Aggelos Kiayias

From MaRDI portal
(Redirected from Person:357116)


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Towards permissionless consensus in the standard model via fine-grained complexity
 
2024-12-04Paper
Universal composable transaction serialization with order fairness
 
2024-12-04Paper
Ordering transactions with bounded unfairness: definitions, complexity and constructions
 
2024-11-13Paper
Proof-of-work-based consensus in expected-constant time
 
2024-11-13Paper
Approximate lower bound arguments
 
2024-11-13Paper
Blockchain participation games
 
2024-09-20Paper
Agile cryptography: a universally composable approach
 
2024-08-15Paper
(Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates
Journal of Cryptology
2024-04-21Paper
Permissionless clock synchronization with public setup
Theory of Cryptography
2023-08-14Paper
Decentralizing information technology: the advent of resource based systems
Algorithmic Game Theory
2023-07-28Paper
Watermarkable public key encryption with efficient extraction under standard assumptions
Lecture Notes in Computer Science
2023-07-25Paper
Ofelimos: combinatorial optimization via proof-of-useful-work. A provably secure blockchain protocol
Advances in Cryptology – CRYPTO 2022
2023-06-28Paper
Crowd verifiable zero-knowledge and end-to-end verifiable multiparty computation
 
2023-03-29Paper
Account management in proof of stake ledgers
 
2022-12-16Paper
Making Any Identity-Based Encryption Accountable, Efficiently
Computer Security -- ESORICS 2015
2022-08-19Paper
TOPPSS: cost-minimal password-protected secret sharing based on threshold OPRF
 
2022-07-01Paper
SoK: communication across distributed ledgers
 
2022-06-22Paper
Efficient state management in distributed ledgers
 
2022-06-22Paper
Fast isomorphic state channels
 
2022-06-22Paper
Multi-instance publicly verifiable time-lock puzzle and its applications
 
2022-06-22Paper
Mining for privacy: how to bootstrap a snarky blockchain
 
2022-06-17Paper
Composition with knowledge assumptions
 
2022-05-18Paper
Resource-restricted cryptography: revisiting MPC bounds in the proof-of-work era
 
2022-03-23Paper
Dynamic ad hoc clock synchronization
 
2021-12-08Paper
Blockchains from non-idealized hash functions
 
2021-12-01Paper
Ledger combiners for fast settlement
 
2021-12-01Paper
Timed signatures and zero-knowledge proofs -- timestamping in the blockchain era
 
2021-02-23Paper
Proof-of-burn
 
2021-02-08Paper
The Combinatorics of the Longest-Chain Rule: Linear Consistency for Proof-of-Stake Blockchains
Proceedings of the Fourteenth Annual ACM-SIAM Symposium on Discrete Algorithms
2021-02-02Paper
Smart contract derivatives
Mathematical Research for Blockchain Economy
2021-02-02Paper
One-shot signatures and applications to hybrid quantum/classical authentication
Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing
2021-01-19Paper
SoK: a consensus taxonomy in the blockchain era
 
2020-08-05Paper
Consensus from signatures of work
 
2020-08-05Paper
Non-malleable codes for partial functions with manipulation detection
 
2020-06-30Paper
Compact Storage of Superblocks for NIPoPoW Applications
Mathematical Research for Blockchain Economy
2020-06-29Paper
On trees, chains and fast transactions in the blockchain
 
2020-03-02Paper
The combinatorics of hidden diversity
Theoretical Computer Science
2020-02-20Paper
A universally composable framework for the privacy of email ecosystems
 
2019-01-23Paper
Secure outsourcing of cryptographic circuits manufacturing
 
2018-11-07Paper
Graded signatures
 
2018-10-18Paper
Distributed parameter generation for bilinear Diffie Hellman exponentiation and applications
 
2018-10-18Paper
On the security properties of e-voting bulletin boards
 
2018-10-17Paper
Ouroboros Praos: an adaptively-secure, semi-synchronous proof-of-stake blockchain
 
2018-07-09Paper
Bootstrapping the blockchain, with applications to consensus and fast PKI setup
 
2018-05-29Paper
The Bitcoin backbone protocol with chains of variable difficulty
 
2017-11-03Paper
Ouroboros: a provably secure proof-of-stake blockchain protocol
 
2017-11-03Paper
Ceremonies for End-to-End Verifiable Elections
Lecture Notes in Computer Science
2017-06-13Paper
Resource-based corruptions and the combinatorics of hidden diversity
Proceedings of the 4th conference on Innovations in Theoretical Computer Science
2017-05-16Paper
Indistinguishable proofs of work or knowledge
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Fair and robust multi-party computation using a global transaction ledger
Advances in Cryptology – EUROCRYPT 2016
2016-07-15Paper
Communication optimal Tardos-based asymmetric fingerprinting
Lecture Notes in Computer Science
2016-03-02Paper
The Bitcoin Backbone Protocol: Analysis and Applications
Advances in Cryptology - EUROCRYPT 2015
2015-09-30Paper
End-to-End Verifiable Elections in the Standard Model
Advances in Cryptology - EUROCRYPT 2015
2015-09-30Paper
Scalable public-key tracing and revoking
Proceedings of the twenty-second annual symposium on Principles of distributed computing
2015-09-04Paper
Distributing the setup in universally composable multi-party computation
Proceedings of the 2014 ACM symposium on Principles of distributed computing
2015-09-03Paper
A little honesty goes a long way. The two-tier model for secure multiparty computation
Theory of Cryptography
2015-07-06Paper
Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model
Lecture Notes in Computer Science
2015-01-06Paper
Efficient Proofs of Secure Erasure
Lecture Notes in Computer Science
2014-10-14Paper
A one-time stegosystem and applications to efficient covert communication
Journal of Cryptology
2014-04-01Paper
Solving the at-most-once problem with nearly optimal effectiveness
Theoretical Computer Science
2014-01-10Paper
Tamper resilient circuits: the adversary at the gates
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Encryption for digital content
Advances in Information Security
2013-07-29Paper
Scalable public-key tracing and revoking
Distributed Computing
2013-06-07Paper
The strong at-most-once problem
Lecture Notes in Computer Science
2013-03-13Paper
BiTR: built-in tamper resilience
Lecture Notes in Computer Science
2011-12-02Paper
On the Effects of Pirate Evolution on the Design of Digital Content Distribution Systems
Lecture Notes in Computer Science
2011-06-08Paper
Electronic voting
 
2011-05-31Paper
Breaking and repairing asymmetric public-key traitor tracing
Lecture Notes in Computer Science
2011-03-18Paper
Improving the round complexity of traitor tracing schemes
Applied Cryptography and Network Security
2010-07-06Paper
The vector-ballot approach for online voting procedures
Towards Trustworthy Elections
2010-06-17Paper
Multi-query Computationally-Private Information Retrieval with Constant Communication Rate
Public Key Cryptography – PKC 2010
2010-05-28Paper
Non-interactive zero-sharing with applications to private distributed decision making
Lecture Notes in Computer Science
2010-03-31Paper
At-Most-Once Semantics in Asynchronous Shared Memory
Lecture Notes in Computer Science
2009-11-19Paper
Secure Function Collection with Sublinear Storage
Automata, Languages and Programming
2009-07-14Paper
On the Portability of Generalized Schnorr Proofs
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
Zero-Knowledge Proofs with Witness Elimination
Public Key Cryptography – PKC 2009
2009-03-24Paper
Pirate Evolution: How to Make the Most of Your Traitor Keys
Advances in Cryptology - CRYPTO 2007
2009-03-10Paper
Cryptographic Hardness Based on the Decoding of Reed–Solomon Codes
IEEE Transactions on Information Theory
2009-02-24Paper
Concurrent Blind Signatures Without Random Oracles
Lecture Notes in Computer Science
2008-11-27Paper
Privacy Preserving Data Mining within Anonymous Credential Systems
Lecture Notes in Computer Science
2008-11-20Paper
Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination
Financial Cryptography and Data Security
2008-09-09Paper
Group Encryption
Advances in Cryptology – ASIACRYPT 2007
2008-05-15Paper
Group Signatures with Efficient Concurrent Join
Lecture Notes in Computer Science
2008-05-06Paper
Equivocal Blind Signatures and Adaptive UC-Security
Theory of Cryptography
2008-03-05Paper
Trading Static for Adaptive Security in Universally Composable Zero-Knowledge
Automata, Languages and Programming
2007-11-28Paper
Advances in Cryptology - EUROCRYPT 2004
Lecture Notes in Computer Science
2007-09-25Paper
Advances in Cryptology - EUROCRYPT 2004
Lecture Notes in Computer Science
2007-09-25Paper
Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice
Designs, Codes and Cryptography
2007-09-20Paper
Decoding interleaved Reed-Solomon codes over noisy channels
Theoretical Computer Science
2007-07-16Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2007-05-02Paper
Progress in Cryptology – Mycrypt 2005
Lecture Notes in Computer Science
2006-10-05Paper
Automata, Languages and Programming
Lecture Notes in Computer Science
2006-01-10Paper
Financial Cryptography and Data Security
Lecture Notes in Computer Science
2005-12-22Paper
Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice
 
2005-08-12Paper
Financial Cryptography
Lecture Notes in Computer Science
2005-06-13Paper
scientific article; zbMATH DE number 2086724 (Why is no real title available?)
 
2004-08-11Paper
scientific article; zbMATH DE number 2087909 (Why is no real title available?)
 
2004-08-11Paper
scientific article; zbMATH DE number 2086625 (Why is no real title available?)
 
2004-08-11Paper
scientific article; zbMATH DE number 2085427 (Why is no real title available?)
 
2004-08-09Paper
scientific article; zbMATH DE number 2085200 (Why is no real title available?)
 
2004-08-09Paper
scientific article; zbMATH DE number 2038702 (Why is no real title available?)
 
2004-02-08Paper
scientific article; zbMATH DE number 2009984 (Why is no real title available?)
 
2003-11-26Paper
scientific article; zbMATH DE number 1953880 (Why is no real title available?)
 
2003-07-28Paper
scientific article; zbMATH DE number 1842486 (Why is no real title available?)
 
2002-12-08Paper
scientific article; zbMATH DE number 1754646 (Why is no real title available?)
 
2002-06-12Paper


Research outcomes over time


This page was built for person: Aggelos Kiayias