Peter Gazi

Orcid: 0000-0003-1572-3255

According to our database1, Peter Gazi authored at least 46 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Tight Analysis of GHOST Consistency.
IACR Cryptol. ePrint Arch., 2024

Consensus Redux: Distributed Ledgers in the Face of Adversarial Supremacy.
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024

2023
Practical Settlement Bounds for Longest-Chain Consensus.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Fait Accompli Committee Selection: Improving the Size-Security Tradeoff of Stake-Based Committees.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
On UC-Secure Range Extension and Batch Verification for ECVRF.
IACR Cryptol. ePrint Arch., 2022

A Composable Security Treatment of ECVRF and Batch Verifications.
Proceedings of the Computer Security - ESORICS 2022, 2022

Practical Settlement Bounds for Proof-of-Work Blockchains.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

SNACKs: Leveraging Proofs of Sequential Work for Blockchain Light Clients.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
Pay to Win: Cheap, Cross-Chain Bribing Attacks on PoW Cryptocurrencies.
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021

SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies.
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021

Fast Isomorphic State Channels.
Proceedings of the Financial Cryptography and Data Security, 2021

Dynamic Ad Hoc Clock Synchronization.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

2020
Proof-of-Stake Blockchain Protocols with Near-Optimal Throughput.
IACR Cryptol. ePrint Arch., 2020

Hydra: Fast Isomorphic State Channels.
IACR Cryptol. ePrint Arch., 2020

Ledger Combiners for Fast Settlement.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Stake Shift in Major Cryptocurrencies: An Empirical Study.
Proceedings of the Financial Cryptography and Data Security, 2020

Tight Consistency Bounds for Bitcoin.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies.
IACR Cryptol. ePrint Arch., 2019

Ouroboros Chronos: Permissionless Clock Synchronization via Proof-of-Stake.
IACR Cryptol. ePrint Arch., 2019

Proof-of-Stake Sidechains.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

2018
Parallel Chains: Improving Throughput and Latency of Blockchain Protocols via Parallel Composition.
IACR Cryptol. ePrint Arch., 2018

SpaceMint: A Cryptocurrency Based on Proofs of Space.
Proceedings of the Financial Cryptography and Data Security, 2018

Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

Stake-Bleeding Attacks on Proof-of-Stake Blockchains.
Proceedings of the Crypto Valley Conference on Blockchain Technology, 2018

Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

On the Memory-Hardness of Data-Independent Password-Hashing Functions.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
The Exact Security of PMAC.
IACR Cryptol. ePrint Arch., 2017

Ouroboros Praos: An adaptively-secure, semi-synchronous proof-of-stake protocol.
IACR Cryptol. ePrint Arch., 2017

Per-Session Security: Password-Based Cryptography Revisited.
Proceedings of the Computer Security - ESORICS 2017, 2017

2016
Provably Robust Sponge-Based PRNGs and KDFs.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

2015
Tight Bounds for Keyed Sponges and Truncated CBC.
IACR Cryptol. ePrint Arch., 2015

Secret-key cryptography from ideal primitives: A systematic overview.
Proceedings of the 2015 IEEE Information Theory Workshop, 2015

Query-Complexity Amplification for Random Oracles.
Proceedings of the Information Theoretic Security - 8th International Conference, 2015

Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes.
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015

The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

Generic Security of NMAC and HMAC with Input Whitening.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Optimality of non-adaptive strategies: The case of parallel games.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

The Exact PRF-Security of NMAC and HMAC.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

2013
On the Security of Plain and Randomized Cascades.
IACR Cryptol. ePrint Arch., 2013

Resource-Restricted Indifferentiability.
Proceedings of the Advances in Cryptology, 2013

Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

2012
Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

2009
Free-Start Distinguishing: Combining Two Types of Indistinguishability Amplification.
Proceedings of the Information Theoretic Security, 4th International Conference, 2009

Cascade Encryption Revisited.
Proceedings of the Advances in Cryptology, 2009

2008
Assisted Problem Solving and Decompositions of Finite Automata.
Proceedings of the SOFSEM 2008: Theory and Practice of Computer Science, 2008

2007
On Ciphertext Undetectability.
IACR Cryptol. ePrint Arch., 2007


  Loading...