Vassilis Zikas

According to our database1, Vassilis Zikas authored at least 60 papers between 2007 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols.
J. Cryptol., 2021

How Private Are Commonly-Used Voting Rules?
IACR Cryptol. ePrint Arch., 2021

Adaptively Secure Broadcast in Resource-Restricted Cryptography.
IACR Cryptol. ePrint Arch., 2021

FairMM: A Fast and Frontrunning-Resistant Crypto Market-Maker.
IACR Cryptol. ePrint Arch., 2021

Universally Composable Almost-Everywhere Secure Computation.
IACR Cryptol. ePrint Arch., 2021

A Rational Protocol Treatment of 51% Attacks.
IACR Cryptol. ePrint Arch., 2021

Etherless Ethereum Tokens: Simulating Native Tokens in Ethereum.
IACR Cryptol. ePrint Arch., 2021

Dynamic Ad Hoc Clock Synchronization.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

2020
A PoR/PoS-Hybrid Blockchain: Proof of Reputation with Nakamoto Fallback.
IACR Cryptol. ePrint Arch., 2020

Round-Optimal and Communication-Efficient Multiparty Computation.
IACR Cryptol. ePrint Arch., 2020

Collusion-Preserving Computation without a Mediator.
IACR Cryptol. ePrint Arch., 2020

On the (Ir)Replaceability of Global Setups, or How (Not) to Use a Global Ledger.
IACR Cryptol. ePrint Arch., 2020

Consensus Redux: Distributed Ledgers in the Face of Adversarial Supremacy.
IACR Cryptol. ePrint Arch., 2020

Universal Composition with Global Subroutines: Capturing Global Setup within plain UC.
IACR Cryptol. ePrint Arch., 2020

Proof-of-Reputation Blockchain with Nakamoto Fallback.
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020

Resource-Restricted Cryptography: Revisiting MPC Bounds in the Proof-of-Work Era.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

2019
Probabilistic Termination and Composability of Cryptographic Protocols.
J. Cryptol., 2019

Efficient MPC via Program Analysis: A Framework for Efficient Optimal Mixing.
IACR Cryptol. ePrint Arch., 2019

Resource-Restricted Cryptography: Honest-Majority MPC from a CRS (and No Broadcast).
IACR Cryptol. ePrint Arch., 2019

Broadcast-Optimal Two-Round MPC.
IACR Cryptol. ePrint Arch., 2019

Ouroboros Chronos: Permissionless Clock Synchronization via Proof-of-Stake.
IACR Cryptol. ePrint Arch., 2019

Timed Signatures and Zero-Knowledge Proofs -Timestamping in the Blockchain Era-.
IACR Cryptol. ePrint Arch., 2019

Cryptography with Disposable Backdoors.
Cryptogr., 2019

PD-ML-Lite: Private Distributed Machine Learning from Lighweight Cryptography.
CoRR, 2019

PD-ML-Lite: Private Distributed Machine Learning from Lightweight Cryptography.
Proceedings of the Information Security - 22nd International Conference, 2019

2018
Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake.
IACR Cryptol. ePrint Arch., 2018

Secure Two-Party Computation over Unreliable Channels.
IACR Cryptol. ePrint Arch., 2018

Cryptography with Dispensable Backdoors.
IACR Cryptol. ePrint Arch., 2018

But Why does it Work? A Rational Protocol Design Treatment of Bitcoin.
IACR Cryptol. ePrint Arch., 2018

Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability.
IACR Cryptol. ePrint Arch., 2018

How Private Is Your Voting? A Framework for Comparing the Privacy of Voting Mechanisms.
CoRR, 2018

Cryptographically Secure Detection of Injection Attacks.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
The Price of Low Communication in Secure Multi-Party Computation.
IACR Cryptol. ePrint Arch., 2017

Bitcoin as a Transaction Ledger: A Composable Treatment.
IACR Cryptol. ePrint Arch., 2017

2016
Network-Hiding Communication and Applications to Multi-Party Protocols.
IACR Cryptol. ePrint Arch., 2016

Constant-Round Asynchronous Multi-Party Computation.
IACR Cryptol. ePrint Arch., 2016

Provably Secure Virus Detection: Using The Observer Effect Against Malware.
Proceedings of the 43rd International Colloquium on Automata, Languages, and Programming, 2016

Constant-Round Asynchronous Multi-Party Computation Based on One-Way Functions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Provable Virus Detection: Using the Uncertainty Principle to Protect Against Malware.
IACR Cryptol. ePrint Arch., 2015

Fair and Robust Multi-Party Computation using a Global Transaction Ledger.
IACR Cryptol. ePrint Arch., 2015

Secure Multi-Party Computation with Identifiable Abort.
IACR Cryptol. ePrint Arch., 2015

Fair Distributed Computation of Reactive Functions.
IACR Cryptol. ePrint Arch., 2015

How Fair is Your Protocol? A Utility-based Approach to Protocol Optimality.
IACR Cryptol. ePrint Arch., 2015

Feasibility and Completeness of Cryptographic Tasks in the Quantum World.
IACR Cryptol. ePrint Arch., 2015

The Hidden Graph Model: Communication Locality and Optimal Resiliency with Adaptive Faults.
Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, 2015

Incoercible Multi-party Computation and Universally Composable Receipt-Free Voting.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

2014
Efficient Three-Party Computation from Cut-and-Choose.
IACR Cryptol. ePrint Arch., 2014

Optimally Resilient and Adaptively Secure Multi-Party Computation with Low Communication Locality.
IACR Cryptol. ePrint Arch., 2014

Distributing the setup in universally composable multi-party computation.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2014

2013
Information-Theoretic Secure Multiparty Computation.
Proceedings of the Secure Multi-Party Computation, 2013

Rational Protocol Design: Cryptography Against Incentive-driven Adversaries.
IACR Cryptol. ePrint Arch., 2013

2012
Byzantine Agreement with a Rational Adversary.
Proceedings of the Automata, Languages, and Programming - 39th International Colloquium, 2012

2011
Universally Composable Synchronous Computation.
IACR Cryptol. ePrint Arch., 2011

Collusion-Preserving Computation.
IACR Cryptol. ePrint Arch., 2011

Player-Centric Byzantine Agreement.
Proceedings of the Automata, Languages and Programming - 38th International Colloquium, 2011

2010
Generalized corruption models in secure multi-party computation.
PhD thesis, 2010

2009
Adaptively Secure Broadcast.
IACR Cryptol. ePrint Arch., 2009

Realistic Failures in Secure Multi-party Computation.
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009

2008
MPC vs. SFE : Unconditional and Computational Security.
Proceedings of the Advances in Cryptology, 2008

2007
MPC vs. SFE: Perfect Security in a Unified Corruption Model.
IACR Cryptol. ePrint Arch., 2007


  Loading...