Aggelos Kiayias
Orcid: 0000-0003-2451-1430Affiliations:
- University of Edinburgh, UK
According to our database1,
Aggelos Kiayias
authored at least 268 papers
between 2001 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
CoRR, June, 2025
IACR Cryptol. ePrint Arch., 2025
Universally Composable Transaction Order Fairness: Refined Definitions and Adaptive Security.
IACR Cryptol. ePrint Arch., 2025
Proceedings of the Thirty-Fourth International Joint Conference on Artificial Intelligence, 2025
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
High-Throughput Permissionless Blockchain Consensus Under Realistic Network Assumptions.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
SyRA: Sybil-Resilient Anonymous Signatures with Applications to Decentralized Identity.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025
Proceedings of the 7th Conference on Advances in Financial Technologies, 2025
Proceedings of the 7th Conference on Advances in Financial Technologies, 2025
Proceedings of the Applied Cryptography and Network Security, 2025
2024
(Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates.
J. Cryptol., June, 2024
SyRA: Sybil-Resilient Anonymous Signatures with Applications to Decentralized Identity.
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Algorithmic Game Theory - 17th International Symposium, 2024
Proceedings of the Mathematical Research for Blockchain Economy: 5th International Conference, 2024
Proceedings of the Financial Cryptography and Data Security, 2024
Proceedings of the Financial Cryptography and Data Security, 2024
Ordering Transactions with Bounded Unfairness: Definitions, Complexity and Constructions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the Cryptology and Network Security - 23rd International Conference, 2024
Proceedings of the Cryptology and Network Security - 23rd International Conference, 2024
Proceedings of the 6th Conference on Advances in Financial Technologies, 2024
2023
Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's Post-Quantum Security.
Quantum, March, 2023
Frontiers Digit. Health, March, 2023
Proceedings of the Web and Internet Economics - 19th International Conference, 2023
Proceedings of the Theory of Cryptography - 21st International Conference, 2023
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023
Fait Accompli Committee Selection: Improving the Size-Security Tradeoff of Stake-Based Committees.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
Leakage Resilient l-more Extractable Hash and Applications to Non-Malleable Cryptography.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Theory of Cryptography - 20th International Conference, 2022
Watermarkable Public Key Encryption with Efficient Extraction Under Standard Assumptions.
Proceedings of the Security and Cryptography for Networks - 13th International Conference, 2022
Proceedings of the Algorithmic Game Theory - 15th International Symposium, 2022
Proceedings of the MobiHoc '22: The Twenty-third International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing, Seoul, Republic of Korea, October 17, 2022
Proceedings of the 3rd ACM International Conference on AI in Finance, 2022
Ofelimos: Combinatorial Optimization via Proof-of-Useful-Work - A Provably Secure Blockchain Protocol.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 4th ACM Conference on Advances in Financial Technologies, 2022
Proceedings of the 4th ACM Conference on Advances in Financial Technologies, 2022
Proceedings of the Applied Cryptography and Network Security, 2022
2021
Watermarking public-key cryptographic functionalities and implementations: The case of encryption and signatures.
IET Inf. Secur., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021
Proceedings of the Financial Cryptography and Data Security, 2021
Proceedings of the Financial Cryptography and Data Security, 2021
Proceedings of the Financial Cryptography and Data Security, 2021
Proceedings of the Financial Cryptography and Data Security, 2021
Proceedings of the Financial Cryptography and Data Security, 2021
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2021
Incentives Against Power Grabs or How to Engineer the Revolution in a Pooled Proof of Stake System.
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2021
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the 3rd ACM Conference on Advances in Financial Technologies, 2021
Proceedings of the 3rd ACM Conference on Advances in Financial Technologies, 2021
2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Post-Quantum Security of the Bitcoin Backbone and Quantum Multi-Solution Bernoulli Search.
CoRR, 2020
Proceedings of the Theory of Cryptography - 18th International Conference, 2020
Proceedings of the Theory of Cryptography - 18th International Conference, 2020
Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing, 2020
The Combinatorics of the Longest-Chain Rule: Linear Consistency for Proof-of-Stake Blockchains.
Proceedings of the 2020 ACM-SIAM Symposium on Discrete Algorithms, 2020
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020
Proceedings of the 2nd International Conference on Mathematical Research for Blockchain Economy, 2020
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
Proceedings of the Financial Cryptography and Data Security, 2020
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020
Proceedings of the Topics in Cryptology - CT-RSA 2020, 2020
Proceedings of the Topics in Cryptology - CT-RSA 2020, 2020
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
Proceedings of the 2nd ACM Conference on Advances in Financial Technologies, 2020
Proceedings of the Applied Cryptography and Network Security, 2020
2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Comput. Secur., 2019
Proceedings of the International Conference on Blockchain Economics, 2019
Proceedings of the International Conference on Blockchain Economics, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the 1st International Conference on Mathematical Research for Blockchain Economy, 2019
Proceedings of the Financial Cryptography and Data Security, 2019
Proceedings of the Financial Cryptography and Data Security, 2019
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2019
2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Parallel Chains: Improving Throughput and Latency of Blockchain Protocols via Parallel Composition.
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018
Proceedings of the Provable Security, 2018
Proceedings of the Public-Key Cryptography - PKC 2018, 2018
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018
Proceedings of the Crypto Valley Conference on Blockchain Technology, 2018
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018
2017
IEEE Secur. Priv., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the Public-Key Cryptography - PKC 2017, 2017
Proceedings of the Progress in Cryptology - LATINCRYPT 2017, 2017
Proceedings of the Information Security - 20th International Conference, 2017
Proceedings of the Information Security - 20th International Conference, 2017
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017
Proceedings of the Applied Cryptography and Network Security, 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
IACR Cryptol. ePrint Arch., 2016
Encrypting wireless network traces to protect user privacy: A case study for smart campus.
Proceedings of the 12th IEEE International Conference on Wireless and Mobile Computing, 2016
Proceedings of the 12th IEEE International Conference on Wireless and Mobile Computing, 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the 2016 ACM Conference on Economics and Computation, 2016
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016
Proceedings of the Financial Cryptography and Data Security, 2016
Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online).
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
SFADiff: Automated Evasion Attacks and Fingerprinting Using Black-box Differential Automata Learning.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
2015
Proc. Priv. Enhancing Technol., 2015
IACR Cryptol. ePrint Arch., 2015
A Little Honesty Goes a Long Way - The Two-Tier Model for Secure Multiparty Computation.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015
Distributed Parameter Generation for Bilinear Diffie Hellman Exponentiation and Applications.
Proceedings of the Information Security - 18th International Conference, 2015
Proceedings of the Information Security - 18th International Conference, 2015
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the E-Democracy - Citizen Rights in the World of the New Computing Paradigms, 2015
Proceedings of the Topics in Cryptology, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2014
Proceedings of the Information Security - 17th International Conference, 2014
Pressing the button for European elections: verifiable e-voting and public attitudes toward internet voting in Greece.
Proceedings of the 6th International Conference on Electronic Voting: Verifying the Vote, 2014
Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the E-Voting and Identify - 4th International Conference, 2013
Malicious takeover of voting systems: arbitrary code execution on optical scan voting terminals.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the Innovations in Theoretical Computer Science, 2013
Proceedings of the E-Democracy, Security, Privacy and Trust in a Digital World, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013
2012
IEEE Trans. Knowl. Data Eng., 2012
Proceedings of the Distributed Computing - 26th International Symposium, 2012
Proceedings of the 5th Workshop on Cyber Security Experimentation and Test, 2012
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
Proceedings of the ACM Symposium on Applied Computing, 2012
Proceedings of the Information Hiding - 14th International Conference, 2012
Proceedings of the Information Hiding - 14th International Conference, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, 2011
Proceedings of the Information Security, 14th International Conference, 2011
Proceedings of the 27th International Conference on Data Engineering, 2011
Proceedings of the Fourth European Workshop on System Security, 2011
On the Effects of Pirate Evolution on the Design of Digital Content Distribution Systems.
Proceedings of the Coding and Cryptology - Third International Workshop, 2011
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011
2010
Advances in Information Security 52, Springer, ISBN: 978-1-4419-0043-2, 2010
Proceedings of the Handbook of Financial Cryptography and Security., 2010
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010
Multi-query Computationally-Private Information Retrieval with Constant Communication Rate.
Proceedings of the Public Key Cryptography, 2010
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
Proceedings of the 10th ACM Workshop on Digital Rights Management, 2010
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
2009
IEEE Trans. Inf. Forensics Secur., 2009
Proceedings of the 2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2009
Proceedings of the SPAA 2009: Proceedings of the 21st Annual ACM Symposium on Parallelism in Algorithms and Architectures, 2009
Taking total control of voting systems: firmware manipulations on an optical scan voting terminal.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009
Proceedings of the Public Key Cryptography, 2009
Proceedings of the Media Forensics and Security I, 2009
Proceedings of the Automata, Languages and Programming, 36th Internatilonal Colloquium, 2009
Proceedings of the Financial Cryptography and Data Security, 2009
Proceedings of the Advances in Cryptology, 2009
On the security of a public-key traitor tracing scheme with sublinear ciphertext size.
Proceedings of the 9th ACM Workshop on Digital Rights Management, 2009
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009
2008
Pre-Election Testing and Post-Election Audit of Optical Scan Voting Terminal Memory Cards.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008
Public-key traitor tracing from efficient decoding and unbounded enrollment: extended abstract.
Proceedings of the 8th ACM Workshop on Digital Rights Management, 2008
Proceedings of the Theoretical Foundations of Practical Information Security, 30.11., 2008
2007
Theor. Comput. Sci., 2007
Proceedings of the 2007 USENIX/ACCURATE Electronic Voting Technology Workshop, 2007
Proceedings of the Automata, Languages and Programming, 34th International Colloquium, 2007
Proceedings of the Financial Cryptography and Data Security, 2007
Proceedings of the Advances in Cryptology, 2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
Tampering with Special Purpose Trusted Computing Devices: A Case Study in Optical Scan E-Voting.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
2006
Int. J. Secur. Networks, 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006
Proceedings of the Financial Cryptography and Data Security, 2006
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006
2005
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005
Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers.
Proceedings of the Progress in Cryptology, 2005
Proceedings of the Information Hiding, 7th International Workshop, 2005
Proceedings of the IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005
Proceedings of the Financial Cryptography and Data Security, 2005
Proceedings of the Advances in Cryptology, 2005
2004
Group Signatures: Provable Security, Efficient Constructions and Anonymity from Trapdoor-Holders.
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Advances in Cryptology, 2004
Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice.
Proceedings of the Advances in Cryptology, 2004
2003
Robust Verifiable non-Interactive Zero-Sharing - A Plug-in Utility for Enhanced Voters' Privacy.
Proceedings of the Secure Electronic Voting, 2003
Proceedings of the Twenty-Second ACM Symposium on Principles of Distributed Computing, 2003
Proceedings of the Automata, Languages and Programming, 30th International Colloquium, 2003
Non-interactive Zero-Sharing with Applications to Private Distributed Decision Making.
Proceedings of the Financial Cryptography, 2003
Proceedings of the Advances in Cryptology, 2003
2002
Electron. Colloquium Comput. Complex., 2002
Proceedings of the Public Key Cryptography, 2002
Proceedings of the Automata, Languages and Programming, 29th International Colloquium, 2002
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002
Proceedings of the Security and Privacy in Digital Rights Management, 2002
2001
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001
Proceedings of the Advances in Informatics, 8th Panhellenic Conference on Informatics, 2001
Proceedings of the Automata, Languages and Programming, 28th International Colloquium, 2001
Proceedings of the Advances in Cryptology, 2001
Proceedings of the Security and Privacy in Digital Rights Management, 2001