Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.




135 Publications

2025 | Published | Conference Paper | IST-REx-ID: 18756 | OA
C. Brzuska, A. Ünal, and I. K. Y. Woo, “Evasive LWE assumptions: Definitions, classes, and counterexamples,” in 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, 2025, vol. 15487, pp. 418–449.
[Preprint] View | DOI | Download Preprint (ext.)
 
2024 | Published | Conference Paper | IST-REx-ID: 17051 | OA
B. Auerbach, C. U. Günther, and K. Z. Pietrzak, “Trapdoor memory-hard functions,” in 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, 2024, vol. 14653, pp. 315–344.
[Preprint] View | DOI | Download Preprint (ext.)
 
2024 | Published | Conference Paper | IST-REx-ID: 17126 | OA
E. Tairi and A. Ünal, “Lower bounds for lattice-based compact functional encryption,” in Advances in Cryptology – EUROCRYPT 2024, Zurich, Switzerland, 2024, vol. 14652, pp. 249–279.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 
2024 | Published | Conference Paper | IST-REx-ID: 17328 | OA
K. Chatterjee, A. Ebrahimzadeh, M. Karrabi, K. Z. Pietrzak, M. X. Yeo, and D. Zikelic, “Fully automated selfish mining analysis in efficient proof systems blockchains,” in Proceedings of the 43rd Annual ACM Symposium on Principles of Distributed Computing, Nantes, France, 2024, pp. 268–278.
[Published Version] View | Files available | DOI | arXiv
 
2024 | Published | Journal Article | IST-REx-ID: 14820 | OA
S. Schmid, J. Svoboda, and M. X. Yeo, “Weighted packet selection for rechargeable links in cryptocurrency networks: Complexity and approximation,” Theoretical Computer Science, vol. 989. Elsevier, 2024.
[Published Version] View | Files available | DOI
 
2024 | Published | Conference Paper | IST-REx-ID: 15007 | OA
O. Alpos, I. Amores-Sesar, C. Cachin, and M. X. Yeo, “Eating sandwiches: Modular and lightweight elimination of transaction reordering attacks,” in 27th International Conference on Principles of Distributed Systems, Tokyo, Japan, 2024, vol. 286.
[Published Version] View | Files available | DOI | arXiv
 
2024 | Published | Conference Paper | IST-REx-ID: 18086
J. F. Alwen, B. Auerbach, M. Cueto Noval, K. Klein, G. Pascual Perez, and K. Z. Pietrzak, “DeCAF: Decentralizable CGKA with fast healing,” in Security and Cryptography for Networks: 14th International Conference, Amalfi, Italy, 2024, vol. 14974, pp. 294–313.
View | Files available | DOI
 
2024 | Published | Thesis | IST-REx-ID: 18088 | OA
G. Pascual Perez, “On the efficiency and security of secure group messaging,” Institute of Science and Technology Austria, 2024.
[Published Version] View | Files available | DOI
 
2024 | Published | Conference Paper | IST-REx-ID: 18702 | OA
M. Anastos et al., “The cost of maintaining keys in dynamic groups with applications to multicast encryption and group messaging,” in 22nd International Conference on Theory of Cryptography, Milan, Italy, 2024, vol. 15364, pp. 413–443.
[Preprint] View | DOI | Download Preprint (ext.)
 
2024 | Published | Conference Paper | IST-REx-ID: 18755 | OA
E. Ebrahimi and A. Yadav, “Strongly secure universal thresholdizer,” in 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, 2024, vol. 15486, pp. 207–239.
[Preprint] View | DOI | Download Preprint (ext.)
 
2023 | Published | Conference Paper | IST-REx-ID: 13143 | OA
C. Hoffmann, P. Hubáček, C. Kamath, and K. Z. Pietrzak, “Certifying giant nonprimes,” in Public-Key Cryptography - PKC 2023, Atlanta, GA, United States, 2023, vol. 13940, pp. 530–553.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 
2023 | Published | Conference Paper | IST-REx-ID: 14428 | OA
Y. Dodis, N. Ferguson, E. Goldin, P. Hall, and K. Z. Pietrzak, “Random oracle combiners: Breaking the concatenation barrier for collision-resistance,” in 43rd Annual International Cryptology Conference, Santa Barbara, CA, United States, 2023, vol. 14082, pp. 514–546.
[Preprint] View | DOI | Download Preprint (ext.)
 
2023 | Published | Conference Paper | IST-REx-ID: 14457 | OA
C. Hoffmann and M. Simkin, “Stronger lower bounds for leakage-resilient secret sharing,” in 8th International Conference on Cryptology and Information Security in Latin America, Quito, Ecuador, 2023, vol. 14168, pp. 215–228.
[Preprint] View | DOI | Download Preprint (ext.)
 
2023 | Published | Conference Paper | IST-REx-ID: 14490 | OA
Z. Avarikioti, T. Lizurej, T. Michalak, and M. X. Yeo, “Lightning creation games,” in 43rd International Conference on Distributed Computing Systems, Hong Kong, China, 2023, vol. 2023, pp. 603–613.
[Preprint] View | Files available | DOI | Download Preprint (ext.) | arXiv
 
2023 | Published | Thesis | IST-REx-ID: 14506 | OA
M. X. Yeo, “Advances in efficiency and privacy in payment channel network analysis,” Institute of Science and Technology Austria, 2023.
[Published Version] View | Files available | DOI
 
2023 | Published | Journal Article | IST-REx-ID: 12164 | OA
M. A. Baig, D. Hendler, A. Milani, and C. Travers, “Long-lived counters with polylogarithmic amortized step complexity,” Distributed Computing, vol. 36. Springer Nature, pp. 29–43, 2023.
[Preprint] View | DOI | Download Preprint (ext.) | WoS
 
2023 | Published | Conference Paper | IST-REx-ID: 14691 | OA
B. Auerbach, M. Cueto Noval, G. Pascual Perez, and K. Z. Pietrzak, “On the cost of post-compromise security in concurrent Continuous Group-Key Agreement,” in 21st International Conference on Theory of Cryptography, Taipei, Taiwan, 2023, vol. 14371, pp. 271–300.
[Preprint] View | DOI | Download Preprint (ext.)
 
2023 | Published | Conference Paper | IST-REx-ID: 14692 | OA
B. Auerbach, C. Hoffmann, and G. Pascual Perez, “Generic-group lower bounds via reductions between geometric-search problems: With and without preprocessing,” in 21st International Conference on Theory of Cryptography, 2023, vol. 14371, pp. 301–330.
[Preprint] View | DOI | Download Preprint (ext.)
 
2023 | Conference Paper | IST-REx-ID: 14693 | OA
C. Hoffmann, P. Hubáček, C. Kamath, and T. Krňák, “(Verifiable) delay functions from Lucas sequences,” in 21st International Conference on Theory of Cryptography, Taipei, Taiwan, 2023, vol. 14372, pp. 336–362.
[Preprint] View | DOI | Download Preprint (ext.)
 
2023 | Published | Conference Paper | IST-REx-ID: 14736
M. Bastankhah, K. Chatterjee, M. A. Maddah-Ali, S. Schmid, J. Svoboda, and M. X. Yeo, “R2: Boosting liquidity in payment channel networks with online admission control,” in 27th International Conference on Financial Cryptography and Data Security, Bol, Brac, Croatia, 2023, vol. 13950, pp. 309–325.
View | DOI
 

Search

Filter Publications

Display / Sort

Citation Style: IEEE

Export / Embed