Vassilis Zikas

From MaRDI portal
(Redirected from Person:1648819)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Concurrent asynchronous Byzantine agreement in expected-constant rounds, revisited2024-08-15Paper
Universally composable almost-everywhere secure computation2024-06-25Paper
Bitcoin as a Transaction Ledger: A Composable Treatment
Journal of Cryptology
2024-04-21Paper
PD-ML-Lite: Private Distributed Machine Learning from Lightweight Cryptography2024-03-14Paper
Completeness theorems for adaptively secure broadcast
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Etherless Ethereum Tokens: simulating native tokens in Ethereum
Journal of Computer and System Sciences
2023-04-21Paper
On the (Ir)replaceability of global setups, or how (not) to use a global ledger2023-04-13Paper
A rational protocol treatment of 51\% attacks2022-04-22Paper
Universal composition with global subroutines: capturing global setup within plain UC2022-03-23Paper
Resource-restricted cryptography: revisiting MPC bounds in the proof-of-work era2022-03-23Paper
Broadcast-optimal two-round MPC2022-03-23Paper
Dynamic ad hoc clock synchronization2021-12-08Paper
Round-preserving parallel composition of probabilistic-termination cryptographic protocols
Journal of Cryptology
2021-06-28Paper
Timed signatures and zero-knowledge proofs -- timestamping in the blockchain era2021-02-23Paper
Round-preserving parallel composition of probabilistic-termination cryptographic protocols2020-05-27Paper
Probabilistic termination and composability of cryptographic protocols
Journal of Cryptology
2019-08-13Paper
Secure two-party computation over unreliable channels2018-10-17Paper
Fair distributed computation of reactive functions2018-08-24Paper
But why does it work? A rational protocol design treatment of bitcoin2018-07-09Paper
Provably Secure Virus Detection: Using The Observer Effect Against Malware.2017-12-19Paper
Bitcoin as a transaction ledger: a composable treatment2017-11-03Paper
The price of low communication in secure multi-party computation2017-11-03Paper
The hidden graph model: communication locality and optimal resiliency with adaptive faults
Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science
2017-05-19Paper
Constant-round asynchronous multi-party computation based on one-way functions
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Probabilistic Termination and Composability of Cryptographic Protocols
Advances in Cryptology – CRYPTO 2016
2016-11-09Paper
Network-Hiding Communication and Applications to Multi-party Protocols
Advances in Cryptology – CRYPTO 2016
2016-10-27Paper
Fair and robust multi-party computation using a global transaction ledger
Advances in Cryptology – EUROCRYPT 2016
2016-07-15Paper
How fair is your protocol? A utility-based approach to protocol optimality
Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing
2016-03-23Paper
Incoercible multi-party computation and universally composable receipt-free voting
Lecture Notes in Computer Science
2015-12-10Paper
Distributing the setup in universally composable multi-party computation
Proceedings of the 2014 ACM symposium on Principles of distributed computing
2015-09-03Paper
Efficient three-party computation from cut-and-choose
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Secure multi-party computation with identifiable abort
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Feasibility and completeness of cryptographic tasks in the quantum world
Theory of Cryptography
2013-03-18Paper
Universally composable synchronous computation
Theory of Cryptography
2013-03-18Paper
Byzantine agreement with a rational adversary
Automata, Languages, and Programming
2012-11-01Paper
Collusion-preserving computation
Lecture Notes in Computer Science
2012-09-25Paper
Player-centric Byzantine agreement
Automata, Languages and Programming
2011-07-06Paper
Adaptively secure broadcast
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
Realistic Failures in Secure Multi-party Computation
Theory of Cryptography
2009-03-03Paper
MPC vs. SFE : Unconditional and Computational Security
Advances in Cryptology - ASIACRYPT 2008
2009-02-10Paper
MPC vs. SFE: Perfect Security in a Unified Corruption Model
Theory of Cryptography
2008-03-05Paper


Research outcomes over time


This page was built for person: Vassilis Zikas