Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
22 Publications
- 1
- 2 (current)
- 3
- 4
- 5
2023 | Conference Paper | IST-REx-ID: 14829 |
S. Cohen, G. Goren, E. Kokoris Kogias, A. Sonnino, and A. Spiegelman, “Proof of availability and retrieval in a modular blockchain architecture,” in 27th International Conference on Financial Cryptography and Data Security, Bol, Brac, Croatia, 2023, vol. 13951, pp. 36–53.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2023 | Conference Paper | IST-REx-ID: 14989 |
H. Malvai et al., “Parakeet: Practical key transparency for end-to-end eEncrypted messaging,” in Proceedings of the 2023 Network and Distributed System Security Symposium, San Diego, CA, United States, 2023.
[Published Version]
View
| DOI
| Download Published Version (ext.)
2023 | Conference Paper | IST-REx-ID: 14743 |
P. Tennage et al., “QuePaxa: Escaping the tyranny of timeouts in consensus,” in Proceedings of the 29th Symposium on Operating Systems Principles, Koblenz, Germany, 2023, pp. 281–297.
[Published Version]
View
| DOI
| Download Published Version (ext.)
2022 | Conference Paper | IST-REx-ID: 12229 |
A. Spiegelman, N. Giridharan, A. Sonnino, and E. Kokoris Kogias, “Bullshark: DAG BFT protocols made practical,” in Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, Los Angeles, CA, United States, 2022, pp. 2705–2718.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| arXiv
2022 | Conference Paper | IST-REx-ID: 12300 |
S. Das, T. Yurek, Z. Xiang, A. Miller, E. Kokoris Kogias, and L. Ren, “Practical asynchronous distributed key generation,” in 2022 IEEE Symposium on Security and Privacy, San Francisco, CA, United States, 2022, pp. 2518–2534.
[Preprint]
View
| DOI
| Download Preprint (ext.)
- 1
- 2 (current)
- 3
- 4
- 5