Aggelos Kiayias

From MaRDI portal
Person:357116

Available identifiers

zbMath Open kiayias.aggelosMaRDI QIDQ357116

List of research outcomes





PublicationDate of PublicationType
Towards permissionless consensus in the standard model via fine-grained complexity2024-12-04Paper
Universal composable transaction serialization with order fairness2024-12-04Paper
Ordering transactions with bounded unfairness: definitions, complexity and constructions2024-11-13Paper
Proof-of-work-based consensus in expected-constant time2024-11-13Paper
Approximate lower bound arguments2024-11-13Paper
Blockchain participation games2024-09-20Paper
Agile cryptography: a universally composable approach2024-08-15Paper
(Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates2024-04-21Paper
Permissionless clock synchronization with public setup2023-08-14Paper
Decentralizing information technology: the advent of resource based systems2023-07-28Paper
Watermarkable public key encryption with efficient extraction under standard assumptions2023-07-25Paper
Ofelimos: combinatorial optimization via proof-of-useful-work. A provably secure blockchain protocol2023-06-28Paper
Crowd verifiable zero-knowledge and end-to-end verifiable multiparty computation2023-03-29Paper
Account management in proof of stake ledgers2022-12-16Paper
Making Any Identity-Based Encryption Accountable, Efficiently2022-08-19Paper
TOPPSS: Cost-Minimal Password-Protected Secret Sharing Based on Threshold OPRF2022-07-01Paper
SoK: communication across distributed ledgers2022-06-22Paper
Efficient state management in distributed ledgers2022-06-22Paper
Fast isomorphic state channels2022-06-22Paper
Multi-instance publicly verifiable time-lock puzzle and its applications2022-06-22Paper
Mining for privacy: how to bootstrap a snarky blockchain2022-06-17Paper
Composition with knowledge assumptions2022-05-18Paper
Resource-restricted cryptography: revisiting MPC bounds in the proof-of-work era2022-03-23Paper
Dynamic ad hoc clock synchronization2021-12-08Paper
Blockchains from non-idealized hash functions2021-12-01Paper
Ledger combiners for fast settlement2021-12-01Paper
Timed signatures and zero-knowledge proofs -- timestamping in the blockchain era2021-02-23Paper
Proof-of-burn2021-02-08Paper
The Combinatorics of the Longest-Chain Rule: Linear Consistency for Proof-of-Stake Blockchains2021-02-02Paper
Smart Contract Derivatives2021-02-02Paper
One-shot signatures and applications to hybrid quantum/classical authentication2021-01-19Paper
SoK: a consensus taxonomy in the blockchain era2020-08-05Paper
Consensus from signatures of work2020-08-05Paper
Non-malleable codes for partial functions with manipulation detection2020-06-30Paper
Compact Storage of Superblocks for NIPoPoW Applications2020-06-29Paper
On trees, chains and fast transactions in the blockchain2020-03-02Paper
The combinatorics of hidden diversity2020-02-20Paper
A universally composable framework for the privacy of email ecosystems2019-01-23Paper
Secure outsourcing of cryptographic circuits manufacturing2018-11-07Paper
Graded signatures2018-10-18Paper
Distributed parameter generation for bilinear Diffie Hellman exponentiation and applications2018-10-18Paper
On the security properties of e-voting bulletin boards2018-10-17Paper
Ouroboros Praos: an adaptively-secure, semi-synchronous proof-of-stake blockchain2018-07-09Paper
Bootstrapping the blockchain, with applications to consensus and fast PKI setup2018-05-29Paper
The Bitcoin backbone protocol with chains of variable difficulty2017-11-03Paper
Ouroboros: a provably secure proof-of-stake blockchain protocol2017-11-03Paper
Ceremonies for End-to-End Verifiable Elections2017-06-13Paper
Resource-based corruptions and the combinatorics of hidden diversity2017-05-16Paper
Indistinguishable Proofs of Work or Knowledge2017-01-06Paper
Fair and Robust Multi-party Computation Using a Global Transaction Ledger2016-07-15Paper
Communication Optimal Tardos-Based Asymmetric Fingerprinting2016-03-02Paper
The Bitcoin Backbone Protocol: Analysis and Applications2015-09-30Paper
End-to-End Verifiable Elections in the Standard Model2015-09-30Paper
Scalable public-key tracing and revoking2015-09-04Paper
Distributing the setup in universally composable multi-party computation2015-09-03Paper
A Little Honesty Goes a Long Way2015-07-06Paper
Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model2015-01-06Paper
Efficient Proofs of Secure Erasure2014-10-14Paper
A one-time stegosystem and applications to efficient covert communication2014-04-01Paper
Solving the at-most-once problem with nearly optimal effectiveness2014-01-10Paper
Tamper Resilient Circuits: The Adversary at the Gates2013-12-10Paper
Encryption for digital content2013-07-29Paper
Scalable public-key tracing and revoking2013-06-07Paper
The Strong At-Most-Once Problem2013-03-13Paper
BiTR: Built-in Tamper Resilience2011-12-02Paper
On the Effects of Pirate Evolution on the Design of Digital Content Distribution Systems2011-06-08Paper
https://portal.mardi4nfdi.de/entity/Q30011252011-05-31Paper
Breaking and Repairing Asymmetric Public-Key Traitor Tracing2011-03-18Paper
Improving the Round Complexity of Traitor Tracing Schemes2010-07-06Paper
The Vector-Ballot Approach for Online Voting Procedures2010-06-17Paper
Multi-query Computationally-Private Information Retrieval with Constant Communication Rate2010-05-28Paper
Computer Aided Verification2010-03-31Paper
At-Most-Once Semantics in Asynchronous Shared Memory2009-11-19Paper
Secure Function Collection with Sublinear Storage2009-07-14Paper
On the Portability of Generalized Schnorr Proofs2009-05-12Paper
Zero-Knowledge Proofs with Witness Elimination2009-03-24Paper
Pirate Evolution: How to Make the Most of Your Traitor Keys2009-03-10Paper
Cryptographic Hardness Based on the Decoding of Reed–Solomon Codes2009-02-24Paper
Concurrent Blind Signatures Without Random Oracles2008-11-27Paper
Privacy Preserving Data Mining within Anonymous Credential Systems2008-11-20Paper
Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination2008-09-09Paper
Group Encryption2008-05-15Paper
Group Signatures with Efficient Concurrent Join2008-05-06Paper
Equivocal Blind Signatures and Adaptive UC-Security2008-03-05Paper
Trading Static for Adaptive Security in Universally Composable Zero-Knowledge2007-11-28Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice2007-09-20Paper
Decoding interleaved Reed-Solomon codes over noisy channels2007-07-16Paper
Applied Cryptography and Network Security2007-05-02Paper
Progress in Cryptology – Mycrypt 20052006-10-05Paper
Automata, Languages and Programming2006-01-10Paper
Financial Cryptography and Data Security2005-12-22Paper
Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice2005-08-12Paper
Financial Cryptography2005-06-13Paper
https://portal.mardi4nfdi.de/entity/Q47372632004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q47389362004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q47371602004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q30439332004-08-09Paper
https://portal.mardi4nfdi.de/entity/Q47364272004-08-09Paper
https://portal.mardi4nfdi.de/entity/Q44491672004-02-08Paper
https://portal.mardi4nfdi.de/entity/Q44349032003-11-26Paper
https://portal.mardi4nfdi.de/entity/Q44150642003-07-28Paper
https://portal.mardi4nfdi.de/entity/Q47837202002-12-08Paper
https://portal.mardi4nfdi.de/entity/Q45350742002-06-12Paper

Research outcomes over time

This page was built for person: Aggelos Kiayias