Foteini Baldimtsi

According to our database1, Foteini Baldimtsi authored at least 27 papers between 2007 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Guest Editorial Special Issue on Blockchain and Economic Knowledge Automation.
IEEE Trans. Systems, Man, and Cybernetics: Systems, 2020

2019
Leakage-resilient lattice-based partially blind signatures.
IET Information Security, 2019

Diversification Across Mining Pools: Optimal Mining Strategies under PoW.
CoRR, 2019

Efficient Noninteractive Certification of RSA Moduli and Beyond.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
Certifying RSA Public Keys with an Efficient NIZK.
IACR Cryptology ePrint Archive, 2018

Universally Composable Accumulators.
IACR Cryptology ePrint Archive, 2018

Blockchains, Smart Contracts and Future Applications (Dagstuhl Seminar 18152).
Dagstuhl Reports, 2018

2017
Watermarking Public-key Cryptographic Functionalities and Implementations.
IACR Cryptology ePrint Archive, 2017

Accumulators with Applications to Anonymity-Preserving Revocation.
IACR Cryptology ePrint Archive, 2017

TumbleBit: An Untrusted Bitcoin-Compatible Anonymous Payment Hub.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Server-Aided Secure Computation with Off-line Parties.
Proceedings of the Computer Security - ESORICS 2017, 2017

2016
Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain Bitcoin Transactions.
IACR Cryptology ePrint Archive, 2016

TumbleBit: An Untrusted Tumbler for Bitcoin-Compatible Anonymous Payments.
IACR Cryptology ePrint Archive, 2016

Secure Computation in Online Social Networks.
IACR Cryptology ePrint Archive, 2016

2015
Cryptographic Theory Meets Practice: Efficient and Privacy-Preserving Payments for Public Transport.
ACM Trans. Inf. Syst. Secur., 2015

Indistinguishable Proofs of Work or Knowledge.
IACR Cryptology ePrint Archive, 2015

Anonymous Transferable E-Cash.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

Sorting and Searching Behind the Curtain.
Proceedings of the Financial Cryptography and Data Security, 2015

Recovering Lost Device-Bound Credentials.
Proceedings of the Applied Cryptography and Network Security, 2015

2014
Sorting and Searching Behind the Curtain: Private Outsourced Sort and Frequency-Based Ranking of Search Results Over Encrypted Data.
IACR Cryptology ePrint Archive, 2014

2013
Efficient E-Cash in Practice: NFC-Based Payments for Public Transportation Systems.
Proceedings of the Privacy Enhancing Technologies - 13th International Symposium, 2013

P4R: Privacy-Preserving Pre-Payments with Refunds for Transportation Systems.
Proceedings of the Financial Cryptography and Data Security, 2013

2012
Anonymous Credentials Light.
IACR Cryptology ePrint Archive, 2012

On The Security of One-Witness Blind Signature Schemes.
IACR Cryptology ePrint Archive, 2012

2010
Attacks on the AKACP Protocol.
IACR Cryptology ePrint Archive, 2010

2008
An Implementation Infrastructure for Server-Passive Timed-Release Cryptography.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols.
Proceedings of the E-business and Telecommunications - 4th International Conference, 2007


  Loading...