Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.




155 Publications

2026 | Published | Conference Paper | IST-REx-ID: 21042 | OA
R. Neiheiser and E. Kokoris Kogias, “Anthemius: Efficient and modular block assembly for concurrent execution,” in 29th International Conference on Financial Cryptography and Data Security, Miyakojima, Japan, 2026, vol. 15751, pp. 307–323.
[Preprint] View | DOI | Download Preprint (ext.) | arXiv
 
2026 | Published | Conference Paper | IST-REx-ID: 21134 | OA
M. A. Baig and K. Z. Pietrzak, “On the (in)security of Proofs-of-space based longest-chain blockchains,” in 29th International Conference on Financial Cryptography and Data Security, Miyakojima, Japan, 2026, vol. 15752, pp. 127–142.
[Preprint] View | DOI | Download Preprint (ext.) | arXiv
 
2025 | Published | Conference Paper | IST-REx-ID: 19778 | OA
C. Hoffmann and K. Z. Pietrzak, “Watermarkable and zero-knowledge Verifiable Delay Functions from any proof of exponentiation,” in 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Roros, Norway, 2025, vol. 15674, pp. 36–66.
[Preprint] View | Files available | DOI | Download Preprint (ext.)
 
2025 | Published | Conference Paper | IST-REx-ID: 20053 | OA
K. Chatterjee, S. Gilbert, S. Schmid, J. Svoboda, and M. X. Yeo, “When is liquid democracy possible?: On the manipulation of variance,” in Proceedings of the ACM Symposium on Principles of Distributed Computing, Huatulco, Mexico, 2025, pp. 241–251.
[Published Version] View | Files available | DOI | Download Published Version (ext.) | WoS
 
2025 | Published | Thesis | PhD | IST-REx-ID: 20556
C. Hoffmann, “Theory and applications of verifiable delay functions,” Institute of Science and Technology Austria, 2025.
[Published Version] View | Files available | DOI
 
2025 | Published | Conference Paper | IST-REx-ID: 20587 | OA
M. A. Baig, C. U. Günther, and K. Z. Pietrzak, “Nakamoto consensus from multiple resources,” in 7th Conference on Advances in Financial Technologies, Pittsburgh, PA, United States, 2025, vol. 354.
[Published Version] View | Files available | DOI | Download Published Version (ext.) | arXiv
 
2025 | Published | Conference Paper | IST-REx-ID: 19600 | OA
Z. Avarikioti, M. Bastankhah, M. A. Maddah-Ali, K. Z. Pietrzak, J. Svoboda, and M. X. Yeo, “Route discovery in private payment channel networks,” in Computer Security. ESORICS 2024 International Workshops, Bydgoszcz, Poland, 2025, vol. 15263, pp. 207–223.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 
2025 | Published | Conference Paper | IST-REx-ID: 19712 | OA
M. Cueto Noval, S.-P. Merz, P. Stählin, and A. Ünal, “On the soundness of algebraic attacks against code-based assumptions,” in 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, 2025, vol. 15606, pp. 385–415.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 
2025 | Conference Paper | IST-REx-ID: 19738 | OA
A. Acharya, K. Azari, M. A. Baig, D. Hofheinz, and C. Kamath, “Securely instantiating ‘Half Gates’ garbling in the standard model,” in 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Roros, Norway, 2025, vol. 15677, pp. 37–75.
[Preprint] View | DOI | Download Preprint (ext.)
 
2025 | Published | Conference Paper | IST-REx-ID: 20844 | OA
J. Dujmovic, C. U. Günther, and K. Z. Pietrzak, “Space-deniable proofs,” in 23rd International Conference on Theory of Cryptography, Aarhus, Denmark, 2025, vol. 16271, pp. 171–202.
[Preprint] View | DOI | Download Preprint (ext.)
 
2025 | Published | Conference Paper | IST-REx-ID: 20845 | OA
S. Agrawal, A. Modi, A. Yadav, and S. Yamada, “Zeroizing attacks against evasive and circular evasive LWE,” in 23rd International Conference on Theory of Cryptography, Aarhus, Denmark, 2025, vol. 16269, pp. 259–290.
[Preprint] View | DOI | Download Preprint (ext.)
 
2025 | Published | Conference Paper | IST-REx-ID: 20846 | OA
N. Brandt, M. Cueto Noval, C. U. Günther, A. Ünal, and S. Wohnig, “Constrained verifiable random functions without obfuscation and friends,” in 23rd International Conference on Theory of Cryptography, Aarhus, Denmark, 2025, vol. 16271, pp. 478–511.
[Preprint] View | DOI | Download Preprint (ext.)
 
2025 | Published | Thesis | PhD | IST-REx-ID: 20920 | OA
C. Hoffmann, “Theory and applications of verifiable delay functions,” Institute of Science and Technology Austria, 2025.
[Published Version] View | Files available | DOI
 
2025 | Epub ahead of print | Journal Article | IST-REx-ID: 21017 | OA | PlanS
R. Neiheiser, M. Matos, and L. Rodrigues, “Kauri: BFT consensus with pipelined tree-based dissemination and aggregation,” ACM Transactions on Computer Systems. Association for Computing Machinery, 2025.
[Published Version] View | DOI | Download Published Version (ext.)
 
2025 | Published | Conference Paper | IST-REx-ID: 21262 | OA
B. Auerbach, M. Cueto Noval, B. Erol, and K. Z. Pietrzak, “Continuous group-key agreement: Concurrent updates without pruning,” in 45th Annual International Cryptology Conference, Santa Barbara, CA, United States, 2025, vol. 16007, pp. 141–172.
[Preprint] View | DOI | Download Preprint (ext.)
 
2025 | Published | Conference Paper | IST-REx-ID: 21323 | OA
J. Belohorec, P. Dvořák, C. Hoffmann, P. Hubáček, K. Mašková, and M. Pastyřík, “On extractability of the KZG family of polynomial commitment schemes,” in 45th Annual International Cryptology Conference, Santa Barbara, CA, United States, 2025, vol. 16005, pp. 584–616.
[Preprint] View | DOI | Download Preprint (ext.)
 
2024 | Published | Conference Paper | IST-REx-ID: 18086
J. F. Alwen, B. Auerbach, M. Cueto Noval, K. Klein, G. Pascual Perez, and K. Z. Pietrzak, “DeCAF: Decentralizable CGKA with fast healing,” in Security and Cryptography for Networks: 14th International Conference, Amalfi, Italy, 2024, vol. 14974, pp. 294–313.
View | Files available | DOI | WoS
 
2024 | Published | Thesis | PhD | IST-REx-ID: 18088 | OA
G. Pascual Perez, “On the efficiency and security of secure group messaging,” Institute of Science and Technology Austria, 2024.
[Published Version] View | Files available | DOI
 
2024 | Published | Conference Paper | IST-REx-ID: 18702 | OA
M. Anastos et al., “The cost of maintaining keys in dynamic groups with applications to multicast encryption and group messaging,” in 22nd International Conference on Theory of Cryptography, Milan, Italy, 2024, vol. 15364, pp. 413–443.
[Preprint] View | DOI | Download Preprint (ext.) | WoS
 
2024 | Draft | Preprint | IST-REx-ID: 20701 | OA
C. Hoffmann, P. Hubáček, and S. Ivanova, “Practical batch proofs of exponentiation,” Cryptology ePrint Archive. International Association for Cryptologic Research .
[Preprint] View | Files available | Download Preprint (ext.)
 

Search

Filter Publications

Display / Sort

Citation Style: IEEE

Export / Embed