ROOBICOM

Research Lab

Monero is not only committed to making a fungible currency, but also to continued research into the realm of financial privacy as it involves cryptocurrencies. Below you'll find the work of our very own Monero Research Lab, with more papers to come. To contact the Monero Research Lab, please email lab@getmonero.org.

MRL-0001: A Note on Chain Reactions in Traceability in CryptoNote 2.0

2014-09-12 by Surae Noether, Sarang Noether, Adam Mackenzie

This bulletin describes a plausibility argument for a chain reaction in traceability in CryptoNote-style currencies. This lack of untraceability is caused by the fact that only one transaction output is actually spent in a ring signature.

MRL-0002: Counterfeiting via Merkle Tree Exploits within Virtual Currencies Employing the CryptoNote Protocol

2014-09-12 by Surae Noether, Sarang Noether, Adam Mackenzie

This bulletin describes an attack on the CryptoNote protocol that allows for the creation of counterfeit coins. The attack exploits a vulnerability in the Merkle tree implementation.

MRL-0003: Monero is Not That Mysterious

2014-09-12 by Surae Noether, Sarang Noether, Adam Mackenzie

This bulletin is an attempt to explain the technology behind Monero in a way that is accessible to a wider audience. It covers the basics of ring signatures, stealth addresses, and the blockchain.

MRL-0004: Improving Obfuscation in the CryptoNote Protocol

2015-01-26 by Adam Mackenzie, Surae Noether, Monero Core Team

This bulletin proposes modifications to the CryptoNote protocol to improve the obfuscation of transaction amounts and origins.

MRL-0005: Ring Signature Confidential Transactions

2015-10-07 by Shen Noether, Adam Mackenzie, Monero Core Team

This paper introduces Ring Confidential Transactions (RingCT), a method for hiding transaction amounts in the Monero protocol.

Zero to Monero: Second Edition

2020-06-01 by koe, Kurt M. Alonso, Sarang Noether

A comprehensive technical guide to the Monero protocol. It covers everything from the basic cryptographic primitives to the high-level network architecture.