Julian Loss

Orcid: 0000-0002-7979-3810

Affiliations:
  • CISPA Helmholtz Center for Information Security, Saarbrücken, Germany
  • Ruhr University Bochum, Germany (PhD 2019)


According to our database1, Julian Loss authored at least 91 papers between 2016 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Network agnostic consensus in constant time.
IACR Cryptol. ePrint Arch., 2025

Dimensional eROSion: Improving the ROS Attack with Decomposition in Higher Bases.
IACR Cryptol. ePrint Arch., 2025

Towards Optimal Early Stopping Agreement Protocols.
IACR Cryptol. ePrint Arch., 2025

Early Stopping is Cheap.
IACR Cryptol. ePrint Arch., 2025

Minicrypt PIR for Big Batches.
IACR Cryptol. ePrint Arch., 2025

Asynchronous YOSO a la Paillier.
IACR Cryptol. ePrint Arch., 2025

Secure Showing of Partial Attributes.
IACR Cryptol. ePrint Arch., 2025

Adaptively Secure Partially Non-Interactive Threshold Schnorr Signatures in the AGM.
IACR Cryptol. ePrint Arch., 2025

Nearly Quadratic Asynchronous Distributed Key Generation.
IACR Cryptol. ePrint Arch., 2025

Sublinear-Round Broadcast without Trusted Setup.
Proceedings of the 2025 Annual ACM-SIAM Symposium on Discrete Algorithms, 2025

Kleptographic Attacks Against Implicit Rejection.
Proceedings of the Public-Key Cryptography - PKC 2025, 2025

Glacius: Threshold Schnorr Signatures from DDH with Full Adaptive Security.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

Nearly Optimal Parallel Broadcast in the Plain Public Key Model.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

Leader Election with Poly-Logarithmic Communication Per Party.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

Adaptively Secure Three-Round Threshold Schnorr Signatures from DDH.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

BIP32-Compatible Threshold Wallets.
Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, 2025

2024
Optimal Consensus in the Presence of Overlapping Faults and Total Omission.
IACR Cryptol. ePrint Arch., 2024

A Concrete Analysis of Wagner's k-List Algorithm over ℤ<sub>p</sub>.
IACR Cryptol. ePrint Arch., 2024

Ipotane: Achieving the Best of All Worlds in Asynchronous BFT.
IACR Cryptol. ePrint Arch., 2024

Towards Optimal Parallel Broadcast under a Dishonest Majority.
IACR Cryptol. ePrint Arch., 2024

Next-Generation Secure Distributed Computing (Dagstuhl Seminar 24362).
Dagstuhl Reports, 2024

Consensus in the Presence of Overlapping Faults and Total Omission.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

Sweep-UC: Swapping Coins Privately.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Round Efficient Byzantine Agreement from VDFs.
Proceedings of the Security and Cryptography for Networks - 14th International Conference, 2024

Efficient Agreement Over Byzantine Gossip.
Proceedings of the Financial Cryptography and Data Security, 2024

Early Stopping for Any Number of Corruptions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

A Holistic Security Analysis of Monero Transactions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

Twinkle: Threshold Signatures from DDH with Full Adaptive Security.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

Breaking RSA Generically Is Equivalent to Factoring, with Preprocessing.
Proceedings of the 5th Conference on Information-Theoretic Cryptography, 2024

Blind Multisignatures for Anonymous Tokens with Decentralized Issuance.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

GRandLine: Adaptively Secure DKG and Randomness Beacon with (Log-)Quadratic Communication Complexity.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Early Stopping Byzantine Agreement in (1+ε ) · f Rounds.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

HARTS: High-Threshold, Adaptively Secure, and Robust Threshold Schnorr Signatures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
BIP32-Compatible Threshold Wallets.
IACR Cryptol. ePrint Arch., 2023

Analyzing the Real-World Security of the Algorand Blockchain.
IACR Cryptol. ePrint Arch., 2023

GRandLine: Adaptively Secure DKG and Randomness Beacon with (Almost) Quadratic Communication Complexity.
IACR Cryptol. ePrint Arch., 2023

Zombies and Ghosts: Optimal Byzantine Agreement in the Presence of Omission Faults.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

Token meets Wallet: Formalizing Privacy and Revocation for FIDO2.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Transparent Batchable Time-lock Puzzles and Applications to Byzantine Consensus.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

Rai-Choo! Evolving Blind Signatures to the Next Level.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Network-Agnostic Security Comes (Almost) for Free in DKG and MPC.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Concurrent Security of Anonymous Credentials Light, Revisited.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Analyzing the Real-World Security of the Algorand Blockchain.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Abraxas: Throughput-Efficient Hybrid Asynchronous Consensus.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Adaptively Secure (Aggregatable) PVSS and Application to Distributed Randomness Beacons.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

A New Look at Blockchain Leader Election: Simple, Efficient, Sustainable and Post-Quantum.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
PI-Cut-Choo! Parallel Instance Cut and Choose for Practical Blind Signatures.
IACR Cryptol. ePrint Arch., 2022

A New Look at Blockchain Leader Election: Simple, Efficient, Sustainable and Post-Quantum.
IACR Cryptol. ePrint Arch., 2022

Breaking RSA Generically is Equivalent to Factoring, with Preprocessing.
IACR Cryptol. ePrint Arch., 2022

Network-Agnostic Security Comes for Free in DKG and MPC.
IACR Cryptol. ePrint Arch., 2022

Sublinear-round Broadcast without trusted setup against dishonest majority.
IACR Cryptol. ePrint Arch., 2022

Optimal Clock Synchronization with Signatures.
Proceedings of the PODC '22: ACM Symposium on Principles of Distributed Computing, Salerno, Italy, July 25, 2022

On Pairing-Free Blind Signature Schemes in the Algebraic Group Model.
Proceedings of the Public-Key Cryptography - PKC 2022, 2022

Gossiping for Communication-Efficient Broadcast.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

PI-Cut-Choo and Friends: Compact Blind Signatures via Parallel Instance Cut-and-Choose and More.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

(Nondeterministic) Hardness vs. Non-malleability.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

On the Adaptive Security of the Threshold BLS Signature Scheme.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

The Abe-Okamoto Partially Blind Signature Scheme Revisited.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

Efficient Adaptively-Secure Byzantine Agreement for Long Messages.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

State Machine Replication Under Changing Network Conditions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

How Byzantine is a Send Corruption?
Proceedings of the Applied Cryptography and Network Security, 2022

2021
A New Way to Achieve Round-Efficient Byzantine Agreement.
Proceedings of the PODC '21: ACM Symposium on Principles of Distributed Computing, 2021

On the (in)security of ROS.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

The Exact Security of BIP32 Wallets.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Boosting the Security of Blind Signature Schemes.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

Tardigrade: An Atomic Broadcast Protocol for Arbitrary Network Conditions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

Algebraic Adversaries in the Universal Composability Framework.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
Nearly Quadratic Broadcast Without Trusted Setup Under Dishonest Majority.
IACR Cryptol. ePrint Arch., 2020

On the Security of Time-Locked Puzzles and Timed Commitments.
IACR Cryptol. ePrint Arch., 2020

On Pairing-Free Blind Signature Schemes in the Algebraic Group Model.
IACR Cryptol. ePrint Arch., 2020

Network-Agnostic State Machine Replication.
IACR Cryptol. ePrint Arch., 2020

On the Security of Time-Lock Puzzles and Timed Commitments.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Asynchronous Byzantine Agreement with Subquadratic Communication.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Lattice-Based Blind Signatures, Revisited.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

Always Have a Backup Plan: Fully Secure Synchronous MPC with Asynchronous Fallback.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

A Classification of Computational Assumptions in the Algebraic Group Model.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

MPC with Synchronous Security and Asynchronous Responsiveness.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
New techniques for the modular analysis of digital signature schemes.
PhD thesis, 2019

Robust MPC: Asynchronous Responsiveness yet Synchronous Security.
IACR Cryptol. ePrint Arch., 2019

Synchronous Consensus with Optimal Asynchronous Fallback Guarantees.
Proceedings of the Theory of Cryptography - 17th International Conference, 2019

On the Security of Two-Round Multi-Signatures.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

A Modular Treatment of Blind Signatures from Identification Schemes.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

A Formal Treatment of Deterministic Wallets.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Combining Asynchronous and Synchronous Byzantine Agreement: The Best of Both Worlds.
IACR Cryptol. ePrint Arch., 2018

Strong Separations Between Broadcast and Authenticated Channels.
Proceedings of the 32nd International Symposium on Distributed Computing, 2018

The Algebraic Group Model and its Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

2017
The Algebraic Group Model and its Applications.
IACR Cryptol. ePrint Arch., 2017

Efficient and Universally Composable Protocols for Oblivious Transfer from the CDH Assumption.
IACR Cryptol. ePrint Arch., 2017

Efficient Algorithms for Broadcast and Consensus Based on Proofs of Work.
IACR Cryptol. ePrint Arch., 2017

Tightly-Secure Signatures from Five-Move Identification Protocols.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
Hierarchy of three-party consistency specifications.
Proceedings of the IEEE International Symposium on Information Theory, 2016


  Loading...