Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.




144 Publications

2025 | Published | Conference Paper | IST-REx-ID: 19712 | OA
Cueto Noval, M., Merz, S.-P., Stählin, P., & Ünal, A. (2025). On the soundness of algebraic attacks against code-based assumptions. In 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Vol. 15606, pp. 385–415). Madrid, Spain: Springer Nature. https://doi.org/10.1007/978-3-031-91095-1_14
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 
2025 | Conference Paper | IST-REx-ID: 19738 | OA
Acharya, A., Azari, K., Baig, M. A., Hofheinz, D., & Kamath, C. (2025). Securely instantiating ‘Half Gates’ garbling in the standard model. In 28th IACR International Conference on Practice and Theory of Public-Key Cryptography (Vol. 15677, pp. 37–75). Roros, Norway: Springer Nature. https://doi.org/10.1007/978-3-031-91829-2_2
[Preprint] View | DOI | Download Preprint (ext.)
 
2025 | Published | Conference Paper | IST-REx-ID: 20053 | OA
Chatterjee, K., Gilbert, S., Schmid, S., Svoboda, J., & Yeo, M. X. (2025). When is liquid democracy possible?: On the manipulation of variance. In Proceedings of the ACM Symposium on Principles of Distributed Computing (pp. 241–251). Huatulco, Mexico: ACM. https://doi.org/10.1145/3732772.3733544
[Published Version] View | Files available | DOI | Download Published Version (ext.) | WoS
 
2025 | Published | Conference Paper | IST-REx-ID: 20587 | OA
Baig, M. A., Günther, C. U., & Pietrzak, K. Z. (2025). Nakamoto consensus from multiple resources. In 7th Conference on Advances in Financial Technologies (Vol. 354). Pittsburgh, PA, United States: Schloss Dagstuhl - Leibniz-Zentrum für Informatik. https://doi.org/10.4230/LIPIcs.AFT.2025.16
[Published Version] View | Files available | DOI | Download Published Version (ext.) | arXiv
 
2025 | Published | Conference Paper | IST-REx-ID: 19600 | OA
Avarikioti, Z., Bastankhah, M., Maddah-Ali, M. A., Pietrzak, K. Z., Svoboda, J., & Yeo, M. X. (2025). Route discovery in private payment channel networks. In Computer Security. ESORICS 2024 International Workshops (Vol. 15263, pp. 207–223). Bydgoszcz, Poland: Springer Nature. https://doi.org/10.1007/978-3-031-82349-7_15
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 
2025 | Published | Conference Paper | IST-REx-ID: 19778 | OA
Hoffmann, C., & Pietrzak, K. Z. (2025). Watermarkable and zero-knowledge Verifiable Delay Functions from any proof of exponentiation. In 28th IACR International Conference on Practice and Theory of Public-Key Cryptography (Vol. 15674, pp. 36–66). Roros, Norway: Springer Nature. https://doi.org/10.1007/978-3-031-91820-9_2
[Preprint] View | Files available | DOI | Download Preprint (ext.)
 
2024 | Published | Conference Paper | IST-REx-ID: 15007 | OA
Alpos, O., Amores-Sesar, I., Cachin, C., & Yeo, M. X. (2024). Eating sandwiches: Modular and lightweight elimination of transaction reordering attacks. In 27th International Conference on Principles of Distributed Systems (Vol. 286). Tokyo, Japan: Schloss Dagstuhl - Leibniz-Zentrum für Informatik. https://doi.org/10.4230/LIPIcs.OPODIS.2023.12
[Published Version] View | Files available | DOI | arXiv
 
2024 | Published | Conference Paper | IST-REx-ID: 18702 | OA
Anastos, M., Auerbach, B., Baig, M. A., Cueto Noval, M., Kwan, M. A., Pascual Perez, G., & Pietrzak, K. Z. (2024). The cost of maintaining keys in dynamic groups with applications to multicast encryption and group messaging. In 22nd International Conference on Theory of Cryptography (Vol. 15364, pp. 413–443). Milan, Italy: Springer Nature. https://doi.org/10.1007/978-3-031-78011-0_14
[Preprint] View | DOI | Download Preprint (ext.)
 
2024 | Published | Conference Paper | IST-REx-ID: 17328 | OA
Chatterjee, K., Ebrahimzadeh, A., Karrabi, M., Pietrzak, K. Z., Yeo, M. X., & Zikelic, D. (2024). Fully automated selfish mining analysis in efficient proof systems blockchains. In Proceedings of the 43rd Annual ACM Symposium on Principles of Distributed Computing (pp. 268–278). Nantes, France: Association for Computing Machinery. https://doi.org/10.1145/3662158.3662769
[Published Version] View | Files available | DOI | arXiv
 
2024 | Published | Journal Article | IST-REx-ID: 18961 | OA
Günther, C. U., & Pietrzak, K. Z. (2024). Deniability in automated contact tracing: Impossibilities and possibilities. Proceedings on Privacy Enhancing Technologies. Bristol, UK/Virtual: Privacy Enhancing Technologies Symposium Advisory Board. https://doi.org/10.56553/popets-2024-0134
[Published Version] View | Files available | DOI
 
2024 | Published | Conference Paper | IST-REx-ID: 17051 | OA
Auerbach, B., Günther, C. U., & Pietrzak, K. Z. (2024). Trapdoor memory-hard functions. In 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques (Vol. 14653, pp. 315–344). Zurich, Switzerland: Springer Nature. https://doi.org/10.1007/978-3-031-58734-4_11
[Preprint] View | DOI | Download Preprint (ext.) | WoS
 
2024 | Published | Conference Paper | IST-REx-ID: 17126 | OA
Tairi, E., & Ünal, A. (2024). Lower bounds for lattice-based compact functional encryption. In Advances in Cryptology – EUROCRYPT 2024 (Vol. 14652, pp. 249–279). Zurich, Switzerland: Springer Nature. https://doi.org/10.1007/978-3-031-58723-8_9
[Submitted Version] View | DOI | Download Submitted Version (ext.) | WoS
 
2024 | Published | Conference Paper | IST-REx-ID: 18086
Alwen, J. F., Auerbach, B., Cueto Noval, M., Klein, K., Pascual Perez, G., & Pietrzak, K. Z. (2024). DeCAF: Decentralizable CGKA with fast healing. In C. Galdi & D. H. Phan (Eds.), Security and Cryptography for Networks: 14th International Conference (Vol. 14974, pp. 294–313). Cham: Springer Nature. https://doi.org/10.1007/978-3-031-71073-5_14
View | Files available | DOI | WoS
 
2024 | Published | Conference Paper | IST-REx-ID: 18756 | OA
Brzuska, C., Ünal, A., & Woo, I. K. Y. (2024). Evasive LWE assumptions: Definitions, classes, and counterexamples. In 30th International Conference on the Theory and Application of Cryptology and Information Security (Vol. 15487, pp. 418–449). Kolkata, India: Springer Nature. https://doi.org/10.1007/978-981-96-0894-2_14
[Preprint] View | DOI | Download Preprint (ext.) | WoS
 
2024 | Published | Conference Paper | IST-REx-ID: 18755 | OA
Ebrahimi, E., & Yadav, A. (2024). Strongly secure universal thresholdizer. In 30th International Conference on the Theory and Application of Cryptology and Information Security (Vol. 15486, pp. 207–239). Kolkata, India: Springer Nature. https://doi.org/10.1007/978-981-96-0891-1_7
[Preprint] View | DOI | Download Preprint (ext.) | WoS
 
2024 | Published | Thesis | IST-REx-ID: 18088 | OA
Pascual Perez, G. (2024). On the efficiency and security of secure group messaging. Institute of Science and Technology Austria. https://doi.org/10.15479/at:ista:18088
[Published Version] View | Files available | DOI
 
2024 | Published | Journal Article | IST-REx-ID: 14820 | OA
Schmid, S., Svoboda, J., & Yeo, M. X. (2024). Weighted packet selection for rechargeable links in cryptocurrency networks: Complexity and approximation. Theoretical Computer Science. Elsevier. https://doi.org/10.1016/j.tcs.2023.114353
[Published Version] View | Files available | DOI | WoS
 
2023 | Published | Journal Article | IST-REx-ID: 12164 | OA
Baig, M. A., Hendler, D., Milani, A., & Travers, C. (2023). Long-lived counters with polylogarithmic amortized step complexity. Distributed Computing. Springer Nature. https://doi.org/10.1007/s00446-022-00439-5
[Preprint] View | DOI | Download Preprint (ext.) | WoS
 
2023 | Published | Conference Paper | IST-REx-ID: 14428 | OA
Dodis, Y., Ferguson, N., Goldin, E., Hall, P., & Pietrzak, K. Z. (2023). Random oracle combiners: Breaking the concatenation barrier for collision-resistance. In 43rd Annual International Cryptology Conference (Vol. 14082, pp. 514–546). Santa Barbara, CA, United States: Springer Nature. https://doi.org/10.1007/978-3-031-38545-2_17
[Preprint] View | DOI | Download Preprint (ext.) | WoS
 
2023 | Published | Conference Paper | IST-REx-ID: 14457 | OA
Hoffmann, C., & Simkin, M. (2023). Stronger lower bounds for leakage-resilient secret sharing. In 8th International Conference on Cryptology and Information Security in Latin America (Vol. 14168, pp. 215–228). Quito, Ecuador: Springer Nature. https://doi.org/10.1007/978-3-031-44469-2_11
[Preprint] View | DOI | Download Preprint (ext.) | WoS
 

Search

Filter Publications

Display / Sort

Citation Style: APA

Export / Embed