Aggelos Kiayias

According to our database1, Aggelos Kiayias authored at least 169 papers between 2001 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
A Composable Security Treatment of the Lightning Network.
IACR Cryptology ePrint Archive, 2019

Iterated Search Problems and Blockchain Security under Falsifiable Assumptions.
IACR Cryptology ePrint Archive, 2019

A Formal Treatment of Hardware Wallets.
IACR Cryptology ePrint Archive, 2019

Timed Signatures and Zero-Knowledge Proofs -Timestamping in the Blockchain Era-.
IACR Cryptology ePrint Archive, 2019

Distributed, end-to-end verifiable, and privacy-preserving internet voting systems.
Computers & Security, 2019

2018
Proof-of-Work Sidechains.
IACR Cryptology ePrint Archive, 2018

Ouroboros-BFT: A Simple Byzantine Fault Tolerant Consensus Protocol.
IACR Cryptology ePrint Archive, 2018

Space Efficient Computational Multi-Secret Sharing and Its Applications.
IACR Cryptology ePrint Archive, 2018

Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake.
IACR Cryptology ePrint Archive, 2018

Proof-of-Stake Sidechains.
IACR Cryptology ePrint Archive, 2018

SoK: A Consensus Taxonomy in the Blockchain Era.
IACR Cryptology ePrint Archive, 2018

Parallel Chains: Improving Throughput and Latency of Blockchain Protocols via Parallel Composition.
IACR Cryptology ePrint Archive, 2018

On the Security Properties of e-Voting Bulletin Boards.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

Secure Outsourcing of Cryptographic Circuits Manufacturing.
Proceedings of the Provable Security, 2018

Bootstrapping the Blockchain, with Applications to Consensus and Fast PKI Setup.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

Stake-Bleeding Attacks on Proof-of-Stake Blockchains.
Proceedings of the Crypto Valley Conference on Blockchain Technology, 2018

Non-Malleable Codes for Partial Functions with Manipulation Detection.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

A Universally Composable Framework for the Privacy of Email Ecosystems.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Auditing for privacy in threshold PKE e-voting.
Inf. & Comput. Security, 2017

An Efficient E2E Verifiable E-voting System without Setup Assumptions.
IEEE Security & Privacy, 2017

Forkable Strings are Rare.
IACR Cryptology ePrint Archive, 2017

Non-Interactive Proofs of Proof-of-Work.
IACR Cryptology ePrint Archive, 2017

Practical Non-Malleable Codes from ℓ-more Extractable Hash Functions.
IACR Cryptology ePrint Archive, 2017

Proofs of Work for Blockchain Protocols.
IACR Cryptology ePrint Archive, 2017

Ouroboros Praos: An adaptively-secure, semi-synchronous proof-of-stake protocol.
IACR Cryptology ePrint Archive, 2017

MCMix: Anonymous Messaging via Secure Multiparty Computation.
Proceedings of the 26th USENIX Security Symposium, 2017

Ceremonies for End-to-End Verifiable Elections.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

Low-Level Attacks in Bitcoin Wallets.
Proceedings of the Information Security - 20th International Conference, 2017

Watermarking Public-Key Cryptographic Functionalities and Implementations.
Proceedings of the Information Security - 20th International Conference, 2017

Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

The Bitcoin Backbone Protocol with Chains of Variable Difficulty.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

Towards a Smart Contract-Based, Decentralized, Public-Key Infrastructure.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

TOPPSS: Cost-Minimal Password-Protected Secret Sharing Based on Threshold OPRF.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
On the Security of Key Extraction From Measuring Physical Quantities.
IEEE Trans. Information Forensics and Security, 2016

On Trees, Chains and Fast Transactions in the Blockchain.
IACR Cryptology ePrint Archive, 2016

A Provably Secure Proof-of-Stake Blockchain Protocol.
IACR Cryptology ePrint Archive, 2016

Bootstrapping the Blockchain - Directly.
IACR Cryptology ePrint Archive, 2016

Secure Outsourcing of Circuit Manufacturing.
IACR Cryptology ePrint Archive, 2016

Encrypting wireless network traces to protect user privacy: A case study for smart campus.
Proceedings of the 12th IEEE International Conference on Wireless and Mobile Computing, 2016

Securely outsourcing cookies to the cloud via private information retrieval.
Proceedings of the 12th IEEE International Conference on Wireless and Mobile Computing, 2016

Back in Black: Towards Formal, Black Box Analysis of Sanitizers and Filters.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Blockchain Mining Games.
Proceedings of the 2016 ACM Conference on Economics and Computation, 2016

D-DEMOS: A Distributed, End-to-End Verifiable, Internet Voting System.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

Proofs of Proofs of Work with Sublinear Complexity.
Proceedings of the Financial Cryptography and Data Security, 2016

Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online).
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

Fair and Robust Multi-party Computation Using a Global Transaction Ledger.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

Efficient Encrypted Keyword Search for Multi-user Data Sharing.
Proceedings of the Computer Security - ESORICS 2016, 2016

Practical Non-Malleable Codes from l-more Extractable Hash Functions.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

SFADiff: Automated Evasion Attacks and Fingerprinting Using Black-box Differential Automata Learning.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Indistinguishable Proofs of Work or Knowledge.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Optimal Rate Private Information Retrieval from Homomorphic Encryption.
PoPETs, 2015

End-to-End Verifiable Elections in the Standard Model∗.
IACR Cryptology ePrint Archive, 2015

A One-time Stegosystem and Applications to Efficient Covert Communication.
IACR Cryptology ePrint Archive, 2015

Speed-Security Tradeoffs in Blockchain Protocols.
IACR Cryptology ePrint Archive, 2015

A Little Honesty Goes a Long Way - The Two-Tier Model for Secure Multiparty Computation.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

Distributed Parameter Generation for Bilinear Diffie Hellman Exponentiation and Applications.
Proceedings of the Information Security - 18th International Conference, 2015

Graded Signatures.
Proceedings of the Information Security - 18th International Conference, 2015

Asynchronous Adaptive Task Allocation.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

End-to-End Verifiable Elections in the Standard Model.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

The Bitcoin Backbone Protocol: Analysis and Applications.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Making Any Identity-Based Encryption Accountable, Efficiently.
Proceedings of the Computer Security - ESORICS 2015, 2015

On the Necessity of Auditing for Election Privacy in e-Voting Systems.
Proceedings of the E-Democracy - Citizen Rights in the World of the New Computing Paradigms, 2015

Communication Optimal Tardos-Based Asymmetric Fingerprinting.
Proceedings of the Topics in Cryptology, 2015

Traitor Deterring Schemes: Using Bitcoin as Collateral for Digital Content.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

DEMOS-2: Scalable E2E Verifiable Elections without Random Oracles.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
A One-Time Stegosystem and Applications to Efficient Covert Communication.
J. Cryptology, 2014

Near Optimal Rate Homomorphic Encryption for Branching Programs.
IACR Cryptology ePrint Archive, 2014

A Little Honesty Goes a Long Way: The Two-Tier Model for Secure Multiparty Computation.
IACR Cryptology ePrint Archive, 2014

Efficient Proofs of Secure Erasure.
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014

Distributing the setup in universally composable multi-party computation.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2014

Graded Encryption, or How to Play "Who Wants To Be A Millionaire?" Distributively.
Proceedings of the Information Security - 17th International Conference, 2014

Pressing the button for European elections: verifiable e-voting and public attitudes toward internet voting in Greece.
Proceedings of the 6th International Conference on Electronic Voting: Verifying the Vote, 2014

Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

Scalability, fidelity and stealth in the DRAKVUF dynamic malware analysis system.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
How to Keep a Secret: Leakage Deterring Public-key Cryptography.
IACR Cryptology ePrint Archive, 2013

Scaling Privacy Guarantees in Code-Verification Elections.
Proceedings of the E-Voting and Identify, 2013

Malicious takeover of voting systems: arbitrary code execution on optical scan voting terminals.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning.
Proceedings of the Network and System Security - 7th International Conference, 2013

Resource-based corruptions and the combinatorics of hidden diversity.
Proceedings of the Innovations in Theoretical Computer Science, 2013

Electronic Voting Systems - From Theory to Implementation.
Proceedings of the E-Democracy, Security, Privacy and Trust in a Digital World, 2013

How to keep a secret: leakage deterring public-key cryptosystems.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Delegatable pseudorandom functions and applications.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Resource Access Control in the Facebook Model.
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013

Tamper Resilient Circuits: The Adversary at the Gates.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2012
Exact In-Network Aggregation with Integrity and Confidentiality.
IEEE Trans. Knowl. Data Eng., 2012

Generic Construction of Trace and Revoke Schemes.
IACR Cryptology ePrint Archive, 2012

The Strong At-Most-Once Problem.
Proceedings of the Distributed Computing - 26th International Symposium, 2012

Virtual Machine Introspection in a Hybrid Honeypot Architecture.
Proceedings of the 5th Workshop on Cyber Security Experimentation and Test, 2012

I Forgot Your Password: Randomness Attacks Against PHP Applications.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Integrity of electronic voting systems: fallacious use of cryptography.
Proceedings of the ACM Symposium on Applied Computing, 2012

Lower Bounds for Private Broadcast Encryption.
Proceedings of the Information Hiding - 14th International Conference, 2012

Key-Efficient Steganography.
Proceedings of the Information Hiding - 14th International Conference, 2012

Solving the At-Most-Once Problem with Nearly Optimal Effectiveness.
Proceedings of the Distributed Computing and Networking - 13th International Conference, 2012

2011
Key Generation Using Physical Properties of Wireless Communication.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Solving the at-most-once problem with nearly optimal effectiveness.
Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, 2011

Attacking Traitor Tracing Schemes Using History Recording and Abrupt Decoders.
Proceedings of the Information Security, 14th International Conference, 2011

Secure and efficient in-network processing of exact SUM queries.
Proceedings of the 27th International Conference on Data Engineering, 2011

On passive inference attacks against physical-layer key extraction?
Proceedings of the Fourth European Workshop on System Security, 2011

On the Effects of Pirate Evolution on the Design of Digital Content Distribution Systems.
Proceedings of the Coding and Cryptology - Third International Workshop, 2011

BiTR: Built-in Tamper Resilience.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
Encryption for Digital Content
Advances in Information Security 52, Springer, ISBN: 978-1-4419-0043-2, 2010

Electronic Voting.
Proceedings of the Handbook of Financial Cryptography and Security., 2010

The Vector-Ballot Approach for Online Voting Procedures.
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010

Multi-query Computationally-Private Information Retrieval with Constant Communication Rate.
Proceedings of the Public Key Cryptography, 2010

Tree-Homomorphic Encryption and Scalable Hierarchical Secret-Ballot Elections.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

RLCPS Preface.
Proceedings of the Financial Cryptography and Data Security, 2010

Robust fingerprinting codes: a near optimal construction.
Proceedings of the 10th ACM Workshop on Digital Rights Management, 2010

A Framework for the Sound Specification of Cryptographic Tasks.
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010

Improving the Round Complexity of Traitor Tracing Schemes.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
State-wide elections, optical scan voting systems, and the pursuit of integrity.
IEEE Trans. Information Forensics and Security, 2009

At-Most-Once Semantics in Asynchronous Shared Memory.
Proceedings of the Distributed Computing, 23rd International Symposium, 2009

Automating Voting Terminal Event Log Analysis.
Proceedings of the 2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2009

At-most-once semantics in asynchronous shared memory.
Proceedings of the SPAA 2009: Proceedings of the 21st Annual ACM Symposium on Parallelism in Algorithms and Architectures, 2009

Taking total control of voting systems: firmware manipulations on an optical scan voting terminal.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Zero-Knowledge Proofs with Witness Elimination.
Proceedings of the Public Key Cryptography, 2009

Robust fingerprinting codes and applications.
Proceedings of the Media Forensics and Security I, 2009

Secure Function Collection with Sublinear Storage.
Proceedings of the Automata, Languages and Programming, 36th Internatilonal Colloquium, 2009

Privacy-Preserving Information Markets for Computing Statistical Data.
Proceedings of the Financial Cryptography and Data Security, 2009

On the Portability of Generalized Schnorr Proofs.
Proceedings of the Advances in Cryptology, 2009

On the security of a public-key traitor tracing scheme with sublinear ciphertext size.
Proceedings of the 9th ACM Workshop on Digital Rights Management, 2009

Tracing and Revoking Pirate Rebroadcasts.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

2008
Pre-Election Testing and Post-Election Audit of Optical Scan Voting Terminal Memory Cards.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008

Equivocal Blind Signatures and Adaptive UC-Security.
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008

Privacy Preserving Data Mining within Anonymous Credential Systems.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008

Public-key traitor tracing from efficient decoding and unbounded enrollment: extended abstract.
Proceedings of the 8th ACM Workshop on Digital Rights Management, 2008

Sound and Fine-grain Specification of Ideal Functionalities.
Proceedings of the Theoretical Foundations of Practical Information Security, 30.11., 2008

2007
Decoding interleaved Reed-Solomon codes over noisy channels.
Theor. Comput. Sci., 2007

An Authentication and Ballot Layout Attack Against an Optical Scan Voting Terminal.
Proceedings of the 2007 USENIX/ACCURATE Electronic Voting Technology Workshop, 2007

Trading Static for Adaptive Security in Universally Composable Zero-Knowledge.
Proceedings of the Automata, Languages and Programming, 34th International Colloquium, 2007

Hidden Identity-Based Signatures.
Proceedings of the Financial Cryptography and Data Security, 2007

Pirate Evolution: How to Make the Most of Your Traitor Keys.
Proceedings of the Advances in Cryptology, 2007

Robust key generation from signal envelopes in wireless networks.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

Group Encryption.
Proceedings of the Advances in Cryptology, 2007

Tampering with Special Purpose Trusted Computing Devices: A Case Study in Optical Scan E-Voting.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
Secure scalable group signature with dynamic joins and separable authorities.
IJSN, 2006

Copyrighting Public-key Functions and Applications to Black-box Traitor Tracing.
IACR Cryptology ePrint Archive, 2006

Concurrent Blind Signatures Without Random Oracles.
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006

Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination.
Proceedings of the Financial Cryptography and Data Security, 2006

An Internet Voting System Supporting User Privacy.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

Syntax-Driven Private Evaluation of Quantified Membership Queries.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
A Solution for Wireless Privacy and Payments based on E-cash.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers.
Proceedings of the Progress in Cryptology, 2005

Efficient Steganography with Provable Security Guarantees.
Proceedings of the Information Hiding, 7th International Workshop, 2005

Cryptography and decoding Reed-Solomon codes as a hard problem.
Proceedings of the IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005

Asynchronous Perfectly Secure Communication over One-Time Pads.
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005

Testing Disjointness of Private Datasets.
Proceedings of the Financial Cryptography and Data Security, 2005

Group Signatures with Efficient Concurrent Join.
Proceedings of the Advances in Cryptology, 2005

2004
Group Signatures: Provable Security, Efficient Constructions and Anonymity from Trapdoor-Holders.
IACR Cryptology ePrint Archive, 2004

The Vector-Ballot e-Voting Approach.
Proceedings of the Financial Cryptography, 2004

Traceable Signatures.
Proceedings of the Advances in Cryptology, 2004

Anonymous Identification in Ad Hoc Groups.
Proceedings of the Advances in Cryptology, 2004

Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice.
Proceedings of the Advances in Cryptology, 2004

2003
Robust Verifiable non-Interactive Zero-Sharing - A Plug-in Utility for Enhanced Voters' Privacy.
Proceedings of the Secure Electronic Voting, 2003

Scalable public-key tracing and revoking.
Proceedings of the Twenty-Second ACM Symposium on Principles of Distributed Computing, 2003

Decoding of Interleaved Reed Solomon Codes over Noisy Data.
Proceedings of the Automata, Languages and Programming, 30th International Colloquium, 2003

Non-interactive Zero-Sharing with Applications to Private Distributed Decision Making.
Proceedings of the Financial Cryptography, 2003

Extracting Group Signatures from Traitor Tracing Schemes.
Proceedings of the Advances in Cryptology, 2003

2002
Cryptographic Hardness based on the Decoding of Reed-Solomon Codes with Applications
Electronic Colloquium on Computational Complexity (ECCC), 2002

Self-tallying Elections and Perfect Ballot Secrecy.
Proceedings of the Public Key Cryptography, 2002

Cryptographic Hardness Based on the Decoding of Reed-Solomon Codes.
Proceedings of the Automata, Languages and Programming, 29th International Colloquium, 2002

Traitor Tracing with Constant Transmission Rate.
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002

Breaking and Repairing Asymmetric Public-Key Traitor Tracing.
Proceedings of the Security and Privacy in Digital Rights Management, 2002

2001
Polynomial Reconstruction Based Cryptography.
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001

Acceptor-Definable Counting Classes.
Proceedings of the Advances in Informatics, 8th Panhellenic Conference on Informatics, 2001

Secure Games with Polynomial Expressions.
Proceedings of the Automata, Languages and Programming, 28th International Colloquium, 2001

Self Protecting Pirates and Black-Box Traitor Tracing.
Proceedings of the Advances in Cryptology, 2001

On Crafty Pirates and Foxy Tracers.
Proceedings of the Security and Privacy in Digital Rights Management, 2001


  Loading...