Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
155 Publications
2026 |
Published |
Conference Paper |
IST-REx-ID: 21042 |
Anthemius: Efficient and modular block assembly for concurrent execution
R. Neiheiser, E. Kokoris Kogias, in:, 29th International Conference on Financial Cryptography and Data Security, Springer Nature, 2026, pp. 307–323.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| arXiv
R. Neiheiser, E. Kokoris Kogias, in:, 29th International Conference on Financial Cryptography and Data Security, Springer Nature, 2026, pp. 307–323.
2026 |
Published |
Conference Paper |
IST-REx-ID: 21134 |
On the (in)security of Proofs-of-space based longest-chain blockchains
M.A. Baig, K.Z. Pietrzak, in:, 29th International Conference on Financial Cryptography and Data Security, Springer Nature, 2026, pp. 127–142.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| arXiv
M.A. Baig, K.Z. Pietrzak, in:, 29th International Conference on Financial Cryptography and Data Security, Springer Nature, 2026, pp. 127–142.
2025 |
Published |
Conference Paper |
IST-REx-ID: 19778 |
Watermarkable and zero-knowledge Verifiable Delay Functions from any proof of exponentiation
C. Hoffmann, K.Z. Pietrzak, in:, 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Springer Nature, 2025, pp. 36–66.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
C. Hoffmann, K.Z. Pietrzak, in:, 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Springer Nature, 2025, pp. 36–66.
2025 |
Published |
Conference Paper |
IST-REx-ID: 20053 |
When is liquid democracy possible?: On the manipulation of variance
K. Chatterjee, S. Gilbert, S. Schmid, J. Svoboda, M.X. Yeo, in:, Proceedings of the ACM Symposium on Principles of Distributed Computing, Association for Computing Machinery, 2025, pp. 241–251.
[Published Version]
View
| Files available
| DOI
| Download Published Version (ext.)
| WoS
K. Chatterjee, S. Gilbert, S. Schmid, J. Svoboda, M.X. Yeo, in:, Proceedings of the ACM Symposium on Principles of Distributed Computing, Association for Computing Machinery, 2025, pp. 241–251.
2025 |
Published |
Thesis | PhD |
IST-REx-ID: 20556
Theory and applications of verifiable delay functions
C. Hoffmann, Theory and Applications of Verifiable Delay Functions, Institute of Science and Technology Austria, 2025.
[Published Version]
View
| Files available
| DOI
C. Hoffmann, Theory and Applications of Verifiable Delay Functions, Institute of Science and Technology Austria, 2025.
2025 |
Published |
Conference Paper |
IST-REx-ID: 20587 |
Nakamoto consensus from multiple resources
M.A. Baig, C.U. Günther, K.Z. Pietrzak, in:, 7th Conference on Advances in Financial Technologies, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2025.
[Published Version]
View
| Files available
| DOI
| Download Published Version (ext.)
| arXiv
M.A. Baig, C.U. Günther, K.Z. Pietrzak, in:, 7th Conference on Advances in Financial Technologies, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2025.
2025 |
Published |
Conference Paper |
IST-REx-ID: 19600 |
Route discovery in private payment channel networks
Z. Avarikioti, M. Bastankhah, M.A. Maddah-Ali, K.Z. Pietrzak, J. Svoboda, M.X. Yeo, in:, Computer Security. ESORICS 2024 International Workshops, Springer Nature, 2025, pp. 207–223.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
Z. Avarikioti, M. Bastankhah, M.A. Maddah-Ali, K.Z. Pietrzak, J. Svoboda, M.X. Yeo, in:, Computer Security. ESORICS 2024 International Workshops, Springer Nature, 2025, pp. 207–223.
2025 |
Published |
Conference Paper |
IST-REx-ID: 19712 |
On the soundness of algebraic attacks against code-based assumptions
M. Cueto Noval, S.-P. Merz, P. Stählin, A. Ünal, in:, 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer Nature, 2025, pp. 385–415.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
M. Cueto Noval, S.-P. Merz, P. Stählin, A. Ünal, in:, 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer Nature, 2025, pp. 385–415.
2025 |
Conference Paper |
IST-REx-ID: 19738 |
Securely instantiating ‘Half Gates’ garbling in the standard model
A. Acharya, K. Azari, M.A. Baig, D. Hofheinz, C. Kamath, in:, 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Springer Nature, 2025, pp. 37–75.
[Preprint]
View
| DOI
| Download Preprint (ext.)
A. Acharya, K. Azari, M.A. Baig, D. Hofheinz, C. Kamath, in:, 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Springer Nature, 2025, pp. 37–75.
2025 |
Published |
Conference Paper |
IST-REx-ID: 20844 |
Space-deniable proofs
J. Dujmovic, C.U. Günther, K.Z. Pietrzak, in:, 23rd International Conference on Theory of Cryptography, Springer Nature, 2025, pp. 171–202.
[Preprint]
View
| DOI
| Download Preprint (ext.)
J. Dujmovic, C.U. Günther, K.Z. Pietrzak, in:, 23rd International Conference on Theory of Cryptography, Springer Nature, 2025, pp. 171–202.
2025 |
Published |
Conference Paper |
IST-REx-ID: 20845 |
Zeroizing attacks against evasive and circular evasive LWE
S. Agrawal, A. Modi, A. Yadav, S. Yamada, in:, 23rd International Conference on Theory of Cryptography, Springer Nature, 2025, pp. 259–290.
[Preprint]
View
| DOI
| Download Preprint (ext.)
S. Agrawal, A. Modi, A. Yadav, S. Yamada, in:, 23rd International Conference on Theory of Cryptography, Springer Nature, 2025, pp. 259–290.
2025 |
Published |
Conference Paper |
IST-REx-ID: 20846 |
Constrained verifiable random functions without obfuscation and friends
N. Brandt, M. Cueto Noval, C.U. Günther, A. Ünal, S. Wohnig, in:, 23rd International Conference on Theory of Cryptography, Springer Nature, 2025, pp. 478–511.
[Preprint]
View
| DOI
| Download Preprint (ext.)
N. Brandt, M. Cueto Noval, C.U. Günther, A. Ünal, S. Wohnig, in:, 23rd International Conference on Theory of Cryptography, Springer Nature, 2025, pp. 478–511.
2025 |
Published |
Thesis | PhD |
IST-REx-ID: 20920 |
Theory and applications of verifiable delay functions
C. Hoffmann, Theory and Applications of Verifiable Delay Functions, Institute of Science and Technology Austria, 2025.
[Published Version]
View
| Files available
| DOI
C. Hoffmann, Theory and Applications of Verifiable Delay Functions, Institute of Science and Technology Austria, 2025.
2025 |
Epub ahead of print |
Journal Article |
IST-REx-ID: 21017 |
|
|
Kauri: BFT consensus with pipelined tree-based dissemination and aggregation
R. Neiheiser, M. Matos, L. Rodrigues, ACM Transactions on Computer Systems (2025).
[Published Version]
View
| DOI
| Download Published Version (ext.)
R. Neiheiser, M. Matos, L. Rodrigues, ACM Transactions on Computer Systems (2025).
2025 |
Published |
Conference Paper |
IST-REx-ID: 21262 |
Continuous group-key agreement: Concurrent updates without pruning
B. Auerbach, M. Cueto Noval, B. Erol, K.Z. Pietrzak, in:, 45th Annual International Cryptology Conference, Springer Nature, 2025, pp. 141–172.
[Preprint]
View
| DOI
| Download Preprint (ext.)
B. Auerbach, M. Cueto Noval, B. Erol, K.Z. Pietrzak, in:, 45th Annual International Cryptology Conference, Springer Nature, 2025, pp. 141–172.
2025 |
Published |
Conference Paper |
IST-REx-ID: 21323 |
On extractability of the KZG family of polynomial commitment schemes
J. Belohorec, P. Dvořák, C. Hoffmann, P. Hubáček, K. Mašková, M. Pastyřík, in:, 45th Annual International Cryptology Conference, Springer Nature, 2025, pp. 584–616.
[Preprint]
View
| DOI
| Download Preprint (ext.)
J. Belohorec, P. Dvořák, C. Hoffmann, P. Hubáček, K. Mašková, M. Pastyřík, in:, 45th Annual International Cryptology Conference, Springer Nature, 2025, pp. 584–616.
2024 |
Published |
Conference Paper |
IST-REx-ID: 18086
DeCAF: Decentralizable CGKA with fast healing
J.F. Alwen, B. Auerbach, M. Cueto Noval, K. Klein, G. Pascual Perez, K.Z. Pietrzak, in:, C. Galdi, D.H. Phan (Eds.), Security and Cryptography for Networks: 14th International Conference, Springer Nature, Cham, 2024, pp. 294–313.
View
| Files available
| DOI
| WoS
J.F. Alwen, B. Auerbach, M. Cueto Noval, K. Klein, G. Pascual Perez, K.Z. Pietrzak, in:, C. Galdi, D.H. Phan (Eds.), Security and Cryptography for Networks: 14th International Conference, Springer Nature, Cham, 2024, pp. 294–313.
2024 |
Published |
Thesis | PhD |
IST-REx-ID: 18088 |
On the efficiency and security of secure group messaging
G. Pascual Perez, On the Efficiency and Security of Secure Group Messaging, Institute of Science and Technology Austria, 2024.
[Published Version]
View
| Files available
| DOI
G. Pascual Perez, On the Efficiency and Security of Secure Group Messaging, Institute of Science and Technology Austria, 2024.
2024 |
Published |
Conference Paper |
IST-REx-ID: 18702 |
The cost of maintaining keys in dynamic groups with applications to multicast encryption and group messaging
M. Anastos, B. Auerbach, M.A. Baig, M. Cueto Noval, M.A. Kwan, G. Pascual Perez, K.Z. Pietrzak, in:, 22nd International Conference on Theory of Cryptography, Springer Nature, 2024, pp. 413–443.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
M. Anastos, B. Auerbach, M.A. Baig, M. Cueto Noval, M.A. Kwan, G. Pascual Perez, K.Z. Pietrzak, in:, 22nd International Conference on Theory of Cryptography, Springer Nature, 2024, pp. 413–443.
2024 |
Draft |
Preprint |
IST-REx-ID: 20701 |
Practical batch proofs of exponentiation
C. Hoffmann, P. Hubáček, S. Ivanova, Cryptology EPrint Archive (n.d.).
[Preprint]
View
| Files available
| Download Preprint (ext.)
C. Hoffmann, P. Hubáček, S. Ivanova, Cryptology EPrint Archive (n.d.).