Vassilis Zikas

Orcid: 0000-0002-5422-7572

According to our database1, Vassilis Zikas authored at least 71 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of two.
  • Erdős number3 of three.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Bitcoin as a Transaction Ledger: A Composable Treatment.
J. Cryptol., June, 2024

General Adversary Structures in Byzantine Agreement and Multi-Party Computation with Active and Omission Corruption.
IACR Cryptol. ePrint Arch., 2024

2023
Etherless Ethereum tokens: Simulating native tokens in Ethereum.
J. Comput. Syst. Sci., August, 2023

Compilation and Backend-Independent Vectorization for Multi-Party Computation.
IACR Cryptol. ePrint Arch., 2023

Concurrent Asynchronous Byzantine Agreement in Expected-Constant Rounds, Revisited.
IACR Cryptol. ePrint Arch., 2023

Blockchain Governance via Sharp Anonymous Multisignatures.
IACR Cryptol. ePrint Arch., 2023

Fine-Tuning Ideal Worlds for the Xor of Two Permutation Outputs.
IACR Cryptol. ePrint Arch., 2023

Towards Optimal Communication Byzantine Reliable Broadcast under a Message Adversary.
CoRR, 2023

Privacy-Utility Tradeoff of OLS with Random Projections.
CoRR, 2023

Synchrony/Asynchrony vs. Stationary/Mobile? The Latter is Superior...in Theory.
CoRR, 2023

Completeness Theorems for Adaptively Secure Broadcast.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

COMBINE: COMpilation and Backend-INdependent vEctorization for Multi-Party Computation.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Eureka: A General Framework for Black-box Differential Privacy Estimators.
IACR Cryptol. ePrint Arch., 2022

2021
Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols.
J. Cryptol., 2021

How Private Are Commonly-Used Voting Rules?
IACR Cryptol. ePrint Arch., 2021

Adaptively Secure Broadcast in Resource-Restricted Cryptography.
IACR Cryptol. ePrint Arch., 2021

FairMM: A Fast and Frontrunning-Resistant Crypto Market-Maker.
IACR Cryptol. ePrint Arch., 2021

Universally Composable Almost-Everywhere Secure Computation.
IACR Cryptol. ePrint Arch., 2021

A Rational Protocol Treatment of 51% Attacks.
IACR Cryptol. ePrint Arch., 2021

Dynamic Ad Hoc Clock Synchronization.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

2020
A PoR/PoS-Hybrid Blockchain: Proof of Reputation with Nakamoto Fallback.
IACR Cryptol. ePrint Arch., 2020

Round-Optimal and Communication-Efficient Multiparty Computation.
IACR Cryptol. ePrint Arch., 2020

Collusion-Preserving Computation without a Mediator.
IACR Cryptol. ePrint Arch., 2020

On the (Ir)Replaceability of Global Setups, or How (Not) to Use a Global Ledger.
IACR Cryptol. ePrint Arch., 2020

Consensus Redux: Distributed Ledgers in the Face of Adversarial Supremacy.
IACR Cryptol. ePrint Arch., 2020

Universal Composition with Global Subroutines: Capturing Global Setup within plain UC.
IACR Cryptol. ePrint Arch., 2020

Proof-of-Reputation Blockchain with Nakamoto Fallback.
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020

Resource-Restricted Cryptography: Revisiting MPC Bounds in the Proof-of-Work Era.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

2019
Probabilistic Termination and Composability of Cryptographic Protocols.
J. Cryptol., 2019

Efficient MPC via Program Analysis: A Framework for Efficient Optimal Mixing.
IACR Cryptol. ePrint Arch., 2019

Resource-Restricted Cryptography: Honest-Majority MPC from a CRS (and No Broadcast).
IACR Cryptol. ePrint Arch., 2019

Broadcast-Optimal Two-Round MPC.
IACR Cryptol. ePrint Arch., 2019

Ouroboros Chronos: Permissionless Clock Synchronization via Proof-of-Stake.
IACR Cryptol. ePrint Arch., 2019

Timed Signatures and Zero-Knowledge Proofs -Timestamping in the Blockchain Era-.
IACR Cryptol. ePrint Arch., 2019

Cryptography with Disposable Backdoors.
Cryptogr., 2019

PD-ML-Lite: Private Distributed Machine Learning from Lighweight Cryptography.
CoRR, 2019

PD-ML-Lite: Private Distributed Machine Learning from Lightweight Cryptography.
Proceedings of the Information Security - 22nd International Conference, 2019

2018
Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake.
IACR Cryptol. ePrint Arch., 2018

Secure Two-Party Computation over Unreliable Channels.
IACR Cryptol. ePrint Arch., 2018

Cryptography with Dispensable Backdoors.
IACR Cryptol. ePrint Arch., 2018

But Why does it Work? A Rational Protocol Design Treatment of Bitcoin.
IACR Cryptol. ePrint Arch., 2018

Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability.
IACR Cryptol. ePrint Arch., 2018

How Private Is Your Voting? A Framework for Comparing the Privacy of Voting Mechanisms.
CoRR, 2018

Cryptographically Secure Detection of Injection Attacks.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
The Price of Low Communication in Secure Multi-Party Computation.
IACR Cryptol. ePrint Arch., 2017

2016
Network-Hiding Communication and Applications to Multi-Party Protocols.
IACR Cryptol. ePrint Arch., 2016

Constant-Round Asynchronous Multi-Party Computation.
IACR Cryptol. ePrint Arch., 2016

Provably Secure Virus Detection: Using The Observer Effect Against Malware.
Proceedings of the 43rd International Colloquium on Automata, Languages, and Programming, 2016

Constant-Round Asynchronous Multi-Party Computation Based on One-Way Functions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Provable Virus Detection: Using the Uncertainty Principle to Protect Against Malware.
IACR Cryptol. ePrint Arch., 2015

Fair and Robust Multi-Party Computation using a Global Transaction Ledger.
IACR Cryptol. ePrint Arch., 2015

Secure Multi-Party Computation with Identifiable Abort.
IACR Cryptol. ePrint Arch., 2015

Fair Distributed Computation of Reactive Functions.
IACR Cryptol. ePrint Arch., 2015

How Fair is Your Protocol? A Utility-based Approach to Protocol Optimality.
IACR Cryptol. ePrint Arch., 2015

Feasibility and Completeness of Cryptographic Tasks in the Quantum World.
IACR Cryptol. ePrint Arch., 2015

The Hidden Graph Model: Communication Locality and Optimal Resiliency with Adaptive Faults.
Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, 2015

Incoercible Multi-party Computation and Universally Composable Receipt-Free Voting.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

2014
Efficient Three-Party Computation from Cut-and-Choose.
IACR Cryptol. ePrint Arch., 2014

Optimally Resilient and Adaptively Secure Multi-Party Computation with Low Communication Locality.
IACR Cryptol. ePrint Arch., 2014

Distributing the setup in universally composable multi-party computation.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2014

2013
Information-Theoretic Secure Multiparty Computation.
Proceedings of the Secure Multi-Party Computation, 2013

Rational Protocol Design: Cryptography Against Incentive-driven Adversaries.
IACR Cryptol. ePrint Arch., 2013

2012
Byzantine Agreement with a Rational Adversary.
Proceedings of the Automata, Languages, and Programming - 39th International Colloquium, 2012

2011
Universally Composable Synchronous Computation.
IACR Cryptol. ePrint Arch., 2011

Collusion-Preserving Computation.
IACR Cryptol. ePrint Arch., 2011

Player-Centric Byzantine Agreement.
Proceedings of the Automata, Languages and Programming - 38th International Colloquium, 2011

2010
Generalized corruption models in secure multi-party computation.
PhD thesis, 2010

2009
Adaptively Secure Broadcast.
IACR Cryptol. ePrint Arch., 2009

Realistic Failures in Secure Multi-party Computation.
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009

2008
MPC vs. SFE : Unconditional and Computational Security.
Proceedings of the Advances in Cryptology, 2008

2007
MPC vs. SFE: Perfect Security in a Unified Corruption Model.
IACR Cryptol. ePrint Arch., 2007


  Loading...