Peter Gazi
Orcid: 0000-0003-1572-3255
According to our database1,
Peter Gazi
authored at least 46 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024
2023
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
Fait Accompli Committee Selection: Improving the Size-Security Tradeoff of Stake-Based Committees.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022
2021
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021
SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies.
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021
Proceedings of the Financial Cryptography and Data Security, 2021
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Theory of Cryptography - 18th International Conference, 2020
Proceedings of the Financial Cryptography and Data Security, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
2018
Parallel Chains: Improving Throughput and Latency of Blockchain Protocols via Parallel Composition.
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Financial Cryptography and Data Security, 2018
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018
Proceedings of the Crypto Valley Conference on Blockchain Technology, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
2016
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016
2015
Proceedings of the 2015 IEEE Information Theory Workshop, 2015
Proceedings of the Information Theoretic Security - 8th International Conference, 2015
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015
The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015
2014
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
2013
Proceedings of the Advances in Cryptology, 2013
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013
2012
Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012
2009
Free-Start Distinguishing: Combining Two Types of Indistinguishability Amplification.
Proceedings of the Information Theoretic Security, 4th International Conference, 2009
2008
Proceedings of the SOFSEM 2008: Theory and Practice of Computer Science, 2008
2007