Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
156 Publications
2026 |
Published |
Conference Paper |
IST-REx-ID: 21042 |
Anthemius: Efficient and modular block assembly for concurrent execution
R. Neiheiser, E. Kokoris Kogias, in:, 29th International Conference on Financial Cryptography and Data Security, Springer Nature, 2026, pp. 307–323.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| arXiv
R. Neiheiser, E. Kokoris Kogias, in:, 29th International Conference on Financial Cryptography and Data Security, Springer Nature, 2026, pp. 307–323.
2026 |
Published |
Conference Paper |
IST-REx-ID: 21134 |
On the (in)security of Proofs-of-space based longest-chain blockchains
M.A. Baig, K.Z. Pietrzak, in:, 29th International Conference on Financial Cryptography and Data Security, Springer Nature, 2026, pp. 127–142.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
| arXiv
M.A. Baig, K.Z. Pietrzak, in:, 29th International Conference on Financial Cryptography and Data Security, Springer Nature, 2026, pp. 127–142.
2026 |
Published |
Thesis | PhD |
IST-REx-ID: 21651 |
On secure chain selection rules from physical resources in a permissionless setting
M.A. Baig, On Secure Chain Selection Rules from Physical Resources in a Permissionless Setting, Institute of Science and Technology Austria, 2026.
[Published Version]
View
| Files available
| DOI
M.A. Baig, On Secure Chain Selection Rules from Physical Resources in a Permissionless Setting, Institute of Science and Technology Austria, 2026.
2025 |
Published |
Conference Paper |
IST-REx-ID: 20053 |
When is liquid democracy possible?: On the manipulation of variance
K. Chatterjee, S. Gilbert, S. Schmid, J. Svoboda, M.X. Yeo, in:, Proceedings of the ACM Symposium on Principles of Distributed Computing, Association for Computing Machinery, 2025, pp. 241–251.
[Published Version]
View
| Files available
| DOI
| Download Published Version (ext.)
| WoS
K. Chatterjee, S. Gilbert, S. Schmid, J. Svoboda, M.X. Yeo, in:, Proceedings of the ACM Symposium on Principles of Distributed Computing, Association for Computing Machinery, 2025, pp. 241–251.
2025 |
Published |
Conference Paper |
IST-REx-ID: 19600 |
Route discovery in private payment channel networks
Z. Avarikioti, M. Bastankhah, M.A. Maddah-Ali, K.Z. Pietrzak, J. Svoboda, M.X. Yeo, in:, Computer Security. ESORICS 2024 International Workshops, Springer Nature, 2025, pp. 207–223.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
Z. Avarikioti, M. Bastankhah, M.A. Maddah-Ali, K.Z. Pietrzak, J. Svoboda, M.X. Yeo, in:, Computer Security. ESORICS 2024 International Workshops, Springer Nature, 2025, pp. 207–223.
2025 |
Published |
Conference Paper |
IST-REx-ID: 19712 |
On the soundness of algebraic attacks against code-based assumptions
M. Cueto Noval, S.-P. Merz, P. Stählin, A. Ünal, in:, 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer Nature, 2025, pp. 385–415.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
M. Cueto Noval, S.-P. Merz, P. Stählin, A. Ünal, in:, 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer Nature, 2025, pp. 385–415.
2025 |
Conference Paper |
IST-REx-ID: 19738 |
Securely instantiating ‘Half Gates’ garbling in the standard model
A. Acharya, K. Azari, M.A. Baig, D. Hofheinz, C. Kamath, in:, 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Springer Nature, 2025, pp. 37–75.
[Preprint]
View
| DOI
| Download Preprint (ext.)
A. Acharya, K. Azari, M.A. Baig, D. Hofheinz, C. Kamath, in:, 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Springer Nature, 2025, pp. 37–75.
2025 |
Published |
Conference Paper |
IST-REx-ID: 20844 |
Space-deniable proofs
J. Dujmovic, C.U. Günther, K.Z. Pietrzak, in:, 23rd International Conference on Theory of Cryptography, Springer Nature, 2025, pp. 171–202.
[Preprint]
View
| DOI
| Download Preprint (ext.)
J. Dujmovic, C.U. Günther, K.Z. Pietrzak, in:, 23rd International Conference on Theory of Cryptography, Springer Nature, 2025, pp. 171–202.
2025 |
Published |
Conference Paper |
IST-REx-ID: 20845 |
Zeroizing attacks against evasive and circular evasive LWE
S. Agrawal, A. Modi, A. Yadav, S. Yamada, in:, 23rd International Conference on Theory of Cryptography, Springer Nature, 2025, pp. 259–290.
[Preprint]
View
| DOI
| Download Preprint (ext.)
S. Agrawal, A. Modi, A. Yadav, S. Yamada, in:, 23rd International Conference on Theory of Cryptography, Springer Nature, 2025, pp. 259–290.
2025 |
Published |
Conference Paper |
IST-REx-ID: 20846 |
Constrained verifiable random functions without obfuscation and friends
N. Brandt, M. Cueto Noval, C.U. Günther, A. Ünal, S. Wohnig, in:, 23rd International Conference on Theory of Cryptography, Springer Nature, 2025, pp. 478–511.
[Preprint]
View
| DOI
| Download Preprint (ext.)
N. Brandt, M. Cueto Noval, C.U. Günther, A. Ünal, S. Wohnig, in:, 23rd International Conference on Theory of Cryptography, Springer Nature, 2025, pp. 478–511.
2025 |
Epub ahead of print |
Journal Article |
IST-REx-ID: 21017 |
|
|
Kauri: BFT consensus with pipelined tree-based dissemination and aggregation
R. Neiheiser, M. Matos, L. Rodrigues, ACM Transactions on Computer Systems (2025).
[Published Version]
View
| DOI
| Download Published Version (ext.)
R. Neiheiser, M. Matos, L. Rodrigues, ACM Transactions on Computer Systems (2025).
2025 |
Published |
Conference Paper |
IST-REx-ID: 21262 |
Continuous group-key agreement: Concurrent updates without pruning
B. Auerbach, M. Cueto Noval, B. Erol, K.Z. Pietrzak, in:, 45th Annual International Cryptology Conference, Springer Nature, 2025, pp. 141–172.
[Preprint]
View
| DOI
| Download Preprint (ext.)
B. Auerbach, M. Cueto Noval, B. Erol, K.Z. Pietrzak, in:, 45th Annual International Cryptology Conference, Springer Nature, 2025, pp. 141–172.
2025 |
Published |
Conference Paper |
IST-REx-ID: 21323 |
On extractability of the KZG family of polynomial commitment schemes
J. Belohorec, P. Dvořák, C. Hoffmann, P. Hubáček, K. Mašková, M. Pastyřík, in:, 45th Annual International Cryptology Conference, Springer Nature, 2025, pp. 584–616.
[Preprint]
View
| DOI
| Download Preprint (ext.)
J. Belohorec, P. Dvořák, C. Hoffmann, P. Hubáček, K. Mašková, M. Pastyřík, in:, 45th Annual International Cryptology Conference, Springer Nature, 2025, pp. 584–616.
2025 |
Published |
Conference Paper |
IST-REx-ID: 20587 |
Nakamoto consensus from multiple resources
M.A. Baig, C.U. Günther, K.Z. Pietrzak, in:, 7th Conference on Advances in Financial Technologies, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2025.
[Published Version]
View
| Files available
| DOI
| Download Published Version (ext.)
| arXiv
M.A. Baig, C.U. Günther, K.Z. Pietrzak, in:, 7th Conference on Advances in Financial Technologies, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2025.
2025 |
Published |
Thesis | PhD |
IST-REx-ID: 20920 |
Theory and applications of verifiable delay functions
C. Hoffmann, Theory and Applications of Verifiable Delay Functions, Institute of Science and Technology Austria, 2025.
[Published Version]
View
| Files available
| DOI
C. Hoffmann, Theory and Applications of Verifiable Delay Functions, Institute of Science and Technology Austria, 2025.
2025 |
Published |
Thesis | PhD |
IST-REx-ID: 20556
Theory and applications of verifiable delay functions
C. Hoffmann, Theory and Applications of Verifiable Delay Functions, Institute of Science and Technology Austria, 2025.
[Published Version]
View
| Files available
| DOI
C. Hoffmann, Theory and Applications of Verifiable Delay Functions, Institute of Science and Technology Austria, 2025.
2025 |
Published |
Conference Paper |
IST-REx-ID: 19778 |
Watermarkable and zero-knowledge Verifiable Delay Functions from any proof of exponentiation
C. Hoffmann, K.Z. Pietrzak, in:, 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Springer Nature, 2025, pp. 36–66.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
C. Hoffmann, K.Z. Pietrzak, in:, 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Springer Nature, 2025, pp. 36–66.
2024 |
Published |
Conference Paper |
IST-REx-ID: 18702 |
The cost of maintaining keys in dynamic groups with applications to multicast encryption and group messaging
M. Anastos, B. Auerbach, M.A. Baig, M. Cueto Noval, M.A. Kwan, G. Pascual Perez, K.Z. Pietrzak, in:, 22nd International Conference on Theory of Cryptography, Springer Nature, 2024, pp. 413–443.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
M. Anastos, B. Auerbach, M.A. Baig, M. Cueto Noval, M.A. Kwan, G. Pascual Perez, K.Z. Pietrzak, in:, 22nd International Conference on Theory of Cryptography, Springer Nature, 2024, pp. 413–443.
2024 |
Published |
Conference Paper |
IST-REx-ID: 18755 |
Strongly secure universal thresholdizer
E. Ebrahimi, A. Yadav, in:, 30th International Conference on the Theory and Application of Cryptology and Information Security, Springer Nature, 2024, pp. 207–239.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
E. Ebrahimi, A. Yadav, in:, 30th International Conference on the Theory and Application of Cryptology and Information Security, Springer Nature, 2024, pp. 207–239.
2024 |
Published |
Conference Paper |
IST-REx-ID: 18756 |
Evasive LWE assumptions: Definitions, classes, and counterexamples
C. Brzuska, A. Ünal, I.K.Y. Woo, in:, 30th International Conference on the Theory and Application of Cryptology and Information Security, Springer Nature, 2024, pp. 418–449.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
C. Brzuska, A. Ünal, I.K.Y. Woo, in:, 30th International Conference on the Theory and Application of Cryptology and Information Security, Springer Nature, 2024, pp. 418–449.