Kostas Kryptos Chalkias

Orcid: 0000-0002-3252-9975

Affiliations:
  • Mysten Labs, Palo Alto, CA, USA
  • Facebook Inc., Menlo Park, CA, USA (former)
  • R3, London, UK (2017 - 2019)
  • Erybo, San Francisco, CA, USA (2014 - 2016)
  • Safemarket, Athens, Greece (2011 - 2014)
  • University of Macedonia, Thessaloniki, Greece (former)


According to our database1, Kostas Kryptos Chalkias authored at least 55 papers between 2005 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Web3 Recovery Mechanisms and User Preferences.
IACR Cryptol. ePrint Arch., 2025

Post-Quantum Readiness in EdDSA Chains.
IACR Cryptol. ePrint Arch., 2025

SuiGPT MAD: Move AI Decompiler to Improve Transparency and Auditability on Non-Open-Source Blockchain Smart Contract.
Proceedings of the ACM on Web Conference 2025, 2025

Bugdar: AI-Augmented Secure Code Review for GitHub Pull Requests.
Proceedings of the IEEE Conference on Artificial Intelligence, 2025

Zero-Knowledge Authenticator for Blockchain: Policy-Private and Obliviously Updateable.
Proceedings of the 7th Conference on Advances in Financial Technologies, 2025

2024
Optimized Computation of the Jacobi Symbol.
IACR Cryptol. ePrint Arch., 2024

An Efficient Hash Function for Imaginary Class Groups.
IACR Cryptol. ePrint Arch., 2024

Improved Polynomial Division in Cryptography.
IACR Cryptol. ePrint Arch., 2024

SoK: Privacy-Preserving Transactions in Blockchains.
IACR Cryptol. ePrint Arch., 2024

MAD: Move AI Decompiler to Improve Transparency and Auditability on Non-Open-Source Blockchain Smart Contract.
CoRR, 2024

Preserving Nature's Ledger: Blockchains in Biodiversity Conservation.
CoRR, 2024

Buck You: Designing Easy-to-Onboard Blockchain Applications with Zero-Knowledge Login and Sponsored Transactions on Sui.
CoRR, 2024

Fastcrypto: Pioneering Cryptography Via Continuous Benchmarking.
Proceedings of the Companion of the 15th ACM/SPEC International Conference on Performance Engineering, 2024

Subset-Optimized BLS Multi-signature with Key Aggregation.
Proceedings of the Financial Cryptography and Data Security, 2024

Truncator: Time-Space Tradeoff of Cryptographic Primitives.
Proceedings of the Financial Cryptography and Data Security, 2024

zkLogin: Privacy-Preserving Blockchain Authentication with Existing Credentials.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

SoK: Zero-Knowledge Range Proofs.
Proceedings of the 6th Conference on Advances in Financial Technologies, 2024

2023
SoK: Web3 Recovery Mechanisms.
IACR Cryptol. ePrint Arch., 2023

Subset-optimized BLS Multi-signature with Key Aggregation.
IACR Cryptol. ePrint Arch., 2023

Building Random, Fair, and Verifiable Games on Blockchain. Raffle smart contract designs on Sui Network.
CoRR, 2023

Double Public Key Signing Function Oracle Attack on EdDSA Software Implementations.
CoRR, 2023

Double Public Key Signing Function Oracle Attack on EdDSA Software Implementations.
Proceedings of the 28th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks , 2023

STROBE: Streaming Threshold Random Beacons.
Proceedings of the 5th Conference on Advances in Financial Technologies, 2023

2022
SoK: Blockchain Light Clients.
Proceedings of the Financial Cryptography and Data Security, 2022

Broken Proofs of Solvency in Blockchain Custodial Wallets and Exchanges.
Proceedings of the Financial Cryptography and Data Security. FC 2022 International Workshops, 2022

Aggregating and Thresholdizing Hash-based Signatures using STARKs.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

Base64 Malleability in Practice.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Aggregating hash-based signatures using STARKs.
IACR Cryptol. ePrint Arch., 2021

HashWires: Hyperefficient Credential-Based Range Proofs.
IACR Cryptol. ePrint Arch., 2021

STROBE: Stake-based Threshold Random Beacons.
IACR Cryptol. ePrint Arch., 2021

Reactive Key-Loss Protection in Blockchains.
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021

Homomorphic Decryption in Blockchains via Compressed Discrete-Log Lookup Tables.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2021

Non-interactive Half-Aggregation of EdDSA and Variants of Schnorr Signatures.
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021

Generalized Proof of Liabilities.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Proof of Assets in the Diem Blockchain.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021

SoK: Auditability and Accountability in Distributed Payment Systems.
Proceedings of the Applied Cryptography and Network Security, 2021

2020
Distributed Auditing Proofs of Liabilities.
IACR Cryptol. ePrint Arch., 2020

Taming the Many EdDSAs.
Proceedings of the Security Standardisation Research - 6th International Conference, 2020

2018
Blockchained Post-Quantum Signatures.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

2016
Going Beyond the Coinbase Transaction Fee: Alternative Reward Schemes for Miners in Blockchain Systems.
Proceedings of the 20th Pan-Hellenic Conference on Informatics, 2016

2012
A Compatible Implementation between Identity-based and Certificateless Encryption Schemes.
Proceedings of the WEBIST 2012 - Proceedings of the 8th International Conference on Web Information Systems and Technologies, Porto, Portugal, 18, 2012

The Concept of Compatibility between Identity-based and Certificateless Encryption Schemes.
Proceedings of the SECRYPT 2012, 2012

2010
Secure cryptographic protocols and applications based on bilinear pairings
PhD thesis, 2010

Attacks on the AKACP Protocol.
IACR Cryptol. ePrint Arch., 2010

Parallel Collection of Live Data Using Hadoop.
Proceedings of the 14th Panhellenic Conference on Informatics, 2010

Practical Implementation of Identity Based Encryption for Secure E-mail Communication.
Proceedings of the 14th Panhellenic Conference on Informatics, 2010

2008
Surveying Wi-Fi Security - Presentation of Wi-Fi Security Measures, Varius Wi-Fi Attacks and a Classification Survey of Wi-Fi Networks in Thessaloniki.
Proceedings of the WINSYS 2008, 2008

An Implementation Infrastructure for Server-Passive Timed-Release Cryptography.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
On the Key-Compromise Impersonation Vulnerability of One-Pass Key Establishment Protocols.
Proceedings of the SECRYPT 2007, 2007

Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols.
Proceedings of the E-business and Telecommunications - 4th International Conference, 2007

Improved Anonymous Timed-Release Encryption.
Proceedings of the Computer Security, 2007

A Provably Secure One-Pass Two-Party Key Establishment Protocol.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

Low-cost Anonymous Timed-Release Encryption.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2006
Timed Release Cryptography from Bilinear Pairings Using Hash Chains.
Proceedings of the Communications and Multimedia Security, 2006

2005
Implementing Authentication Protocol for Exchanging Encrypted Messages via an Authentication Server based on Elliptic Curve Cryptography with the ElGamal's Algorithm.
Proceedings of the International Enformatika Conference, 2005


  Loading...