Yiannis Tselekounis

According to our database1, Yiannis Tselekounis authored at least 16 papers between 2011 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Guarding the Signal: Secure Messaging with Reverse Firewalls.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
(Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates.
J. Cryptol., June, 2024

2023
Optimal Single-Server Private Information Retrieval.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Fork-Resilient Continuous Group Key Agreement.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

2022
Leakage Resilient l-more Extractable Hash and Applications to Non-Malleable Cryptography.
IACR Cryptol. ePrint Arch., 2022

2021
Steel: Composable Hardware-Based Stateful and Randomised Functional Encryption.
Proceedings of the Public-Key Cryptography - PKC 2021, 2021

Modular Design of Secure Group Messaging Protocols and the Security of MLS.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Security Analysis and Improvements for the IETF MLS Standard for Group Messaging.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

2018
Cryptographic techniques for hardware security.
PhD thesis, 2018

Secure Outsourcing of Cryptographic Circuits Manufacturing.
Proceedings of the Provable Security, 2018

Non-Malleable Codes for Partial Functions with Manipulation Detection.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

2016
Secure Outsourcing of Circuit Manufacturing.
IACR Cryptol. ePrint Arch., 2016

Blockchain Mining Games.
Proceedings of the 2016 ACM Conference on Economics and Computation, 2016

Practical Non-Malleable Codes from l-more Extractable Hash Functions.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2013
Tamper Resilient Circuits: The Adversary at the Gates.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2011
Cognitive WMNs: A distributed mechanism for leasing cellular bandwidth.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011


  Loading...