Daniel Tschudi

Orcid: 0000-0001-6188-1049

According to our database1, Daniel Tschudi authored at least 32 papers between 2013 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
MAESTRO: Multi-party AES using Lookup Tables.
Dataset, April, 2025

MAESTRO: Multi-party AES using Lookup Tables.
Dataset, January, 2025

MAESTRO: Multi-party AES using Lookup Tables.
Dataset, January, 2025

2024
MAESTRO: Multi-party AES using Lookup Tables.
IACR Cryptol. ePrint Arch., 2024

Efficient Secure Communication over Dynamic Incomplete Networks with Minimal Connectivity.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

2023
Verifiable proofs for the energy supply chain: small proofs brings you a long way.
Energy Inform., January, 2023

Fiat-Shamir Bulletproofs are Non-Malleable (in the Random Oracle Model).
IACR Cryptol. ePrint Arch., 2023

Witness-Succinct Universally-Composable SNARKs.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Secure Communication in Dynamic Incomplete Networks.
Proceedings of the 4th Conference on Information-Theoretic Cryptography, 2023

2022
Enig: Player Replaceable Finality Layers with Optimal Validity.
IACR Cryptol. ePrint Arch., 2022

Fiat-Shamir Bulletproofs are Non-Malleable (in the Algebraic Group Model).
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

GearBox: Optimal-size Shard Committees by Leveraging the Safety-Liveness Dichotomy.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Fiatâ€"Shamir Bulletproofs are Non-Malleable (in the Algebraic Group Model).
IACR Cryptol. ePrint Arch., 2021

GearBox: An Efficient UC Sharded Ledger Leveraging the Safety-Liveness Dichotomy.
IACR Cryptol. ePrint Arch., 2021

Weight-Based Nakamoto-Style Blockchains.
Proceedings of the Progress in Cryptology - LATINCRYPT 2021, 2021

Reparo: Publicly Verifiable Layer to Repair Blockchains.
Proceedings of the Financial Cryptography and Data Security, 2021

Virtual ASICs: Generalized Proof-of-Stake Mining in Cryptocurrencies.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2021

2020
Leveraging Weight Functions for Optimistic Responsiveness in Blockchains.
IACR Cryptol. ePrint Arch., 2020

Afgjort: A Partially Synchronous Finality Layer for Blockchains.
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020

Topology-Hiding Computation for Networks with Unknown Delays.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020

MPC with Synchronous Security and Asynchronous Responsiveness.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Robust MPC: Asynchronous Responsiveness yet Synchronous Security.
IACR Cryptol. ePrint Arch., 2019

Afgjort - A Semi-Synchronous Finality Layer for Blockchains.
IACR Cryptol. ePrint Arch., 2019

Proof-of-Stake Protocols for Privacy-Aware Blockchains.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

2018
Strong Separations Between Broadcast and Authenticated Channels.
Proceedings of the 32nd International Symposium on Distributed Computing, 2018

Topology-Hiding Computation Beyond Semi-Honest Adversaries.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

But Why Does It Work? A Rational Protocol Design Treatment of Bitcoin.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

2017
Witness-hiding proofs of knowledge for cable locks.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Bitcoin as a Transaction Ledger: A Composable Treatment.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

2016
Hierarchy of three-party consistency specifications.
Proceedings of the IEEE International Symposium on Information Theory, 2016

Network-Hiding Communication and Applications to Multi-party Protocols.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

2013
Efficient General-Adversary Multi-Party Computation.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013


  Loading...