Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
155 Publications
2026 |
Published |
Conference Paper |
IST-REx-ID: 21042 |
Neiheiser R, Kokoris Kogias E. Anthemius: Efficient and modular block assembly for concurrent execution. In: 29th International Conference on Financial Cryptography and Data Security. Vol 15751. Springer Nature; 2026:307-323. doi:10.1007/978-3-032-07024-1_18
[Preprint]
View
| DOI
| Download Preprint (ext.)
| arXiv
2026 |
Published |
Conference Paper |
IST-REx-ID: 21134 |
Baig MA, Pietrzak KZ. On the (in)security of Proofs-of-space based longest-chain blockchains. In: 29th International Conference on Financial Cryptography and Data Security. Vol 15752. Springer Nature; 2026:127-142. doi:10.1007/978-3-032-07035-7_8
[Preprint]
View
| DOI
| Download Preprint (ext.)
| arXiv
2025 |
Published |
Conference Paper |
IST-REx-ID: 19778 |
Hoffmann C, Pietrzak KZ. Watermarkable and zero-knowledge Verifiable Delay Functions from any proof of exponentiation. In: 28th IACR International Conference on Practice and Theory of Public-Key Cryptography. Vol 15674. Springer Nature; 2025:36-66. doi:10.1007/978-3-031-91820-9_2
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
2025 |
Published |
Conference Paper |
IST-REx-ID: 20053 |
Chatterjee K, Gilbert S, Schmid S, Svoboda J, Yeo MX. When is liquid democracy possible?: On the manipulation of variance. In: Proceedings of the ACM Symposium on Principles of Distributed Computing. Association for Computing Machinery; 2025:241-251. doi:10.1145/3732772.3733544
[Published Version]
View
| Files available
| DOI
| Download Published Version (ext.)
| WoS
2025 |
Published |
Thesis | PhD |
IST-REx-ID: 20556
Hoffmann C. Theory and applications of verifiable delay functions. 2025. doi:10.15479/AT-ISTA-20556
[Published Version]
View
| Files available
| DOI
2025 |
Published |
Conference Paper |
IST-REx-ID: 20587 |
Baig MA, Günther CU, Pietrzak KZ. Nakamoto consensus from multiple resources. In: 7th Conference on Advances in Financial Technologies. Vol 354. Schloss Dagstuhl - Leibniz-Zentrum für Informatik; 2025. doi:10.4230/LIPIcs.AFT.2025.16
[Published Version]
View
| Files available
| DOI
| Download Published Version (ext.)
| arXiv
2025 |
Published |
Conference Paper |
IST-REx-ID: 19600 |
Avarikioti Z, Bastankhah M, Maddah-Ali MA, Pietrzak KZ, Svoboda J, Yeo MX. Route discovery in private payment channel networks. In: Computer Security. ESORICS 2024 International Workshops. Vol 15263. Springer Nature; 2025:207-223. doi:10.1007/978-3-031-82349-7_15
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2025 |
Published |
Conference Paper |
IST-REx-ID: 19712 |
Cueto Noval M, Merz S-P, Stählin P, Ünal A. On the soundness of algebraic attacks against code-based assumptions. In: 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Vol 15606. Springer Nature; 2025:385-415. doi:10.1007/978-3-031-91095-1_14
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2025 |
Conference Paper |
IST-REx-ID: 19738 |
Acharya A, Azari K, Baig MA, Hofheinz D, Kamath C. Securely instantiating ‘Half Gates’ garbling in the standard model. In: 28th IACR International Conference on Practice and Theory of Public-Key Cryptography. Vol 15677. Springer Nature; 2025:37-75. doi:10.1007/978-3-031-91829-2_2
[Preprint]
View
| DOI
| Download Preprint (ext.)
2025 |
Published |
Conference Paper |
IST-REx-ID: 20844 |
Dujmovic J, Günther CU, Pietrzak KZ. Space-deniable proofs. In: 23rd International Conference on Theory of Cryptography. Vol 16271. Springer Nature; 2025:171-202. doi:10.1007/978-3-032-12290-2_6
[Preprint]
View
| DOI
| Download Preprint (ext.)
2025 |
Published |
Conference Paper |
IST-REx-ID: 20845 |
Agrawal S, Modi A, Yadav A, Yamada S. Zeroizing attacks against evasive and circular evasive LWE. In: 23rd International Conference on Theory of Cryptography. Vol 16269. Springer Nature; 2025:259-290. doi:10.1007/978-3-032-12293-3_9
[Preprint]
View
| DOI
| Download Preprint (ext.)
2025 |
Published |
Conference Paper |
IST-REx-ID: 20846 |
Brandt N, Cueto Noval M, Günther CU, Ünal A, Wohnig S. Constrained verifiable random functions without obfuscation and friends. In: 23rd International Conference on Theory of Cryptography. Vol 16271. Springer Nature; 2025:478-511. doi:10.1007/978-3-032-12290-2_16
[Preprint]
View
| DOI
| Download Preprint (ext.)
2025 |
Published |
Thesis | PhD |
IST-REx-ID: 20920 |
Hoffmann C. Theory and applications of verifiable delay functions. 2025. doi:10.15479/AT-ISTA-20920
[Published Version]
View
| Files available
| DOI
2025 |
Epub ahead of print |
Journal Article |
IST-REx-ID: 21017 |
|
|
Neiheiser R, Matos M, Rodrigues L. Kauri: BFT consensus with pipelined tree-based dissemination and aggregation. ACM Transactions on Computer Systems. 2025. doi:10.1145/3769423
[Published Version]
View
| DOI
| Download Published Version (ext.)
2025 |
Published |
Conference Paper |
IST-REx-ID: 21262 |
Auerbach B, Cueto Noval M, Erol B, Pietrzak KZ. Continuous group-key agreement: Concurrent updates without pruning. In: 45th Annual International Cryptology Conference. Vol 16007. Springer Nature; 2025:141-172. doi:10.1007/978-3-032-01913-4_5
[Preprint]
View
| DOI
| Download Preprint (ext.)
2025 |
Published |
Conference Paper |
IST-REx-ID: 21323 |
Belohorec J, Dvořák P, Hoffmann C, Hubáček P, Mašková K, Pastyřík M. On extractability of the KZG family of polynomial commitment schemes. In: 45th Annual International Cryptology Conference. Vol 16005. Springer Nature; 2025:584-616. doi:10.1007/978-3-032-01887-8_19
[Preprint]
View
| DOI
| Download Preprint (ext.)
2024 |
Published |
Conference Paper |
IST-REx-ID: 18086
Alwen JF, Auerbach B, Cueto Noval M, Klein K, Pascual Perez G, Pietrzak KZ. DeCAF: Decentralizable CGKA with fast healing. In: Galdi C, Phan DH, eds. Security and Cryptography for Networks: 14th International Conference. Vol 14974. Cham: Springer Nature; 2024:294–313. doi:10.1007/978-3-031-71073-5_14
View
| Files available
| DOI
| WoS
2024 |
Published |
Thesis | PhD |
IST-REx-ID: 18088 |
Pascual Perez G. On the efficiency and security of secure group messaging. 2024. doi:10.15479/at:ista:18088
[Published Version]
View
| Files available
| DOI
2024 |
Published |
Conference Paper |
IST-REx-ID: 18702 |
Anastos M, Auerbach B, Baig MA, et al. The cost of maintaining keys in dynamic groups with applications to multicast encryption and group messaging. In: 22nd International Conference on Theory of Cryptography. Vol 15364. Springer Nature; 2024:413-443. doi:10.1007/978-3-031-78011-0_14
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
2024 |
Draft |
Preprint |
IST-REx-ID: 20701 |
Hoffmann C, Hubáček P, Ivanova S. Practical batch proofs of exponentiation. Cryptology ePrint Archive.
[Preprint]
View
| Files available
| Download Preprint (ext.)