Home

Awesome

titleAwesome Ethereum
summaryEthereum Awesome list focused on Finance, Cutting Edge and Novel Works
version2022.04.25
licenseCC-1.0
tags["ethereum", "zero knowledge", "cryptography", "financial engineering", "solidity", "formal verification", "high assurance"]

Awesome Ethereum Finance

Ethereum

Recommended

Tim Roughgarden's lectures

MIT Open Course: Blockchain and Money

Stanford Center for Blockchain Research

Stanford Blockchain Club and its online seminar and activities

Incentives in Computer Science

Tim Roughgarden's Youtube short course on incentives in CS

Financial Computing

UCL Financial Computing and Analytics Group

Fedor Iskhakov's Lecture in ANU

Encryption Content (zk, obvram, circuts, smpc, etc)

MPC videos

  1. The 1st BIU Winter School SECURE COMPUTATION AND EFFICIENCY
  2. The 5th BIU Winter School ADVANCES IN PRACTICAL MULTIPARTY COMPUTATION
  3. Simons Securing Computation Workshop
  4. Simons Cryptography Boot Camp
  5. DIMACS/Columbia Data Science Institute Workshop on Cryptography for Big Data
  6. DIMACS/MACS Workshop on Cryptography for the RAM Model of Computation
  7. DIMACS/MACS Workshop on Usable, Efficient, and Formally Verified Secure Computation

MEV

### Flashbots Resources: </br> Flashbots Medium </br> Flashbots EthResearch post </br> Research roadmap </br> Research Fellowship

MEV Ship Vault

</br> Flash Boys 2.0: Frontrunning, Transaction Reordering, and Consensus Instability in Decentralized Exchanges by Daian et. al.

High-Frequency Trading on Decentralized On-Chain Exchanges by Zhou et. al

Fair Sequencing Services: Enabling a Provably Fair DeFi Ecosystem by Juels et. al. (Chainlink)

MEV Auction: Auctioning transaction ordering rights as a solution to Miner Extractable Value by Karl Floersch (Optimism)

Blinder: MPC Based Scalable and Robust Anonymous Committed Broadcast by Ittai Abraham et. al.

Time, clocks, and the ordering of events in a distributed system by Leslie Lamport

On The Instability Of Bitcoin Without The Block Reward by Carlsten et. al.

SoK: Transparent Dishonesty: Front-running Attacks on Blockchain by Eskandari et. al.

MEV auctions considered harmful by Ed Felten (Offchain Labs)

Order-Fairness for Byzantine Consensus by Kelkar et. al.

Tesseract: Real-Time Cryptocurrency Exchange Using Trusted Hardware by Bentov et. al

Submarine Sends by Breidenbach et. al.

TEX – A Securely Scalable Trustless Exchange by Khalil et. al.

Spam resistant block creator selection via burn auction by Barry Whitehat

Miscellaneous Gems

Ethereum is a Dark Forest by Dan Robinson

Escaping the Dark Forest by Sam Sun

Dark Forest Escape Route Starkware whiteboard session video recording

ETHOnline - 'Phil & Georgios Talk Miner Extractable Value'

IC3 Blockchain Camp 2020 - Phil Daian - "DeFi Composability - Friend or Foe?"

Gas Wars: Understanding Ethereum’s Mempool & Miner Extractable Value by Uncommon Core podcast

The Alchemy of Hashpower (Part II) by Leo Zhang

Exploring DeFi Trading Strategies: Arbitrage in DeFi by Alex Obadia

How to munch on pickles from a whale dinner by Tomasz Mierzwa

Portion of Daily Gas Used by [[Backrunning]] Bot Contracts by Phillipe Castonguay

Gas Gambits - Game Theory Example of Incentivized Collaboration by KeeperDAO

Phantom TX: a dark pool for Ethereum transactions

Candyshop: a smart transaction batching service that extracts value by controlling transaction ordering

Scrooge-McEtherface: attack tool that loots Ether from vulnerable smart contracts

Surrogeth: Tricking frontrunners into being transaction relayers

B.Protocol: A Decentralized Backstop Liquidity Protocol

Gas Now (Sparkpool): ETH Gas Price quotation system based on Pending transactions

Blocknative Mempool Explorer

Geth Wiki

What diagrams exist to illustrate the Ethereum blockchain creation process?

Garbled circuits

  1. An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries, 2017 paper
  2. Billion-Gate Secure Computation with Malicious Adversaries, 2012 paper
  3. Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer, 2011 paper
  4. Fast Cut-and-Choose-Based Protocols for Malicious and Covert Adversaries, 2013 paper
  5. Two-Output Secure Computation with Malicious Adversaries, 2011 paper
  6. Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose, 2013 paper
  7. Amortizing Garbled Circuits, 2014 paper
  8. Non-Interactive Secure Computation Based on Cut-and-Choose paper

LEGO

  1. LEGO for Two-Party Secure Computation, 2009 paper
  2. MiniLEGO: Efficient Secure Two-Party Computation from General Assumptions, 2013 paper
  3. TinyLEGO: An Interactive Garbling Scheme for Maliciously Secure Two-Party Computation, 2015 paper
  4. Constant Round Maliciously Secure 2PC with Function-independent Preprocessing using LEGO, 2017 paper

Full Table for Sufficient Values of Whale Transaction

source

The value of 𝛿 (whale attack premium) that makes whale mining more profitable than honest mining, as a function of the lead of the original branch at the start of the race phase z, Alice’s mining power 𝛼 (rows), and m’s mining power 𝛽𝑚 (columns). For 𝑧=0, 𝛿 is always equal to 0.

****00.050.10.150.20.250.30.350.40.45
𝑧=6
0.0547045879.95503469.4229624.23448.26574.53117.9127.076.190.930
0.1531439.8931270.043639.89606.5124.5228.636.591.0400
0.1533109.343854.04642.23131.930.377.041.16000
0.24094.75682.4140.232.337.541.290000
0.25727.67149.5634.548.111.4400000
0.3159.96378.741.61000000
0.3539.499.381.780000000
0.49.721.8800000000
0.451.52000000000
𝑧=5
0.052476097.9555940.165226.98861.32190.8449.9614.123.80.580
0.159047.895517.41909.22201.552.7914.954.060.6700
0.155841.86962.74213.4155.9615.894.360.76000
0.21022.75226.7659.516.954.690.870000
0.25241.6763.4718.125.07100000
0.367.7419.395.471.13000000
0.3520.555.841.250000000
0.45.931.2800000000
0.450.91000000000
𝑧=4
0.05130319.956214.68921.58214.5862.9520.847.142.20.290
0.16559.89972.82226.5566.522.057.592.370.3600
0.151029.95239.970.4623.418.092.570.44000
0.2254.7574.8624.918.662.790.530000
0.2579.6726.559.273.030.6300000
0.328.219.893.280.73000000
0.3510.363.460.80000000
0.43.40.7800000000
0.450.41000000000
𝑧=3
0.056857.95689.63161.8152.8920.328.363.381.130.060
0.1727.89170.8355.8821.58.883.631.250.1200
0.15180.7959.1822.89.453.891.380.18000
0.262.7524.2110.074.181.520.250000
0.2525.6710.714.481.670.3200000
0.311.284.751.80.39000000
0.354.871.850.420000000
0.41.710.3400000000
0.450.01000000000
𝑧=2
0.05359.9575.7227.7312.476.13.011.360.4200
0.179.8929.2913.26.493.231.490.5000
0.1530.9313.986.93.461.620.580000
0.214.757.313.691.760.660.010000
0.257.673.891.880.730.0500000
0.34.021.950.780.08000000
0.351.910.750.070000000
0.40.58000000000
0.450000000000
𝑧=1
0.0517.957.54.062.361.360.710.27000
0.17.894.292.511.470.790.320000
0.154.492.651.560.860.380.030000
0.22.751.640.910.410.0500000
0.251.670.940.430.07000000
0.30.90.410.050000000
0.350.32000000000
0.40000000000
0.450000000000

License

CC0-1.0