Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.




155 Publications

2026 | Published | Conference Paper | IST-REx-ID: 21042 | OA
Neiheiser, R., & Kokoris Kogias, E. (2026). Anthemius: Efficient and modular block assembly for concurrent execution. In 29th International Conference on Financial Cryptography and Data Security (Vol. 15751, pp. 307–323). Miyakojima, Japan: Springer Nature. https://doi.org/10.1007/978-3-032-07024-1_18
[Preprint] View | DOI | Download Preprint (ext.) | arXiv
 
2026 | Published | Conference Paper | IST-REx-ID: 21134 | OA
Baig, M. A., & Pietrzak, K. Z. (2026). On the (in)security of Proofs-of-space based longest-chain blockchains. In 29th International Conference on Financial Cryptography and Data Security (Vol. 15752, pp. 127–142). Miyakojima, Japan: Springer Nature. https://doi.org/10.1007/978-3-032-07035-7_8
[Preprint] View | DOI | Download Preprint (ext.) | arXiv
 
2025 | Published | Conference Paper | IST-REx-ID: 19778 | OA
Hoffmann, C., & Pietrzak, K. Z. (2025). Watermarkable and zero-knowledge Verifiable Delay Functions from any proof of exponentiation. In 28th IACR International Conference on Practice and Theory of Public-Key Cryptography (Vol. 15674, pp. 36–66). Roros, Norway: Springer Nature. https://doi.org/10.1007/978-3-031-91820-9_2
[Preprint] View | Files available | DOI | Download Preprint (ext.)
 
2025 | Published | Conference Paper | IST-REx-ID: 20053 | OA
Chatterjee, K., Gilbert, S., Schmid, S., Svoboda, J., & Yeo, M. X. (2025). When is liquid democracy possible?: On the manipulation of variance. In Proceedings of the ACM Symposium on Principles of Distributed Computing (pp. 241–251). Huatulco, Mexico: Association for Computing Machinery. https://doi.org/10.1145/3732772.3733544
[Published Version] View | Files available | DOI | Download Published Version (ext.) | WoS
 
2025 | Published | Thesis | PhD | IST-REx-ID: 20556
Hoffmann, C. (2025). Theory and applications of verifiable delay functions. Institute of Science and Technology Austria. https://doi.org/10.15479/AT-ISTA-20556
[Published Version] View | Files available | DOI
 
2025 | Published | Conference Paper | IST-REx-ID: 20587 | OA
Baig, M. A., Günther, C. U., & Pietrzak, K. Z. (2025). Nakamoto consensus from multiple resources. In 7th Conference on Advances in Financial Technologies (Vol. 354). Pittsburgh, PA, United States: Schloss Dagstuhl - Leibniz-Zentrum für Informatik. https://doi.org/10.4230/LIPIcs.AFT.2025.16
[Published Version] View | Files available | DOI | Download Published Version (ext.) | arXiv
 
2025 | Published | Conference Paper | IST-REx-ID: 19600 | OA
Avarikioti, Z., Bastankhah, M., Maddah-Ali, M. A., Pietrzak, K. Z., Svoboda, J., & Yeo, M. X. (2025). Route discovery in private payment channel networks. In Computer Security. ESORICS 2024 International Workshops (Vol. 15263, pp. 207–223). Bydgoszcz, Poland: Springer Nature. https://doi.org/10.1007/978-3-031-82349-7_15
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 
2025 | Published | Conference Paper | IST-REx-ID: 19712 | OA
Cueto Noval, M., Merz, S.-P., Stählin, P., & Ünal, A. (2025). On the soundness of algebraic attacks against code-based assumptions. In 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Vol. 15606, pp. 385–415). Madrid, Spain: Springer Nature. https://doi.org/10.1007/978-3-031-91095-1_14
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 
2025 | Conference Paper | IST-REx-ID: 19738 | OA
Acharya, A., Azari, K., Baig, M. A., Hofheinz, D., & Kamath, C. (2025). Securely instantiating ‘Half Gates’ garbling in the standard model. In 28th IACR International Conference on Practice and Theory of Public-Key Cryptography (Vol. 15677, pp. 37–75). Roros, Norway: Springer Nature. https://doi.org/10.1007/978-3-031-91829-2_2
[Preprint] View | DOI | Download Preprint (ext.)
 
2025 | Published | Conference Paper | IST-REx-ID: 20844 | OA
Dujmovic, J., Günther, C. U., & Pietrzak, K. Z. (2025). Space-deniable proofs. In 23rd International Conference on Theory of Cryptography (Vol. 16271, pp. 171–202). Aarhus, Denmark: Springer Nature. https://doi.org/10.1007/978-3-032-12290-2_6
[Preprint] View | DOI | Download Preprint (ext.)
 
2025 | Published | Conference Paper | IST-REx-ID: 20845 | OA
Agrawal, S., Modi, A., Yadav, A., & Yamada, S. (2025). Zeroizing attacks against evasive and circular evasive LWE. In 23rd International Conference on Theory of Cryptography (Vol. 16269, pp. 259–290). Aarhus, Denmark: Springer Nature. https://doi.org/10.1007/978-3-032-12293-3_9
[Preprint] View | DOI | Download Preprint (ext.)
 
2025 | Published | Conference Paper | IST-REx-ID: 20846 | OA
Brandt, N., Cueto Noval, M., Günther, C. U., Ünal, A., & Wohnig, S. (2025). Constrained verifiable random functions without obfuscation and friends. In 23rd International Conference on Theory of Cryptography (Vol. 16271, pp. 478–511). Aarhus, Denmark: Springer Nature. https://doi.org/10.1007/978-3-032-12290-2_16
[Preprint] View | DOI | Download Preprint (ext.)
 
2025 | Published | Thesis | PhD | IST-REx-ID: 20920 | OA
Hoffmann, C. (2025). Theory and applications of verifiable delay functions. Institute of Science and Technology Austria. https://doi.org/10.15479/AT-ISTA-20920
[Published Version] View | Files available | DOI
 
2025 | Epub ahead of print | Journal Article | IST-REx-ID: 21017 | OA | PlanS
Neiheiser, R., Matos, M., & Rodrigues, L. (2025). Kauri: BFT consensus with pipelined tree-based dissemination and aggregation. ACM Transactions on Computer Systems. Association for Computing Machinery. https://doi.org/10.1145/3769423
[Published Version] View | DOI | Download Published Version (ext.)
 
2025 | Published | Conference Paper | IST-REx-ID: 21262 | OA
Auerbach, B., Cueto Noval, M., Erol, B., & Pietrzak, K. Z. (2025). Continuous group-key agreement: Concurrent updates without pruning. In 45th Annual International Cryptology Conference (Vol. 16007, pp. 141–172). Santa Barbara, CA, United States: Springer Nature. https://doi.org/10.1007/978-3-032-01913-4_5
[Preprint] View | DOI | Download Preprint (ext.)
 
2025 | Published | Conference Paper | IST-REx-ID: 21323 | OA
Belohorec, J., Dvořák, P., Hoffmann, C., Hubáček, P., Mašková, K., & Pastyřík, M. (2025). On extractability of the KZG family of polynomial commitment schemes. In 45th Annual International Cryptology Conference (Vol. 16005, pp. 584–616). Santa Barbara, CA, United States: Springer Nature. https://doi.org/10.1007/978-3-032-01887-8_19
[Preprint] View | DOI | Download Preprint (ext.)
 
2024 | Published | Conference Paper | IST-REx-ID: 18086
Alwen, J. F., Auerbach, B., Cueto Noval, M., Klein, K., Pascual Perez, G., & Pietrzak, K. Z. (2024). DeCAF: Decentralizable CGKA with fast healing. In C. Galdi & D. H. Phan (Eds.), Security and Cryptography for Networks: 14th International Conference (Vol. 14974, pp. 294–313). Cham: Springer Nature. https://doi.org/10.1007/978-3-031-71073-5_14
View | Files available | DOI | WoS
 
2024 | Published | Thesis | PhD | IST-REx-ID: 18088 | OA
Pascual Perez, G. (2024). On the efficiency and security of secure group messaging. Institute of Science and Technology Austria. https://doi.org/10.15479/at:ista:18088
[Published Version] View | Files available | DOI
 
2024 | Published | Conference Paper | IST-REx-ID: 18702 | OA
Anastos, M., Auerbach, B., Baig, M. A., Cueto Noval, M., Kwan, M. A., Pascual Perez, G., & Pietrzak, K. Z. (2024). The cost of maintaining keys in dynamic groups with applications to multicast encryption and group messaging. In 22nd International Conference on Theory of Cryptography (Vol. 15364, pp. 413–443). Milan, Italy: Springer Nature. https://doi.org/10.1007/978-3-031-78011-0_14
[Preprint] View | DOI | Download Preprint (ext.) | WoS
 
2024 | Draft | Preprint | IST-REx-ID: 20701 | OA
Hoffmann, C., Hubáček, P., & Ivanova, S. (n.d.). Practical batch proofs of exponentiation. Cryptology ePrint Archive. International Association for Cryptologic Research .
[Preprint] View | Files available | Download Preprint (ext.)
 

Search

Filter Publications

Display / Sort

Citation Style: APA

Export / Embed