Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.




150 Publications

2025 | Published | Conference Paper | IST-REx-ID: 19712 | OA
Cueto Noval, Miguel, et al. “On the Soundness of Algebraic Attacks against Code-Based Assumptions.” 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, vol. 15606, Springer Nature, 2025, pp. 385–415, doi:10.1007/978-3-031-91095-1_14.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 
2025 | Conference Paper | IST-REx-ID: 19738 | OA
Acharya, Anasuya, et al. “Securely Instantiating ‘Half Gates’ Garbling in the Standard Model.” 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, vol. 15677, Springer Nature, 2025, pp. 37–75, doi:10.1007/978-3-031-91829-2_2.
[Preprint] View | DOI | Download Preprint (ext.)
 
2025 | Published | Conference Paper | IST-REx-ID: 20053 | OA
Chatterjee, Krishnendu, et al. “When Is Liquid Democracy Possible?: On the Manipulation of Variance.” Proceedings of the ACM Symposium on Principles of Distributed Computing, ACM, 2025, pp. 241–51, doi:10.1145/3732772.3733544.
[Published Version] View | Files available | DOI | Download Published Version (ext.) | WoS
 
2025 | Published | Conference Paper | IST-REx-ID: 20587 | OA
Baig, Mirza Ahad, et al. “Nakamoto Consensus from Multiple Resources.” 7th Conference on Advances in Financial Technologies, vol. 354, 16, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2025, doi:10.4230/LIPIcs.AFT.2025.16.
[Published Version] View | Files available | DOI | Download Published Version (ext.) | arXiv
 
2025 | Published | Conference Paper | IST-REx-ID: 19600 | OA
Avarikioti, Zeta, et al. “Route Discovery in Private Payment Channel Networks.” Computer Security. ESORICS 2024 International Workshops, vol. 15263, Springer Nature, 2025, pp. 207–23, doi:10.1007/978-3-031-82349-7_15.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 
2025 | Published | Conference Paper | IST-REx-ID: 20846 | OA
Brandt, Nicholas, et al. “Constrained Verifiable Random Functions without Obfuscation and Friends.” 23rd International Conference on Theory of Cryptography, vol. 16271, Springer Nature, 2025, pp. 478–511, doi:10.1007/978-3-032-12290-2_16.
[Preprint] View | DOI | Download Preprint (ext.)
 
2025 | Published | Conference Paper | IST-REx-ID: 20845 | OA
Agrawal, Shweta, et al. “Zeroizing Attacks against Evasive and Circular Evasive LWE.” 23rd International Conference on Theory of Cryptography, vol. 16269, Springer Nature, 2025, pp. 259–90, doi:10.1007/978-3-032-12293-3_9.
[Preprint] View | DOI | Download Preprint (ext.)
 
2025 | Published | Conference Paper | IST-REx-ID: 20844 | OA
Dujmovic, Jesko, et al. “Space-Deniable Proofs.” 23rd International Conference on Theory of Cryptography, vol. 16271, Springer Nature, 2025, pp. 171–202, doi:10.1007/978-3-032-12290-2_6.
[Preprint] View | DOI | Download Preprint (ext.)
 
2025 | Published | Thesis | IST-REx-ID: 20920 | OA
Hoffmann, Charlotte. Theory and Applications of Verifiable Delay Functions. Institute of Science and Technology Austria, 2025, doi:10.15479/AT-ISTA-20920.
[Published Version] View | Files available | DOI
 
2025 | Published | Thesis | IST-REx-ID: 20556
Hoffmann, Charlotte. Theory and Applications of Verifiable Delay Functions. Institute of Science and Technology Austria, 2025, doi:10.15479/AT-ISTA-20556.
[Published Version] View | Files available | DOI
 
2025 | Published | Conference Paper | IST-REx-ID: 19778 | OA
Hoffmann, Charlotte, and Krzysztof Z. Pietrzak. “Watermarkable and Zero-Knowledge Verifiable Delay Functions from Any Proof of Exponentiation.” 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, vol. 15674, Springer Nature, 2025, pp. 36–66, doi:10.1007/978-3-031-91820-9_2.
[Preprint] View | Files available | DOI | Download Preprint (ext.)
 
2024 | Published | Conference Paper | IST-REx-ID: 17328 | OA
Chatterjee, Krishnendu, et al. “Fully Automated Selfish Mining Analysis in Efficient Proof Systems Blockchains.” Proceedings of the 43rd Annual ACM Symposium on Principles of Distributed Computing, Association for Computing Machinery, 2024, pp. 268–78, doi:10.1145/3662158.3662769.
[Published Version] View | Files available | DOI | arXiv
 
2024 | Published | Journal Article | IST-REx-ID: 18961 | OA
Günther, Christoph Ullrich, and Krzysztof Z. Pietrzak. “Deniability in Automated Contact Tracing: Impossibilities and Possibilities.” Proceedings on Privacy Enhancing Technologies, vol. 2024, no. 4, Privacy Enhancing Technologies Symposium Advisory Board, 2024, pp. 636–48, doi:10.56553/popets-2024-0134.
[Published Version] View | Files available | DOI
 
2024 | Published | Conference Paper | IST-REx-ID: 17051 | OA
Auerbach, Benedikt, et al. “Trapdoor Memory-Hard Functions.” 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, vol. 14653, Springer Nature, 2024, pp. 315–44, doi:10.1007/978-3-031-58734-4_11.
[Preprint] View | DOI | Download Preprint (ext.) | WoS
 
2024 | Published | Conference Paper | IST-REx-ID: 17126 | OA
Tairi, Erkan, and Akin Ünal. “Lower Bounds for Lattice-Based Compact Functional Encryption.” Advances in Cryptology – EUROCRYPT 2024, vol. 14652, Springer Nature, 2024, pp. 249–79, doi:10.1007/978-3-031-58723-8_9.
[Submitted Version] View | DOI | Download Submitted Version (ext.) | WoS
 
2024 | Published | Conference Paper | IST-REx-ID: 18086
Alwen, Joel F., et al. “DeCAF: Decentralizable CGKA with Fast Healing.” Security and Cryptography for Networks: 14th International Conference, edited by Clemente Galdi and Duong Hieu Phan, vol. 14974, Springer Nature, 2024, pp. 294–313, doi:10.1007/978-3-031-71073-5_14.
View | Files available | DOI | WoS
 
2024 | Published | Conference Paper | IST-REx-ID: 18756 | OA
Brzuska, Chris, et al. “Evasive LWE Assumptions: Definitions, Classes, and Counterexamples.” 30th International Conference on the Theory and Application of Cryptology and Information Security, vol. 15487, Springer Nature, 2024, pp. 418–49, doi:10.1007/978-981-96-0894-2_14.
[Preprint] View | DOI | Download Preprint (ext.) | WoS
 
2024 | Published | Conference Paper | IST-REx-ID: 18755 | OA
Ebrahimi, Ehsan, and Anshu Yadav. “Strongly Secure Universal Thresholdizer.” 30th International Conference on the Theory and Application of Cryptology and Information Security, vol. 15486, Springer Nature, 2024, pp. 207–39, doi:10.1007/978-981-96-0891-1_7.
[Preprint] View | DOI | Download Preprint (ext.) | WoS
 
2024 | Published | Thesis | IST-REx-ID: 18088 | OA
Pascual Perez, Guillermo. On the Efficiency and Security of Secure Group Messaging. Institute of Science and Technology Austria, 2024, doi:10.15479/at:ista:18088.
[Published Version] View | Files available | DOI
 
2024 | Published | Conference Paper | IST-REx-ID: 15007 | OA
Alpos, Orestis, et al. “Eating Sandwiches: Modular and Lightweight Elimination of Transaction Reordering Attacks.” 27th International Conference on Principles of Distributed Systems, vol. 286, 12, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2024, doi:10.4230/LIPIcs.OPODIS.2023.12.
[Published Version] View | Files available | DOI | WoS | arXiv
 

Search

Filter Publications

Display / Sort

Citation Style: MLA

Export / Embed