Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
144 Publications
2025 | Published | Conference Paper | IST-REx-ID: 19712 |
Cueto Noval, Miguel, et al. “On the Soundness of Algebraic Attacks against Code-Based Assumptions.” 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, vol. 15606, Springer Nature, 2025, pp. 385–415, doi:10.1007/978-3-031-91095-1_14.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2025 | Conference Paper | IST-REx-ID: 19738 |
Acharya, Anasuya, et al. “Securely Instantiating ‘Half Gates’ Garbling in the Standard Model.” 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, vol. 15677, Springer Nature, 2025, pp. 37–75, doi:10.1007/978-3-031-91829-2_2.
[Preprint]
View
| DOI
| Download Preprint (ext.)
2025 | Published | Conference Paper | IST-REx-ID: 20053 |
Chatterjee, Krishnendu, et al. “When Is Liquid Democracy Possible?: On the Manipulation of Variance.” Proceedings of the ACM Symposium on Principles of Distributed Computing, ACM, 2025, pp. 241–51, doi:10.1145/3732772.3733544.
[Published Version]
View
| Files available
| DOI
| Download Published Version (ext.)
| WoS
2025 | Published | Conference Paper | IST-REx-ID: 20587 |
Baig, Mirza Ahad, et al. “Nakamoto Consensus from Multiple Resources.” 7th Conference on Advances in Financial Technologies, vol. 354, 16, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2025, doi:10.4230/LIPIcs.AFT.2025.16.
[Published Version]
View
| Files available
| DOI
| Download Published Version (ext.)
| arXiv
2025 | Published | Conference Paper | IST-REx-ID: 19600 |
Avarikioti, Zeta, et al. “Route Discovery in Private Payment Channel Networks.” Computer Security. ESORICS 2024 International Workshops, vol. 15263, Springer Nature, 2025, pp. 207–23, doi:10.1007/978-3-031-82349-7_15.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2025 | Published | Conference Paper | IST-REx-ID: 19778 |
Hoffmann, Charlotte, and Krzysztof Z. Pietrzak. “Watermarkable and Zero-Knowledge Verifiable Delay Functions from Any Proof of Exponentiation.” 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, vol. 15674, Springer Nature, 2025, pp. 36–66, doi:10.1007/978-3-031-91820-9_2.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
2024 | Published | Conference Paper | IST-REx-ID: 15007 |
Alpos, Orestis, et al. “Eating Sandwiches: Modular and Lightweight Elimination of Transaction Reordering Attacks.” 27th International Conference on Principles of Distributed Systems, vol. 286, 12, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2024, doi:10.4230/LIPIcs.OPODIS.2023.12.
[Published Version]
View
| Files available
| DOI
| arXiv
2024 | Published | Conference Paper | IST-REx-ID: 18702 |
Anastos, Michael, et al. “The Cost of Maintaining Keys in Dynamic Groups with Applications to Multicast Encryption and Group Messaging.” 22nd International Conference on Theory of Cryptography, vol. 15364, Springer Nature, 2024, pp. 413–43, doi:10.1007/978-3-031-78011-0_14.
[Preprint]
View
| DOI
| Download Preprint (ext.)
2024 | Published | Conference Paper | IST-REx-ID: 17328 |
Chatterjee, Krishnendu, et al. “Fully Automated Selfish Mining Analysis in Efficient Proof Systems Blockchains.” Proceedings of the 43rd Annual ACM Symposium on Principles of Distributed Computing, Association for Computing Machinery, 2024, pp. 268–78, doi:10.1145/3662158.3662769.
[Published Version]
View
| Files available
| DOI
| arXiv
2024 | Published | Journal Article | IST-REx-ID: 18961 |
Günther, Christoph Ullrich, and Krzysztof Z. Pietrzak. “Deniability in Automated Contact Tracing: Impossibilities and Possibilities.” Proceedings on Privacy Enhancing Technologies, vol. 2024, no. 4, Privacy Enhancing Technologies Symposium Advisory Board, 2024, pp. 636–48, doi:10.56553/popets-2024-0134.
[Published Version]
View
| Files available
| DOI
2024 | Published | Conference Paper | IST-REx-ID: 17051 |
Auerbach, Benedikt, et al. “Trapdoor Memory-Hard Functions.” 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, vol. 14653, Springer Nature, 2024, pp. 315–44, doi:10.1007/978-3-031-58734-4_11.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
2024 | Published | Conference Paper | IST-REx-ID: 17126 |
Tairi, Erkan, and Akin Ünal. “Lower Bounds for Lattice-Based Compact Functional Encryption.” Advances in Cryptology – EUROCRYPT 2024, vol. 14652, Springer Nature, 2024, pp. 249–79, doi:10.1007/978-3-031-58723-8_9.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
| WoS
2024 | Published | Conference Paper | IST-REx-ID: 18086
Alwen, Joel F., et al. “DeCAF: Decentralizable CGKA with Fast Healing.” Security and Cryptography for Networks: 14th International Conference, edited by Clemente Galdi and Duong Hieu Phan, vol. 14974, Springer Nature, 2024, pp. 294–313, doi:10.1007/978-3-031-71073-5_14.
View
| Files available
| DOI
| WoS
2024 | Published | Conference Paper | IST-REx-ID: 18756 |
Brzuska, Chris, et al. “Evasive LWE Assumptions: Definitions, Classes, and Counterexamples.” 30th International Conference on the Theory and Application of Cryptology and Information Security, vol. 15487, Springer Nature, 2024, pp. 418–49, doi:10.1007/978-981-96-0894-2_14.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
2024 | Published | Conference Paper | IST-REx-ID: 18755 |
Ebrahimi, Ehsan, and Anshu Yadav. “Strongly Secure Universal Thresholdizer.” 30th International Conference on the Theory and Application of Cryptology and Information Security, vol. 15486, Springer Nature, 2024, pp. 207–39, doi:10.1007/978-981-96-0891-1_7.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
2024 | Published | Thesis | IST-REx-ID: 18088 |
Pascual Perez, Guillermo. On the Efficiency and Security of Secure Group Messaging. Institute of Science and Technology Austria, 2024, doi:10.15479/at:ista:18088.
[Published Version]
View
| Files available
| DOI
2024 | Published | Journal Article | IST-REx-ID: 14820 |
Schmid, Stefan, et al. “Weighted Packet Selection for Rechargeable Links in Cryptocurrency Networks: Complexity and Approximation.” Theoretical Computer Science, vol. 989, 114353, Elsevier, 2024, doi:10.1016/j.tcs.2023.114353.
[Published Version]
View
| Files available
| DOI
| WoS
2023 | Published | Journal Article | IST-REx-ID: 12164 |
Baig, Mirza Ahad, et al. “Long-Lived Counters with Polylogarithmic Amortized Step Complexity.” Distributed Computing, vol. 36, Springer Nature, 2023, pp. 29–43, doi:10.1007/s00446-022-00439-5.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
2023 | Published | Conference Paper | IST-REx-ID: 14428 |
Dodis, Yevgeniy, et al. “Random Oracle Combiners: Breaking the Concatenation Barrier for Collision-Resistance.” 43rd Annual International Cryptology Conference, vol. 14082, Springer Nature, 2023, pp. 514–46, doi:10.1007/978-3-031-38545-2_17.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
2023 | Published | Conference Paper | IST-REx-ID: 14457 |
Hoffmann, Charlotte, and Mark Simkin. “Stronger Lower Bounds for Leakage-Resilient Secret Sharing.” 8th International Conference on Cryptology and Information Security in Latin America, vol. 14168, Springer Nature, 2023, pp. 215–28, doi:10.1007/978-3-031-44469-2_11.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS