Aggelos Kiayias

According to our database1, Aggelos Kiayias authored at least 199 papers between 2001 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2020
The combinatorics of hidden diversity.
Theor. Comput. Sci., 2020

Consistency in Proof-of-Stake Blockchains with Concurrent Honest Slot Leaders.
IACR Cryptol. ePrint Arch., 2020

Kachina - Foundations of Private Smart Contracts.
IACR Cryptol. ePrint Arch., 2020

Mining for Privacy: How to Bootstrap a Snarky Blockchain.
IACR Cryptol. ePrint Arch., 2020

Smart Contract Derivatives.
IACR Cryptol. ePrint Arch., 2020

Account Management in Proof of Stake Ledgers.
IACR Cryptol. ePrint Arch., 2020

Securing Proof-of-Work Ledgers via Checkpointing.
IACR Cryptol. ePrint Arch., 2020

Tight Consistency Bounds for Bitcoin.
IACR Cryptol. ePrint Arch., 2020

Full Analysis of Nakamoto Consensus in Bounded-Delay Networks.
IACR Cryptol. ePrint Arch., 2020

Ledger Combiners for Fast Settlement.
IACR Cryptol. ePrint Arch., 2020

Proof-of-Stake Blockchain Protocols with Near-Optimal Throughput.
IACR Cryptol. ePrint Arch., 2020

A Gas-Efficient Superlight Bitcoin Client in Solidity.
IACR Cryptol. ePrint Arch., 2020

Updatable Blockchains.
IACR Cryptol. ePrint Arch., 2020

Hydra: Fast Isomorphic State Channels.
IACR Cryptol. ePrint Arch., 2020

Crowd Verifiable Zero-Knowledge and End-to-end Verifiable Multiparty Computation.
IACR Cryptol. ePrint Arch., 2020

Consistency for Functional Encryption.
IACR Cryptol. ePrint Arch., 2020

One-shot Signatures and Applications to Hybrid Quantum/Classical Authentication.
IACR Cryptol. ePrint Arch., 2020

Coalition-Safe Equilibria with Virtual Payoffs.
CoRR, 2020

The Combinatorics of the Longest-Chain Rule: Linear Consistency for Proof-of-Stake Blockchains.
Proceedings of the 2020 ACM-SIAM Symposium on Discrete Algorithms, 2020

Resource-Restricted Cryptography: Revisiting MPC Bounds in the Proof-of-Work Era.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Consensus from Signatures of Work.
Proceedings of the Topics in Cryptology - CT-RSA 2020, 2020

2019
SoK: Communication Across Distributed Ledgers.
IACR Cryptol. ePrint Arch., 2019

A Composable Security Treatment of the Lightning Network.
IACR Cryptol. ePrint Arch., 2019

Proof-of-Burn.
IACR Cryptol. ePrint Arch., 2019

Compact Storage of Superblocks for NIPoPoW Applications.
IACR Cryptol. ePrint Arch., 2019

Iterated Search Problems and Blockchain Security under Falsifiable Assumptions.
IACR Cryptol. ePrint Arch., 2019

Resource-Restricted Cryptography: Honest-Majority MPC from a CRS (and No Broadcast).
IACR Cryptol. ePrint Arch., 2019

The Bitcoin Backbone Protocol Against Quantum Adversaries.
IACR Cryptol. ePrint Arch., 2019

Ouroboros Chronos: Permissionless Clock Synchronization via Proof-of-Stake.
IACR Cryptol. ePrint Arch., 2019

A Formal Treatment of Hardware Wallets.
IACR Cryptol. ePrint Arch., 2019

Timed Signatures and Zero-Knowledge Proofs -Timestamping in the Blockchain Era-.
IACR Cryptol. ePrint Arch., 2019

Linear Consistency for Proof-of-Stake Blockchains.
CoRR, 2019

Cryptocurrency Egalitarianism: A Quantitative Approach.
CoRR, 2019

Distributed, end-to-end verifiable, and privacy-preserving internet voting systems.
Comput. Secur., 2019

On the Practicality of a Smart Contract PKI.
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2019

2018
Towards a Smart Contract-based, Decentralized, Public-Key Infrastructure.
IACR Cryptol. ePrint Arch., 2018

Proof-of-Work Sidechains.
IACR Cryptol. ePrint Arch., 2018

Ouroboros-BFT: A Simple Byzantine Fault Tolerant Consensus Protocol.
IACR Cryptol. ePrint Arch., 2018

Space Efficient Computational Multi-Secret Sharing and Its Applications.
IACR Cryptol. ePrint Arch., 2018

Non-Malleable Codes for Partial Functions with Manipulation Detection.
IACR Cryptol. ePrint Arch., 2018

On the Security Properties of e-Voting Bulletin Boards.
IACR Cryptol. ePrint Arch., 2018

Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake.
IACR Cryptol. ePrint Arch., 2018

Proof-of-Stake Sidechains.
IACR Cryptol. ePrint Arch., 2018

Stake-Bleeding Attacks on Proof-of-Stake Blockchains.
IACR Cryptol. ePrint Arch., 2018

SoK: A Consensus Taxonomy in the Blockchain Era.
IACR Cryptol. ePrint Arch., 2018

Parallel Chains: Improving Throughput and Latency of Blockchain Protocols via Parallel Composition.
IACR Cryptol. ePrint Arch., 2018

A Universally Composable Framework for the Privacy of Email Ecosystems.
IACR Cryptol. ePrint Arch., 2018

Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability.
IACR Cryptol. ePrint Arch., 2018

Structure and Content of the Visible Darknet.
CoRR, 2018

A Puff of Steem: Security Analysis of Decentralized Content Curation.
CoRR, 2018

Reward Sharing Schemes for Stake Pools.
CoRR, 2018

Secure Outsourcing of Cryptographic Circuits Manufacturing.
Proceedings of the Provable Security, 2018

Bootstrapping the Blockchain, with Applications to Consensus and Fast PKI Setup.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

2017
Auditing for privacy in threshold PKE e-voting.
Inf. Comput. Secur., 2017

An Efficient E2E Verifiable E-voting System without Setup Assumptions.
IEEE Secur. Priv., 2017

Forkable Strings are Rare.
IACR Cryptol. ePrint Arch., 2017

Non-Interactive Proofs of Proof-of-Work.
IACR Cryptol. ePrint Arch., 2017

Practical Non-Malleable Codes from ℓ-more Extractable Hash Functions.
IACR Cryptol. ePrint Arch., 2017

TOPPSS: Cost-minimal Password-Protected Secret Sharing based on Threshold OPRF.
IACR Cryptol. ePrint Arch., 2017

Proofs of Work for Blockchain Protocols.
IACR Cryptol. ePrint Arch., 2017

Ouroboros Praos: An adaptively-secure, semi-synchronous proof-of-stake protocol.
IACR Cryptol. ePrint Arch., 2017

Watermarking Public-key Cryptographic Functionalities and Implementations.
IACR Cryptol. ePrint Arch., 2017

MCMix: Anonymous Messaging via Secure Multiparty Computation.
IACR Cryptol. ePrint Arch., 2017

Low-Level Attacks in Bitcoin Wallets.
Proceedings of the Information Security - 20th International Conference, 2017

Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

2016
On the Security of Key Extraction From Measuring Physical Quantities.
IEEE Trans. Inf. Forensics Secur., 2016

On Trees, Chains and Fast Transactions in the Blockchain.
IACR Cryptol. ePrint Arch., 2016

A Provably Secure Proof-of-Stake Blockchain Protocol.
IACR Cryptol. ePrint Arch., 2016

Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online).
IACR Cryptol. ePrint Arch., 2016

Bootstrapping the Blockchain - Directly.
IACR Cryptol. ePrint Arch., 2016

The Bitcoin Backbone Protocol with Chains of Variable Difficulty.
IACR Cryptol. ePrint Arch., 2016

Secure Outsourcing of Circuit Manufacturing.
IACR Cryptol. ePrint Arch., 2016

Encrypting wireless network traces to protect user privacy: A case study for smart campus.
Proceedings of the 12th IEEE International Conference on Wireless and Mobile Computing, 2016

Securely outsourcing cookies to the cloud via private information retrieval.
Proceedings of the 12th IEEE International Conference on Wireless and Mobile Computing, 2016

Back in Black: Towards Formal, Black Box Analysis of Sanitizers and Filters.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Blockchain Mining Games.
Proceedings of the 2016 ACM Conference on Economics and Computation, 2016

D-DEMOS: A Distributed, End-to-End Verifiable, Internet Voting System.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

Proofs of Proofs of Work with Sublinear Complexity.
Proceedings of the Financial Cryptography and Data Security, 2016

Efficient Encrypted Keyword Search for Multi-user Data Sharing.
Proceedings of the Computer Security - ESORICS 2016, 2016

SFADiff: Automated Evasion Attacks and Fingerprinting Using Black-box Differential Automata Learning.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Optimal Rate Private Information Retrieval from Homomorphic Encryption.
PoPETs, 2015

Fair and Robust Multi-Party Computation using a Global Transaction Ledger.
IACR Cryptol. ePrint Arch., 2015

End-to-End Verifiable Elections in the Standard Model∗.
IACR Cryptol. ePrint Arch., 2015

Speed-Security Tradeoffs in Blockchain Protocols.
IACR Cryptol. ePrint Arch., 2015

Ceremonies for End-to-End Verifiable Elections.
IACR Cryptol. ePrint Arch., 2015

Indistinguishable Proofs of Work or Knowledge.
IACR Cryptol. ePrint Arch., 2015

A distributed, end-to-end verifiable, internet voting system.
CoRR, 2015

Distributed Parameter Generation for Bilinear Diffie Hellman Exponentiation and Applications.
Proceedings of the Information Security - 18th International Conference, 2015

Graded Signatures.
Proceedings of the Information Security - 18th International Conference, 2015

Asynchronous Adaptive Task Allocation.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Making Any Identity-Based Encryption Accountable, Efficiently.
Proceedings of the Computer Security - ESORICS 2015, 2015

On the Necessity of Auditing for Election Privacy in e-Voting Systems.
Proceedings of the E-Democracy - Citizen Rights in the World of the New Computing Paradigms, 2015

Communication Optimal Tardos-Based Asymmetric Fingerprinting.
Proceedings of the Topics in Cryptology, 2015

Traitor Deterring Schemes: Using Bitcoin as Collateral for Digital Content.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

DEMOS-2: Scalable E2E Verifiable Elections without Random Oracles.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
A One-Time Stegosystem and Applications to Efficient Covert Communication.
J. Cryptology, 2014

Near Optimal Rate Homomorphic Encryption for Branching Programs.
IACR Cryptol. ePrint Arch., 2014

Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model.
IACR Cryptol. ePrint Arch., 2014

The Bitcoin Backbone Protocol: Analysis and Applications.
IACR Cryptol. ePrint Arch., 2014

A Little Honesty Goes a Long Way: The Two-Tier Model for Secure Multiparty Computation.
IACR Cryptol. ePrint Arch., 2014

Efficient Proofs of Secure Erasure.
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014

Distributing the setup in universally composable multi-party computation.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2014

Graded Encryption, or How to Play "Who Wants To Be A Millionaire?" Distributively.
Proceedings of the Information Security - 17th International Conference, 2014

Pressing the button for European elections: verifiable e-voting and public attitudes toward internet voting in Greece.
Proceedings of the 6th International Conference on Electronic Voting: Verifying the Vote, 2014

Scalability, fidelity and stealth in the DRAKVUF dynamic malware analysis system.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Solving the at-most-once problem with nearly optimal effectiveness.
Theor. Comput. Sci., 2013

How to Keep a Secret: Leakage Deterring Public-key Cryptography.
IACR Cryptol. ePrint Arch., 2013

Tamper Resilient Circuits: The Adversary at the Gates.
IACR Cryptol. ePrint Arch., 2013

Delegatable Pseudorandom Functions and Applications.
IACR Cryptol. ePrint Arch., 2013

Scaling Privacy Guarantees in Code-Verification Elections.
Proceedings of the E-Voting and Identify - 4th International Conference, 2013

Malicious takeover of voting systems: arbitrary code execution on optical scan voting terminals.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning.
Proceedings of the Network and System Security - 7th International Conference, 2013

Electronic Voting Systems - From Theory to Implementation.
Proceedings of the E-Democracy, Security, Privacy and Trust in a Digital World, 2013

How to keep a secret: leakage deterring public-key cryptosystems.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Resource Access Control in the Facebook Model.
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013

2012
Exact In-Network Aggregation with Integrity and Confidentiality.
IEEE Trans. Knowl. Data Eng., 2012

Resource-based Corruptions and the Combinatorics of Hidden Diversity.
IACR Cryptol. ePrint Arch., 2012

Generic Construction of Trace and Revoke Schemes.
IACR Cryptol. ePrint Arch., 2012

The Strong At-Most-Once Problem.
Proceedings of the Distributed Computing - 26th International Symposium, 2012

Virtual Machine Introspection in a Hybrid Honeypot Architecture.
Proceedings of the 5th Workshop on Cyber Security Experimentation and Test, 2012

I Forgot Your Password: Randomness Attacks Against PHP Applications.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Integrity of electronic voting systems: fallacious use of cryptography.
Proceedings of the ACM Symposium on Applied Computing, 2012

Lower Bounds for Private Broadcast Encryption.
Proceedings of the Information Hiding - 14th International Conference, 2012

Key-Efficient Steganography.
Proceedings of the Information Hiding - 14th International Conference, 2012

2011
Key Generation Using Physical Properties of Wireless Communication.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Attacking Traitor Tracing Schemes Using History Recording and Abrupt Decoders.
Proceedings of the Information Security, 14th International Conference, 2011

Secure and efficient in-network processing of exact SUM queries.
Proceedings of the 27th International Conference on Data Engineering, 2011

On passive inference attacks against physical-layer key extraction?
Proceedings of the Fourth European Workshop on System Security, 2011

On the Effects of Pirate Evolution on the Design of Digital Content Distribution Systems.
Proceedings of the Coding and Cryptology - Third International Workshop, 2011

2010
Encryption for Digital Content
Advances in Information Security 52, Springer, ISBN: 978-1-4419-0043-2, 2010

Electronic Voting.
Proceedings of the Handbook of Financial Cryptography and Security., 2010

BiTR: Built-in Tamper Resilience.
IACR Cryptol. ePrint Arch., 2010

The Vector-Ballot Approach for Online Voting Procedures.
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010

Multi-query Computationally-Private Information Retrieval with Constant Communication Rate.
Proceedings of the Public Key Cryptography, 2010

Tree-Homomorphic Encryption and Scalable Hierarchical Secret-Ballot Elections.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

RLCPS Preface.
Proceedings of the Financial Cryptography and Data Security, 2010

Robust fingerprinting codes: a near optimal construction.
Proceedings of the 10th ACM Workshop on Digital Rights Management, 2010

Improving the Round Complexity of Traitor Tracing Schemes.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
State-wide elections, optical scan voting systems, and the pursuit of integrity.
IEEE Trans. Inf. Forensics Secur., 2009

Hidden identity-based signatures.
IET Information Security, 2009

On the Portability of Generalized Schnorr Proofs.
IACR Cryptol. ePrint Arch., 2009

Randomness-optimal Steganography
CoRR, 2009

Efficient Steganography with Provable Security Guarantees
CoRR, 2009

At-Most-Once Semantics in Asynchronous Shared Memory.
Proceedings of the Distributed Computing, 23rd International Symposium, 2009

Automating Voting Terminal Event Log Analysis.
Proceedings of the 2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2009

Taking total control of voting systems: firmware manipulations on an optical scan voting terminal.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Zero-Knowledge Proofs with Witness Elimination.
Proceedings of the Public Key Cryptography, 2009

Robust fingerprinting codes and applications.
Proceedings of the Media Forensics and Security I, 2009

Secure Function Collection with Sublinear Storage.
Proceedings of the Automata, Languages and Programming, 36th Internatilonal Colloquium, 2009

Privacy-Preserving Information Markets for Computing Statistical Data.
Proceedings of the Financial Cryptography and Data Security, 2009

On the security of a public-key traitor tracing scheme with sublinear ciphertext size.
Proceedings of the 9th ACM Workshop on Digital Rights Management, 2009

Tracing and Revoking Pirate Rebroadcasts.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

2008
Cryptographic Hardness Based on the Decoding of Reed-Solomon Codes.
IEEE Trans. Inf. Theory, 2008

A Framework for the Sound Specification of Cryptographic Tasks.
IACR Cryptol. ePrint Arch., 2008

Pre-Election Testing and Post-Election Audit of Optical Scan Voting Terminal Memory Cards.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008

Privacy Preserving Data Mining within Anonymous Credential Systems.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008

Public-key traitor tracing from efficient decoding and unbounded enrollment: extended abstract.
Proceedings of the 8th ACM Workshop on Digital Rights Management, 2008

Sound and Fine-grain Specification of Ideal Functionalities.
Proceedings of the Theoretical Foundations of Practical Information Security, 30.11., 2008

2007
Decoding interleaved Reed-Solomon codes over noisy channels.
Theor. Comput. Sci., 2007

Equivocal Blind Signatures and Adaptive UC-Security.
IACR Cryptol. ePrint Arch., 2007

Group Encryption.
IACR Cryptol. ePrint Arch., 2007

Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice.
Des. Codes Cryptogr., 2007

An Authentication and Ballot Layout Attack Against an Optical Scan Voting Terminal.
Proceedings of the 2007 USENIX/ACCURATE Electronic Voting Technology Workshop, 2007

Trading Static for Adaptive Security in Universally Composable Zero-Knowledge.
Proceedings of the Automata, Languages and Programming, 34th International Colloquium, 2007

Pirate Evolution: How to Make the Most of Your Traitor Keys.
Proceedings of the Advances in Cryptology, 2007

Robust key generation from signal envelopes in wireless networks.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

Tampering with Special Purpose Trusted Computing Devices: A Case Study in Optical Scan E-Voting.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
Secure scalable group signature with dynamic joins and separable authorities.
Int. J. Secur. Networks, 2006

Copyrighting Public-key Functions and Applications to Black-box Traitor Tracing.
IACR Cryptol. ePrint Arch., 2006

Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination.
Proceedings of the Financial Cryptography and Data Security, 2006

An Internet Voting System Supporting User Privacy.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

Syntax-Driven Private Evaluation of Quantified Membership Queries.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
Concurrent Blind Signatures without Random Oracles.
IACR Cryptol. ePrint Arch., 2005

Group Signatures with Efficient Concurrent Join.
IACR Cryptol. ePrint Arch., 2005

Scalable public-key tracing and revoking.
Distributed Comput., 2005

A Solution for Wireless Privacy and Payments based on E-cash.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers.
Proceedings of the Progress in Cryptology, 2005

Efficient Steganography with Provable Security Guarantees.
Proceedings of the Information Hiding, 7th International Workshop, 2005

Cryptography and decoding Reed-Solomon codes as a hard problem.
Proceedings of the IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005

Asynchronous Perfectly Secure Communication over One-Time Pads.
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005

Testing Disjointness of Private Datasets.
Proceedings of the Financial Cryptography and Data Security, 2005

2004
Group Signatures: Provable Security, Efficient Constructions and Anonymity from Trapdoor-Holders.
IACR Cryptol. ePrint Arch., 2004

Traceable Signatures.
IACR Cryptol. ePrint Arch., 2004

The Vector-Ballot e-Voting Approach.
Proceedings of the Financial Cryptography, 2004

Anonymous Identification in Ad Hoc Groups.
Proceedings of the Advances in Cryptology, 2004

2003
Robust Verifiable non-Interactive Zero-Sharing - A Plug-in Utility for Enhanced Voters' Privacy.
Proceedings of the Secure Electronic Voting, 2003

Decoding of Interleaved Reed Solomon Codes over Noisy Data.
Proceedings of the Automata, Languages and Programming, 30th International Colloquium, 2003

Non-interactive Zero-Sharing with Applications to Private Distributed Decision Making.
Proceedings of the Financial Cryptography, 2003

Extracting Group Signatures from Traitor Tracing Schemes.
Proceedings of the Advances in Cryptology, 2003

2002
Cryptographic Hardness based on the Decoding of Reed-Solomon Codes with Applications
Electronic Colloquium on Computational Complexity (ECCC), 2002

Self-tallying Elections and Perfect Ballot Secrecy.
Proceedings of the Public Key Cryptography, 2002

Traitor Tracing with Constant Transmission Rate.
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002

Breaking and Repairing Asymmetric Public-Key Traitor Tracing.
Proceedings of the Security and Privacy in Digital Rights Management, 2002

2001
Polynomial Reconstruction Based Cryptography.
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001

Acceptor-Definable Counting Classes.
Proceedings of the Advances in Informatics, 8th Panhellenic Conference on Informatics, 2001

Secure Games with Polynomial Expressions.
Proceedings of the Automata, Languages and Programming, 28th International Colloquium, 2001

Self Protecting Pirates and Black-Box Traitor Tracing.
Proceedings of the Advances in Cryptology, 2001

On Crafty Pirates and Foxy Tracers.
Proceedings of the Security and Privacy in Digital Rights Management, 2001


  Loading...