default search action
Aviv Zohar
Person information
- affiliation: The Hebrew University of Jerusalem, Israel
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c54]Aviv Yaish, Kaihua Qin, Liyi Zhou, Aviv Zohar, Arthur Gervais:
Speculative Denial-of-Service Attacks In Ethereum. USENIX Security Symposium 2024 - 2023
- [c53]Aviv Yaish, Aviv Zohar:
Correct Cryptocurrency ASIC Pricing: Are Miners Overpaying? AFT 2023: 2:1-2:25 - [c52]Aviv Yaish, Gilad Stern, Aviv Zohar:
Uncle Maker: (Time)Stamping Out The Competition in Ethereum. CCS 2023: 135-149 - [c51]Maya Dotan, Aviv Yaish, Hsin-Chu Yin, Eytan Tsytkin, Aviv Zohar:
The Vulnerable Nature of Decentralized Governance in DeFi. DeFi@CCS 2023: 25-31 - [i28]Lucianna Kiffer, Joachim Neu, Srivatsan Sridhar, Aviv Zohar, David Tse:
Security of Blockchains at Capacity. CoRR abs/2303.09113 (2023) - [i27]Maya Dotan, Aviv Yaish, Hsin-Chu Yin, Eytan Tsytkin, Aviv Zohar:
The Vulnerable Nature of Decentralized Governance in DeFi. CoRR abs/2308.04267 (2023) - [i26]Lucianna Kiffer, Joachim Neu, Srivatsan Sridhar, Aviv Zohar, David Tse:
Security of Blockchains at Capacity. IACR Cryptol. ePrint Arch. 2023: 381 (2023) - [i25]Aviv Yaish, Maya Dotan, Kaihua Qin, Aviv Zohar, Arthur Gervais:
Suboptimality in DeFi. IACR Cryptol. ePrint Arch. 2023: 892 (2023) - [i24]Aviv Yaish, Kaihua Qin, Liyi Zhou, Aviv Zohar, Arthur Gervais:
Speculative Denial-of-Service Attacks in Ethereum. IACR Cryptol. ePrint Arch. 2023: 956 (2023) - 2022
- [j13]Maya Dotan, Yvonne-Anne Pignolet, Stefan Schmid, Saar Tochner, Aviv Zohar:
Survey on Blockchain Networking: Context, State-of-the-Art, Challenges. ACM Comput. Surv. 54(5): 107:1-107:34 (2022) - [j12]Ron Lavi, Or Sattath, Aviv Zohar:
Redesigning Bitcoin's Fee Market. ACM Trans. Economics and Comput. 10(1): 5:1-5:31 (2022) - [c50]Simina Brânzei, Erel Segal-Halevi, Aviv Zohar:
How to Charge Lightning: The Economics of Bitcoin Transaction Channels. Allerton 2022: 1-8 - [c49]Ayelet Lotem, Sarah Azouvi, Patrick McCorry, Aviv Zohar:
Sliding Window Challenge Process for Congestion Detection. Financial Cryptography 2022: 512-530 - [c48]Aviv Yaish, Saar Tochner, Aviv Zohar:
Blockchain Stretching & Squeezing: Manipulating Time for Your Best Interest. EC 2022: 65-88 - [c47]Maya Dotan, Saar Tochner, Aviv Zohar, Yossi Gilad:
Twilight: A Differentially Private Payment Channel Network. USENIX Security Symposium 2022: 555-570 - [i23]Ayelet Lotem, Sarah Azouvi, Patrick McCorry, Aviv Zohar:
Sliding Window Challenge Process for Congestion Detection. CoRR abs/2201.09009 (2022) - [i22]Maya Dotan, Gilad Stern, Aviv Zohar:
Validated Byzantine Asynchronous Multidimensional Approximate Agreement. CoRR abs/2211.02126 (2022) - [i21]Maya Dotan, Saar Tochner, Aviv Zohar, Yossi Gilad:
Twilight: A Differentially Private Payment Channel Network. IACR Cryptol. ePrint Arch. 2022: 136 (2022) - [i20]Aviv Yaish, Gilad Stern, Aviv Zohar:
Uncle Maker: (Time)Stamping Out The Competition in Ethereum. IACR Cryptol. ePrint Arch. 2022: 1020 (2022) - 2021
- [c46]Yonatan Sompolinsky, Shai Wyborski, Aviv Zohar:
PHANTOM GHOSTDAG: a scalable generalization of Nakamoto consensus: September 2, 2021. AFT 2021: 57-70 - [c45]Chaya Ganesh, Claudio Orlandi, Daniel Tschudi, Aviv Zohar:
Virtual ASICs: Generalized Proof-of-Stake Mining in Cryptocurrencies. DPM/CBT@ESORICS 2021: 173-191 - [c44]Ayelet Mizrahi, Aviv Zohar:
Congestion Attacks in Payment Channel Networks. Financial Cryptography (2) 2021: 170-188 - 2020
- [j11]Rainer Böhme, Lisa Eckey, Tyler Moore, Neha Narula, Tim Ruffing, Aviv Zohar:
Responsible vulnerability disclosure in cryptocurrencies. Commun. ACM 63(10): 62-71 (2020) - [c43]Maya Dotan, Yvonne-Anne Pignolet, Stefan Schmid, Saar Tochner, Aviv Zohar:
SOK: cryptocurrency networking context, state-of-the-art, challenges. ARES 2020: 5:1-5:13 - [c42]Saar Tochner, Aviv Zohar:
How to Pick Your Friends A Game Theoretic Approach to P2P Overlay Construction. AFT 2020: 37-45 - [c41]Jona Harris, Aviv Zohar:
Flood & Loot: A Systemic Attack on The Lightning Network. AFT 2020: 202-213 - [c40]Saar Tochner, Aviv Zohar, Stefan Schmid:
Route Hijacking and DoS in Off-Chain Networks. AFT 2020: 228-240 - [c39]Sara Cohen, Adam Rosenthal, Aviv Zohar:
Reasoning about the Future in Blockchain Databases. ICDE 2020: 1930-1933 - [i19]Ayelet Mizrahi, Aviv Zohar:
Congestion Attacks in Payment Channel Networks. CoRR abs/2002.06564 (2020) - [i18]Aviv Yaish, Aviv Zohar:
Pricing ASICs for Cryptocurrency Mining. CoRR abs/2002.11064 (2020) - [i17]Jona Harris, Aviv Zohar:
Flood & Loot: A Systemic Attack On The Lightning Network. CoRR abs/2006.08513 (2020) - [i16]Yotam Sali, Aviv Zohar:
Optimizing Off-Chain Payment Networks in Cryptocurrencies. CoRR abs/2007.09410 (2020) - [i15]Maya Dotan, Yvonne-Anne Pignolet, Stefan Schmid, Saar Tochner, Aviv Zohar:
Survey on Cryptocurrency Networking: Context, State-of-the-Art, Challenges. CoRR abs/2008.08412 (2020) - [i14]Chaya Ganesh, Claudio Orlandi, Daniel Tschudi, Aviv Zohar:
Virtual ASICs: Generalized Proof-of-Stake Mining in Cryptocurrencies. IACR Cryptol. ePrint Arch. 2020: 791 (2020)
2010 – 2019
- 2019
- [c38]Ron Lavi, Or Sattath, Aviv Zohar:
Redesigning Bitcoin's fee market. WWW 2019: 2950-2956 - [e1]Aviv Zohar, Ittay Eyal, Vanessa Teague, Jeremy Clark, Andrea Bracciali, Federico Pintore, Massimiliano Sala:
Financial Cryptography and Data Security - FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Curaçao, March 2, 2018, Revised Selected Papers. Lecture Notes in Computer Science 10958, Springer 2019, ISBN 978-3-662-58819-2 [contents] - [i13]Saar Tochner, Stefan Schmid, Aviv Zohar:
Hijacking Routes in Payment Channel Networks: A Predictability Tradeoff. CoRR abs/1909.06890 (2019) - 2018
- [j10]Yonatan Sompolinsky, Aviv Zohar:
Bitcoin's underlying incentives. Commun. ACM 61(3): 46-53 (2018) - [c37]Shira Werman, Aviv Zohar:
Avoiding Deadlocks in Payment Channel Networks. DPM/CBT@ESORICS 2018: 175-187 - [i12]Sara Cohen, Aviv Zohar:
Database Perspectives on Blockchains. CoRR abs/1803.06015 (2018) - [i11]Saar Tochner, Aviv Zohar:
How to Pick Your Friends - A Game Theoretic Approach to P2P Overlay Construction. CoRR abs/1810.05447 (2018) - [i10]Yonatan Sompolinsky, Aviv Zohar:
PHANTOM: A Scalable BlockDAG Protocol. IACR Cryptol. ePrint Arch. 2018: 104 (2018) - 2017
- [j9]Yonatan Sompolinsky, Aviv Zohar:
Bitcoin's Underlying Incentives. ACM Queue 15(5): 50 (2017) - [c36]Gil Dollberg, Aviv Zohar:
Memory-Based Mechanisms for Economic Agents. AAMAS 2017: 1523-1525 - [c35]Aviv Zohar:
Securing and scaling cryptocurrencies. IJCAI 2017: 5161-5165 - [c34]Maria Apostolaki, Aviv Zohar, Laurent Vanbever:
Hijacking Bitcoin: Routing Attacks on Cryptocurrencies. IEEE Symposium on Security and Privacy 2017: 375-392 - [c33]Aviv Zohar:
Recent trends in decentralized cryptocurrencies (invited talk). STOC 2017: 1 - [i9]Ron Lavi, Or Sattath, Aviv Zohar:
Redesigning Bitcoin's fee market. CoRR abs/1709.08881 (2017) - [i8]Simina Brânzei, Erel Segal-Halevi, Aviv Zohar:
How to Charge Lightning. CoRR abs/1712.10222 (2017) - 2016
- [c32]Ayelet Sapirshtein, Yonatan Sompolinsky, Aviv Zohar:
Optimal Selfish Mining Strategies in Bitcoin. Financial Cryptography 2016: 515-532 - [c31]Michal Feldman, Tomer Koren, Roi Livni, Yishay Mansour, Aviv Zohar:
Online Pricing with Strategic and Patient Buyers. NIPS 2016: 3864-3872 - [r1]Moshe Tennenholtz, Aviv Zohar:
The Axiomatic Approach and the Internet. Handbook of Computational Social Choice 2016: 427-452 - [i7]Maria Apostolaki, Aviv Zohar, Laurent Vanbever:
Hijacking Bitcoin: Large-scale Network Attacks on Cryptocurrencies. CoRR abs/1605.07524 (2016) - [i6]Yonatan Sompolinsky, Aviv Zohar:
Bitcoin's Security Model Revisited. CoRR abs/1605.09193 (2016) - [i5]Yonatan Sompolinsky, Yoad Lewenberg, Aviv Zohar:
SPECTRE: A Fast and Scalable Cryptocurrency Protocol. IACR Cryptol. ePrint Arch. 2016: 1159 (2016) - 2015
- [j8]Aviv Zohar:
Bitcoin: under the hood. Commun. ACM 58(9): 104-113 (2015) - [c30]Sara Cohen, Aviv Zohar:
An Axiomatic Approach to Link Prediction. AAAI 2015: 58-64 - [c29]Yoad Lewenberg, Yoram Bachrach, Yonatan Sompolinsky, Aviv Zohar, Jeffrey S. Rosenschein:
Bitcoin Mining Pools: A Cooperative Game Theoretic Analysis. AAMAS 2015: 919-927 - [c28]Yonatan Sompolinsky, Aviv Zohar:
Secure High-Rate Transaction Processing in Bitcoin. Financial Cryptography 2015: 507-527 - [c27]Yoad Lewenberg, Yonatan Sompolinsky, Aviv Zohar:
Inclusive Block Chain Protocols. Financial Cryptography 2015: 528-547 - [c26]Ethan Heilman, Alison Kendler, Aviv Zohar, Sharon Goldberg:
Eclipse Attacks on Bitcoin's Peer-to-Peer Network. USENIX Security Symposium 2015: 129-144 - [c25]Omer Lev, Moshe Tennenholtz, Aviv Zohar:
An Axiomatic Approach to Routing. TARK 2015: 194-206 - [i4]Ayelet Sapirshtein, Yonatan Sompolinsky, Aviv Zohar:
Optimal Selfish Mining Strategies in Bitcoin. CoRR abs/1507.06183 (2015) - [i3]Ethan Heilman, Alison Kendler, Aviv Zohar, Sharon Goldberg:
Eclipse Attacks on Bitcoin's Peer-to-Peer Network. IACR Cryptol. ePrint Arch. 2015: 263 (2015) - 2013
- [i2]Yonatan Sompolinsky, Aviv Zohar:
Accelerating Bitcoin's Transaction Processing. Fast Money Grows on Trees, Not Chains. IACR Cryptol. ePrint Arch. 2013: 881 (2013) - 2012
- [c24]Moshe Babaioff, Shahar Dobzinski, Sigal Oren, Aviv Zohar:
On bitcoin and red balloons. EC 2012: 56-73 - [c23]Ian A. Kash, John K. Lai, Haoqi Zhang, Aviv Zohar:
Economics of BitTorrent communities. WWW 2012: 221-230 - 2011
- [j7]Hagay Levin, Michael Schapira, Aviv Zohar:
Interdomain Routing and Games. SIAM J. Comput. 40(6): 1892-1912 (2011) - [j6]Noam Nisan, Michael Schapira, Gregory Valiant, Aviv Zohar:
When is it best to best-respond? SIGecom Exch. 10(2): 16-18 (2011) - [j5]Moshe Babaioff, Shahar Dobzinski, Sigal Oren, Aviv Zohar:
On Bitcoin and red balloons. SIGecom Exch. 10(3): 5-9 (2011) - [c22]Nir Pochter, Aviv Zohar, Jeffrey S. Rosenschein:
Exploiting Problem Symmetries in State-Based Planners. AAAI 2011: 1004-1009 - [c21]Noam Nisan, Michael Schapira, Gregory Valiant, Aviv Zohar:
Best-Response Mechanisms. ICS 2011: 155-165 - [c20]Noam Nisan, Michael Schapira, Gregory Valiant, Aviv Zohar:
Incentive-compatible distributed greedy protocols. PODC 2011: 335-336 - [c19]Yuval Emek, Ron Karidi, Moshe Tennenholtz, Aviv Zohar:
Mechanisms for multi-level marketing. EC 2011: 209-218 - [c18]Noam Nisan, Michael Schapira, Gregory Valiant, Aviv Zohar:
Best-response auctions. EC 2011: 351-360 - [i1]Moshe Babaioff, Shahar Dobzinski, Sigal Oren, Aviv Zohar:
On Bitcoin and Red Balloons. CoRR abs/1111.2626 (2011) - 2010
- [b1]Aviv Zohar:
A game theoretic approach to communication protocols (עם תקציר בעברית, תכן ושער נוסף: ניתוח ותכנון פרוטוקטלי תקשורת בעזרת תורת המשחקים.). Hebrew University of Jerusalem, Israel, 2010 - [c17]Nir Pochter, Aviv Zohar, Jeffrey S. Rosenschein, Ariel Felner:
Search Space Reduction Using Swamp Hierarchies. AAAI 2010: 155-160 - [c16]Itai Ashlagi, Moshe Tennenholtz, Aviv Zohar:
Competing Schedulers. AAAI 2010: 691-696 - [c15]Brighten Godfrey, Michael Schapira, Aviv Zohar, Scott Shenker:
Incentive compatibility and dynamics of congestion control. SIGMETRICS 2010: 95-106 - [c14]Nir Pochter, Aviv Zohar, Jeffrey S. Rosenschein, Ariel Felner:
Search Space Reduction Using Swamp Hierarchies. SOCS 2010: 155-156
2000 – 2009
- 2009
- [j4]Ariel D. Procaccia, Aviv Zohar, Yoni Peleg, Jeffrey S. Rosenschein:
The learnability of voting rules. Artif. Intell. 173(12-13): 1133-1149 (2009) - [c13]Moshe Tennenholtz, Aviv Zohar:
Learning equilibria in repeated congestion games. AAMAS (1) 2009: 233-240 - [c12]Aviv Zohar, Jeffrey S. Rosenschein:
Adding incentives to file-sharing systems. AAMAS (2) 2009: 859-866 - [c11]Nir Pochter, Aviv Zohar, Jeffrey S. Rosenschein:
Using swamps to improve optimal pathfinding. AAMAS (2) 2009: 1163-1164 - [c10]Rahul Sami, Michael Schapira, Aviv Zohar:
Searching for Stability in Interdomain Routing. INFOCOM 2009: 549-557 - 2008
- [j3]Aviv Zohar, Jeffrey S. Rosenschein:
Mechanisms for information elicitation. Artif. Intell. 172(16-17): 1917-1939 (2008) - [j2]Reshef Meir, Ariel D. Procaccia, Jeffrey S. Rosenschein, Aviv Zohar:
Complexity of Strategic Behavior in Multi-Winner Elections. J. Artif. Intell. Res. 33: 149-178 (2008) - [j1]Ariel D. Procaccia, Jeffrey S. Rosenschein, Aviv Zohar:
On the complexity of achieving proportional representation. Soc. Choice Welf. 30(3): 353-362 (2008) - [c9]Ariel D. Procaccia, Aviv Zohar, Jeffrey S. Rosenschein:
Automated design of scoring rules by learning from examples. AAMAS (2) 2008: 951-958 - [c8]Hagay Levin, Michael Schapira, Aviv Zohar:
Interdomain routing and games. STOC 2008: 57-66 - [c7]Noam Nisan, Michael Schapira, Aviv Zohar:
Asynchronous Best-Reply Dynamics. WINE 2008: 531-538 - 2007
- [c6]Ariel D. Procaccia, Aviv Zohar, Yoni Peleg, Jeffrey S. Rosenschein:
Learning Voting Trees. AAAI 2007: 110-115 - [c5]Ariel D. Procaccia, Jeffrey S. Rosenschein, Aviv Zohar:
Multi-Winner Elections: Complexity of Manipulation, Control and Winner-Determination. IJCAI 2007: 1476-1481 - 2006
- [c4]Aviv Zohar, Jeffrey S. Rosenschein:
Mechanisms for Partial Information Elicitation: The Truth, but Not the Whole Truth. AAAI 2006: 734-739 - [c3]Aviv Zohar, Jeffrey S. Rosenschein:
Robust Mechanisms for Information Elicitation. AAAI 2006: 740-746 - [c2]Aviv Zohar, Jeffrey S. Rosenschein:
Robust mechanisms for information elicitation. AAMAS 2006: 1202-1204 - 2005
- [c1]Aviv Zohar, Jeffrey S. Rosenschein:
Using tags to evolve trust and cooperation between groups. AAMAS 2005: 1199-1200
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint