Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.




137 Publications

2025 | Published | Conference Paper | IST-REx-ID: 19600
Avarikioti, Zeta, Route discovery in private payment channel networks. Computer Security. ESORICS 2024 International Workshops 15263. 2025
View | DOI
 
2024 | Published | Conference Paper | IST-REx-ID: 15007 | OA
Alpos O, Amores-Sesar I, Cachin C, Yeo MX. Eating sandwiches: Modular and lightweight elimination of transaction reordering attacks. In: 27th International Conference on Principles of Distributed Systems. Vol 286. Schloss Dagstuhl - Leibniz-Zentrum für Informatik; 2024. doi:10.4230/LIPIcs.OPODIS.2023.12
[Published Version] View | Files available | DOI | arXiv
 
2024 | Published | Conference Paper | IST-REx-ID: 18702 | OA
Anastos M, Auerbach B, Baig MA, et al. The cost of maintaining keys in dynamic groups with applications to multicast encryption and group messaging. In: 22nd International Conference on Theory of Cryptography. Vol 15364. Springer Nature; 2024:413-443. doi:10.1007/978-3-031-78011-0_14
[Preprint] View | DOI | Download Preprint (ext.)
 
2024 | Published | Conference Paper | IST-REx-ID: 18755 | OA
Ebrahimi E, Yadav A. Strongly secure universal thresholdizer. In: 30th International Conference on the Theory and Application of Cryptology and Information Security. Vol 15486. Springer Nature; 2024:207-239. doi:10.1007/978-981-96-0891-1_7
[Preprint] View | DOI | Download Preprint (ext.)
 
2024 | Published | Conference Paper | IST-REx-ID: 18756 | OA
Brzuska C, Ünal A, Woo IKY. Evasive LWE assumptions: Definitions, classes, and counterexamples. In: 30th International Conference on the Theory and Application of Cryptology and Information Security. Vol 15487. Springer Nature; 2024:418-449. doi:10.1007/978-981-96-0894-2_14
[Preprint] View | DOI | Download Preprint (ext.)
 
2024 | Published | Conference Paper | IST-REx-ID: 17126 | OA
Tairi, Erkan, Lower bounds for lattice-based compact functional encryption. Advances in Cryptology – EUROCRYPT 2024 14652. 2024
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 
2024 | Published | Conference Paper | IST-REx-ID: 17328 | OA
Chatterjee K, Ebrahimzadeh A, Karrabi M, Pietrzak KZ, Yeo MX, Zikelic D. Fully automated selfish mining analysis in efficient proof systems blockchains. In: Proceedings of the 43rd Annual ACM Symposium on Principles of Distributed Computing. Association for Computing Machinery; 2024:268-278. doi:10.1145/3662158.3662769
[Published Version] View | Files available | DOI | arXiv
 
2024 | Published | Journal Article | IST-REx-ID: 14820 | OA
Schmid S, Svoboda J, Yeo MX. Weighted packet selection for rechargeable links in cryptocurrency networks: Complexity and approximation. Theoretical Computer Science. 2024;989. doi:10.1016/j.tcs.2023.114353
[Published Version] View | Files available | DOI
 
2024 | Published | Conference Paper | IST-REx-ID: 18086
Alwen JF, Auerbach B, Cueto Noval M, Klein K, Pascual Perez G, Pietrzak KZ. DeCAF: Decentralizable CGKA with fast healing. In: Galdi C, Phan DH, eds. Security and Cryptography for Networks: 14th International Conference. Vol 14974. Cham: Springer Nature; 2024:294–313. doi:10.1007/978-3-031-71073-5_14
View | Files available | DOI
 
2024 | Published | Journal Article | IST-REx-ID: 18961 | OA
Günther CU, Pietrzak KZ. Deniability in automated contact tracing: Impossibilities and possibilities. Proceedings on Privacy Enhancing Technologies. 2024;2024(4):636-648. doi:10.56553/popets-2024-0134
[Published Version] View | Files available | DOI
 
2024 | Published | Conference Paper | IST-REx-ID: 17051 | OA
Auerbach, Benedikt, Trapdoor memory-hard functions. 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques 14653. 2024
[Preprint] View | DOI | Download Preprint (ext.)
 
2024 | Published | Thesis | IST-REx-ID: 18088 | OA
Pascual Perez G. On the efficiency and security of secure group messaging. 2024. doi:10.15479/at:ista:18088
[Published Version] View | Files available | DOI
 
2023 | Published | Conference Paper | IST-REx-ID: 13143 | OA
Hoffmann C, Hubáček P, Kamath C, Pietrzak KZ. Certifying giant nonprimes. In: Public-Key Cryptography - PKC 2023. Vol 13940. Springer Nature; 2023:530-553. doi:10.1007/978-3-031-31368-4_19
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 
2023 | Published | Conference Paper | IST-REx-ID: 14428 | OA
Dodis Y, Ferguson N, Goldin E, Hall P, Pietrzak KZ. Random oracle combiners: Breaking the concatenation barrier for collision-resistance. In: 43rd Annual International Cryptology Conference. Vol 14082. Springer Nature; 2023:514-546. doi:10.1007/978-3-031-38545-2_17
[Preprint] View | DOI | Download Preprint (ext.)
 
2023 | Published | Journal Article | IST-REx-ID: 12164 | OA
Baig MA, Hendler D, Milani A, Travers C. Long-lived counters with polylogarithmic amortized step complexity. Distributed Computing. 2023;36:29-43. doi:10.1007/s00446-022-00439-5
[Preprint] View | DOI | Download Preprint (ext.) | WoS
 
2023 | Published | Conference Paper | IST-REx-ID: 14691 | OA
Auerbach B, Cueto Noval M, Pascual Perez G, Pietrzak KZ. On the cost of post-compromise security in concurrent Continuous Group-Key Agreement. In: 21st International Conference on Theory of Cryptography. Vol 14371. Springer Nature; 2023:271-300. doi:10.1007/978-3-031-48621-0_10
[Preprint] View | DOI | Download Preprint (ext.)
 
2023 | Published | Conference Paper | IST-REx-ID: 14692 | OA
Auerbach B, Hoffmann C, Pascual Perez G. Generic-group lower bounds via reductions between geometric-search problems: With and without preprocessing. In: 21st International Conference on Theory of Cryptography. Vol 14371. Springer Nature; 2023:301-330. doi:10.1007/978-3-031-48621-0_11
[Preprint] View | DOI | Download Preprint (ext.)
 
2023 | Conference Paper | IST-REx-ID: 14693 | OA
Hoffmann C, Hubáček P, Kamath C, Krňák T. (Verifiable) delay functions from Lucas sequences. In: 21st International Conference on Theory of Cryptography. Vol 14372. Springer Nature; 2023:336-362. doi:10.1007/978-3-031-48624-1_13
[Preprint] View | DOI | Download Preprint (ext.)
 
2023 | Published | Conference Paper | IST-REx-ID: 14457 | OA
Hoffmann, Charlotte, Stronger lower bounds for leakage-resilient secret sharing. 8th International Conference on Cryptology and Information Security in Latin America 14168. 2023
[Preprint] View | DOI | Download Preprint (ext.)
 
2023 | Published | Conference Paper | IST-REx-ID: 14736
Bastankhah M, Chatterjee K, Maddah-Ali MA, Schmid S, Svoboda J, Yeo MX. R2: Boosting liquidity in payment channel networks with online admission control. In: 27th International Conference on Financial Cryptography and Data Security. Vol 13950. Springer Nature; 2023:309-325. doi:10.1007/978-3-031-47754-6_18
View | DOI
 

Search

Filter Publications

Display / Sort

Citation Style: AMA

Export / Embed