Peter Gaži

From MaRDI portal
Person:1648821



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Taming iterative grinding attacks on blockchain beacons2026-03-31Paper
Practical settlement bounds for longest-chain consensus
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
SNACKs: leveraging proofs of sequential work for blockchain light clients
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
A composable security treatment of ECVRF and batch verifications
Computer Security – ESORICS 2022
2023-07-28Paper
Fast isomorphic state channels2022-06-22Paper
SoK: algorithmic incentive manipulation attacks on permissionless PoW cryptocurrencies2022-06-01Paper
Pay to win: cheap, cross-chain bribing attacks on PoW cryptocurrencies2022-06-01Paper
Dynamic ad hoc clock synchronization2021-12-08Paper
Ledger combiners for fast settlement2021-12-01Paper
Ouroboros Praos: an adaptively-secure, semi-synchronous proof-of-stake blockchain2018-07-09Paper
Provably robust sponge-based PRNGs and KDFs
Advances in Cryptology – EUROCRYPT 2016
2016-09-09Paper
Generic security of NMAC and HMAC with input whitening
Advances in Cryptology – ASIACRYPT 2015
2016-03-23Paper
The exact PRF security of truncation: tight bounds for keyed sponges and truncated CBC
Lecture Notes in Computer Science
2015-12-10Paper
Query-complexity amplification for random oracles
Lecture Notes in Computer Science
2015-09-24Paper
Relaxing full-codebook security: a refined analysis of key-length extension schemes
Fast Software Encryption
2015-09-18Paper
The exact PRF-security of NMAC and HMAC
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Plain versus randomized cascading-based key-length extension for block ciphers
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Resource-restricted indifferentiability
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Efficient and optimally secure key-length extension for block ciphers via randomized cascading
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
Free-start distinguishing: combining two types of indistinguishability amplification
Lecture Notes in Computer Science
2010-09-29Paper
Cascade Encryption Revisited
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
On ciphertext undetectability2009-03-11Paper
Assisted Problem Solving and Decompositions of Finite Automata
SOFSEM 2008: Theory and Practice of Computer Science
2008-03-07Paper


Research outcomes over time


This page was built for person: Peter Gaži