Pyrros Chaidos

According to our database1, Pyrros Chaidos authored at least 15 papers between 2012 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Approximate Lower Bound Arguments.
IACR Cryptol. ePrint Arch., 2023

Blockchain Participation Games.
Proceedings of the Web and Internet Economics - 19th International Conference, 2023

New Design Techniques for Efficient Arithmetization-Oriented Hash Functions: ttAnemoi Permutations and ttJive Compression Mode.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

2022
Anemoi: Exploiting the Link between Arithmetization-Orientation and CCZ-Equivalence.
IACR Cryptol. ePrint Arch., 2022

2021
Mithril: Stake-based Threshold Multisignatures.
IACR Cryptol. ePrint Arch., 2021

Lelantus-CLA.
IACR Cryptol. ePrint Arch., 2021

2020
Foundations of Fully Dynamic Group Signatures.
J. Cryptol., 2020

2018
A Universally Composable Framework for the Privacy of Email Ecosystems.
IACR Cryptol. ePrint Arch., 2018

2017
Efficient Designated-Verifier Non-Interactive Zero-Knowledge Proofs of Knowledge.
IACR Cryptol. ePrint Arch., 2017

2016
Efficient Zero-Knowledge Arguments for Arithmetic Circuits in the Discrete Log Setting.
IACR Cryptol. ePrint Arch., 2016

Efficient Zero-Knowledge Proof Systems.
Proceedings of the Foundations of Security Analysis and Design VIII, 2016

BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Short Accountable Ring Signatures Based on DDH.
IACR Cryptol. ePrint Arch., 2015

Making Sigma-Protocols Non-interactive Without Random Oracles.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

2012
Applying Divertibility to Blind Ballot Copying in the Helios Internet Voting System.
Proceedings of the Computer Security - ESORICS 2012, 2012


  Loading...