This bulletin describes a plausibility argument for a chain reaction in traceability in CryptoNote-style currencies. This lack of untraceability is caused by the fact that only one transaction output is actually spent in a ring signature.
This bulletin describes an attack on the CryptoNote protocol that allows for the creation of counterfeit coins. The attack exploits a vulnerability in the Merkle tree implementation.
This bulletin is an attempt to explain the technology behind Monero in a way that is accessible to a wider audience. It covers the basics of ring signatures, stealth addresses, and the blockchain.
This bulletin proposes modifications to the CryptoNote protocol to improve the obfuscation of transaction amounts and origins.
This paper introduces Ring Confidential Transactions (RingCT), a method for hiding transaction amounts in the Monero protocol.
A comprehensive technical guide to the Monero protocol. It covers everything from the basic cryptographic primitives to the high-level network architecture.