Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

136 Publications


2024 | Published | Conference Paper | IST-REx-ID: 18702 | OA
Anastos M, Auerbach B, Baig MA, et al. The cost of maintaining keys in dynamic groups with applications to multicast encryption and group messaging. In: 22nd International Conference on Theory of Cryptography. Vol 15364. Springer Nature; 2024:413-443. doi:10.1007/978-3-031-78011-0_14
[Preprint] View | DOI | Download Preprint (ext.)
 

2024 | Published | Conference Paper | IST-REx-ID: 18755 | OA
Ebrahimi E, Yadav A. Strongly secure universal thresholdizer. In: 30th International Conference on the Theory and Application of Cryptology and Information Security. Vol 15486. Springer Nature; 2024:207-239. doi:10.1007/978-981-96-0891-1_7
[Preprint] View | DOI | Download Preprint (ext.)
 

2024 | Published | Journal Article | IST-REx-ID: 18961 | OA
Günther CU, Pietrzak KZ. Deniability in automated contact tracing: Impossibilities and possibilities. Proceedings on Privacy Enhancing Technologies. 2024;2024(4):636-648. doi:10.56553/popets-2024-0134
[Published Version] View | Files available | DOI
 

2024 | Published | Conference Paper | IST-REx-ID: 18756 | OA
Brzuska C, Ünal A, Woo IKY. Evasive LWE assumptions: Definitions, classes, and counterexamples. In: 30th International Conference on the Theory and Application of Cryptology and Information Security. Vol 15487. Springer Nature; 2024:418-449. doi:10.1007/978-981-96-0894-2_14
[Preprint] View | DOI | Download Preprint (ext.)
 

2024 | Published | Conference Paper | IST-REx-ID: 17051 | OA
Auerbach B, Günther CU, Pietrzak KZ. Trapdoor memory-hard functions. In: 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques. Vol 14653. Springer Nature; 2024:315-344. doi:10.1007/978-3-031-58734-4_11
[Preprint] View | DOI | Download Preprint (ext.)
 

2024 | Published | Conference Paper | IST-REx-ID: 17126 | OA
Tairi E, Ünal A. Lower bounds for lattice-based compact functional encryption. In: Advances in Cryptology – EUROCRYPT 2024. Vol 14652. Springer Nature; 2024:249-279. doi:10.1007/978-3-031-58723-8_9
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

2024 | Published | Conference Paper | IST-REx-ID: 17328 | OA
Chatterjee K, Ebrahimzadeh A, Karrabi M, Pietrzak KZ, Yeo MX, Zikelic D. Fully automated selfish mining analysis in efficient proof systems blockchains. In: Proceedings of the 43rd Annual ACM Symposium on Principles of Distributed Computing. Association for Computing Machinery; 2024:268-278. doi:10.1145/3662158.3662769
[Published Version] View | Files available | DOI | arXiv
 

2024 | Published | Journal Article | IST-REx-ID: 14820 | OA
Schmid S, Svoboda J, Yeo MX. Weighted packet selection for rechargeable links in cryptocurrency networks: Complexity and approximation. Theoretical Computer Science. 2024;989. doi:10.1016/j.tcs.2023.114353
[Published Version] View | Files available | DOI
 

2024 | Published | Conference Paper | IST-REx-ID: 15007 | OA
Alpos O, Amores-Sesar I, Cachin C, Yeo MX. Eating sandwiches: Modular and lightweight elimination of transaction reordering attacks. In: 27th International Conference on Principles of Distributed Systems. Vol 286. Schloss Dagstuhl - Leibniz-Zentrum für Informatik; 2024. doi:10.4230/LIPIcs.OPODIS.2023.12
[Published Version] View | Files available | DOI | arXiv
 

2024 | Published | Conference Paper | IST-REx-ID: 18086
Alwen JF, Auerbach B, Cueto Noval M, Klein K, Pascual Perez G, Pietrzak KZ. DeCAF: Decentralizable CGKA with fast healing. In: Galdi C, Phan DH, eds. Security and Cryptography for Networks: 14th International Conference. Vol 14974. Cham: Springer Nature; 2024:294–313. doi:10.1007/978-3-031-71073-5_14
View | Files available | DOI
 

2024 | Published | Thesis | IST-REx-ID: 18088 | OA
Pascual Perez G. On the efficiency and security of secure group messaging. 2024. doi:10.15479/at:ista:18088
[Published Version] View | Files available | DOI
 

2023 | Published | Conference Paper | IST-REx-ID: 13143 | OA
Hoffmann C, Hubáček P, Kamath C, Pietrzak KZ. Certifying giant nonprimes. In: Public-Key Cryptography - PKC 2023. Vol 13940. Springer Nature; 2023:530-553. doi:10.1007/978-3-031-31368-4_19
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

2023 | Published | Conference Paper | IST-REx-ID: 14428 | OA
Dodis Y, Ferguson N, Goldin E, Hall P, Pietrzak KZ. Random oracle combiners: Breaking the concatenation barrier for collision-resistance. In: 43rd Annual International Cryptology Conference. Vol 14082. Springer Nature; 2023:514-546. doi:10.1007/978-3-031-38545-2_17
[Preprint] View | DOI | Download Preprint (ext.)
 

2023 | Published | Conference Paper | IST-REx-ID: 14457 | OA
Hoffmann C, Simkin M. Stronger lower bounds for leakage-resilient secret sharing. In: 8th International Conference on Cryptology and Information Security in Latin America. Vol 14168. Springer Nature; 2023:215-228. doi:10.1007/978-3-031-44469-2_11
[Preprint] View | DOI | Download Preprint (ext.)
 

2023 | Published | Conference Paper | IST-REx-ID: 14490 | OA
Avarikioti Z, Lizurej T, Michalak T, Yeo MX. Lightning creation games. In: 43rd International Conference on Distributed Computing Systems. Vol 2023. IEEE; 2023:603-613. doi:10.1109/ICDCS57875.2023.00037
[Preprint] View | Files available | DOI | Download Preprint (ext.) | arXiv
 

2023 | Published | Thesis | IST-REx-ID: 14506 | OA
Yeo MX. Advances in efficiency and privacy in payment channel network analysis. 2023. doi:10.15479/14506
[Published Version] View | Files available | DOI
 

2023 | Published | Journal Article | IST-REx-ID: 12164 | OA
Baig MA, Hendler D, Milani A, Travers C. Long-lived counters with polylogarithmic amortized step complexity. Distributed Computing. 2023;36:29-43. doi:10.1007/s00446-022-00439-5
[Preprint] View | DOI | Download Preprint (ext.) | WoS
 

2023 | Published | Conference Paper | IST-REx-ID: 14691 | OA
Auerbach B, Cueto Noval M, Pascual Perez G, Pietrzak KZ. On the cost of post-compromise security in concurrent Continuous Group-Key Agreement. In: 21st International Conference on Theory of Cryptography. Vol 14371. Springer Nature; 2023:271-300. doi:10.1007/978-3-031-48621-0_10
[Preprint] View | DOI | Download Preprint (ext.)
 

2023 | Published | Conference Paper | IST-REx-ID: 14692 | OA
Auerbach B, Hoffmann C, Pascual Perez G. Generic-group lower bounds via reductions between geometric-search problems: With and without preprocessing. In: 21st International Conference on Theory of Cryptography. Vol 14371. Springer Nature; 2023:301-330. doi:10.1007/978-3-031-48621-0_11
[Preprint] View | DOI | Download Preprint (ext.)
 

2023 | Conference Paper | IST-REx-ID: 14693 | OA
Hoffmann C, Hubáček P, Kamath C, Krňák T. (Verifiable) delay functions from Lucas sequences. In: 21st International Conference on Theory of Cryptography. Vol 14372. Springer Nature; 2023:336-362. doi:10.1007/978-3-031-48624-1_13
[Preprint] View | DOI | Download Preprint (ext.)
 

Filters and Search Terms

department=KrPi

Search

Filter Publications

Display / Sort

Citation Style: AMA

Export / Embed