Konstantinos Chalkias

According to our database1, Konstantinos Chalkias authored at least 43 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SoK: Zero-Knowledge Range Proofs.
IACR Cryptol. ePrint Arch., 2024

An Efficient Hash Function for Imaginary Class Groups.
IACR Cryptol. ePrint Arch., 2024

Fastcrypto: Pioneering Cryptography Via Continuous Benchmarking.
IACR Cryptol. ePrint Arch., 2024

zkLogin: Privacy-Preserving Blockchain Authentication with Existing Credentials.
CoRR, 2024

2023
SoK: Web3 Recovery Mechanisms.
IACR Cryptol. ePrint Arch., 2023

Subset-optimized BLS Multi-signature with Key Aggregation.
IACR Cryptol. ePrint Arch., 2023

Building Random, Fair, and Verifiable Games on Blockchain. Raffle smart contract designs on Sui Network.
CoRR, 2023

Double Public Key Signing Function Oracle Attack on EdDSA Software Implementations.
CoRR, 2023

Double Public Key Signing Function Oracle Attack on EdDSA Software Implementations.
Proceedings of the 28th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks , 2023

STROBE: Streaming Threshold Random Beacons.
Proceedings of the 5th Conference on Advances in Financial Technologies, 2023

2022
Base64 Malleability in Practice.
IACR Cryptol. ePrint Arch., 2022

Broken Proofs of Solvency in Blockchain Custodial Wallets and Exchanges.
IACR Cryptol. ePrint Arch., 2022

Truncator: Time-space Tradeoff of Cryptographic Primitives.
IACR Cryptol. ePrint Arch., 2022

Aggregating and Thresholdizing Hash-based Signatures using STARKs.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
HashWires: Hyperefficient Credential-Based Range Proofs.
Proc. Priv. Enhancing Technol., 2021

Aggregating hash-based signatures using STARKs.
IACR Cryptol. ePrint Arch., 2021

Generalized Proof of Liabilities.
IACR Cryptol. ePrint Arch., 2021

Homomorphic decryption in blockchains via compressed discrete-log lookup tables.
IACR Cryptol. ePrint Arch., 2021

Proof of Assets in the Diem Blockchain.
IACR Cryptol. ePrint Arch., 2021

SoK: Blockchain Light Clients.
IACR Cryptol. ePrint Arch., 2021

SoK: Auditability and Accountability in Distributed Payment Systems.
IACR Cryptol. ePrint Arch., 2021

Non-interactive half-aggregation of EdDSA and variants of Schnorr signatures.
IACR Cryptol. ePrint Arch., 2021

Reactive Key-Loss Protection in Blockchains.
IACR Cryptol. ePrint Arch., 2021

STROBE: Stake-based Threshold Random Beacons.
IACR Cryptol. ePrint Arch., 2021

2020
Distributed Auditing Proofs of Liabilities.
IACR Cryptol. ePrint Arch., 2020

Taming the many EdDSAs.
IACR Cryptol. ePrint Arch., 2020

2018
Blockchained Post-Quantum Signatures.
IACR Cryptol. ePrint Arch., 2018

2016
Going Beyond the Coinbase Transaction Fee: Alternative Reward Schemes for Miners in Blockchain Systems.
Proceedings of the 20th Pan-Hellenic Conference on Informatics, 2016

2012
A Compatible Implementation between Identity-based and Certificateless Encryption Schemes.
Proceedings of the WEBIST 2012 - Proceedings of the 8th International Conference on Web Information Systems and Technologies, Porto, Portugal, 18, 2012

The Concept of Compatibility between Identity-based and Certificateless Encryption Schemes.
Proceedings of the SECRYPT 2012, 2012

2010
Secure cryptographic protocols and applications based on bilinear pairings
PhD thesis, 2010

Attacks on the AKACP Protocol.
IACR Cryptol. ePrint Arch., 2010

Parallel Collection of Live Data Using Hadoop.
Proceedings of the 14th Panhellenic Conference on Informatics, 2010

Practical Implementation of Identity Based Encryption for Secure E-mail Communication.
Proceedings of the 14th Panhellenic Conference on Informatics, 2010

2008
Surveying Wi-Fi Security - Presentation of Wi-Fi Security Measures, Varius Wi-Fi Attacks and a Classification Survey of Wi-Fi Networks in Thessaloniki.
Proceedings of the WINSYS 2008, 2008

An Implementation Infrastructure for Server-Passive Timed-Release Cryptography.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
On the Key-Compromise Impersonation Vulnerability of One-Pass Key Establishment Protocols.
Proceedings of the SECRYPT 2007, 2007

Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols.
Proceedings of the E-business and Telecommunications - 4th International Conference, 2007

Improved Anonymous Timed-Release Encryption.
Proceedings of the Computer Security, 2007

A Provably Secure One-Pass Two-Party Key Establishment Protocol.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

Low-cost Anonymous Timed-Release Encryption.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2006
Timed Release Cryptography from Bilinear Pairings Using Hash Chains.
Proceedings of the Communications and Multimedia Security, 2006

2005
Implementing Authentication Protocol for Exchanging Encrypted Messages via an Authentication Server based on Elliptic Curve Cryptography with the ElGamal's Algorithm.
Proceedings of the International Enformatika Conference, 2005


  Loading...