Expert

About

https://medium.com/@avivzohar/the-spectre-protocol-7dbbebb707b5
https://eprint.iacr.org/2016/1159.pdf
https://btc-hijack.ethz.ch/
http://www.avivz.net/pubs/16/OptSelfishMining.pdf
http://www.avivz.net/pubs/15/sec15-paper-heilman_final.pdf

Interests

Google Presence

Projects

Papers

2019
Redesigning Bitcoin's fee market
Redesigning Bitcoin's fee market
R Lavi, O Sattath, A Zohar
The World Wide Web Conference, 2950-2956
5
2019
2019
2018
How to pick your friends-a game theoretic approach to p2p overlay construction
How to pick your friends-a game theoretic approach to p2p overlay construction
S Tochner, A Zohar
arXiv preprint arXiv:1810.05447
0
2018
2018
Avoiding deadlocks in payment channel networks
Avoiding deadlocks in payment channel networks
S Werman, A Zohar
Data Privacy Management, Cryptocurrencies and Blockchain Technology, 175-187
4
2018
2018
Database perspectives on blockchains
Database perspectives on blockchains
S Cohen, A Zohar
arXiv preprint arXiv:1803.06015
1
2018
2018
Bitcoin's underlying incentives
Bitcoin's underlying incentives
Y Sompolinsky, A Zohar
Communications of the ACM 61 (3), 46-53
16
2018
2018
PHANTOM: A Scalable BlockDAG Protocol.
PHANTOM: A Scalable BlockDAG Protocol.
Y Sompolinsky, A Zohar
IACR Cryptology ePrint Archive 2018, 104
26
2018
2018
PHANTOM
PHANTOM
Y Sompolinsky, A Zohar
IACR Cryptology ePrint Archive, Report 2018/104
2
2018
2017
How to charge lightning
How to charge lightning
S Brânzei, E Segal-Halevi, A Zohar
arXiv preprint arXiv:1712.10222
4
2017
2017
Bitcoin's underlying incentives
Bitcoin's underlying incentives
Y Sompolinsky, A Zohar
Queue 15 (5), 50
2
2017
2017
Securing and scaling cryptocurrencies.
Securing and scaling cryptocurrencies.
A Zohar
IJCAI, 5161-5165
6
2017
2017
Recent trends in decentralized cryptocurrencies (invited talk)
Recent trends in decentralized cryptocurrencies (invited talk)
A Zohar
Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, 1-1
0
2017
2017
Hijacking bitcoin: Routing attacks on cryptocurrencies
Hijacking bitcoin: Routing attacks on cryptocurrencies
M Apostolaki, A Zohar, L Vanbever
2017 IEEE Symposium on Security and Privacy (SP), 375-392
0
2017
2017
Memory-Based Mechanisms for Economic Agents
Memory-Based Mechanisms for Economic Agents
G Dollberg, A Zohar
Proceedings of the 16th Conference on Autonomous Agents and MultiAgent …
0
2017
2016
An axiomatic approach to routing
An axiomatic approach to routing
O Lev, M Tennenholtz, A Zohar
arXiv preprint arXiv:1606.07523
4
2016
2016
Bitcoin's security model revisited
Bitcoin's security model revisited
Y Sompolinsky, A Zohar
arXiv preprint arXiv:1605.09193
38
2016
2016
The Axiomatic Approach and the Internet.
The Axiomatic Approach and the Internet.
M Tennenholtz, A Zohar
Handbook of computational social choice, 427-452
6
2016
2016
SPECTRE: A Fast and Scalable Cryptocurrency Protocol.
SPECTRE: A Fast and Scalable Cryptocurrency Protocol.
Y Sompolinsky, Y Lewenberg, A Zohar
IACR Cryptology ePrint Archive 2016, 1159
86
2016
2016
Optimal selfish mining strategies in Bitcoin
Optimal selfish mining strategies in Bitcoin
A Sapirshtein, Y Sompolinsky, A Zohar
Financial Cryptography 2016
245
2016
2015
Bitcoin: under the hood
Bitcoin: under the hood
A Zohar
Communications of the ACM 58 (9), 104-113
106
2015
Read more

Google Trends (past one year)

21.6
Learn about Google Trends

Academic Achievement

Twitter Influence

0/100
Learn about weight

Recent Twitter Hashtags

Recent Tweets

Popular People

Naval Ravikant
Naval Ravikant Entrepreneur | Investor @ AngelList | Bitwise Asset Management
Craig Steven Wright
Craig Steven Wright Programmer | Entrepreneur @ nChain | DeMorgan
Benedikt Bünz
Benedikt Bünz Scholar @ Stanford University | Applied Crypto Group
Meltem Demirors
Meltem Demirors Investor | Entrepreneur @ CoinShares | Shiny Pony Ventures | Digital Currency Group
Browse all people