Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.




150 Publications

2025 | Published | Conference Paper | IST-REx-ID: 19712 | OA
Cueto Noval M, Merz S-P, Stählin P, Ünal A. On the soundness of algebraic attacks against code-based assumptions. In: 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Vol 15606. Springer Nature; 2025:385-415. doi:10.1007/978-3-031-91095-1_14
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 
2025 | Conference Paper | IST-REx-ID: 19738 | OA
Acharya A, Azari K, Baig MA, Hofheinz D, Kamath C. Securely instantiating ‘Half Gates’ garbling in the standard model. In: 28th IACR International Conference on Practice and Theory of Public-Key Cryptography. Vol 15677. Springer Nature; 2025:37-75. doi:10.1007/978-3-031-91829-2_2
[Preprint] View | DOI | Download Preprint (ext.)
 
2025 | Published | Conference Paper | IST-REx-ID: 20053 | OA
Chatterjee K, Gilbert S, Schmid S, Svoboda J, Yeo MX. When is liquid democracy possible?: On the manipulation of variance. In: Proceedings of the ACM Symposium on Principles of Distributed Computing. ACM; 2025:241-251. doi:10.1145/3732772.3733544
[Published Version] View | Files available | DOI | Download Published Version (ext.) | WoS
 
2025 | Published | Conference Paper | IST-REx-ID: 20587 | OA
Baig MA, Günther CU, Pietrzak KZ. Nakamoto consensus from multiple resources. In: 7th Conference on Advances in Financial Technologies. Vol 354. Schloss Dagstuhl - Leibniz-Zentrum für Informatik; 2025. doi:10.4230/LIPIcs.AFT.2025.16
[Published Version] View | Files available | DOI | Download Published Version (ext.) | arXiv
 
2025 | Published | Conference Paper | IST-REx-ID: 19600 | OA
Avarikioti Z, Bastankhah M, Maddah-Ali MA, Pietrzak KZ, Svoboda J, Yeo MX. Route discovery in private payment channel networks. In: Computer Security. ESORICS 2024 International Workshops. Vol 15263. Springer Nature; 2025:207-223. doi:10.1007/978-3-031-82349-7_15
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 
2025 | Published | Conference Paper | IST-REx-ID: 20846 | OA
Brandt N, Cueto Noval M, Günther CU, Ünal A, Wohnig S. Constrained verifiable random functions without obfuscation and friends. In: 23rd International Conference on Theory of Cryptography. Vol 16271. Springer Nature; 2025:478-511. doi:10.1007/978-3-032-12290-2_16
[Preprint] View | DOI | Download Preprint (ext.)
 
2025 | Published | Conference Paper | IST-REx-ID: 20845 | OA
Agrawal S, Modi A, Yadav A, Yamada S. Zeroizing attacks against evasive and circular evasive LWE. In: 23rd International Conference on Theory of Cryptography. Vol 16269. Springer Nature; 2025:259-290. doi:10.1007/978-3-032-12293-3_9
[Preprint] View | DOI | Download Preprint (ext.)
 
2025 | Published | Conference Paper | IST-REx-ID: 20844 | OA
Dujmovic J, Günther CU, Pietrzak KZ. Space-deniable proofs. In: 23rd International Conference on Theory of Cryptography. Vol 16271. Springer Nature; 2025:171-202. doi:10.1007/978-3-032-12290-2_6
[Preprint] View | DOI | Download Preprint (ext.)
 
2025 | Published | Thesis | IST-REx-ID: 20920 | OA
Hoffmann C. Theory and applications of verifiable delay functions. 2025. doi:10.15479/AT-ISTA-20920
[Published Version] View | Files available | DOI
 
2025 | Published | Thesis | IST-REx-ID: 20556
Hoffmann C. Theory and applications of verifiable delay functions. 2025. doi:10.15479/AT-ISTA-20556
[Published Version] View | Files available | DOI
 
2025 | Published | Conference Paper | IST-REx-ID: 19778 | OA
Hoffmann C, Pietrzak KZ. Watermarkable and zero-knowledge Verifiable Delay Functions from any proof of exponentiation. In: 28th IACR International Conference on Practice and Theory of Public-Key Cryptography. Vol 15674. Springer Nature; 2025:36-66. doi:10.1007/978-3-031-91820-9_2
[Preprint] View | Files available | DOI | Download Preprint (ext.)
 
2024 | Published | Conference Paper | IST-REx-ID: 17328 | OA
Chatterjee K, Ebrahimzadeh A, Karrabi M, Pietrzak KZ, Yeo MX, Zikelic D. Fully automated selfish mining analysis in efficient proof systems blockchains. In: Proceedings of the 43rd Annual ACM Symposium on Principles of Distributed Computing. Association for Computing Machinery; 2024:268-278. doi:10.1145/3662158.3662769
[Published Version] View | Files available | DOI | arXiv
 
2024 | Published | Journal Article | IST-REx-ID: 18961 | OA
Günther CU, Pietrzak KZ. Deniability in automated contact tracing: Impossibilities and possibilities. Proceedings on Privacy Enhancing Technologies. 2024;2024(4):636-648. doi:10.56553/popets-2024-0134
[Published Version] View | Files available | DOI
 
2024 | Published | Conference Paper | IST-REx-ID: 17051 | OA
Auerbach B, Günther CU, Pietrzak KZ. Trapdoor memory-hard functions. In: 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques. Vol 14653. Springer Nature; 2024:315-344. doi:10.1007/978-3-031-58734-4_11
[Preprint] View | DOI | Download Preprint (ext.) | WoS
 
2024 | Published | Conference Paper | IST-REx-ID: 17126 | OA
Tairi E, Ünal A. Lower bounds for lattice-based compact functional encryption. In: Advances in Cryptology – EUROCRYPT 2024. Vol 14652. Springer Nature; 2024:249-279. doi:10.1007/978-3-031-58723-8_9
[Submitted Version] View | DOI | Download Submitted Version (ext.) | WoS
 
2024 | Published | Conference Paper | IST-REx-ID: 18086
Alwen JF, Auerbach B, Cueto Noval M, Klein K, Pascual Perez G, Pietrzak KZ. DeCAF: Decentralizable CGKA with fast healing. In: Galdi C, Phan DH, eds. Security and Cryptography for Networks: 14th International Conference. Vol 14974. Cham: Springer Nature; 2024:294–313. doi:10.1007/978-3-031-71073-5_14
View | Files available | DOI | WoS
 
2024 | Published | Conference Paper | IST-REx-ID: 18756 | OA
Brzuska C, Ünal A, Woo IKY. Evasive LWE assumptions: Definitions, classes, and counterexamples. In: 30th International Conference on the Theory and Application of Cryptology and Information Security. Vol 15487. Springer Nature; 2024:418-449. doi:10.1007/978-981-96-0894-2_14
[Preprint] View | DOI | Download Preprint (ext.) | WoS
 
2024 | Published | Conference Paper | IST-REx-ID: 18755 | OA
Ebrahimi E, Yadav A. Strongly secure universal thresholdizer. In: 30th International Conference on the Theory and Application of Cryptology and Information Security. Vol 15486. Springer Nature; 2024:207-239. doi:10.1007/978-981-96-0891-1_7
[Preprint] View | DOI | Download Preprint (ext.) | WoS
 
2024 | Published | Thesis | IST-REx-ID: 18088 | OA
Pascual Perez G. On the efficiency and security of secure group messaging. 2024. doi:10.15479/at:ista:18088
[Published Version] View | Files available | DOI
 
2024 | Published | Conference Paper | IST-REx-ID: 15007 | OA
Alpos O, Amores-Sesar I, Cachin C, Yeo MX. Eating sandwiches: Modular and lightweight elimination of transaction reordering attacks. In: 27th International Conference on Principles of Distributed Systems. Vol 286. Schloss Dagstuhl - Leibniz-Zentrum für Informatik; 2024. doi:10.4230/LIPIcs.OPODIS.2023.12
[Published Version] View | Files available | DOI | WoS | arXiv
 

Filters and Search Terms

type<>research_data

Search

Filter Publications

Display / Sort

Citation Style: AMA

Export / Embed