Aggelos Kiayias

Orcid: 0000-0003-2451-1430

Affiliations:
  • University of Edinburgh, UK


According to our database1, Aggelos Kiayias authored at least 268 papers between 2001 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
One-dimensional vs. Multi-dimensional Pricing in Blockchain Protocols.
CoRR, June, 2025

SoK: Measuring Blockchain Decentralization.
CoRR, January, 2025

DART: Decentralized, Anonymous, and Regulation-friendly Tokenization.
IACR Cryptol. ePrint Arch., 2025

Universally Composable Transaction Order Fairness: Refined Definitions and Adaptive Security.
IACR Cryptol. ePrint Arch., 2025

Airdrop Games.
Proceedings of the Thirty-Fourth International Joint Conference on Artificial Intelligence, 2025

State Machine Replication Among Strangers, Fast and Self-sufficient.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

High-Throughput Permissionless Blockchain Consensus Under Realistic Network Assumptions.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

SyRA: Sybil-Resilient Anonymous Signatures with Applications to Decentralized Identity.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025

Single-Token vs Two-Token Blockchain Tokenomics.
Proceedings of the 7th Conference on Advances in Financial Technologies, 2025

Pool Formation in Oceanic Games: Shapley Value and Proportional Sharing.
Proceedings of the 7th Conference on Advances in Financial Technologies, 2025

SoK: Measuring Blockchain Decentralization.
Proceedings of the Applied Cryptography and Network Security, 2025

2024
(Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates.
J. Cryptol., June, 2024

SyRA: Sybil-Resilient Anonymous Signatures with Applications to Decentralized Identity.
IACR Cryptol. ePrint Arch., 2024

Decentralized Reliability Estimation for Mixnets.
CoRR, 2024

Balancing Participation and Decentralization in Proof-of-Stake Cryptocurrencies.
Proceedings of the Algorithmic Game Theory - 17th International Symposium, 2024

Tiered Mechanisms for Blockchain Transaction Fees.
Proceedings of the Mathematical Research for Blockchain Economy: 5th International Conference, 2024

SoK: A Stratified Approach to Blockchain Decentralization.
Proceedings of the Financial Cryptography and Data Security, 2024

Would Friedman Burn Your Tokens?
Proceedings of the Financial Cryptography and Data Security, 2024

Ordering Transactions with Bounded Unfairness: Definitions, Complexity and Constructions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

Proof-of-Work-Based Consensus in Expected-Constant Time.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

Approximate Lower Bound Arguments.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

Consensus Redux: Distributed Ledgers in the Face of Adversarial Supremacy.
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024

Universal Composable Transaction Serialization with Order Fairness.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Towards Permissionless Consensus in the Standard Model via Fine-Grained Complexity.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Blockchain Bribing Attacks and the Efficacy of Counterincentives.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

PARScoin: A Privacy-preserving, Auditable, and Regulation-friendly Stablecoin.
Proceedings of the Cryptology and Network Security - 23rd International Conference, 2024

Mithril: Stake-Based Threshold Multisignatures.
Proceedings of the Cryptology and Network Security - 23rd International Conference, 2024

Blockchain Space Tokenization.
Proceedings of the 6th Conference on Advances in Financial Technologies, 2024

2023
Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's Post-Quantum Security.
Quantum, March, 2023

An open-source digital contact tracing system tailored to haulage.
Frontiers Digit. Health, March, 2023

Are continuous stop-and-go mixnets provably secure?
IACR Cryptol. ePrint Arch., 2023

Blockchain Participation Games.
Proceedings of the Web and Internet Economics - 19th International Conference, 2023

Agile Cryptography: A Universally Composable Approach.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

Adaptively Secure Random Beacons for Ungrindable Blockchains.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

Fait Accompli Committee Selection: Improving the Size-Security Tradeoff of Stake-Based Committees.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
An Efficient E2E Crowd Verifiable E-Voting System.
IEEE Trans. Dependable Secur. Comput., 2022

Privacy Preserving Opinion Aggregation.
IACR Cryptol. ePrint Arch., 2022

Leakage Resilient l-more Extractable Hash and Applications to Non-Malleable Cryptography.
IACR Cryptol. ePrint Arch., 2022

The Generals’ Scuttlebutt: Byzantine-Resilient Gossip Protocols.
IACR Cryptol. ePrint Arch., 2022

Agile Cryptography: A Composable Approach.
IACR Cryptol. ePrint Arch., 2022

Permissionless Clock Synchronization with Public Setup.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Watermarkable Public Key Encryption with Efficient Extraction Under Standard Assumptions.
Proceedings of the Security and Cryptography for Networks - 13th International Conference, 2022

Decentralizing Information Technology: The Advent of Resource Based Systems.
Proceedings of the Algorithmic Game Theory - 15th International Symposium, 2022

Optimal bootstrapping of PoW blockchains.
Proceedings of the MobiHoc '22: The Twenty-third International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing, Seoul, Republic of Korea, October 17, 2022

Decentralization Analysis of Pooling Behavior in Cardano Proof of Stake.
Proceedings of the 3rd ACM International Conference on AI in Finance, 2022

Ofelimos: Combinatorial Optimization via Proof-of-Useful-Work - A Provably Secure Blockchain Protocol.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

PEReDi: Privacy-Enhanced, Regulated and Distributed Central Bank Digital Currencies.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Minotaur: Multi-Resource Blockchain Consensus.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

The Generals' Scuttlebutt: Byzantine-Resilient Gossip Protocols.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

SoK: Blockchain Governance.
Proceedings of the 4th ACM Conference on Advances in Financial Technologies, 2022

Blockchain Nash Dynamics and the Pursuit of Compliance.
Proceedings of the 4th ACM Conference on Advances in Financial Technologies, 2022

Babel Fees via Limited Liabilities.
Proceedings of the Applied Cryptography and Network Security, 2022

2021
Watermarking public-key cryptographic functionalities and implementations: The case of encryption and signatures.
IET Inf. Secur., 2021

Efficient Random Beacons with Adaptive Security for Ungrindable Blockchains.
IACR Cryptol. ePrint Arch., 2021

Elmo: Recursive Virtual Payment Channels for Bitcoin.
IACR Cryptol. ePrint Arch., 2021

Securing Proof-of-Work Ledgers via Checkpointing.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021

SoK: Communication Across Distributed Ledgers.
Proceedings of the Financial Cryptography and Data Security, 2021

Mining for Privacy: How to Bootstrap a Snarky Blockchain.
Proceedings of the Financial Cryptography and Data Security, 2021

Efficient State Management in Distributed Ledgers.
Proceedings of the Financial Cryptography and Data Security, 2021

Fast Isomorphic State Channels.
Proceedings of the Financial Cryptography and Data Security, 2021

Multi-instance Publicly Verifiable Time-Lock Puzzle and Its Applications.
Proceedings of the Financial Cryptography and Data Security, 2021

Dynamic Ad Hoc Clock Synchronization.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Conclave: A Collective Stake Pool Protocol.
Proceedings of the Computer Security - ESORICS 2021, 2021

Filling the Tax Gap via Programmable Money.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2021

Incentives Against Power Grabs or How to Engineer the Revolution in a Pooled Proof of Stake System.
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2021

KACHINA - Foundations of Private Smart Contracts.
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021

Consistency for Functional Encryption.
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021

Composition with Knowledge Assumptions.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Mining in Logarithmic Space.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Coalition-safe equilibria with virtual payoffs.
Proceedings of the 3rd ACM Conference on Advances in Financial Technologies, 2021

The velvet path to superlight blockchain clients.
Proceedings of the 3rd ACM Conference on Advances in Financial Technologies, 2021

2020
Implementing a Smart Contract PKI.
IEEE Trans. Engineering Management, 2020

The combinatorics of hidden diversity.
Theor. Comput. Sci., 2020

Full Analysis of Nakamoto Consensus in Bounded-Delay Networks.
IACR Cryptol. ePrint Arch., 2020

Proof-of-Stake Blockchain Protocols with Near-Optimal Throughput.
IACR Cryptol. ePrint Arch., 2020

Hydra: Fast Isomorphic State Channels.
IACR Cryptol. ePrint Arch., 2020

Post-Quantum Security of the Bitcoin Backbone and Quantum Multi-Solution Bernoulli Search.
CoRR, 2020

Blockchains from Non-idealized Hash Functions.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Ledger Combiners for Fast Settlement.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

One-shot signatures and applications to hybrid quantum/classical authentication.
Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing, 2020

The Combinatorics of the Longest-Chain Rule: Linear Consistency for Proof-of-Stake Blockchains.
Proceedings of the 2020 ACM-SIAM Symposium on Discrete Algorithms, 2020

Account Management in Proof of Stake Ledgers.
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020

Smart Contract Derivatives.
Proceedings of the 2nd International Conference on Mathematical Research for Blockchain Economy, 2020

Consistency of Proof-of-Stake Blockchains with Concurrent Honest Slot Leaders.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

Non-interactive Proofs of Proof-of-Work.
Proceedings of the Financial Cryptography and Data Security, 2020

Proof-of-Burn.
Proceedings of the Financial Cryptography and Data Security, 2020

Reward Sharing Schemes for Stake Pools.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

Resource-Restricted Cryptography: Revisiting MPC Bounds in the Proof-of-Work Era.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Updatable Blockchains.
Proceedings of the Computer Security - ESORICS 2020, 2020

Consensus from Signatures of Work.
Proceedings of the Topics in Cryptology - CT-RSA 2020, 2020

SoK: A Consensus Taxonomy in the Blockchain Era.
Proceedings of the Topics in Cryptology - CT-RSA 2020, 2020

A Composable Security Treatment of the Lightning Network.
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020

Tight Consistency Bounds for Bitcoin.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Crowd Verifiable Zero-Knowledge and End-to-End Verifiable Multiparty Computation.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

A Gas-Efficient Superlight Bitcoin Client in Solidity.
Proceedings of the 2nd ACM Conference on Advances in Financial Technologies, 2020

Timed Signatures and Zero-Knowledge Proofs - Timestamping in the Blockchain Era -.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
Compact Storage of Superblocks for NIPoPoW Applications.
IACR Cryptol. ePrint Arch., 2019

Iterated Search Problems and Blockchain Security under Falsifiable Assumptions.
IACR Cryptol. ePrint Arch., 2019

Resource-Restricted Cryptography: Honest-Majority MPC from a CRS (and No Broadcast).
IACR Cryptol. ePrint Arch., 2019

The Bitcoin Backbone Protocol Against Quantum Adversaries.
IACR Cryptol. ePrint Arch., 2019

Ouroboros Chronos: Permissionless Clock Synchronization via Proof-of-Stake.
IACR Cryptol. ePrint Arch., 2019

Linear Consistency for Proof-of-Stake Blockchains.
CoRR, 2019

Distributed, end-to-end verifiable, and privacy-preserving internet voting systems.
Comput. Secur., 2019

A Puff of Steem: Security Analysis of Decentralized Content Curation.
Proceedings of the International Conference on Blockchain Economics, 2019

Cryptocurrency Egalitarianism: A Quantitative Approach.
Proceedings of the International Conference on Blockchain Economics, 2019

Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Proof-of-Stake Sidechains.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Compact Storage of Superblocks for NIPoPoW Applications.
Proceedings of the 1st International Conference on Mathematical Research for Blockchain Economy, 2019

Proof-of-Work Sidechains.
Proceedings of the Financial Cryptography and Data Security, 2019

A Formal Treatment of Hardware Wallets.
Proceedings of the Financial Cryptography and Data Security, 2019

On the Practicality of a Smart Contract PKI.
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2019

2018
Ouroboros-BFT: A Simple Byzantine Fault Tolerant Consensus Protocol.
IACR Cryptol. ePrint Arch., 2018

Space Efficient Computational Multi-Secret Sharing and Its Applications.
IACR Cryptol. ePrint Arch., 2018

Parallel Chains: Improving Throughput and Latency of Blockchain Protocols via Parallel Composition.
IACR Cryptol. ePrint Arch., 2018

Structure and Content of the Visible Darknet.
CoRR, 2018

On the Security Properties of e-Voting Bulletin Boards.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

Secure Outsourcing of Cryptographic Circuits Manufacturing.
Proceedings of the Provable Security, 2018

Bootstrapping the Blockchain, with Applications to Consensus and Fast PKI Setup.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

Stake-Bleeding Attacks on Proof-of-Stake Blockchains.
Proceedings of the Crypto Valley Conference on Blockchain Technology, 2018

Non-Malleable Codes for Partial Functions with Manipulation Detection.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

A Universally Composable Framework for the Privacy of Email Ecosystems.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Auditing for privacy in threshold PKE e-voting.
Inf. Comput. Secur., 2017

An Efficient E2E Verifiable E-voting System without Setup Assumptions.
IEEE Secur. Priv., 2017

Forkable Strings are Rare.
IACR Cryptol. ePrint Arch., 2017

Proofs of Work for Blockchain Protocols.
IACR Cryptol. ePrint Arch., 2017

Ouroboros Praos: An adaptively-secure, semi-synchronous proof-of-stake protocol.
IACR Cryptol. ePrint Arch., 2017

MCMix: Anonymous Messaging via Secure Multiparty Computation.
Proceedings of the 26th USENIX Security Symposium, 2017

Ceremonies for End-to-End Verifiable Elections.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

On Trees, Chains and Fast Transactions in the Blockchain.
Proceedings of the Progress in Cryptology - LATINCRYPT 2017, 2017

Low-Level Attacks in Bitcoin Wallets.
Proceedings of the Information Security - 20th International Conference, 2017

Watermarking Public-Key Cryptographic Functionalities and Implementations.
Proceedings of the Information Security - 20th International Conference, 2017

Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

The Bitcoin Backbone Protocol with Chains of Variable Difficulty.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

Towards a Smart Contract-Based, Decentralized, Public-Key Infrastructure.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

TOPPSS: Cost-Minimal Password-Protected Secret Sharing Based on Threshold OPRF.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
On the Security of Key Extraction From Measuring Physical Quantities.
IEEE Trans. Inf. Forensics Secur., 2016

A Provably Secure Proof-of-Stake Blockchain Protocol.
IACR Cryptol. ePrint Arch., 2016

Bootstrapping the Blockchain - Directly.
IACR Cryptol. ePrint Arch., 2016

Secure Outsourcing of Circuit Manufacturing.
IACR Cryptol. ePrint Arch., 2016

Encrypting wireless network traces to protect user privacy: A case study for smart campus.
Proceedings of the 12th IEEE International Conference on Wireless and Mobile Computing, 2016

Securely outsourcing cookies to the cloud via private information retrieval.
Proceedings of the 12th IEEE International Conference on Wireless and Mobile Computing, 2016

Back in Black: Towards Formal, Black Box Analysis of Sanitizers and Filters.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Blockchain Mining Games.
Proceedings of the 2016 ACM Conference on Economics and Computation, 2016

D-DEMOS: A Distributed, End-to-End Verifiable, Internet Voting System.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

Proofs of Proofs of Work with Sublinear Complexity.
Proceedings of the Financial Cryptography and Data Security, 2016

Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online).
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

Fair and Robust Multi-party Computation Using a Global Transaction Ledger.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

Efficient Encrypted Keyword Search for Multi-user Data Sharing.
Proceedings of the Computer Security - ESORICS 2016, 2016

Practical Non-Malleable Codes from l-more Extractable Hash Functions.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

SFADiff: Automated Evasion Attacks and Fingerprinting Using Black-box Differential Automata Learning.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Indistinguishable Proofs of Work or Knowledge.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Optimal Rate Private Information Retrieval from Homomorphic Encryption.
Proc. Priv. Enhancing Technol., 2015

A One-time Stegosystem and Applications to Efficient Covert Communication.
IACR Cryptol. ePrint Arch., 2015

Speed-Security Tradeoffs in Blockchain Protocols.
IACR Cryptol. ePrint Arch., 2015

A distributed, end-to-end verifiable, internet voting system.
CoRR, 2015

A Little Honesty Goes a Long Way - The Two-Tier Model for Secure Multiparty Computation.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

Distributed Parameter Generation for Bilinear Diffie Hellman Exponentiation and Applications.
Proceedings of the Information Security - 18th International Conference, 2015

Graded Signatures.
Proceedings of the Information Security - 18th International Conference, 2015

Asynchronous Adaptive Task Allocation.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

End-to-End Verifiable Elections in the Standard Model.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

The Bitcoin Backbone Protocol: Analysis and Applications.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Making Any Identity-Based Encryption Accountable, Efficiently.
Proceedings of the Computer Security - ESORICS 2015, 2015

On the Necessity of Auditing for Election Privacy in e-Voting Systems.
Proceedings of the E-Democracy - Citizen Rights in the World of the New Computing Paradigms, 2015

Communication Optimal Tardos-Based Asymmetric Fingerprinting.
Proceedings of the Topics in Cryptology, 2015

Traitor Deterring Schemes: Using Bitcoin as Collateral for Digital Content.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

DEMOS-2: Scalable E2E Verifiable Elections without Random Oracles.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Near Optimal Rate Homomorphic Encryption for Branching Programs.
IACR Cryptol. ePrint Arch., 2014

Efficient Proofs of Secure Erasure.
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014

Distributing the setup in universally composable multi-party computation.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2014

Graded Encryption, or How to Play "Who Wants To Be A Millionaire?" Distributively.
Proceedings of the Information Security - 17th International Conference, 2014

Pressing the button for European elections: verifiable e-voting and public attitudes toward internet voting in Greece.
Proceedings of the 6th International Conference on Electronic Voting: Verifying the Vote, 2014

Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

Scalability, fidelity and stealth in the DRAKVUF dynamic malware analysis system.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
How to Keep a Secret: Leakage Deterring Public-key Cryptography.
IACR Cryptol. ePrint Arch., 2013

Scaling Privacy Guarantees in Code-Verification Elections.
Proceedings of the E-Voting and Identify - 4th International Conference, 2013

Malicious takeover of voting systems: arbitrary code execution on optical scan voting terminals.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning.
Proceedings of the Network and System Security - 7th International Conference, 2013

Resource-based corruptions and the combinatorics of hidden diversity.
Proceedings of the Innovations in Theoretical Computer Science, 2013

Electronic Voting Systems - From Theory to Implementation.
Proceedings of the E-Democracy, Security, Privacy and Trust in a Digital World, 2013

How to keep a secret: leakage deterring public-key cryptosystems.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Delegatable pseudorandom functions and applications.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Resource Access Control in the Facebook Model.
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013

Tamper Resilient Circuits: The Adversary at the Gates.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2012
Exact In-Network Aggregation with Integrity and Confidentiality.
IEEE Trans. Knowl. Data Eng., 2012

Generic Construction of Trace and Revoke Schemes.
IACR Cryptol. ePrint Arch., 2012

The Strong At-Most-Once Problem.
Proceedings of the Distributed Computing - 26th International Symposium, 2012

Virtual Machine Introspection in a Hybrid Honeypot Architecture.
Proceedings of the 5th Workshop on Cyber Security Experimentation and Test, 2012

I Forgot Your Password: Randomness Attacks Against PHP Applications.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Integrity of electronic voting systems: fallacious use of cryptography.
Proceedings of the ACM Symposium on Applied Computing, 2012

Lower Bounds for Private Broadcast Encryption.
Proceedings of the Information Hiding - 14th International Conference, 2012

Key-Efficient Steganography.
Proceedings of the Information Hiding - 14th International Conference, 2012

2011
Key Generation Using Physical Properties of Wireless Communication.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Solving the at-most-once problem with nearly optimal effectiveness.
Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, 2011

Attacking Traitor Tracing Schemes Using History Recording and Abrupt Decoders.
Proceedings of the Information Security, 14th International Conference, 2011

Secure and efficient in-network processing of exact SUM queries.
Proceedings of the 27th International Conference on Data Engineering, 2011

On passive inference attacks against physical-layer key extraction?
Proceedings of the Fourth European Workshop on System Security, 2011

On the Effects of Pirate Evolution on the Design of Digital Content Distribution Systems.
Proceedings of the Coding and Cryptology - Third International Workshop, 2011

BiTR: Built-in Tamper Resilience.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
Encryption for Digital Content
Advances in Information Security 52, Springer, ISBN: 978-1-4419-0043-2, 2010

Electronic Voting.
Proceedings of the Handbook of Financial Cryptography and Security., 2010

The Vector-Ballot Approach for Online Voting Procedures.
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010

Multi-query Computationally-Private Information Retrieval with Constant Communication Rate.
Proceedings of the Public Key Cryptography, 2010

Tree-Homomorphic Encryption and Scalable Hierarchical Secret-Ballot Elections.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

RLCPS Preface.
Proceedings of the Financial Cryptography and Data Security, 2010

Robust fingerprinting codes: a near optimal construction.
Proceedings of the 10th ACM Workshop on Digital Rights Management, 2010

A Framework for the Sound Specification of Cryptographic Tasks.
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010

Improving the Round Complexity of Traitor Tracing Schemes.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
State-wide elections, optical scan voting systems, and the pursuit of integrity.
IEEE Trans. Inf. Forensics Secur., 2009

Randomness-optimal Steganography
CoRR, 2009

Efficient Steganography with Provable Security Guarantees
CoRR, 2009

Automating Voting Terminal Event Log Analysis.
Proceedings of the 2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2009

At-most-once semantics in asynchronous shared memory.
Proceedings of the SPAA 2009: Proceedings of the 21st Annual ACM Symposium on Parallelism in Algorithms and Architectures, 2009

Taking total control of voting systems: firmware manipulations on an optical scan voting terminal.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Zero-Knowledge Proofs with Witness Elimination.
Proceedings of the Public Key Cryptography, 2009

Robust fingerprinting codes and applications.
Proceedings of the Media Forensics and Security I, 2009

Secure Function Collection with Sublinear Storage.
Proceedings of the Automata, Languages and Programming, 36th Internatilonal Colloquium, 2009

Privacy-Preserving Information Markets for Computing Statistical Data.
Proceedings of the Financial Cryptography and Data Security, 2009

On the Portability of Generalized Schnorr Proofs.
Proceedings of the Advances in Cryptology, 2009

On the security of a public-key traitor tracing scheme with sublinear ciphertext size.
Proceedings of the 9th ACM Workshop on Digital Rights Management, 2009

Tracing and Revoking Pirate Rebroadcasts.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

2008
Pre-Election Testing and Post-Election Audit of Optical Scan Voting Terminal Memory Cards.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008

Equivocal Blind Signatures and Adaptive UC-Security.
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008

Privacy Preserving Data Mining within Anonymous Credential Systems.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008

Public-key traitor tracing from efficient decoding and unbounded enrollment: extended abstract.
Proceedings of the 8th ACM Workshop on Digital Rights Management, 2008

Sound and Fine-grain Specification of Ideal Functionalities.
Proceedings of the Theoretical Foundations of Practical Information Security, 30.11., 2008

2007
Decoding interleaved Reed-Solomon codes over noisy channels.
Theor. Comput. Sci., 2007

An Authentication and Ballot Layout Attack Against an Optical Scan Voting Terminal.
Proceedings of the 2007 USENIX/ACCURATE Electronic Voting Technology Workshop, 2007

Trading Static for Adaptive Security in Universally Composable Zero-Knowledge.
Proceedings of the Automata, Languages and Programming, 34th International Colloquium, 2007

Hidden Identity-Based Signatures.
Proceedings of the Financial Cryptography and Data Security, 2007

Pirate Evolution: How to Make the Most of Your Traitor Keys.
Proceedings of the Advances in Cryptology, 2007

Robust key generation from signal envelopes in wireless networks.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

Group Encryption.
Proceedings of the Advances in Cryptology, 2007

Tampering with Special Purpose Trusted Computing Devices: A Case Study in Optical Scan E-Voting.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
Secure scalable group signature with dynamic joins and separable authorities.
Int. J. Secur. Networks, 2006

Copyrighting Public-key Functions and Applications to Black-box Traitor Tracing.
IACR Cryptol. ePrint Arch., 2006

Concurrent Blind Signatures Without Random Oracles.
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006

Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination.
Proceedings of the Financial Cryptography and Data Security, 2006

An Internet Voting System Supporting User Privacy.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

Syntax-Driven Private Evaluation of Quantified Membership Queries.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
A Solution for Wireless Privacy and Payments based on E-cash.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers.
Proceedings of the Progress in Cryptology, 2005

Efficient Steganography with Provable Security Guarantees.
Proceedings of the Information Hiding, 7th International Workshop, 2005

Cryptography and decoding Reed-Solomon codes as a hard problem.
Proceedings of the IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005

Asynchronous Perfectly Secure Communication over One-Time Pads.
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005

Testing Disjointness of Private Datasets.
Proceedings of the Financial Cryptography and Data Security, 2005

Group Signatures with Efficient Concurrent Join.
Proceedings of the Advances in Cryptology, 2005

2004
Group Signatures: Provable Security, Efficient Constructions and Anonymity from Trapdoor-Holders.
IACR Cryptol. ePrint Arch., 2004

The Vector-Ballot e-Voting Approach.
Proceedings of the Financial Cryptography, 2004

Traceable Signatures.
Proceedings of the Advances in Cryptology, 2004

Anonymous Identification in Ad Hoc Groups.
Proceedings of the Advances in Cryptology, 2004

Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice.
Proceedings of the Advances in Cryptology, 2004

2003
Robust Verifiable non-Interactive Zero-Sharing - A Plug-in Utility for Enhanced Voters' Privacy.
Proceedings of the Secure Electronic Voting, 2003

Scalable public-key tracing and revoking.
Proceedings of the Twenty-Second ACM Symposium on Principles of Distributed Computing, 2003

Decoding of Interleaved Reed Solomon Codes over Noisy Data.
Proceedings of the Automata, Languages and Programming, 30th International Colloquium, 2003

Non-interactive Zero-Sharing with Applications to Private Distributed Decision Making.
Proceedings of the Financial Cryptography, 2003

Extracting Group Signatures from Traitor Tracing Schemes.
Proceedings of the Advances in Cryptology, 2003

2002
Cryptographic Hardness based on the Decoding of Reed-Solomon Codes with Applications
Electron. Colloquium Comput. Complex., 2002

Self-tallying Elections and Perfect Ballot Secrecy.
Proceedings of the Public Key Cryptography, 2002

Cryptographic Hardness Based on the Decoding of Reed-Solomon Codes.
Proceedings of the Automata, Languages and Programming, 29th International Colloquium, 2002

Traitor Tracing with Constant Transmission Rate.
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002

Breaking and Repairing Asymmetric Public-Key Traitor Tracing.
Proceedings of the Security and Privacy in Digital Rights Management, 2002

2001
Polynomial Reconstruction Based Cryptography.
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001

Acceptor-Definable Counting Classes.
Proceedings of the Advances in Informatics, 8th Panhellenic Conference on Informatics, 2001

Secure Games with Polynomial Expressions.
Proceedings of the Automata, Languages and Programming, 28th International Colloquium, 2001

Self Protecting Pirates and Black-Box Traitor Tracing.
Proceedings of the Advances in Cryptology, 2001

On Crafty Pirates and Foxy Tracers.
Proceedings of the Security and Privacy in Digital Rights Management, 2001


  Loading...