The academic community was relatively slow to being research on Bitcoin. Here are the first academic papers written between 2008 and 2013 (5 years) on Bitcoin.
Bitcoin: A Peer-to-Peer Electronic Cash System
S. Nakamoto
Tech Report, 2008An Analysis of Anonymity in the Bitcoin System
F. Reid and M. Harrigan
PASSAT 2011On Bitcoin and Red Balloons
M. Babaioff, S. Dobzinski, S. Oren, and A. Zohar
SIGecon Exchanges, 10(3), 2011 (and ACM EC 2012)CommitCoin: Carbon Dating Commitments with Bitcoin
J. Clark and A. Essex
Financial Cryptography 2012Bitter to Better — How to Make Bitcoin a Better Currency
S. Barber, X. Boyen, E. Shi, and E. Uzun
Financial Cryptography 2012Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by the Bitcoin Currency
J. Becker, D. Breuker, T. Heide, J. Holler, H. P. Rauer, and R. Bohme
WEIS 2012Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin
G. O. Karame, E. Androulaki, and S. Capkun
CCS 2012Quantitative Analysis of the Full Bitcoin Transaction Graph
D. Ron and A. Shamir
Financial Cryptography 2013Evaluating User Privacy in Bitcoin
E. Androulaki, G. Karame, M. Roeschlin, T. Scherer and S. Capkun
Financial Cryptography 2013Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk
T. Moore and N. Christin
Financial Cryptography 2013Zerocoin: Anonymous Distributed e-Cash from Bitcoin
I. Miers, C. Garman, M. Green, and A. Rubin
IEEE SSP (Oakland) 2013Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace
N. Christin
WWW 2013Pinocchio Coin: Building Zerocoin from a Succinct Pairing-based Proof System
G. Danezis, C. Fournet, M. Kohlweiss, and B. Parno
PETShop 2013The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries
J. Kroll, I. Davey, and E. Felten
WEIS 2013Information Propagation in the Bitcoin Network
C. Decker and R. Wattenhofer
P2P 2013Have a Snack, Pay with Bitcoins
T. Bamert, C. Decker, L. Elsen, R. Wattenhofer and S. Welten
P2P 2013A Fistful of Bitcoins: Characterizing Payments Among Men with No Names
S. Meiklejohn, M. Pomarole, G. Jordan, K. Levchenko, D. McCoy, G.M. Voelker, and S. Savage
IMC 2013
-
2014 & 2015
On the Privacy Provisions of Bloom Filters in Lightweight Bitcoin Clients
A. Gervais, G.O. Karame, D. Gruber and S. Capkun
ACSAC 2014Sybil-Resistant Mixing for Bitcoin
G. Bissias, A.P. Ozisik, B.N. Levine, and M. Liberatore
WPES 2014How to Use Bitcoin to Incentivize Correct Computations
R. Kumaresan and I. Bentov
CCS 2014Deanonymisation of clients in Bitcoin P2P network
A. Biryukov, D. Khovratovich and I. Pustogarov
CCS 2014VerSum: Verifiable Computations over Large Public Logs
J. van del Hooff, M. F. Kaashoek and N. Zeldovich
CCS 2014Modeling Bitcoin Contracts by Timed Automata
M. Andrychowicz, S. Dziembowski, D. Malinowski and L. Mazurek
FORMATS 2014CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin
T. Ruffing, P. Moreno-Sanchez, and A. Kate
ESORICS 2014Bitcoin Transaction Malleability and MtGox
C. Decker, and R. Wattenhofer
ESORICS 2014BlueWallet: The Secure Bitcoin Wallet
T. Bamert, C. Decker, R. Wattenhofer and S. Welten
STM 2014How to Use Bitcoin to Design Fair Protocols
I. Bentov and R. Kumaresan
CRYPTO 2014Better in Practice than in Theory: Lessons from the Rise of Bitcoin
J. Bonneau and A. Narayanan
HotSec 2014 (Speakers)From Onions to Shallots: Rewarding Tor Relays with TEARS
R. Jansen, A. Miller, P. Syverson and B. Ford
HotPETS 2014A TorPath to TorCoin: Proof-of-Bandwidth Altcoins for Compensating Relays
M. Ghosh, M. Richardson, B. Ford and R. Jansen
HotPETS 2014On Decentralizing Prediction Markets and Order Books
J. Clark, J. Bonneau, E.W. Felten, J.A. Kroll, A. Miller, and A. Narayanan
WEIS 2014Competition in the Crypto-Currency Market
N. Gandal and H. Halaburda
WEIS 2014Is Bitcoin a Decentralized Currency?
A. Gervais, G.O. Karame, S. Capkun and V. Capkun
IEEE S&P Magazine 12(3) 2014Anonymous Byzantine Consensus from Moderately-Hard Puzzles: A Model for Bitcoin
A. Miller and J.J. LaViola
Tech Report 2014Secure Multiparty Computations on Bitcoin
M. Andrychowicz, S. Dziembowski, D. Malinowski, and L. Mazurek
IEEE SSP (Oakland) 2014Zerocash: Decentralized Anonymous Payments from Bitcoin
E. Ben-Sasson, A. Chiesa, C. Garman, M. Green, I. Miers, E. Tromer, and M. Virza
IEEE SSP (Oakland) 2014PermaCoin: Repurposing Bitcoin Work for Data Preservation
A. Miller, A. Juels, E. Shi, B. Parno, and J. Katz
IEEE SSP (Oakland) 2014Botcoin: Monetizing Stolen Cycles
D.Y. Huang, H. Dharmdasani, S. Meiklejohn, V. Dave, C. Grier, D. McCoy, S. Savage, N. Weaver, A.C. Snoeren and K. Levchenko
NDSS 2014Decentralized Anonymous Credentials
C. Garman, M. Green, and I. Miers
NDSS 2014Majority is not Enough: Bitcoin Mining is Vulnerable
I. Eyal and E.G. Sirer
Financial Cryptography 2014BitIodine: Extracting Intelligence from the Bitcoin Network
M. Spagnuolo, F. Maggi and S. Zanero
Financial Cryptography 2014Mixcoin: Anonymity for Bitcoin with accountable mixes
J. Bonneau, A. Narayanan, A. Miller, J. Clark, J.A. Kroll and E.W. Felten
Financial Cryptography 2014An Analysis of Anonymity in Bitcoin Using P2P Network Traffic
P. Koshy, D. Koshy and P. McDaniel
Financial Cryptography 2014Elliptic Curve Cryptography in Practice
J. Bos, J.A. Halderman, N. Heninger, J. Moore, M. Naehrig and E. Wustrow
Financial Cryptography 2014Bitcoin and Cryptocurrency Research Conference
Entire Program
CITP, Princeton, 2014BITCOIN 2014
(Entire Program)
Misbehavior in Bitcoin: A Study of Double-Spending and Accountability
G. O. Karame, E. Androulaki, M. Roeschlin, A. Gervais, S. Capkun
TISSEC, 18(1), 2015Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges
G. Dagher, B. Bünz, J. Bonneau, J. Clark, D. Boneh
CCS 2015Liar, Liar, Coins on Fire! — Penalizing Equivocation By Loss of Bitcoins
T. Ruffing, A. Kate, D. Schroeder
CCS 2015How to Use Bitcoin to Play Decentralized Poker
R. Kumaresan, T. Moran, I. Bentov
CCS 2015Micropayments for Decentralized Currencies
R. Pass, a. shelat
CCS 2015Traitor Deterring Schemes: Using Bitcoin as Collateral for Digital Content
A. Kiayias, Q. Tang
CCS 2015Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions
A. Miller, A. Kosba, E. Shi, J. Katz
CCS 2015Tampering with the Delivery of Blocks and Transactions in Bitcoin
A. Gervais, H. Ritzdorf, G. O. Karame, S. Capkun
CCS 2015Making Bitcoin Exchanges Transparent
C. Decker, J. Guthrie, J. Seidel and R. Wattenhofer
ESORICS 2015PoW-Based Distributed Cryptography with no Trusted Setup
M. Andrychowicz, S. Dziembowski
CRYPTO 2015Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem
K. Soska, N. Christin
USENIX Security 2015Eclipse Attacks on Bitcoin's Peer-to-Peer Network
E. Heilman, A. Kendler, A. Zohar, S. Goldberg
USENIX Security 2015Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications
A. Miller, R. Jansen
CSET 2015An empirical study of Namecoin and lessons for decentralized namespace design
H. Kalodner, M. Carlsten, P. Ellenbogen, J. Bonneau, and A. Narayanan
WEIS 2015Bitcoin and Second-generation Cryptocurrencies
J. Bonneau, A. Miller, J. Clark, A. Narayanan, J. Kroll, and E.W. Felten
IEEE SP (Oakland) 2015Bitcoin over Tor isn't a Good Idea
A. Biryukov and I. Pustogarov
IEEE SP (Oakland) 2015The Bitcoin Backbone Protocol: Analysis and Applications
J. Garay, A. Kiayias and N. Leonardos
EUROCRYPT 2015A First Look at the Usability of Bitcoin Key Management
S. Eskandari, D, Barrera, E. Stobert, and J. Clark
USEC 2015There's No Free Lunch, Even Using Bitcoin: Tracking the Popularity and Profits of Virtual Currency Scams
M. Vasek and T. Moore
Financial Cryptography 2015Hierarchical deterministic Bitcoin wallets that tolerate key leakage
G. Gutoski and D. Stebila
Financial Cryptography 2015Secure High-Rate Transaction Processing in Bitcoin
Y. Sompolinsky and A. Zohar
Financial Cryptography 2015Inclusive Block Chain Protocols
Y. Lewenberg, Y. Sompolinsky and A. Zohar
Financial Cryptography 2015BITCOIN 2015
(Entire Program)