 | 2.65 | 1.56 | 0.86 | 0.38 | 0.03 | 0 | 0 | 0 | 0 |
0.2 | 2.75 | 1.64 | 0.91 | 0.41 | 0.05 | 0 | 0 | 0 | 0 | 0 |
0.25 | 1.67 | 0.94 | 0.43 | 0.07 | 0 | 0 | 0 | 0 | 0 | 0 |
0.3 | 0.9 | 0.41 | 0.05 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
0.35 | 0.32 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
0.4 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
0.45 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
CC0-1.0
About
Ethereum cutting edge applications, protocols, cryptography, systems and more
Topics
Resources
License
Code of conduct
Security policy
Uh oh!
There was an error while loading.Please reload this page.