Ittay Eyal, Emin Gün Sirer, Majority is not enough: Bitcoin mining is vulnerable, in: Financial Cryptography and Data Security 436–454, Springer 2014 pdf
A. Sapirshtein, Y. Sompolinsky, A. Zohar, Optimal selfish mining strategies in bitcoin, arxiv/1507.06183
Zhu et al. Research on the security of blockchain data: A survey, arxiv/1812.02009
C. Natoli, V. Gramoli, The balance attack against proof-of-work blockchains: the R3 testbed as an example, arxiv/1612.09426
ARPA whitepaper (secure computation solution for blockchain networks) arxiv/1812.05820
Oraclize, Encrypted queries: private data on a public blockchain, 2016 medium blog
Andrea Coladangelo, Smart contracts meet quantum cryptography, arxiv/1902.05214
A. Kosba et al. Hawk: the blockchain model of cryptography and privacy-preserving smart contracts, 2016 IEEE Symposium on Security and Privacy 839–858 doi
Security of off chain wallets
V. Buterin, Blockchain and Ethereum security on the higher level, youtube 1:21h
S. Goldwasser, S. Micali, C. Rackoff, The knowledge complexity of interactive proof systems, SIAM Journal on Computing, 18 (1): 186–208, doipdf
Zokrates - a toolbox for zkSNARKs on Ethereum. It helps you use verifiable computation in your DApp, from the specification of your program in a high level language to generating proofs of computation to verifying those proofs in Solidity.
K. Chalkias et al. Blockchained post-quantum signatures (and related BPQS library, Cryptology ePrint Archive 2018/65 pdfgithub
I. Stewart, D. Ilie, A. Zamyatin, S. Werner, M. F. Torshizi, W. J. Knottenbelt, Committing to quantum resistance: a slow defence for Bitcoin against a fast quantum computing attack, Royal Society Open Science, Special Collection on Blockchain Technology, doi
K.K.A. Thissen, Klepto for post-quantum signatures, B.S. thesis, Eindhoven University 2016 pdf and related Tanja Lang, Lattice kleptopdf