Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.




156 Publications

2026 | Published | Conference Paper | IST-REx-ID: 21042 | OA
Anthemius: Efficient and modular block assembly for concurrent execution
R. Neiheiser, E. Kokoris Kogias, in:, 29th International Conference on Financial Cryptography and Data Security, Springer Nature, 2026, pp. 307–323.
[Preprint] View | DOI | Download Preprint (ext.) | arXiv
 
2026 | Published | Conference Paper | IST-REx-ID: 21134 | OA
On the (in)security of Proofs-of-space based longest-chain blockchains
M.A. Baig, K.Z. Pietrzak, in:, 29th International Conference on Financial Cryptography and Data Security, Springer Nature, 2026, pp. 127–142.
[Preprint] View | Files available | DOI | Download Preprint (ext.) | arXiv
 
2026 | Published | Thesis | PhD | IST-REx-ID: 21651 | OA
On secure chain selection rules from physical resources in a permissionless setting
M.A. Baig, On Secure Chain Selection Rules from Physical Resources in a Permissionless Setting, Institute of Science and Technology Austria, 2026.
[Published Version] View | Files available | DOI
 
2025 | Published | Conference Paper | IST-REx-ID: 20053 | OA
When is liquid democracy possible?: On the manipulation of variance
K. Chatterjee, S. Gilbert, S. Schmid, J. Svoboda, M.X. Yeo, in:, Proceedings of the ACM Symposium on Principles of Distributed Computing, Association for Computing Machinery, 2025, pp. 241–251.
[Published Version] View | Files available | DOI | Download Published Version (ext.) | WoS
 
2025 | Published | Conference Paper | IST-REx-ID: 19600 | OA
Route discovery in private payment channel networks
Z. Avarikioti, M. Bastankhah, M.A. Maddah-Ali, K.Z. Pietrzak, J. Svoboda, M.X. Yeo, in:, Computer Security. ESORICS 2024 International Workshops, Springer Nature, 2025, pp. 207–223.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 
2025 | Published | Conference Paper | IST-REx-ID: 19712 | OA
On the soundness of algebraic attacks against code-based assumptions
M. Cueto Noval, S.-P. Merz, P. Stählin, A. Ünal, in:, 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer Nature, 2025, pp. 385–415.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 
2025 | Conference Paper | IST-REx-ID: 19738 | OA
Securely instantiating ‘Half Gates’ garbling in the standard model
A. Acharya, K. Azari, M.A. Baig, D. Hofheinz, C. Kamath, in:, 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Springer Nature, 2025, pp. 37–75.
[Preprint] View | DOI | Download Preprint (ext.)
 
2025 | Published | Conference Paper | IST-REx-ID: 20844 | OA
Space-deniable proofs
J. Dujmovic, C.U. Günther, K.Z. Pietrzak, in:, 23rd International Conference on Theory of Cryptography, Springer Nature, 2025, pp. 171–202.
[Preprint] View | DOI | Download Preprint (ext.)
 
2025 | Published | Conference Paper | IST-REx-ID: 20845 | OA
Zeroizing attacks against evasive and circular evasive LWE
S. Agrawal, A. Modi, A. Yadav, S. Yamada, in:, 23rd International Conference on Theory of Cryptography, Springer Nature, 2025, pp. 259–290.
[Preprint] View | DOI | Download Preprint (ext.)
 
2025 | Published | Conference Paper | IST-REx-ID: 20846 | OA
Constrained verifiable random functions without obfuscation and friends
N. Brandt, M. Cueto Noval, C.U. Günther, A. Ünal, S. Wohnig, in:, 23rd International Conference on Theory of Cryptography, Springer Nature, 2025, pp. 478–511.
[Preprint] View | DOI | Download Preprint (ext.)
 
2025 | Epub ahead of print | Journal Article | IST-REx-ID: 21017 | OA | PlanS
Kauri: BFT consensus with pipelined tree-based dissemination and aggregation
R. Neiheiser, M. Matos, L. Rodrigues, ACM Transactions on Computer Systems (2025).
[Published Version] View | DOI | Download Published Version (ext.)
 
2025 | Published | Conference Paper | IST-REx-ID: 21262 | OA
Continuous group-key agreement: Concurrent updates without pruning
B. Auerbach, M. Cueto Noval, B. Erol, K.Z. Pietrzak, in:, 45th Annual International Cryptology Conference, Springer Nature, 2025, pp. 141–172.
[Preprint] View | DOI | Download Preprint (ext.)
 
2025 | Published | Conference Paper | IST-REx-ID: 21323 | OA
On extractability of the KZG family of polynomial commitment schemes
J. Belohorec, P. Dvořák, C. Hoffmann, P. Hubáček, K. Mašková, M. Pastyřík, in:, 45th Annual International Cryptology Conference, Springer Nature, 2025, pp. 584–616.
[Preprint] View | DOI | Download Preprint (ext.)
 
2025 | Published | Conference Paper | IST-REx-ID: 20587 | OA
Nakamoto consensus from multiple resources
M.A. Baig, C.U. Günther, K.Z. Pietrzak, in:, 7th Conference on Advances in Financial Technologies, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2025.
[Published Version] View | Files available | DOI | Download Published Version (ext.) | arXiv
 
2025 | Published | Thesis | PhD | IST-REx-ID: 20920 | OA
Theory and applications of verifiable delay functions
C. Hoffmann, Theory and Applications of Verifiable Delay Functions, Institute of Science and Technology Austria, 2025.
[Published Version] View | Files available | DOI
 
2025 | Published | Thesis | PhD | IST-REx-ID: 20556
Theory and applications of verifiable delay functions
C. Hoffmann, Theory and Applications of Verifiable Delay Functions, Institute of Science and Technology Austria, 2025.
[Published Version] View | Files available | DOI
 
2025 | Published | Conference Paper | IST-REx-ID: 19778 | OA
Watermarkable and zero-knowledge Verifiable Delay Functions from any proof of exponentiation
C. Hoffmann, K.Z. Pietrzak, in:, 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Springer Nature, 2025, pp. 36–66.
[Preprint] View | Files available | DOI | Download Preprint (ext.)
 
2024 | Published | Conference Paper | IST-REx-ID: 18702 | OA
The cost of maintaining keys in dynamic groups with applications to multicast encryption and group messaging
M. Anastos, B. Auerbach, M.A. Baig, M. Cueto Noval, M.A. Kwan, G. Pascual Perez, K.Z. Pietrzak, in:, 22nd International Conference on Theory of Cryptography, Springer Nature, 2024, pp. 413–443.
[Preprint] View | DOI | Download Preprint (ext.) | WoS
 
2024 | Published | Conference Paper | IST-REx-ID: 18755 | OA
Strongly secure universal thresholdizer
E. Ebrahimi, A. Yadav, in:, 30th International Conference on the Theory and Application of Cryptology and Information Security, Springer Nature, 2024, pp. 207–239.
[Preprint] View | DOI | Download Preprint (ext.) | WoS
 
2024 | Published | Conference Paper | IST-REx-ID: 18756 | OA
Evasive LWE assumptions: Definitions, classes, and counterexamples
C. Brzuska, A. Ünal, I.K.Y. Woo, in:, 30th International Conference on the Theory and Application of Cryptology and Information Security, Springer Nature, 2024, pp. 418–449.
[Preprint] View | DOI | Download Preprint (ext.) | WoS
 

Filters and Search Terms

type<>research_data_reference

Search

Filter Publications

Display / Sort

Export / Embed