Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
150 Publications
2025 | Published | Conference Paper | IST-REx-ID: 19712 |
Cueto Noval, M., Merz, S.-P., Stählin, P., & Ünal, A. (2025). On the soundness of algebraic attacks against code-based assumptions. In 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Vol. 15606, pp. 385–415). Madrid, Spain: Springer Nature. https://doi.org/10.1007/978-3-031-91095-1_14
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2025 | Conference Paper | IST-REx-ID: 19738 |
Acharya, A., Azari, K., Baig, M. A., Hofheinz, D., & Kamath, C. (2025). Securely instantiating ‘Half Gates’ garbling in the standard model. In 28th IACR International Conference on Practice and Theory of Public-Key Cryptography (Vol. 15677, pp. 37–75). Roros, Norway: Springer Nature. https://doi.org/10.1007/978-3-031-91829-2_2
[Preprint]
View
| DOI
| Download Preprint (ext.)
2025 | Published | Conference Paper | IST-REx-ID: 20053 |
Chatterjee, K., Gilbert, S., Schmid, S., Svoboda, J., & Yeo, M. X. (2025). When is liquid democracy possible?: On the manipulation of variance. In Proceedings of the ACM Symposium on Principles of Distributed Computing (pp. 241–251). Huatulco, Mexico: ACM. https://doi.org/10.1145/3732772.3733544
[Published Version]
View
| Files available
| DOI
| Download Published Version (ext.)
| WoS
2025 | Published | Conference Paper | IST-REx-ID: 20587 |
Baig, M. A., Günther, C. U., & Pietrzak, K. Z. (2025). Nakamoto consensus from multiple resources. In 7th Conference on Advances in Financial Technologies (Vol. 354). Pittsburgh, PA, United States: Schloss Dagstuhl - Leibniz-Zentrum für Informatik. https://doi.org/10.4230/LIPIcs.AFT.2025.16
[Published Version]
View
| Files available
| DOI
| Download Published Version (ext.)
| arXiv
2025 | Published | Conference Paper | IST-REx-ID: 19600 |
Avarikioti, Z., Bastankhah, M., Maddah-Ali, M. A., Pietrzak, K. Z., Svoboda, J., & Yeo, M. X. (2025). Route discovery in private payment channel networks. In Computer Security. ESORICS 2024 International Workshops (Vol. 15263, pp. 207–223). Bydgoszcz, Poland: Springer Nature. https://doi.org/10.1007/978-3-031-82349-7_15
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2025 | Published | Conference Paper | IST-REx-ID: 20846 |
Brandt, N., Cueto Noval, M., Günther, C. U., Ünal, A., & Wohnig, S. (2025). Constrained verifiable random functions without obfuscation and friends. In 23rd International Conference on Theory of Cryptography (Vol. 16271, pp. 478–511). Aarhus, Denmark: Springer Nature. https://doi.org/10.1007/978-3-032-12290-2_16
[Preprint]
View
| DOI
| Download Preprint (ext.)
2025 | Published | Conference Paper | IST-REx-ID: 20845 |
Agrawal, S., Modi, A., Yadav, A., & Yamada, S. (2025). Zeroizing attacks against evasive and circular evasive LWE. In 23rd International Conference on Theory of Cryptography (Vol. 16269, pp. 259–290). Aarhus, Denmark: Springer Nature. https://doi.org/10.1007/978-3-032-12293-3_9
[Preprint]
View
| DOI
| Download Preprint (ext.)
2025 | Published | Conference Paper | IST-REx-ID: 20844 |
Dujmovic, J., Günther, C. U., & Pietrzak, K. Z. (2025). Space-deniable proofs. In 23rd International Conference on Theory of Cryptography (Vol. 16271, pp. 171–202). Aarhus, Denmark: Springer Nature. https://doi.org/10.1007/978-3-032-12290-2_6
[Preprint]
View
| DOI
| Download Preprint (ext.)
2025 | Published | Thesis | IST-REx-ID: 20920 |
Hoffmann, C. (2025). Theory and applications of verifiable delay functions. Institute of Science and Technology Austria. https://doi.org/10.15479/AT-ISTA-20920
[Published Version]
View
| Files available
| DOI
2025 | Published | Thesis | IST-REx-ID: 20556
Hoffmann, C. (2025). Theory and applications of verifiable delay functions. Institute of Science and Technology Austria. https://doi.org/10.15479/AT-ISTA-20556
[Published Version]
View
| Files available
| DOI
2025 | Published | Conference Paper | IST-REx-ID: 19778 |
Hoffmann, C., & Pietrzak, K. Z. (2025). Watermarkable and zero-knowledge Verifiable Delay Functions from any proof of exponentiation. In 28th IACR International Conference on Practice and Theory of Public-Key Cryptography (Vol. 15674, pp. 36–66). Roros, Norway: Springer Nature. https://doi.org/10.1007/978-3-031-91820-9_2
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
2024 | Published | Conference Paper | IST-REx-ID: 17328 |
Chatterjee, K., Ebrahimzadeh, A., Karrabi, M., Pietrzak, K. Z., Yeo, M. X., & Zikelic, D. (2024). Fully automated selfish mining analysis in efficient proof systems blockchains. In Proceedings of the 43rd Annual ACM Symposium on Principles of Distributed Computing (pp. 268–278). Nantes, France: Association for Computing Machinery. https://doi.org/10.1145/3662158.3662769
[Published Version]
View
| Files available
| DOI
| arXiv
2024 | Published | Journal Article | IST-REx-ID: 18961 |
Günther, C. U., & Pietrzak, K. Z. (2024). Deniability in automated contact tracing: Impossibilities and possibilities. Proceedings on Privacy Enhancing Technologies. Bristol, UK/Virtual: Privacy Enhancing Technologies Symposium Advisory Board. https://doi.org/10.56553/popets-2024-0134
[Published Version]
View
| Files available
| DOI
2024 | Published | Conference Paper | IST-REx-ID: 17051 |
Auerbach, B., Günther, C. U., & Pietrzak, K. Z. (2024). Trapdoor memory-hard functions. In 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques (Vol. 14653, pp. 315–344). Zurich, Switzerland: Springer Nature. https://doi.org/10.1007/978-3-031-58734-4_11
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
2024 | Published | Conference Paper | IST-REx-ID: 17126 |
Tairi, E., & Ünal, A. (2024). Lower bounds for lattice-based compact functional encryption. In Advances in Cryptology – EUROCRYPT 2024 (Vol. 14652, pp. 249–279). Zurich, Switzerland: Springer Nature. https://doi.org/10.1007/978-3-031-58723-8_9
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
| WoS
2024 | Published | Conference Paper | IST-REx-ID: 18086
Alwen, J. F., Auerbach, B., Cueto Noval, M., Klein, K., Pascual Perez, G., & Pietrzak, K. Z. (2024). DeCAF: Decentralizable CGKA with fast healing. In C. Galdi & D. H. Phan (Eds.), Security and Cryptography for Networks: 14th International Conference (Vol. 14974, pp. 294–313). Cham: Springer Nature. https://doi.org/10.1007/978-3-031-71073-5_14
View
| Files available
| DOI
| WoS
2024 | Published | Conference Paper | IST-REx-ID: 18756 |
Brzuska, C., Ünal, A., & Woo, I. K. Y. (2024). Evasive LWE assumptions: Definitions, classes, and counterexamples. In 30th International Conference on the Theory and Application of Cryptology and Information Security (Vol. 15487, pp. 418–449). Kolkata, India: Springer Nature. https://doi.org/10.1007/978-981-96-0894-2_14
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
2024 | Published | Conference Paper | IST-REx-ID: 18755 |
Ebrahimi, E., & Yadav, A. (2024). Strongly secure universal thresholdizer. In 30th International Conference on the Theory and Application of Cryptology and Information Security (Vol. 15486, pp. 207–239). Kolkata, India: Springer Nature. https://doi.org/10.1007/978-981-96-0891-1_7
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
2024 | Published | Thesis | IST-REx-ID: 18088 |
Pascual Perez, G. (2024). On the efficiency and security of secure group messaging. Institute of Science and Technology Austria. https://doi.org/10.15479/at:ista:18088
[Published Version]
View
| Files available
| DOI
2024 | Published | Conference Paper | IST-REx-ID: 15007 |
Alpos, O., Amores-Sesar, I., Cachin, C., & Yeo, M. X. (2024). Eating sandwiches: Modular and lightweight elimination of transaction reordering attacks. In 27th International Conference on Principles of Distributed Systems (Vol. 286). Tokyo, Japan: Schloss Dagstuhl - Leibniz-Zentrum für Informatik. https://doi.org/10.4230/LIPIcs.OPODIS.2023.12
[Published Version]
View
| Files available
| DOI
| WoS
| arXiv