Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.




150 Publications

2025 | Published | Conference Paper | IST-REx-ID: 19712 | OA
Cueto Noval M, Merz S-P, Stählin P, Ünal A. 2025. On the soundness of algebraic attacks against code-based assumptions. 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques. EUROCRYPT: International Conference on the Theory and Applications of Cryptographic Techniques, LNCS, vol. 15606, 385–415.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 
2025 | Conference Paper | IST-REx-ID: 19738 | OA
Acharya A, Azari K, Baig MA, Hofheinz D, Kamath C. 2025. Securely instantiating ‘Half Gates’ garbling in the standard model. 28th IACR International Conference on Practice and Theory of Public-Key Cryptography. PKC: Public-Key Cryptography, LNCS, vol. 15677, 37–75.
[Preprint] View | DOI | Download Preprint (ext.)
 
2025 | Published | Conference Paper | IST-REx-ID: 20053 | OA
Chatterjee K, Gilbert S, Schmid S, Svoboda J, Yeo MX. 2025. When is liquid democracy possible?: On the manipulation of variance. Proceedings of the ACM Symposium on Principles of Distributed Computing. PODC: Symposium on Principles of Distributed Computing, 241–251.
[Published Version] View | Files available | DOI | Download Published Version (ext.) | WoS
 
2025 | Published | Conference Paper | IST-REx-ID: 20587 | OA
Baig MA, Günther CU, Pietrzak KZ. 2025. Nakamoto consensus from multiple resources. 7th Conference on Advances in Financial Technologies. AFT: Conference on Advances in Financial Technologies, LIPIcs, vol. 354, 16.
[Published Version] View | Files available | DOI | Download Published Version (ext.) | arXiv
 
2025 | Published | Conference Paper | IST-REx-ID: 19600 | OA
Avarikioti Z, Bastankhah M, Maddah-Ali MA, Pietrzak KZ, Svoboda J, Yeo MX. 2025. Route discovery in private payment channel networks. Computer Security. ESORICS 2024 International Workshops. ESORICS: European Symposium on Research in Computer Security, LNCS, vol. 15263, 207–223.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 
2025 | Published | Conference Paper | IST-REx-ID: 20846 | OA
Brandt N, Cueto Noval M, Günther CU, Ünal A, Wohnig S. 2025. Constrained verifiable random functions without obfuscation and friends. 23rd International Conference on Theory of Cryptography. TCC: Theory of Cryptography, LNCS, vol. 16271, 478–511.
[Preprint] View | DOI | Download Preprint (ext.)
 
2025 | Published | Conference Paper | IST-REx-ID: 20845 | OA
Agrawal S, Modi A, Yadav A, Yamada S. 2025. Zeroizing attacks against evasive and circular evasive LWE. 23rd International Conference on Theory of Cryptography. TCC: Theory of Cryptography, LNCS, vol. 16269, 259–290.
[Preprint] View | DOI | Download Preprint (ext.)
 
2025 | Published | Conference Paper | IST-REx-ID: 20844 | OA
Dujmovic J, Günther CU, Pietrzak KZ. 2025. Space-deniable proofs. 23rd International Conference on Theory of Cryptography. TCC: Theory of Cryptography, LNCS, vol. 16271, 171–202.
[Preprint] View | DOI | Download Preprint (ext.)
 
2025 | Published | Thesis | IST-REx-ID: 20920 | OA
Hoffmann C. 2025. Theory and applications of verifiable delay functions. Institute of Science and Technology Austria.
[Published Version] View | Files available | DOI
 
2025 | Published | Thesis | IST-REx-ID: 20556
Hoffmann C. 2025. Theory and applications of verifiable delay functions. Institute of Science and Technology Austria.
[Published Version] View | Files available | DOI
 
2025 | Published | Conference Paper | IST-REx-ID: 19778 | OA
Hoffmann C, Pietrzak KZ. 2025. Watermarkable and zero-knowledge Verifiable Delay Functions from any proof of exponentiation. 28th IACR International Conference on Practice and Theory of Public-Key Cryptography. PKC: Public-Key Cryptography, LNCS, vol. 15674, 36–66.
[Preprint] View | Files available | DOI | Download Preprint (ext.)
 
2024 | Published | Conference Paper | IST-REx-ID: 17328 | OA
Chatterjee K, Ebrahimzadeh A, Karrabi M, Pietrzak KZ, Yeo MX, Zikelic D. 2024. Fully automated selfish mining analysis in efficient proof systems blockchains. Proceedings of the 43rd Annual ACM Symposium on Principles of Distributed Computing. PODC: Symposium on Principles of Distributed Computing, 268–278.
[Published Version] View | Files available | DOI | arXiv
 
2024 | Published | Journal Article | IST-REx-ID: 18961 | OA
Günther CU, Pietrzak KZ. 2024. Deniability in automated contact tracing: Impossibilities and possibilities. Proceedings on Privacy Enhancing Technologies. 2024(4), 636–648.
[Published Version] View | Files available | DOI
 
2024 | Published | Conference Paper | IST-REx-ID: 17051 | OA
Auerbach B, Günther CU, Pietrzak KZ. 2024. Trapdoor memory-hard functions. 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques. EUROCRYPT: Theory and Applications of Cryptographic Techniques, LNCS, vol. 14653, 315–344.
[Preprint] View | DOI | Download Preprint (ext.) | WoS
 
2024 | Published | Conference Paper | IST-REx-ID: 17126 | OA
Tairi E, Ünal A. 2024. Lower bounds for lattice-based compact functional encryption. Advances in Cryptology – EUROCRYPT 2024. EUROCRYPT: Theory and Applications of Cryptographic Techniques, LNCS, vol. 14652, 249–279.
[Submitted Version] View | DOI | Download Submitted Version (ext.) | WoS
 
2024 | Published | Conference Paper | IST-REx-ID: 18086
Alwen JF, Auerbach B, Cueto Noval M, Klein K, Pascual Perez G, Pietrzak KZ. 2024. DeCAF: Decentralizable CGKA with fast healing. Security and Cryptography for Networks: 14th International Conference. SCN: Security and Cryptography for Networks, LNCS, vol. 14974, 294–313.
View | Files available | DOI | WoS
 
2024 | Published | Conference Paper | IST-REx-ID: 18756 | OA
Brzuska C, Ünal A, Woo IKY. 2024. Evasive LWE assumptions: Definitions, classes, and counterexamples. 30th International Conference on the Theory and Application of Cryptology and Information Security. ASIACRYPT: Conference on the Theory and Application of Cryptology and Information Security, LNCS, vol. 15487, 418–449.
[Preprint] View | DOI | Download Preprint (ext.) | WoS
 
2024 | Published | Conference Paper | IST-REx-ID: 18755 | OA
Ebrahimi E, Yadav A. 2024. Strongly secure universal thresholdizer. 30th International Conference on the Theory and Application of Cryptology and Information Security. ASIACRYPT: Conference on the Theory and Application of Cryptology and Information Security vol. 15486, 207–239.
[Preprint] View | DOI | Download Preprint (ext.) | WoS
 
2024 | Published | Thesis | IST-REx-ID: 18088 | OA
Pascual Perez G. 2024. On the efficiency and security of secure group messaging. Institute of Science and Technology Austria.
[Published Version] View | Files available | DOI
 
2024 | Published | Conference Paper | IST-REx-ID: 15007 | OA
Alpos O, Amores-Sesar I, Cachin C, Yeo MX. 2024. Eating sandwiches: Modular and lightweight elimination of transaction reordering attacks. 27th International Conference on Principles of Distributed Systems. OPODIS: Conference on Principles of Distributed Systems, LIPIcs, vol. 286, 12.
[Published Version] View | Files available | DOI | WoS | arXiv
 

Search

Filter Publications

Display / Sort

Citation Style: ISTA Annual Report

Export / Embed