Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
150 Publications
2025 | Published | Conference Paper | IST-REx-ID: 19712 |
Cueto Noval, Miguel, et al. “On the Soundness of Algebraic Attacks against Code-Based Assumptions.” 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, vol. 15606, Springer Nature, 2025, pp. 385–415, doi:10.1007/978-3-031-91095-1_14.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2025 | Conference Paper | IST-REx-ID: 19738 |
Acharya, Anasuya, et al. “Securely Instantiating ‘Half Gates’ Garbling in the Standard Model.” 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, vol. 15677, Springer Nature, 2025, pp. 37–75, doi:10.1007/978-3-031-91829-2_2.
[Preprint]
View
| DOI
| Download Preprint (ext.)
2025 | Published | Conference Paper | IST-REx-ID: 20053 |
Chatterjee, Krishnendu, et al. “When Is Liquid Democracy Possible?: On the Manipulation of Variance.” Proceedings of the ACM Symposium on Principles of Distributed Computing, ACM, 2025, pp. 241–51, doi:10.1145/3732772.3733544.
[Published Version]
View
| Files available
| DOI
| Download Published Version (ext.)
| WoS
2025 | Published | Conference Paper | IST-REx-ID: 20587 |
Baig, Mirza Ahad, et al. “Nakamoto Consensus from Multiple Resources.” 7th Conference on Advances in Financial Technologies, vol. 354, 16, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2025, doi:10.4230/LIPIcs.AFT.2025.16.
[Published Version]
View
| Files available
| DOI
| Download Published Version (ext.)
| arXiv
2025 | Published | Conference Paper | IST-REx-ID: 19600 |
Avarikioti, Zeta, et al. “Route Discovery in Private Payment Channel Networks.” Computer Security. ESORICS 2024 International Workshops, vol. 15263, Springer Nature, 2025, pp. 207–23, doi:10.1007/978-3-031-82349-7_15.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2025 | Published | Conference Paper | IST-REx-ID: 20846 |
Brandt, Nicholas, et al. “Constrained Verifiable Random Functions without Obfuscation and Friends.” 23rd International Conference on Theory of Cryptography, vol. 16271, Springer Nature, 2025, pp. 478–511, doi:10.1007/978-3-032-12290-2_16.
[Preprint]
View
| DOI
| Download Preprint (ext.)
2025 | Published | Conference Paper | IST-REx-ID: 20845 |
Agrawal, Shweta, et al. “Zeroizing Attacks against Evasive and Circular Evasive LWE.” 23rd International Conference on Theory of Cryptography, vol. 16269, Springer Nature, 2025, pp. 259–90, doi:10.1007/978-3-032-12293-3_9.
[Preprint]
View
| DOI
| Download Preprint (ext.)
2025 | Published | Conference Paper | IST-REx-ID: 20844 |
Dujmovic, Jesko, et al. “Space-Deniable Proofs.” 23rd International Conference on Theory of Cryptography, vol. 16271, Springer Nature, 2025, pp. 171–202, doi:10.1007/978-3-032-12290-2_6.
[Preprint]
View
| DOI
| Download Preprint (ext.)
2025 | Published | Thesis | IST-REx-ID: 20920 |
Hoffmann, Charlotte. Theory and Applications of Verifiable Delay Functions. Institute of Science and Technology Austria, 2025, doi:10.15479/AT-ISTA-20920.
[Published Version]
View
| Files available
| DOI
2025 | Published | Thesis | IST-REx-ID: 20556
Hoffmann, Charlotte. Theory and Applications of Verifiable Delay Functions. Institute of Science and Technology Austria, 2025, doi:10.15479/AT-ISTA-20556.
[Published Version]
View
| Files available
| DOI
2025 | Published | Conference Paper | IST-REx-ID: 19778 |
Hoffmann, Charlotte, and Krzysztof Z. Pietrzak. “Watermarkable and Zero-Knowledge Verifiable Delay Functions from Any Proof of Exponentiation.” 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, vol. 15674, Springer Nature, 2025, pp. 36–66, doi:10.1007/978-3-031-91820-9_2.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
2024 | Published | Conference Paper | IST-REx-ID: 17328 |
Chatterjee, Krishnendu, et al. “Fully Automated Selfish Mining Analysis in Efficient Proof Systems Blockchains.” Proceedings of the 43rd Annual ACM Symposium on Principles of Distributed Computing, Association for Computing Machinery, 2024, pp. 268–78, doi:10.1145/3662158.3662769.
[Published Version]
View
| Files available
| DOI
| arXiv
2024 | Published | Journal Article | IST-REx-ID: 18961 |
Günther, Christoph Ullrich, and Krzysztof Z. Pietrzak. “Deniability in Automated Contact Tracing: Impossibilities and Possibilities.” Proceedings on Privacy Enhancing Technologies, vol. 2024, no. 4, Privacy Enhancing Technologies Symposium Advisory Board, 2024, pp. 636–48, doi:10.56553/popets-2024-0134.
[Published Version]
View
| Files available
| DOI
2024 | Published | Conference Paper | IST-REx-ID: 17051 |
Auerbach, Benedikt, et al. “Trapdoor Memory-Hard Functions.” 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, vol. 14653, Springer Nature, 2024, pp. 315–44, doi:10.1007/978-3-031-58734-4_11.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
2024 | Published | Conference Paper | IST-REx-ID: 17126 |
Tairi, Erkan, and Akin Ünal. “Lower Bounds for Lattice-Based Compact Functional Encryption.” Advances in Cryptology – EUROCRYPT 2024, vol. 14652, Springer Nature, 2024, pp. 249–79, doi:10.1007/978-3-031-58723-8_9.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
| WoS
2024 | Published | Conference Paper | IST-REx-ID: 18086
Alwen, Joel F., et al. “DeCAF: Decentralizable CGKA with Fast Healing.” Security and Cryptography for Networks: 14th International Conference, edited by Clemente Galdi and Duong Hieu Phan, vol. 14974, Springer Nature, 2024, pp. 294–313, doi:10.1007/978-3-031-71073-5_14.
View
| Files available
| DOI
| WoS
2024 | Published | Conference Paper | IST-REx-ID: 18756 |
Brzuska, Chris, et al. “Evasive LWE Assumptions: Definitions, Classes, and Counterexamples.” 30th International Conference on the Theory and Application of Cryptology and Information Security, vol. 15487, Springer Nature, 2024, pp. 418–49, doi:10.1007/978-981-96-0894-2_14.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
2024 | Published | Conference Paper | IST-REx-ID: 18755 |
Ebrahimi, Ehsan, and Anshu Yadav. “Strongly Secure Universal Thresholdizer.” 30th International Conference on the Theory and Application of Cryptology and Information Security, vol. 15486, Springer Nature, 2024, pp. 207–39, doi:10.1007/978-981-96-0891-1_7.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
2024 | Published | Thesis | IST-REx-ID: 18088 |
Pascual Perez, Guillermo. On the Efficiency and Security of Secure Group Messaging. Institute of Science and Technology Austria, 2024, doi:10.15479/at:ista:18088.
[Published Version]
View
| Files available
| DOI
2024 | Published | Conference Paper | IST-REx-ID: 15007 |
Alpos, Orestis, et al. “Eating Sandwiches: Modular and Lightweight Elimination of Transaction Reordering Attacks.” 27th International Conference on Principles of Distributed Systems, vol. 286, 12, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2024, doi:10.4230/LIPIcs.OPODIS.2023.12.
[Published Version]
View
| Files available
| DOI
| WoS
| arXiv