Kushal Babel

Orcid: 0000-0002-6776-5273

According to our database1, Kushal Babel authored at least 17 papers between 2017 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Timing Games in Responsive Consensus Protocols.
CoRR, October, 2025

MonadBFT: Fast, Responsive, Fork-Resistant Streamlined Consensus.
CoRR, February, 2025

Voting-Bloc Entropy: A New Metric for DAO Decentralization.
Proceedings of the 34th USENIX Security Symposium, 2025

Liquefaction: Privately Liquefying Blockchain Assets.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

Mysticeti: Reaching the Latency Limits with Uncertified DAGs.
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025

2024
The Sting Framework: Proving the Existence of Superclass Adversaries.
IACR Cryptol. ePrint Arch., 2024

PROF: Protected Order Flow in a Profit-Seeking World.
IACR Cryptol. ePrint Arch., 2024

Complete Knowledge: Preventing Encumbrance of Cryptographic Secrets.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Charlotte: Reformulating Blockchains into a Web of Composable Attested Data Structures for Cross-Domain Applications.
ACM Trans. Comput. Syst., 2023

DAO Decentralization: Voting-Bloc Entropy, Bribery, and Dark DAOs.
CoRR, 2023

Mysticeti: Low-Latency DAG Consensus with Fast Commit Path.
CoRR, 2023

Clockwork Finance: Automated Analysis of Economic Security in Smart Contracts.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Lanturn: Measuring Economic Security of Smart Contracts Through Adaptive Learning.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
SHORTSTACK: Distributed, Fault-tolerant, Oblivious Data Access.
Proceedings of the 16th USENIX Symposium on Operating Systems Design and Implementation, 2022

Strategic Peer Selection Using Transaction Value and Latency.
Proceedings of the 2022 ACM CCS Workshop on Decentralized Finance and Security, 2022

2020
On the semantics of communications when verifying equivalence properties.
J. Comput. Secur., 2020

2017
On Communication Models When Verifying Equivalence Properties.
Proceedings of the Principles of Security and Trust - 6th International Conference, 2017


  Loading...