{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:43:47Z","timestamp":1767339827449,"version":"3.37.3"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100013904","name":"National Physical Science Consortium","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100013904","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100005883","name":"Fannie and John Hertz Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100005883","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,1]]},"DOI":"10.1109\/icbc56567.2023.10174966","type":"proceedings-article","created":{"date-parts":[[2023,7,12]],"date-time":"2023-07-12T17:20:50Z","timestamp":1689182450000},"page":"1-9","source":"Crossref","is-referenced-by-count":9,"title":["MEVade: An MEV-Resistant Blockchain Design"],"prefix":"10.1109","author":[{"given":"Julien","family":"Piet","sequence":"first","affiliation":[{"name":"UC Berkeley,Berkeley,CA,USA"}]},{"given":"Vivek","family":"Nair","sequence":"additional","affiliation":[{"name":"UC Berkeley,Berkeley,CA,USA"}]},{"given":"Sanjay","family":"Subramanian","sequence":"additional","affiliation":[{"name":"UC Berkeley,Berkeley,CA,USA"}]}],"member":"263","reference":[{"volume-title":"Extracting godl [sic] from the salt mines: Ethereum miners extracting value","year":"2022","author":"Piet","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00040"},{"volume-title":"Ethereum is a dark forest","year":"2020","author":"Robinson","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/sp46214.2022.9833734"},{"volume-title":"A secure decentralised generalised transaction ledger","author":"Wood","key":"ref5"},{"key":"ref6","first-page":"21260","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto","year":"2008","journal-title":"Decentralized Business Review"},{"volume-title":"Combining ghost and casper","year":"2020","author":"Buterin","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00113"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3834535"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3560832.3563439"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3488932.3517390"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-07689-3_31"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-78372-3_7"},{"key":"ref14","article-title":"A2mm: Mitigating frontrunning, transaction reordering and consensus instability in decentralized exchanges","author":"Zhou","year":"2021","journal-title":"arXiv preprint"},{"volume-title":"Combating Front-Running in the Blockchain Ecosystem","year":"2022","author":"Byers","key":"ref15"},{"key":"ref16","article-title":"Themis: Fast, strong order-fairness in byzantine consensus","author":"Kelkar","year":"2021","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-56877-1_16"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3419614.3423263"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3052038"},{"key":"ref20","article-title":"Ferveo: Threshold decryption for mempool privacy in bft networks","author":"Bebel","year":"2022","journal-title":"Cryptology ePrint Archive, Paper 2022\/898"},{"key":"ref21","article-title":"Verifiable delay functions","author":"Boneh","year":"2018","journal-title":"Cryptology ePrint Archive, Paper 2018\/601"},{"volume-title":"Sgx.fail","key":"ref22"},{"volume-title":"Successful resolution of xapic vulnerability.","author":"Network","key":"ref23"},{"key":"ref24","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-48910-X_7","article-title":"An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack","volume-title":"EUROCRYPT","author":"Canetti","year":"1999"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1017\/cbo9780511721656"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2001.959888"},{"volume-title":"Go-Ethereum","key":"ref27"}],"event":{"name":"2023 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","start":{"date-parts":[[2023,5,1]]},"location":"Dubai, United Arab Emirates","end":{"date-parts":[[2023,5,5]]}},"container-title":["2023 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10174862\/10174863\/10174966.pdf?arnumber=10174966","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T13:21:52Z","timestamp":1709299312000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10174966\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,1]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/icbc56567.2023.10174966","relation":{},"subject":[],"published":{"date-parts":[[2023,5,1]]}}}