Kostas Kryptos Chalkias
Orcid: 0000-0002-3252-9975Affiliations:
- Mysten Labs, Palo Alto, CA, USA
- Facebook Inc., Menlo Park, CA, USA (former)
- R3, London, UK (2017 - 2019)
- Erybo, San Francisco, CA, USA (2014 - 2016)
- Safemarket, Athens, Greece (2011 - 2014)
- University of Macedonia, Thessaloniki, Greece (former)
According to our database1,
Kostas Kryptos Chalkias
authored at least 55 papers
between 2005 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
SuiGPT MAD: Move AI Decompiler to Improve Transparency and Auditability on Non-Open-Source Blockchain Smart Contract.
Proceedings of the ACM on Web Conference 2025, 2025
Proceedings of the IEEE Conference on Artificial Intelligence, 2025
Zero-Knowledge Authenticator for Blockchain: Policy-Private and Obliviously Updateable.
Proceedings of the 7th Conference on Advances in Financial Technologies, 2025
2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
MAD: Move AI Decompiler to Improve Transparency and Auditability on Non-Open-Source Blockchain Smart Contract.
CoRR, 2024
Buck You: Designing Easy-to-Onboard Blockchain Applications with Zero-Knowledge Login and Sponsored Transactions on Sui.
CoRR, 2024
Proceedings of the Companion of the 15th ACM/SPEC International Conference on Performance Engineering, 2024
Proceedings of the Financial Cryptography and Data Security, 2024
Proceedings of the Financial Cryptography and Data Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 6th Conference on Advances in Financial Technologies, 2024
2023
IACR Cryptol. ePrint Arch., 2023
Building Random, Fair, and Verifiable Games on Blockchain. Raffle smart contract designs on Sui Network.
CoRR, 2023
CoRR, 2023
Proceedings of the 28th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks , 2023
Proceedings of the 5th Conference on Advances in Financial Technologies, 2023
2022
Proceedings of the Financial Cryptography and Data Security, 2022
Proceedings of the Financial Cryptography and Data Security. FC 2022 International Workshops, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2021
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the Applied Cryptography and Network Security Workshops, 2021
Proceedings of the Applied Cryptography and Network Security, 2021
2020
Proceedings of the Security Standardisation Research - 6th International Conference, 2020
2018
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
2016
Going Beyond the Coinbase Transaction Fee: Alternative Reward Schemes for Miners in Blockchain Systems.
Proceedings of the 20th Pan-Hellenic Conference on Informatics, 2016
2012
A Compatible Implementation between Identity-based and Certificateless Encryption Schemes.
Proceedings of the WEBIST 2012 - Proceedings of the 8th International Conference on Web Information Systems and Technologies, Porto, Portugal, 18, 2012
The Concept of Compatibility between Identity-based and Certificateless Encryption Schemes.
Proceedings of the SECRYPT 2012, 2012
2010
PhD thesis, 2010
Proceedings of the 14th Panhellenic Conference on Informatics, 2010
Practical Implementation of Identity Based Encryption for Secure E-mail Communication.
Proceedings of the 14th Panhellenic Conference on Informatics, 2010
2008
Surveying Wi-Fi Security - Presentation of Wi-Fi Security Measures, Varius Wi-Fi Attacks and a Classification Survey of Wi-Fi Networks in Thessaloniki.
Proceedings of the WINSYS 2008, 2008
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008
2007
On the Key-Compromise Impersonation Vulnerability of One-Pass Key Establishment Protocols.
Proceedings of the SECRYPT 2007, 2007
Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols.
Proceedings of the E-business and Telecommunications - 4th International Conference, 2007
Proceedings of the Computer Security, 2007
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
Proceedings of the Third International Symposium on Information Assurance and Security, 2007
2006
Proceedings of the Communications and Multimedia Security, 2006
2005
Implementing Authentication Protocol for Exchanging Encrypted Messages via an Authentication Server based on Elliptic Curve Cryptography with the ElGamal's Algorithm.
Proceedings of the International Enformatika Conference, 2005