Publications associées (8)

Wavelength-Division Multiplexed Optical Cryptocurrency

Maxim Karpov

We propose an optical proof-of-work scheme that feeds data encoded into wavelength-division multiplexed modes through a programmable photonic network. We verify robustness by modeling network dispersion, allowing for energy-efficient optical alternatives t ...
IEEE2021

ICO investors

Rüdiger Fahlenbrach, Marc André Frattaroli

We conduct a detailed analysis of investors in successful initial coin offerings (ICOs). The average ICO has 4700 contributors. The median participant contributes small amounts and many investors sell their tokens before the underlying product is developed ...
SPRINGER2020

Essays in Financial Economics

Marc André Frattaroli

This thesis consists of three chapters that study separate subjects in the area of corporate governance and financial intermediation. In the first chapter, I study a protectionist anti-takeover law introduced in 2014 in France that covers a subset of all ...
EPFL2020

Identity and Personhood in Digital Democracy: Evaluating Inclusion, Equality, Security, and Privacy in Pseudonym Parties and Other Proofs of Personhood

Bryan Alexander Ford

Digital identity seems at first like a prerequisite for digital democracy: how can we ensure “one person, one vote” online without identifying voters? But the full gamut of digital identity solutions – e.g., online ID checking, biometrics, self-sovereign i ...
2020

The Anatomy of a Cryptocurrency Pump-and-Dump Scheme

Jiahua Xu

While pump-and-dump schemes have attracted the attention of cryptocurrency observers and regulators alike, this paper represents the first detailed empirical query of pump-and-dump activities in cryptocurrency markets. We present a case study of a recent p ...
USENIX ASSOC2019

Secured Routines: Language-based Construction of Trusted Execution Environments

James Richard Larus, Edouard Bugnion, Adrien Ghosn

Trusted Execution Environments (TEEs), such as Intel SGX enclaves, use hardware to ensure the confidentiality and integrity of operations on sensitive data. While the technology is available on many processors, the complexity of its programming model and i ...
USENIX ASSOC2019

Model Checking of Distributed Algorithm Implementations

Maysam Yabandeh

It is notoriously difficult to develop reliable, high-performance distributed systems that run over asynchronous networks. Even if a distributed system is based on a well-understood distributed algorithm, its implementation can contain errors arising from ...
EPFL2011

Factoring by electronic mail

Arjen Lenstra

Describes a distributed implementation of two factoring algorithms, the elliptic curve method (ECM) and the multiple polynomial quadratic sieve algorithm (MPQS). The authors' ECM-implementation on a network of DEC MicroVAX processors has factored several n ...
1990

Graph Chatbot

Chattez avec Graph Search

Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.

AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.