Mark Simkin
Orcid: 0000-0002-7325-5261Affiliations:
- Ethereum Foundation, Aarhus, Denmark
- Aarhus University, Denmark
- Saarland University, Germany (former)
According to our database1,
Mark Simkin
authored at least 58 papers
between 2014 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Robust Distributed Arrays: Provably Secure Networking for Data Availability Sampling.
CoRR, April, 2025
IACR Cryptol. ePrint Arch., 2025
Proceedings of the Public-Key Cryptography - PKC 2025, 2025
2024
Time-Based Cryptography From Weaker Assumptions: Randomness Beacons, Delay Functions and More.
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024
Proceedings of the 32nd Annual European Symposium on Algorithms, 2024
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024
2023
Proceedings of the Public-Key Cryptography - PKC 2023, 2023
Proceedings of the Progress in Cryptology - LATINCRYPT 2023, 2023
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
Proceedings of the 4th Conference on Information-Theoretic Cryptography, 2023
Interactive Non-Malleable Codes Against Desynchronizing Attacks in the Multi-Party Setting.
Proceedings of the 4th Conference on Information-Theoretic Cryptography, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Privacy Amplification With Tamperable Memory via Non-Malleable Two-Source Extractors.
IEEE Trans. Inf. Theory, 2022
Proceedings of the Security and Cryptography for Networks - 13th International Conference, 2022
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
Proceedings of the 3rd Conference on Information-Theoretic Cryptography, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the 2021 ACM-SIAM Symposium on Discrete Algorithms, 2021
Proceedings of the Public-Key Cryptography - PKC 2021, 2021
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
2020
Two-Source Non-Malleable Extractors and Applications to Privacy Amplification with Tamperable Memory.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Theory of Cryptography - 18th International Conference, 2020
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020
Proceedings of the 1st Conference on Information-Theoretic Cryptography, 2020
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
Non-malleable Secret Sharing Against Bounded Joint-Tampering Attacks in the Plain Model.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
Stronger Leakage-Resilient and Non-Malleable Secret Sharing Schemes for General Access Structures.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019
2018
Proceedings of the Public-Key Cryptography - PKC 2018, 2018
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
Proceedings of the Applied Cryptography and Network Security, 2018
2016
Proceedings of the Public-Key Cryptography - PKC 2016, 2016
Efficient Unlinkable Sanitizable Signatures from Signatures with Re-randomizable Keys.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Efficient Unlinkable Sanitizable Signatures from Signatures with Rerandomizable Keys.
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Financial Cryptography and Data Security, 2015
2014
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the Applied Cryptography and Network Security, 2014