5 Publications

Mark all

[5]
2025 | Published | Conference Paper | IST-REx-ID: 20587 | OA
Nakamoto consensus from multiple resources
M.A. Baig, C.U. Günther, K.Z. Pietrzak, in:, 7th Conference on Advances in Financial Technologies, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2025.
[Published Version] View | Files available | DOI | Download Published Version (ext.) | arXiv
 
[4]
2025 | Published | Conference Paper | IST-REx-ID: 20846 | OA
Constrained verifiable random functions without obfuscation and friends
N. Brandt, M. Cueto Noval, C.U. Günther, A. Ünal, S. Wohnig, in:, 23rd International Conference on Theory of Cryptography, Springer Nature, 2025, pp. 478–511.
[Preprint] View | DOI | Download Preprint (ext.)
 
[3]
2025 | Published | Conference Paper | IST-REx-ID: 20844 | OA
Space-deniable proofs
J. Dujmovic, C.U. Günther, K.Z. Pietrzak, in:, 23rd International Conference on Theory of Cryptography, Springer Nature, 2025, pp. 171–202.
[Preprint] View | DOI | Download Preprint (ext.)
 
[2]
2024 | Published | Journal Article | IST-REx-ID: 18961 | OA
Deniability in automated contact tracing: Impossibilities and possibilities
C.U. Günther, K.Z. Pietrzak, Proceedings on Privacy Enhancing Technologies 2024 (2024) 636–648.
[Published Version] View | Files available | DOI
 
[1]
2024 | Published | Conference Paper | IST-REx-ID: 17051 | OA
Trapdoor memory-hard functions
B. Auerbach, C.U. Günther, K.Z. Pietrzak, in:, 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer Nature, 2024, pp. 315–344.
[Preprint] View | DOI | Download Preprint (ext.) | WoS
 

Search

Filter Publications

Display / Sort

Export / Embed

Grants


5 Publications

Mark all

[5]
2025 | Published | Conference Paper | IST-REx-ID: 20587 | OA
Nakamoto consensus from multiple resources
M.A. Baig, C.U. Günther, K.Z. Pietrzak, in:, 7th Conference on Advances in Financial Technologies, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2025.
[Published Version] View | Files available | DOI | Download Published Version (ext.) | arXiv
 
[4]
2025 | Published | Conference Paper | IST-REx-ID: 20846 | OA
Constrained verifiable random functions without obfuscation and friends
N. Brandt, M. Cueto Noval, C.U. Günther, A. Ünal, S. Wohnig, in:, 23rd International Conference on Theory of Cryptography, Springer Nature, 2025, pp. 478–511.
[Preprint] View | DOI | Download Preprint (ext.)
 
[3]
2025 | Published | Conference Paper | IST-REx-ID: 20844 | OA
Space-deniable proofs
J. Dujmovic, C.U. Günther, K.Z. Pietrzak, in:, 23rd International Conference on Theory of Cryptography, Springer Nature, 2025, pp. 171–202.
[Preprint] View | DOI | Download Preprint (ext.)
 
[2]
2024 | Published | Journal Article | IST-REx-ID: 18961 | OA
Deniability in automated contact tracing: Impossibilities and possibilities
C.U. Günther, K.Z. Pietrzak, Proceedings on Privacy Enhancing Technologies 2024 (2024) 636–648.
[Published Version] View | Files available | DOI
 
[1]
2024 | Published | Conference Paper | IST-REx-ID: 17051 | OA
Trapdoor memory-hard functions
B. Auerbach, C.U. Günther, K.Z. Pietrzak, in:, 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer Nature, 2024, pp. 315–344.
[Preprint] View | DOI | Download Preprint (ext.) | WoS
 

Search

Filter Publications

Display / Sort

Export / Embed