default search action
Aggelos Kiayias
Person information
- affiliation: University of Edinburgh, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Juan A. Garay, Aggelos Kiayias, Nikos Leonardos:
The Bitcoin Backbone Protocol: Analysis and Applications. J. ACM 71(4): 25:1-25:49 (2024) - [j23]Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis:
(Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates. J. Cryptol. 37(2): 17 (2024) - [j22]Debajyoti Das, Claudia Díaz, Aggelos Kiayias, Thomas Zacharias:
Are continuous stop-and-go mixnets provably secure? Proc. Priv. Enhancing Technol. 2024(4): 665-683 (2024) - [c195]Aggelos Kiayias, Elias Koutsoupias, Philip Lazos, Giorgos Panagiotakos:
Blockchain Space Tokenization. AFT 2024: 9:1-9:20 - [c194]Pyrros Chaidos, Aggelos Kiayias:
Mithril: Stake-Based Threshold Multisignatures. CANS (1) 2024: 239-263 - [c193]Amirreza Sarencheh, Aggelos Kiayias, Markulf Kohlweiss:
PARScoin: A Privacy-preserving, Auditable, and Regulation-friendly Stablecoin. CANS (1) 2024: 289-313 - [c192]Dimitris Karakostas, Aggelos Kiayias, Thomas Zacharias:
Blockchain Bribing Attacks and the Efficacy of Counterincentives. CCS 2024: 1031-1045 - [c191]Marshall Ball, Juan A. Garay, Peter Hall, Aggelos Kiayias, Giorgos Panagiotakos:
Towards Permissionless Consensus in the Standard Model via Fine-Grained Complexity. CRYPTO (2) 2024: 113-146 - [c190]Michele Ciampi, Aggelos Kiayias, Yu Shen:
Universal Composable Transaction Serialization with Order Fairness. CRYPTO (2) 2024: 147-180 - [c189]Christian Badertscher, Peter Gazi, Aggelos Kiayias, Alexander Russell, Vassilis Zikas:
Consensus Redux: Distributed Ledgers in the Face of Adversarial Supremacy. CSF 2024: 143-158 - [c188]Aggelos Kiayias, Nikos Leonardos, Yu Shen:
Ordering Transactions with Bounded Unfairness: Definitions, Complexity and Constructions. EUROCRYPT (3) 2024: 34-63 - [c187]Pyrros Chaidos, Aggelos Kiayias, Leonid Reyzin, Anatoliy Zinovyev:
Approximate Lower Bound Arguments. EUROCRYPT (4) 2024: 55-84 - [c186]Juan A. Garay, Aggelos Kiayias, Yu Shen:
Proof-of-Work-Based Consensus in Expected-Constant Time. EUROCRYPT (3) 2024: 96-125 - [c185]Aggelos Kiayias, Elias Koutsoupias, Francisco J. Marmolejo Cossío, Aikaterini-Panagiota Stouka:
Balancing Participation and Decentralization in Proof-of-Stake Cryptocurrencies. SAGT 2024: 333-350 - [i144]Dimitris Karakostas, Aggelos Kiayias, Thomas Zacharias:
Blockchain Bribing Attacks and the Efficacy of Counterincentives. CoRR abs/2402.06352 (2024) - [i143]Aggelos Kiayias, Philip Lazos, Paolo Penna:
Single-token vs Two-token Blockchain Tokenomics. CoRR abs/2403.15429 (2024) - [i142]Claudia Díaz, Harry Halpin, Aggelos Kiayias:
Decentralized Reliability Estimation for Mixnets. CoRR abs/2406.06760 (2024) - [i141]Aggelos Kiayias, Elias Koutsoupias, Francisco J. Marmolejo Cossío, Aikaterini-Panagiota Stouka:
Balancing Participation and Decentralization in Proof-of-Stake Cryptocurrencies. CoRR abs/2407.08686 (2024) - [i140]Elizabeth C. Crites, Aggelos Kiayias, Amirreza Sarencheh:
SyRA: Sybil-Resilient Anonymous Signatures with Applications to Decentralized Identity. IACR Cryptol. ePrint Arch. 2024: 379 (2024) - [i139]Marshall Ball, Juan A. Garay, Peter Hall, Aggelos Kiayias, Giorgos Panagiotakos:
Towards Permissionless Consensus in the Standard Model via Fine-Grained Complexity. IACR Cryptol. ePrint Arch. 2024: 637 (2024) - [i138]Aggelos Kiayias, Elias Koutsoupias, Philip Lazos, Giorgos Panagiotakos:
Blockchain Space Tokenization. IACR Cryptol. ePrint Arch. 2024: 1154 (2024) - [i137]Michele Ciampi, Aggelos Kiayias, Yu Shen:
Universal Composable Transaction Serialization with Order Fairness. IACR Cryptol. ePrint Arch. 2024: 1296 (2024) - 2023
- [j21]Adrian Muwonge, Bryan A. Wee, Ibrahimm Mugerwa, Emma Nabunya, Christine M. Mpyangu, Barend M. de C. Bronsvoort, Emmanuel Ssebaggala, Aggelos Kiayias, Erisa Mwaka, Moses Joloba:
An open-source digital contact tracing system tailored to haulage. Frontiers Digit. Health 5 (2023) - [j20]Alexandru Cojocaru, Juan A. Garay, Aggelos Kiayias, Fang Song, Petros Wallden:
Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's Post-Quantum Security. Quantum 7: 944 (2023) - [c184]Peter Gazi, Aggelos Kiayias, Alexander Russell:
Fait Accompli Committee Selection: Improving the Size-Security Tradeoff of Stake-Based Committees. CCS 2023: 845-858 - [c183]Aggelos Kiayias, Cristopher Moore, Saad Quader, Alexander Russell:
Adaptively Secure Random Beacons for Ungrindable Blockchains. ICDCS 2023: 62-72 - [c182]Christian Badertscher, Michele Ciampi, Aggelos Kiayias:
Agile Cryptography: A Universally Composable Approach. TCC (4) 2023: 480-509 - [c181]Pyrros Chaidos, Aggelos Kiayias, Evangelos Markakis:
Blockchain Participation Games. WINE 2023: 169-187 - [e11]Yackolley Amoussou-Guenou, Aggelos Kiayias, Marianne Verdier:
4th International Conference on Blockchain Economics, Security and Protocols, Tokenomics 2022, December 12-13, 2022, Paris, France. OASIcs 110, Schloss Dagstuhl - Leibniz-Zentrum für Informatik 2023, ISBN 978-3-95977-274-7 [contents] - [i136]Aggelos Kiayias, Elias Koutsoupias, Philip Lazos, Giorgos Panagiotakos:
Tiered Mechanisms for Blockchain Transaction Fees. CoRR abs/2304.06014 (2023) - [i135]Aggelos Kiayias, Philip Lazos, Jan Christoph Schlegel:
Would Friedman Burn your Tokens? CoRR abs/2306.17025 (2023) - [i134]Pyrros Chaidos, Aggelos Kiayias, Evangelos Markakis:
Blockchain Participation Games. CoRR abs/2312.02769 (2023) - [i133]Aggelos Kiayias, Nikos Leonardos, Yu Shen:
Ordering Transactions with Bounded Unfairness: Definitions, Complexity and Constructions. IACR Cryptol. ePrint Arch. 2023: 1253 (2023) - [i132]Peter Gazi, Aggelos Kiayias, Alexander Russell:
Fait Accompli Committee Selection: Improving the Size-Security Tradeoff of Stake-Based Committees. IACR Cryptol. ePrint Arch. 2023: 1273 (2023) - [i131]Debajyoti Das, Claudia Díaz, Aggelos Kiayias, Thomas Zacharias:
Are continuous stop-and-go mixnets provably secure? IACR Cryptol. ePrint Arch. 2023: 1311 (2023) - [i130]Pyrros Chaidos, Aggelos Kiayias, Leonid Reyzin, Anatoliy Zinovyev:
Approximate Lower Bound Arguments. IACR Cryptol. ePrint Arch. 2023: 1655 (2023) - [i129]Juan A. Garay, Aggelos Kiayias, Yu Shen:
Proof-of-Work-based Consensus in Expected-Constant Time. IACR Cryptol. ePrint Arch. 2023: 1663 (2023) - [i128]Amirreza Sarencheh, Aggelos Kiayias, Markulf Kohlweiss:
PARScoin: A Privacy-preserving, Auditable, and Regulation-friendly Stablecoin. IACR Cryptol. ePrint Arch. 2023: 1908 (2023) - 2022
- [j19]Xinyu Zhang, Bingsheng Zhang, Aggelos Kiayias, Thomas Zacharias, Kui Ren:
An Efficient E2E Crowd Verifiable E-Voting System. IEEE Trans. Dependable Secur. Comput. 19(6): 3607-3620 (2022) - [c180]Manuel M. T. Chakravarty, Nikos Karayannidis, Aggelos Kiayias, Michael Peyton Jones, Polina Vinogradova:
Babel Fees via Limited Liabilities. ACNS 2022: 707-726 - [c179]Aggelos Kiayias, Philip Lazos:
SoK: Blockchain Governance. AFT 2022: 61-73 - [c178]Dimitris Karakostas, Aggelos Kiayias, Thomas Zacharias:
Blockchain Nash Dynamics and the Pursuit of Compliance. AFT 2022: 281-293 - [c177]Sandro Coretti, Aggelos Kiayias, Cristopher Moore, Alexander Russell:
The Generals' Scuttlebutt: Byzantine-Resilient Gossip Protocols. CCS 2022: 595-608 - [c176]Matthias Fitzi, Xuechao Wang, Sreeram Kannan, Aggelos Kiayias, Nikos Leonardos, Pramod Viswanath, Gerui Wang:
Minotaur: Multi-Resource Blockchain Consensus. CCS 2022: 1095-1108 - [c175]Aggelos Kiayias, Markulf Kohlweiss, Amirreza Sarencheh:
PEReDi: Privacy-Enhanced, Regulated and Distributed Central Bank Digital Currencies. CCS 2022: 1739-1752 - [c174]Matthias Fitzi, Aggelos Kiayias, Giorgos Panagiotakos, Alexander Russell:
Ofelimos: Combinatorial Optimization via Proof-of-Useful-Work - A Provably Secure Blockchain Protocol. CRYPTO (2) 2022: 339-369 - [c173]Christina Ovezik, Aggelos Kiayias:
Decentralization Analysis of Pooling Behavior in Cardano Proof of Stake. ICAIF 2022: 18-26 - [c172]Ranvir Rana, Dimitris Karakostas, Sreeram Kannan, Aggelos Kiayias, Pramod Viswanath:
Optimal bootstrapping of PoW blockchains. MobiHoc 2022: 231-240 - [c171]Aggelos Kiayias:
Decentralizing Information Technology: The Advent of Resource Based Systems. SAGT 2022: 3-19 - [c170]Foteini Baldimtsi, Aggelos Kiayias, Katerina Samari:
Watermarkable Public Key Encryption with Efficient Extraction Under Standard Assumptions. SCN 2022: 244-267 - [c169]Juan A. Garay, Aggelos Kiayias, Yu Shen:
Permissionless Clock Synchronization with Public Setup. TCC (3) 2022: 181-211 - [i127]Dimitris Karakostas, Aggelos Kiayias, Thomas Zacharias:
Blockchain Nash Dynamics and the Pursuit of Compliance. CoRR abs/2201.00858 (2022) - [i126]Aggelos Kiayias, Philip Lazos:
SoK: Blockchain Governance. CoRR abs/2201.07188 (2022) - [i125]Matthias Fitzi, Xuechao Wang, Sreeram Kannan, Aggelos Kiayias, Nikos Leonardos, Pramod Viswanath, Gerui Wang:
Minotaur: Multi-Resource Blockchain Consensus. CoRR abs/2201.11780 (2022) - [i124]Ranvir Rana, Dimitris Karakostas, Sreeram Kannan, Aggelos Kiayias, Pramod Viswanath:
Optimal Bootstrapping of PoW Blockchains. CoRR abs/2208.10618 (2022) - [i123]Dimitris Karakostas, Aggelos Kiayias, Christina Ovezik:
SoK: A Stratified Approach to Blockchain Decentralization. CoRR abs/2211.01291 (2022) - [i122]Matthias Fitzi, Xuechao Wang, Sreeram Kannan, Aggelos Kiayias, Nikos Leonardos, Pramod Viswanath, Gerui Wang:
Minotaur: Multi-Resource Blockchain Consensus. IACR Cryptol. ePrint Arch. 2022: 104 (2022) - [i121]Sandro Coretti, Aggelos Kiayias, Cristopher Moore, Alexander Russell:
The Generalsâ Scuttlebutt: Byzantine-Resilient Gossip Protocols. IACR Cryptol. ePrint Arch. 2022: 541 (2022) - [i120]Aggelos Kiayias, Vanessa Teague, Orfeas Stefanos Thyfronitis Litos:
Privacy Preserving Opinion Aggregation. IACR Cryptol. ePrint Arch. 2022: 760 (2022) - [i119]Foteini Baldimtsi, Aggelos Kiayias, Katerina Samari:
Watermarkable Public key Encryption With Efficient Extraction Under Standard Assumptions. IACR Cryptol. ePrint Arch. 2022: 876 (2022) - [i118]Aggelos Kiayias, Markulf Kohlweiss, Amirreza Sarencheh:
PEReDi: Privacy-Enhanced, Regulated and Distributed Central Bank Digital Currencies. IACR Cryptol. ePrint Arch. 2022: 974 (2022) - [i117]Juan A. Garay, Aggelos Kiayias, Yu Shen:
Permissionless Clock Synchronization with Public Setup. IACR Cryptol. ePrint Arch. 2022: 1220 (2022) - [i116]Christian Badertscher, Michele Ciampi, Aggelos Kiayias:
Agile Cryptography: A Composable Approach. IACR Cryptol. ePrint Arch. 2022: 1367 (2022) - [i115]Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis:
Leakage Resilient l-more Extractable Hash and Applications to Non-Malleable Cryptography. IACR Cryptol. ePrint Arch. 2022: 1745 (2022) - 2021
- [j18]Foteini Baldimtsi, Aggelos Kiayias, Katerina Samari:
Watermarking public-key cryptographic functionalities and implementations: The case of encryption and signatures. IET Inf. Secur. 15(3): 205-222 (2021) - [c168]Aggelos Kiayias, Aikaterini-Panagiota Stouka:
Coalition-safe equilibria with virtual payoffs. AFT 2021: 71-85 - [c167]Aggelos Kiayias, Andrianna Polydouri, Dionysis Zindros:
The velvet path to superlight blockchain clients. AFT 2021: 205-218 - [c166]Aggelos Kiayias, Nikos Leonardos, Dionysis Zindros:
Mining in Logarithmic Space. CCS 2021: 3487-3501 - [c165]Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss:
Composition with Knowledge Assumptions. CRYPTO (4) 2021: 364-393 - [c164]Christian Badertscher, Aggelos Kiayias, Markulf Kohlweiss, Hendrik Waldner:
Consistency for Functional Encryption. CSF 2021: 1-16 - [c163]Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss:
KACHINA - Foundations of Private Smart Contracts. CSF 2021: 1-16 - [c162]Aggelos Kiayias, Elias Koutsoupias, Aikaterini-Panagiota Stouka:
Incentives Against Power Grabs or How to Engineer the Revolution in a Pooled Proof of Stake System. DAPPS 2021: 1-10 - [c161]Dimitris Karakostas, Aggelos Kiayias:
Filling the Tax Gap via Programmable Money. DPM/CBT@ESORICS 2021: 281-288 - [c160]Dimitris Karakostas, Aggelos Kiayias, Mario Larangeira:
Conclave: A Collective Stake Pool Protocol. ESORICS (1) 2021: 370-389 - [c159]Christian Badertscher, Peter Gazi, Aggelos Kiayias, Alexander Russell, Vassilis Zikas:
Dynamic Ad Hoc Clock Synchronization. EUROCRYPT (3) 2021: 399-428 - [c158]Alexei Zamyatin, Mustafa Al-Bassam, Dionysis Zindros, Eleftherios Kokoris-Kogias, Pedro Moreno-Sanchez, Aggelos Kiayias, William J. Knottenbelt:
SoK: Communication Across Distributed Ledgers. Financial Cryptography (2) 2021: 3-36 - [c157]Dimitris Karakostas, Nikos Karayannidis, Aggelos Kiayias:
Efficient State Management in Distributed Ledgers. Financial Cryptography (2) 2021: 319-338 - [c156]Manuel M. T. Chakravarty, Sandro Coretti, Matthias Fitzi, Peter Gazi, Philipp Kant, Aggelos Kiayias, Alexander Russell:
Fast Isomorphic State Channels. Financial Cryptography (2) 2021: 339-358 - [c155]Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss:
Mining for Privacy: How to Bootstrap a Snarky Blockchain. Financial Cryptography (1) 2021: 497-514 - [c154]Aydin Abadi, Aggelos Kiayias:
Multi-instance Publicly Verifiable Time-Lock Puzzle and Its Applications. Financial Cryptography (2) 2021: 541-559 - [c153]Dimitris Karakostas, Aggelos Kiayias:
Securing Proof-of-Work Ledgers via Checkpointing. IEEE ICBC 2021: 1-5 - [i114]Manuel M. T. Chakravarty, Nikos Karayannidis, Aggelos Kiayias, Michael Peyton Jones, Polina Vinogradova:
Babel Fees via Limited Liabilities. CoRR abs/2106.01161 (2021) - [i113]Dimitris Karakostas, Aggelos Kiayias:
Filling the Tax Gap via Programmable Money. CoRR abs/2107.12069 (2021) - [i112]Aggelos Kiayias, Elias Koutsoupias, Aikaterini-Panagiota Stouka:
Incentives Against Power Grabs or How to Engineer the Revolution in a Pooled Proof of Stake System. CoRR abs/2111.08562 (2021) - [i111]Aggelos Kiayias:
Decentralizing Information Technology: The Advent of Resource Based Systems. CoRR abs/2112.09941 (2021) - [i110]Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss:
Composition with Knowledge Assumptions. IACR Cryptol. ePrint Arch. 2021: 165 (2021) - [i109]Dimitris Karakostas, Nikos Karayannidis, Aggelos Kiayias:
Efficient State Management in Distributed Ledgers. IACR Cryptol. ePrint Arch. 2021: 183 (2021) - [i108]Aggelos Kiayias, Nikos Leonardos, Dionysis Zindros:
Mining in Logarithmic Space. IACR Cryptol. ePrint Arch. 2021: 623 (2021) - [i107]Dimitris Karakostas, Aggelos Kiayias, Mario Larangeira:
Conclave: A Collective Stake Pool Protocol. IACR Cryptol. ePrint Arch. 2021: 742 (2021) - [i106]Aggelos Kiayias, Orfeas Stefanos Thyfronitis Litos:
Elmo: Recursive Virtual Payment Channels for Bitcoin. IACR Cryptol. ePrint Arch. 2021: 747 (2021) - [i105]Pyrros Chaidos, Aggelos Kiayias:
Mithril: Stake-based Threshold Multisignatures. IACR Cryptol. ePrint Arch. 2021: 916 (2021) - [i104]Matthias Fitzi, Aggelos Kiayias, Giorgos Panagiotakos, Alexander Russell:
Ofelimos: Combinatorial Optimization via Proof-of-Useful-Work \\ A Provably Secure Blockchain Protocol. IACR Cryptol. ePrint Arch. 2021: 1379 (2021) - [i103]Aggelos Kiayias, Cristopher Moore, Saad Quader, Alexander Russell:
Efficient Random Beacons with Adaptive Security for Ungrindable Blockchains. IACR Cryptol. ePrint Arch. 2021: 1698 (2021) - 2020
- [j17]Juan A. Garay, David S. Johnson, Aggelos Kiayias, Moti Yung:
The combinatorics of hidden diversity. Theor. Comput. Sci. 812: 80-95 (2020) - [j16]Christos Patsonakis, Katerina Samari, Aggelos Kiayias, Mema Roussopoulos:
Implementing a Smart Contract PKI. IEEE Trans. Engineering Management 67(4): 1425-1443 (2020) - [c152]Aydin Abadi, Michele Ciampi, Aggelos Kiayias, Vassilis Zikas:
Timed Signatures and Zero-Knowledge Proofs - Timestamping in the Blockchain Era -. ACNS (1) 2020: 335-354 - [c151]Stelios Daveas, Kostis Karantias, Aggelos Kiayias, Dionysis Zindros:
A Gas-Efficient Superlight Bitcoin Client in Solidity. AFT 2020: 132-144 - [c150]Foteini Baldimtsi, Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang:
Crowd Verifiable Zero-Knowledge and End-to-End Verifiable Multiparty Computation. ASIACRYPT (3) 2020: 717-748 - [c149]Peter Gazi, Aggelos Kiayias, Alexander Russell:
Tight Consistency Bounds for Bitcoin. CCS 2020: 819-838 - [c148]Aggelos Kiayias, Orfeas Stefanos Thyfronitis Litos:
A Composable Security Treatment of the Lightning Network. CSF 2020: 334-349 - [c147]Juan A. Garay, Aggelos Kiayias:
SoK: A Consensus Taxonomy in the Blockchain Era. CT-RSA 2020: 284-318 - [c146]Juan A. Garay, Aggelos Kiayias, Giorgos Panagiotakos:
Consensus from Signatures of Work. CT-RSA 2020: 319-344 - [c145]Michele Ciampi, Nikos Karayannidis, Aggelos Kiayias, Dionysis Zindros:
Updatable Blockchains. ESORICS (2) 2020: 590-609 - [c144]Juan A. Garay, Aggelos Kiayias, Rafail M. Ostrovsky, Giorgos Panagiotakos, Vassilis Zikas:
Resource-Restricted Cryptography: Revisiting MPC Bounds in the Proof-of-Work Era. EUROCRYPT (2) 2020: 129-158 - [c143]Lars Brünjes, Aggelos Kiayias, Elias Koutsoupias, Aikaterini-Panagiota Stouka:
Reward Sharing Schemes for Stake Pools. EuroS&P 2020: 256-275 - [c142]Aggelos Kiayias, Andrew Miller, Dionysis Zindros:
Non-interactive Proofs of Proof-of-Work. Financial Cryptography 2020: 505-522 - [c141]Kostis Karantias, Aggelos Kiayias, Dionysis Zindros:
Proof-of-Burn. Financial Cryptography 2020: 523-540 - [c140]Aggelos Kiayias, Saad Quader, Alexander Russell:
Consistency of Proof-of-Stake Blockchains with Concurrent Honest Slot Leaders. ICDCS 2020: 776-786 - [c139]Kostis Karantias, Aggelos Kiayias, Dionysis Zindros:
Smart Contract Derivatives. MARBLE 2020: 1-8 - [c138]Dimitris Karakostas, Aggelos Kiayias, Mario Larangeira:
Account Management in Proof of Stake Ledgers. SCN 2020: 3-23 - [c137]Erica Blum, Aggelos Kiayias, Cristopher Moore, Saad Quader, Alexander Russell:
The Combinatorics of the Longest-Chain Rule: Linear Consistency for Proof-of-Stake Blockchains. SODA 2020: 1135-1154 - [c136]Ryan Amos, Marios Georgiou, Aggelos Kiayias, Mark Zhandry:
One-shot signatures and applications to hybrid quantum/classical authentication. STOC 2020: 255-268 - [c135]Juan A. Garay, Aggelos Kiayias, Giorgos Panagiotakos:
Blockchains from Non-idealized Hash Functions. TCC (1) 2020: 291-321 - [c134]Matthias Fitzi, Peter Gazi, Aggelos Kiayias, Alexander Russell:
Ledger Combiners for Fast Settlement. TCC (1) 2020: 322-352 - [e10]Aggelos Kiayias, Markulf Kohlweiss, Petros Wallden, Vassilis Zikas:
Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part I. Lecture Notes in Computer Science 12110, Springer 2020, ISBN 978-3-030-45373-2 [contents] - [e9]Aggelos Kiayias, Markulf Kohlweiss, Petros Wallden, Vassilis Zikas:
Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part II. Lecture Notes in Computer Science 12111, Springer 2020, ISBN 978-3-030-45387-9 [contents] - [i102]Aggelos Kiayias, Aikaterini-Panagiota Stouka:
Coalition-Safe Equilibria with Virtual Payoffs. CoRR abs/2001.00047 (2020) - [i101]Aggelos Kiayias, Saad Quader, Alexander Russell:
Consistency of Proof-of-Stake Blockchains with Concurrent Honest Slot Leaders. CoRR abs/2001.06403 (2020) - [i100]Alexandru Cojocaru, Juan A. Garay, Aggelos Kiayias, Fang Song, Petros Wallden:
Post-Quantum Security of the Bitcoin Backbone and Quantum Multi-Solution Bernoulli Search. CoRR abs/2012.15254 (2020) - [i99]Matthias Fitzi, Peter Gazi, Aggelos Kiayias, Alexander Russell:
Proof-of-Stake Blockchain Protocols with Near-Optimal Throughput. IACR Cryptol. ePrint Arch. 2020: 37 (2020) - [i98]Aggelos Kiayias, Saad Quader, Alexander Russell:
Consistency in Proof-of-Stake Blockchains with Concurrent Honest Slot Leaders. IACR Cryptol. ePrint Arch. 2020: 41 (2020) - [i97]Ryan Amos, Marios Georgiou, Aggelos Kiayias, Mark Zhandry:
One-shot Signatures and Applications to Hybrid Quantum/Classical Authentication. IACR Cryptol. ePrint Arch. 2020: 107 (2020) - [i96]Christian Badertscher, Aggelos Kiayias, Markulf Kohlweiss, Hendrik Waldner:
Consistency for Functional Encryption. IACR Cryptol. ePrint Arch. 2020: 137 (2020) - [i95]Kostis Karantias, Aggelos Kiayias, Dionysis Zindros:
Smart Contract Derivatives. IACR Cryptol. ePrint Arch. 2020: 138 (2020) - [i94]Dimitris Karakostas, Aggelos Kiayias:
Securing Proof-of-Work Ledgers via Checkpointing. IACR Cryptol. ePrint Arch. 2020: 173 (2020) - [i93]Juan A. Garay, Aggelos Kiayias, Nikos Leonardos:
Full Analysis of Nakamoto Consensus in Bounded-Delay Networks. IACR Cryptol. ePrint Arch. 2020: 277 (2020) - [i92]Manuel M. T. Chakravarty, Sandro Coretti, Matthias Fitzi, Peter Gazi, Philipp Kant, Aggelos Kiayias, Alexander Russell:
Hydra: Fast Isomorphic State Channels. IACR Cryptol. ePrint Arch. 2020: 299 (2020) - [i91]Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss:
Mining for Privacy: How to Bootstrap a Snarky Blockchain. IACR Cryptol. ePrint Arch. 2020: 401 (2020) - [i90]Dimitris Karakostas, Aggelos Kiayias, Mario Larangeira:
Account Management in Proof of Stake Ledgers. IACR Cryptol. ePrint Arch. 2020: 525 (2020) - [i89]Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss:
Kachina - Foundations of Private Smart Contracts. IACR Cryptol. ePrint Arch. 2020: 543 (2020) - [i88]Peter Gazi, Aggelos Kiayias, Alexander Russell:
Tight Consistency Bounds for Bitcoin. IACR Cryptol. ePrint Arch. 2020: 661 (2020) - [i87]Matthias Fitzi, Peter Gazi, Aggelos Kiayias, Alexander Russell:
Ledger Combiners for Fast Settlement. IACR Cryptol. ePrint Arch. 2020: 675 (2020) - [i86]Foteini Baldimtsi, Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang:
Crowd Verifiable Zero-Knowledge and End-to-end Verifiable Multiparty Computation. IACR Cryptol. ePrint Arch. 2020: 711 (2020) - [i85]Michele Ciampi, Nikos Karayannidis, Aggelos Kiayias, Dionysis Zindros:
Updatable Blockchains. IACR Cryptol. ePrint Arch. 2020: 887 (2020) - [i84]Stelios Daveas, Kostis Karantias, Aggelos Kiayias, Dionysis Zindros:
A Gas-Efficient Superlight Bitcoin Client in Solidity. IACR Cryptol. ePrint Arch. 2020: 927 (2020) - [i83]Christian Badertscher, Peter Gazi, Aggelos Kiayias, Alexander Russell, Vassilis Zikas:
Consensus Redux: Distributed Ledgers in the Face of Adversarial Supremacy. IACR Cryptol. ePrint Arch. 2020: 1021 (2020) - [i82]Aggelos Kiayias, Andrianna Polydouri, Dionysis Zindros:
The Velvet Path to Superlight Blockchain Clients. IACR Cryptol. ePrint Arch. 2020: 1122 (2020)
2010 – 2019
- 2019
- [j15]Nikos Chondros, Bingsheng Zhang, Thomas Zacharias, Panos Diamantopoulos, Stathis Maneas, Christos Patsonakis, Alex Delis, Aggelos Kiayias, Mema Roussopoulos:
Distributed, end-to-end verifiable, and privacy-preserving internet voting systems. Comput. Secur. 83: 268-299 (2019) - [c133]Christos Patsonakis, Katerina Samari, Aggelos Kiayias, Mema Roussopoulos:
On the Practicality of a Smart Contract PKI. DAPPCON 2019: 109-118 - [c132]Aggelos Kiayias, Dionysis Zindros:
Proof-of-Work Sidechains. Financial Cryptography Workshops 2019: 21-34 - [c131]Myrto Arapinis, Andriana Gkaniatsou, Dimitris Karakostas, Aggelos Kiayias:
A Formal Treatment of Hardware Wallets. Financial Cryptography 2019: 426-445 - [c130]Kostis Karantias, Aggelos Kiayias, Dionysis Zindros:
Compact Storage of Superblocks for NIPoPoW Applications. MARBLE 2019: 77-91 - [c129]Peter Gazi, Aggelos Kiayias, Dionysis Zindros:
Proof-of-Stake Sidechains. IEEE Symposium on Security and Privacy 2019: 139-156 - [c128]Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss, Vassilis Zikas:
Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake. IEEE Symposium on Security and Privacy 2019: 157-174 - [c127]Aggelos Kiayias, Benjamin Livshits, Andrés Monteoliva Mosteiro, Orfeas Stefanos Thyfronitis Litos:
A Puff of Steem: Security Analysis of Decentralized Content Curation. Tokenomics 2019: 3:1-3:21 - [c126]Dimitris Karakostas, Aggelos Kiayias, Christos Nasikas, Dionysis Zindros:
Cryptocurrency Egalitarianism: A Quantitative Approach. Tokenomics 2019: 7:1-7:21 - [i81]Christos Patsonakis, Katerina Samari, Aggelos Kiayias, Mema Roussopoulos:
On the Practicality of Smart Contract PKI. CoRR abs/1902.00878 (2019) - [i80]Dimitris Karakostas, Aggelos Kiayias, Christos Nasikas, Dionysis Zindros:
Cryptocurrency Egalitarianism: A Quantitative Approach. CoRR abs/1907.02434 (2019) - [i79]Erica Blum, Aggelos Kiayias, Cristopher Moore, Saad Quader, Alexander Russell:
Linear Consistency for Proof-of-Stake Blockchains. CoRR abs/1911.10187 (2019) - [i78]Myrto Arapinis, Andriana Gkaniatsou, Dimitris Karakostas, Aggelos Kiayias:
A Formal Treatment of Hardware Wallets. IACR Cryptol. ePrint Arch. 2019: 34 (2019) - [i77]Juan A. Garay, Aggelos Kiayias, Giorgos Panagiotakos:
Iterated Search Problems and Blockchain Security under Falsifiable Assumptions. IACR Cryptol. ePrint Arch. 2019: 315 (2019) - [i76]Aydin Abadi, Michele Ciampi, Aggelos Kiayias, Vassilis Zikas:
Timed Signatures and Zero-Knowledge Proofs -Timestamping in the Blockchain Era-. IACR Cryptol. ePrint Arch. 2019: 644 (2019) - [i75]Aggelos Kiayias, Orfeas Stefanos Thyfronitis Litos:
A Composable Security Treatment of the Lightning Network. IACR Cryptol. ePrint Arch. 2019: 778 (2019) - [i74]Christian Badertscher, Peter Gazi, Aggelos Kiayias, Alexander Russell, Vassilis Zikas:
Ouroboros Chronos: Permissionless Clock Synchronization via Proof-of-Stake. IACR Cryptol. ePrint Arch. 2019: 838 (2019) - [i73]Kostis Karantias, Aggelos Kiayias, Dionysis Zindros:
Proof-of-Burn. IACR Cryptol. ePrint Arch. 2019: 1096 (2019) - [i72]Alexei Zamyatin, Mustafa Al-Bassam, Dionysis Zindros, Eleftherios Kokoris-Kogias, Pedro Moreno-Sanchez, Aggelos Kiayias, William J. Knottenbelt:
SoK: Communication Across Distributed Ledgers. IACR Cryptol. ePrint Arch. 2019: 1128 (2019) - [i71]Alexandru Cojocaru, Juan A. Garay, Aggelos Kiayias, Fang Song, Petros Wallden:
The Bitcoin Backbone Protocol Against Quantum Adversaries. IACR Cryptol. ePrint Arch. 2019: 1150 (2019) - [i70]Juan A. Garay, Aggelos Kiayias, Rafail Ostrovsky, Giorgos Panagiotakos, Vassilis Zikas:
Resource-Restricted Cryptography: Honest-Majority MPC from a CRS (and No Broadcast). IACR Cryptol. ePrint Arch. 2019: 1264 (2019) - [i69]Kostis Karantias, Aggelos Kiayias, Nikos Leonardos, Dionysis Zindros:
Compact Storage of Superblocks for NIPoPoW Applications. IACR Cryptol. ePrint Arch. 2019: 1444 (2019) - 2018
- [c125]Pyrros Chaidos, Olga Fourtounelli, Aggelos Kiayias, Thomas Zacharias:
A Universally Composable Framework for the Privacy of Email Ecosystems. ASIACRYPT (3) 2018: 191-221 - [c124]Christian Badertscher, Peter Gazi, Aggelos Kiayias, Alexander Russell, Vassilis Zikas:
Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability. CCS 2018: 913-930 - [c123]Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis:
Non-Malleable Codes for Partial Functions with Manipulation Detection. CRYPTO (3) 2018: 577-607 - [c122]Peter Gazi, Aggelos Kiayias, Alexander Russell:
Stake-Bleeding Attacks on Proof-of-Stake Blockchains. CVCBT 2018: 85-92 - [c121]Bernardo David, Peter Gazi, Aggelos Kiayias, Alexander Russell:
Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain. EUROCRYPT (2) 2018: 66-98 - [c120]Juan A. Garay, Aggelos Kiayias, Nikos Leonardos, Giorgos Panagiotakos:
Bootstrapping the Blockchain, with Applications to Consensus and Fast PKI Setup. Public Key Cryptography (2) 2018: 465-495 - [c119]Giuseppe Ateniese, Aggelos Kiayias, Bernardo Magri, Yiannis Tselekounis, Daniele Venturi:
Secure Outsourcing of Cryptographic Circuits Manufacturing. ProvSec 2018: 75-93 - [c118]Aggelos Kiayias, Annabell Kuldmaa, Helger Lipmaa, Janno Siim, Thomas Zacharias:
On the Security Properties of e-Voting Bulletin Boards. SCN 2018: 505-523 - [i68]Lars Brünjes, Aggelos Kiayias, Elias Koutsoupias, Aikaterini-Panagiota Stouka:
Reward Sharing Schemes for Stake Pools. CoRR abs/1807.11218 (2018) - [i67]Aggelos Kiayias, Benjamin Livshits, Andrés Monteoliva Mosteiro, Orfeas Stefanos Thyfronitis Litos:
A Puff of Steem: Security Analysis of Decentralized Content Curation. CoRR abs/1810.01719 (2018) - [i66]Georgia Avarikioti, Roman Brunner, Aggelos Kiayias, Roger Wattenhofer, Dionysis Zindros:
Structure and Content of the Visible Darknet. CoRR abs/1811.01348 (2018) - [i65]Peter Gazi, Aggelos Kiayias, Alexander Russell:
Stake-Bleeding Attacks on Proof-of-Stake Blockchains. IACR Cryptol. ePrint Arch. 2018: 248 (2018) - [i64]Christian Badertscher, Peter Gazi, Aggelos Kiayias, Alexander Russell, Vassilis Zikas:
Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability. IACR Cryptol. ePrint Arch. 2018: 378 (2018) - [i63]Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis:
Non-Malleable Codes for Partial Functions with Manipulation Detection. IACR Cryptol. ePrint Arch. 2018: 538 (2018) - [i62]Aggelos Kiayias, Annabell Kuldmaa, Helger Lipmaa, Janno Siim, Thomas Zacharias:
On the Security Properties of e-Voting Bulletin Boards. IACR Cryptol. ePrint Arch. 2018: 567 (2018) - [i61]Juan A. Garay, Aggelos Kiayias:
SoK: A Consensus Taxonomy in the Blockchain Era. IACR Cryptol. ePrint Arch. 2018: 754 (2018) - [i60]Pyrros Chaidos, Olga Fourtounelli, Aggelos Kiayias, Thomas Zacharias:
A Universally Composable Framework for the Privacy of Email Ecosystems. IACR Cryptol. ePrint Arch. 2018: 848 (2018) - [i59]Christos Patsonakis, Katerina Samari, Mema Roussopoulos, Aggelos Kiayias:
Towards a Smart Contract-based, Decentralized, Public-Key Infrastructure. IACR Cryptol. ePrint Arch. 2018: 853 (2018) - [i58]Aggelos Kiayias, Murat Osmanoglu, Alexander Russell, Qiang Tang:
Space Efficient Computational Multi-Secret Sharing and Its Applications. IACR Cryptol. ePrint Arch. 2018: 1010 (2018) - [i57]Aggelos Kiayias, Dionysis Zindros:
Proof-of-Work Sidechains. IACR Cryptol. ePrint Arch. 2018: 1048 (2018) - [i56]Aggelos Kiayias, Alexander Russell:
Ouroboros-BFT: A Simple Byzantine Fault Tolerant Consensus Protocol. IACR Cryptol. ePrint Arch. 2018: 1049 (2018) - [i55]Matthias Fitzi, Peter Gazi, Aggelos Kiayias, Alexander Russell:
Parallel Chains: Improving Throughput and Latency of Blockchain Protocols via Parallel Composition. IACR Cryptol. ePrint Arch. 2018: 1119 (2018) - [i54]Thomas Kerber, Markulf Kohlweiss, Aggelos Kiayias, Vassilis Zikas:
Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake. IACR Cryptol. ePrint Arch. 2018: 1132 (2018) - [i53]Peter Gazi, Aggelos Kiayias, Dionysis Zindros:
Proof-of-Stake Sidechains. IACR Cryptol. ePrint Arch. 2018: 1239 (2018) - 2017
- [j14]Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang:
An Efficient E2E Verifiable E-voting System without Setup Assumptions. IEEE Secur. Priv. 15(3): 14-23 (2017) - [j13]Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang:
Auditing for privacy in threshold PKE e-voting. Inf. Comput. Secur. 25(1): 100-116 (2017) - [c117]Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu:
TOPPSS: Cost-Minimal Password-Protected Secret Sharing Based on Threshold OPRF. ACNS 2017: 39-58 - [c116]Christos Patsonakis, Katerina Samari, Mema Roussopoulos, Aggelos Kiayias:
Towards a Smart Contract-Based, Decentralized, Public-Key Infrastructure. CANS 2017: 299-321 - [c115]Juan A. Garay, Aggelos Kiayias, Nikos Leonardos:
The Bitcoin Backbone Protocol with Chains of Variable Difficulty. CRYPTO (1) 2017: 291-323 - [c114]Aggelos Kiayias, Alexander Russell, Bernardo David, Roman Oliynykov:
Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol. CRYPTO (1) 2017: 357-388 - [c113]Foteini Baldimtsi, Aggelos Kiayias, Katerina Samari:
Watermarking Public-Key Cryptographic Functionalities and Implementations. ISC 2017: 173-191 - [c112]Andriana Gkaniatsou, Myrto Arapinis, Aggelos Kiayias:
Low-Level Attacks in Bitcoin Wallets. ISC 2017: 233-253 - [c111]Aggelos Kiayias, Giorgos Panagiotakos:
On Trees, Chains and Fast Transactions in the Blockchain. LATINCRYPT 2017: 327-351 - [c110]Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang:
Ceremonies for End-to-End Verifiable Elections. Public Key Cryptography (2) 2017: 305-334 - [c109]Nikolaos Alexopoulos, Aggelos Kiayias, Riivo Talviste, Thomas Zacharias:
MCMix: Anonymous Messaging via Secure Multiparty Computation. USENIX Security Symposium 2017: 1217-1234 - [e8]Aggelos Kiayias:
Financial Cryptography and Data Security - 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10322, Springer 2017, ISBN 978-3-319-70971-0 [contents] - [i52]Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis:
Practical Non-Malleable Codes from ℓ-more Extractable Hash Functions. IACR Cryptol. ePrint Arch. 2017: 40 (2017) - [i51]Alexander Russell, Cristopher Moore, Aggelos Kiayias, Saad Quader:
Forkable Strings are Rare. IACR Cryptol. ePrint Arch. 2017: 241 (2017) - [i50]Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu:
TOPPSS: Cost-minimal Password-Protected Secret Sharing based on Threshold OPRF. IACR Cryptol. ePrint Arch. 2017: 363 (2017) - [i49]Foteini Baldimtsi, Aggelos Kiayias, Katerina Samari:
Watermarking Public-key Cryptographic Functionalities and Implementations. IACR Cryptol. ePrint Arch. 2017: 557 (2017) - [i48]Bernardo Machado David, Peter Gazi, Aggelos Kiayias, Alexander Russell:
Ouroboros Praos: An adaptively-secure, semi-synchronous proof-of-stake protocol. IACR Cryptol. ePrint Arch. 2017: 573 (2017) - [i47]Juan A. Garay, Aggelos Kiayias, Giorgos Panagiotakos:
Proofs of Work for Blockchain Protocols. IACR Cryptol. ePrint Arch. 2017: 775 (2017) - [i46]Nikolaos Alexopoulos, Aggelos Kiayias, Riivo Talviste, Thomas Zacharias:
MCMix: Anonymous Messaging via Secure Multiparty Computation. IACR Cryptol. ePrint Arch. 2017: 778 (2017) - [i45]Aggelos Kiayias, Andrew Miller, Dionysis Zindros:
Non-Interactive Proofs of Proof-of-Work. IACR Cryptol. ePrint Arch. 2017: 963 (2017) - 2016
- [j12]Matthew Edman, Aggelos Kiayias, Qiang Tang, Bülent Yener:
On the Security of Key Extraction From Measuring Physical Quantities. IEEE Trans. Inf. Forensics Secur. 11(8): 1796-1806 (2016) - [c108]Foteini Baldimtsi, Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang:
Indistinguishable Proofs of Work or Knowledge. ASIACRYPT (2) 2016: 902-933 - [c107]Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis:
Practical Non-Malleable Codes from l-more Extractable Hash Functions. CCS 2016: 1317-1328 - [c106]George Argyros, Ioannis Stais, Suman Jana, Angelos D. Keromytis, Aggelos Kiayias:
SFADiff: Automated Evasion Attacks and Fingerprinting Using Black-box Differential Automata Learning. CCS 2016: 1690-1701 - [c105]Aggelos Kiayias, Ozgur Oksuz, Alexander Russell, Qiang Tang, Bing Wang:
Efficient Encrypted Keyword Search for Multi-user Data Sharing. ESORICS (1) 2016: 173-195 - [c104]Aggelos Kiayias, Hong-Sheng Zhou, Vassilis Zikas:
Fair and Robust Multi-party Computation Using a Global Transaction Ledger. EUROCRYPT (2) 2016: 705-734 - [c103]Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu:
Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online). EuroS&P 2016: 276-291 - [c102]Aggelos Kiayias, Nikolaos Lamprou, Aikaterini-Panagiota Stouka:
Proofs of Proofs of Work with Sublinear Complexity. Financial Cryptography Workshops 2016: 61-78 - [c101]Nikos Chondros, Bingsheng Zhang, Thomas Zacharias, Panos Diamantopoulos, Stathis Maneas, Christos Patsonakis, Alex Delis, Aggelos Kiayias, Mema Roussopoulos:
D-DEMOS: A Distributed, End-to-End Verifiable, Internet Voting System. ICDCS 2016: 711-720 - [c100]Aggelos Kiayias, Elias Koutsoupias, Maria Kyropoulou, Yiannis Tselekounis:
Blockchain Mining Games. EC 2016: 365-382 - [c99]George Argyros, Ioannis Stais, Aggelos Kiayias, Angelos D. Keromytis:
Back in Black: Towards Formal, Black Box Analysis of Sanitizers and Filters. IEEE Symposium on Security and Privacy 2016: 91-109 - [c98]Levon Nazaryan, Ruofan Jin, Chaoqun Yue, Ozgur Oksuz, Bing Wang, Kyoungwon Suh, Aggelos Kiayias:
Securely outsourcing cookies to the cloud via private information retrieval. WiMob 2016: 1-8 - [c97]Luqiao Zhang, Ozgur Oksuz, Levon Nazaryan, Chaoqun Yue, Bing Wang, Aggelos Kiayias, Athanasios Bamis:
Encrypting wireless network traces to protect user privacy: A case study for smart campus. WiMob 2016: 1-8 - [i44]Aggelos Kiayias, Elias Koutsoupias, Maria Kyropoulou, Yiannis Tselekounis:
Blockchain Mining Games. CoRR abs/1607.02420 (2016) - [i43]Nikos Chondros, Bingsheng Zhang, Thomas Zacharias, Panos Diamantopoulos, Stathis Maneas, Christos Patsonakis, Alex Delis, Aggelos Kiayias, Mema Roussopoulos:
Distributed, End-to-end Verifiable, and Privacy-Preserving Internet Voting Systems. CoRR abs/1608.00849 (2016) - [i42]Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu:
Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online). IACR Cryptol. ePrint Arch. 2016: 144 (2016) - [i41]Giuseppe Ateniese, Aggelos Kiayias, Bernardo Magri, Yiannis Tselekounis, Daniele Venturi:
Secure Outsourcing of Circuit Manufacturing. IACR Cryptol. ePrint Arch. 2016: 527 (2016) - [i40]Aggelos Kiayias, Giorgos Panagiotakos:
On Trees, Chains and Fast Transactions in the Blockchain. IACR Cryptol. ePrint Arch. 2016: 545 (2016) - [i39]Aggelos Kiayias, Ioannis Konstantinou, Alexander Russell, Bernardo David, Roman Oliynykov:
A Provably Secure Proof-of-Stake Blockchain Protocol. IACR Cryptol. ePrint Arch. 2016: 889 (2016) - [i38]Juan A. Garay, Aggelos Kiayias, Nikos Leonardos, Giorgos Panagiotakos:
Bootstrapping the Blockchain - Directly. IACR Cryptol. ePrint Arch. 2016: 991 (2016) - [i37]Juan A. Garay, Aggelos Kiayias, Nikos Leonardos:
The Bitcoin Backbone Protocol with Chains of Variable Difficulty. IACR Cryptol. ePrint Arch. 2016: 1048 (2016) - 2015
- [j11]Aggelos Kiayias, Nikos Leonardos, Helger Lipmaa, Kateryna Pavlyk, Qiang Tang:
Optimal Rate Private Information Retrieval from Homomorphic Encryption. Proc. Priv. Enhancing Technol. 2015(2): 222-243 (2015) - [c96]Aggelos Kiayias, Qiang Tang:
Traitor Deterring Schemes: Using Bitcoin as Collateral for Digital Content. CCS 2015: 231-242 - [c95]Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang:
DEMOS-2: Scalable E2E Verifiable Elections without Random Oracles. CCS 2015: 352-363 - [c94]Aggelos Kiayias, Nikos Leonardos, Helger Lipmaa, Kateryna Pavlyk, Qiang Tang:
Communication Optimal Tardos-Based Asymmetric Fingerprinting. CT-RSA 2015: 469-486 - [c93]Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang:
On the Necessity of Auditing for Election Privacy in e-Voting Systems. e-Democracy 2015: 3-17 - [c92]Aggelos Kiayias, Qiang Tang:
Making Any Identity-Based Encryption Accountable, Efficiently. ESORICS (1) 2015: 326-346 - [c91]Juan A. Garay, Aggelos Kiayias, Nikos Leonardos:
The Bitcoin Backbone Protocol: Analysis and Applications. EUROCRYPT (2) 2015: 281-310 - [c90]Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang:
End-to-End Verifiable Elections in the Standard Model. EUROCRYPT (2) 2015: 468-498 - [c89]Sotirios Kentros, Chadi Kari, Aggelos Kiayias, Alexander Russell:
Asynchronous Adaptive Task Allocation. ICDCS 2015: 83-92 - [c88]Aggelos Kiayias, Murat Osmanoglu, Qiang Tang:
Graded Signatures. ISC 2015: 61-80 - [c87]Aggelos Kiayias, Ozgur Oksuz, Qiang Tang:
Distributed Parameter Generation for Bilinear Diffie Hellman Exponentiation and Applications. ISC 2015: 548-567 - [c86]Juan A. Garay, Ran Gelles, David S. Johnson, Aggelos Kiayias, Moti Yung:
A Little Honesty Goes a Long Way - The Two-Tier Model for Secure Multiparty Computation. TCC (1) 2015: 134-158 - [i36]Nikos Chondros, Bingsheng Zhang, Thomas Zacharias, Panos Diamantopoulos, Stathis Maneas, Christos Patsonakis, Alex Delis, Aggelos Kiayias, Mema Roussopoulos:
A distributed, end-to-end verifiable, internet voting system. CoRR abs/1507.06812 (2015) - [i35]Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang:
End-to-End Verifiable Elections in the Standard Model∗. IACR Cryptol. ePrint Arch. 2015: 346 (2015) - [i34]Aggelos Kiayias, Hong-Sheng Zhou, Vassilis Zikas:
Fair and Robust Multi-Party Computation using a Global Transaction Ledger. IACR Cryptol. ePrint Arch. 2015: 574 (2015) - [i33]Aggelos Kiayias, Yona Raekow, Alexander Russell, Narasimha K. Shashidhar:
A One-time Stegosystem and Applications to Efficient Covert Communication. IACR Cryptol. ePrint Arch. 2015: 684 (2015) - [i32]Aggelos Kiayias, Giorgos Panagiotakos:
Speed-Security Tradeoffs in Blockchain Protocols. IACR Cryptol. ePrint Arch. 2015: 1019 (2015) - [i31]Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang:
Ceremonies for End-to-End Verifiable Elections. IACR Cryptol. ePrint Arch. 2015: 1166 (2015) - [i30]Foteini Baldimtsi, Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang:
Indistinguishable Proofs of Work or Knowledge. IACR Cryptol. ePrint Arch. 2015: 1230 (2015) - 2014
- [j10]Aggelos Kiayias, Yona Raekow, Alexander Russell, Narasimha K. Shashidhar:
A One-Time Stegosystem and Applications to Efficient Covert Communication. J. Cryptol. 27(1): 23-44 (2014) - [c85]Tamas K. Lengyel, Steve Maresca, Bryan D. Payne, George D. Webster, Sebastian Vogl, Aggelos Kiayias:
Scalability, fidelity and stealth in the DRAKVUF dynamic malware analysis system. ACSAC 2014: 386-395 - [c84]Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk:
Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model. ASIACRYPT (2) 2014: 233-253 - [c83]Alex Delis, Konstantina Gavatha, Aggelos Kiayias, Charalampos Koutalakis, Elias Nikolakopoulos, Lampros Paschos, Mema Roussopoulos, Georgios Sotirellis, Panos Stathopoulos, Pavlos Vasilopoulos, Thomas Zacharias, Bingsheng Zhang:
Pressing the button for European elections: verifiable e-voting and public attitudes toward internet voting in Greece. EVOTE 2014: 1-8 - [c82]Aggelos Kiayias, Murat Osmanoglu, Qiang Tang:
Graded Encryption, or How to Play "Who Wants To Be A Millionaire?" Distributively. ISC 2014: 377-387 - [c81]Jonathan Katz, Aggelos Kiayias, Hong-Sheng Zhou, Vassilis Zikas:
Distributing the setup in universally composable multi-party computation. PODC 2014: 20-29 - [c80]Nikolaos P. Karvelas, Aggelos Kiayias:
Efficient Proofs of Secure Erasure. SCN 2014: 520-537 - [e7]Dimitris Gritzalis, Aggelos Kiayias, Ioannis G. Askoxylakis:
Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings. Lecture Notes in Computer Science 8813, Springer 2014, ISBN 978-3-319-12279-3 [contents] - [i29]Juan A. Garay, Ran Gelles, David S. Johnson, Aggelos Kiayias, Moti Yung:
A Little Honesty Goes a Long Way: The Two-Tier Model for Secure Multiparty Computation. IACR Cryptol. ePrint Arch. 2014: 209 (2014) - [i28]Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk:
Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model. IACR Cryptol. ePrint Arch. 2014: 650 (2014) - [i27]Juan A. Garay, Aggelos Kiayias, Nikos Leonardos:
The Bitcoin Backbone Protocol: Analysis and Applications. IACR Cryptol. ePrint Arch. 2014: 765 (2014) - [i26]Aggelos Kiayias, Nikos Leonardos, Helger Lipmaa, Kateryna Pavlyk, Qiang Tang:
Near Optimal Rate Homomorphic Encryption for Branching Programs. IACR Cryptol. ePrint Arch. 2014: 851 (2014) - 2013
- [j9]Sotiris Kentros, Aggelos Kiayias:
Solving the at-most-once problem with nearly optimal effectiveness. Theor. Comput. Sci. 496: 69-88 (2013) - [c79]Aggelos Kiayias, Yiannis Tselekounis:
Tamper Resilient Circuits: The Adversary at the Gates. ASIACRYPT (2) 2013: 161-180 - [c78]Konstantinos Chronopoulos, Maria Gouseti, Aggelos Kiayias:
Resource Access Control in the Facebook Model. CANS 2013: 179-198 - [c77]Aggelos Kiayias, Stavros Papadopoulos, Nikos Triandopoulos, Thomas Zacharias:
Delegatable pseudorandom functions and applications. CCS 2013: 669-684 - [c76]Aggelos Kiayias, Qiang Tang:
How to keep a secret: leakage deterring public-key cryptosystems. CCS 2013: 943-954 - [c75]Nikos Chondros, Alex Delis, Dina Gavatha, Aggelos Kiayias, Charalampos Koutalakis, Ilias Nicolacopoulos, Lampros Paschos, Mema Roussopoulos, Giorge Sotirelis, Panos Stathopoulos, Pavlos Vasilopoulos, Thomas Zacharias, Bingsheng Zhang, Fotis Zygoulis:
Electronic Voting Systems - From Theory to Implementation. e-Democracy 2013: 113-122 - [c74]Juan A. Garay, David S. Johnson, Aggelos Kiayias, Moti Yung:
Resource-based corruptions and the combinatorics of hidden diversity. ITCS 2013: 415-428 - [c73]Tamas K. Lengyel, Justin Neumann, Steve Maresca, Aggelos Kiayias:
Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning. NSS 2013: 164-177 - [c72]Russell J. Jancewicz, Aggelos Kiayias, Laurent D. Michel, Alexander Russell, Alexander A. Shvartsman:
Malicious takeover of voting systems: arbitrary code execution on optical scan voting terminals. SAC 2013: 1816-1823 - [c71]Aggelos Kiayias, Anthi Orfanou:
Scaling Privacy Guarantees in Code-Verification Elections. VoteID 2013: 1-24 - [i25]Matthew Edman, Aggelos Kiayias, Qiang Tang, Bülent Yener:
On the Security of Key Extraction from Measuring Physical Quantities. CoRR abs/1311.4591 (2013) - [i24]Aggelos Kiayias, Stavros Papadopoulos, Nikos Triandopoulos, Thomas Zacharias:
Delegatable Pseudorandom Functions and Applications. IACR Cryptol. ePrint Arch. 2013: 379 (2013) - [i23]Aggelos Kiayias, Yiannis Tselekounis:
Tamper Resilient Circuits: The Adversary at the Gates. IACR Cryptol. ePrint Arch. 2013: 797 (2013) - [i22]Aggelos Kiayias, Qiang Tang:
How to Keep a Secret: Leakage Deterring Public-key Cryptography. IACR Cryptol. ePrint Arch. 2013: 845 (2013) - 2012
- [j8]Stavros Papadopoulos, Aggelos Kiayias, Dimitris Papadias:
Exact In-Network Aggregation with Integrity and Confidentiality. IEEE Trans. Knowl. Data Eng. 24(10): 1760-1773 (2012) - [c70]Sotiris Kentros, Aggelos Kiayias:
Solving the At-Most-Once Problem with Nearly Optimal Effectiveness. ICDCN 2012: 122-137 - [c69]Aggelos Kiayias, Alexander Russell, Narasimha K. Shashidhar:
Key-Efficient Steganography. Information Hiding 2012: 142-159 - [c68]Aggelos Kiayias, Katerina Samari:
Lower Bounds for Private Broadcast Encryption. Information Hiding 2012: 176-190 - [c67]Seda Davtyan, Aggelos Kiayias, Laurent Michel, Alexander Russell, Alexander A. Shvartsman:
Integrity of electronic voting systems: fallacious use of cryptography. SAC 2012: 1486-1493 - [c66]George Argyros, Aggelos Kiayias:
I Forgot Your Password: Randomness Attacks Against PHP Applications. USENIX Security Symposium 2012: 81-96 - [c65]Tamas K. Lengyel, Justin Neumann, Steve Maresca, Bryan D. Payne, Aggelos Kiayias:
Virtual Machine Introspection in a Hybrid Honeypot Architecture. CSET 2012 - [c64]Sotiris Kentros, Chadi Kari, Aggelos Kiayias:
The Strong At-Most-Once Problem. DISC 2012: 386-400 - [e6]Aggelos Kiayias, Helger Lipmaa:
E-Voting and Identity - Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7187, Springer 2012, ISBN 978-3-642-32746-9 [contents] - [i21]Murat Ak, Aggelos Kiayias, Serdar Pehlivanoglu, Ali Aydin Selçuk:
Generic Construction of Trace and Revoke Schemes. IACR Cryptol. ePrint Arch. 2012: 531 (2012) - [i20]Juan A. Garay, David S. Johnson, Aggelos Kiayias, Moti Yung:
Resource-based Corruptions and the Combinatorics of Hidden Diversity. IACR Cryptol. ePrint Arch. 2012: 556 (2012) - 2011
- [c63]Seung Geol Choi, Aggelos Kiayias, Tal Malkin:
BiTR: Built-in Tamper Resilience. ASIACRYPT 2011: 740-758 - [c62]Aggelos Kiayias:
On the Effects of Pirate Evolution on the Design of Digital Content Distribution Systems. IWCC 2011: 223-237 - [c61]Matthew Edman, Aggelos Kiayias, Bülent Yener:
On passive inference attacks against physical-layer key extraction? EUROSEC 2011: 8 - [c60]Stavros Papadopoulos, Aggelos Kiayias, Dimitris Papadias:
Secure and efficient in-network processing of exact SUM queries. ICDE 2011: 517-528 - [c59]Aggelos Kiayias, Serdar Pehlivanoglu:
Attacking Traitor Tracing Schemes Using History Recording and Abrupt Decoders. ISC 2011: 17-31 - [c58]Sotiris Kentros, Aggelos Kiayias:
Solving the at-most-once problem with nearly optimal effectiveness. PODC 2011: 229-230 - [e5]Aggelos Kiayias:
Topics in Cryptology - CT-RSA 2011 - The Cryptographers' Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings. Lecture Notes in Computer Science 6558, Springer 2011, ISBN 978-3-642-19073-5 [contents] - [r2]Aggelos Kiayias, Bülent Yener:
Key Generation Using Physical Properties of Wireless Communication. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 682-683 - [i19]Sotiris Kentros, Aggelos Kiayias:
Solving the At-Most-Once Problem with Nearly Optimal Effectiveness. CoRR abs/1107.2990 (2011) - 2010
- [b1]Aggelos Kiayias, Serdar Pehlivanoglu:
Encryption for Digital Content. Advances in Information Security 52, Springer 2010, ISBN 978-1-4419-0043-2, pp. 1-197 - [c57]Aggelos Kiayias, Serdar Pehlivanoglu:
Improving the Round Complexity of Traitor Tracing Schemes. ACNS 2010: 273-290 - [c56]Juan A. Garay, Aggelos Kiayias, Hong-Sheng Zhou:
A Framework for the Sound Specification of Cryptographic Tasks. CSF 2010: 277-289 - [c55]Dan Boneh, Aggelos Kiayias, Hart William Montgomery:
Robust fingerprinting codes: a near optimal construction. Digital Rights Management Workshop 2010: 3-12 - [c54]Aggelos Kiayias, Kazue Sako:
RLCPS Preface. Financial Cryptography Workshops 2010: 105 - [c53]Aggelos Kiayias, Moti Yung:
Tree-Homomorphic Encryption and Scalable Hierarchical Secret-Ballot Elections. Financial Cryptography 2010: 257-271 - [c52]Jens Groth, Aggelos Kiayias, Helger Lipmaa:
Multi-query Computationally-Private Information Retrieval with Constant Communication Rate. Public Key Cryptography 2010: 107-123 - [c51]Aggelos Kiayias, Moti Yung:
The Vector-Ballot Approach for Online Voting Procedures. Towards Trustworthy Elections 2010: 155-174 - [e4]Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M. Miret, Kazue Sako, Francesc Sebé:
Financial Cryptography and Data Security, FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6054, Springer 2010, ISBN 978-3-642-14991-7 [contents] - [r1]Aggelos Kiayias:
Electronic Voting. Handbook of Financial Cryptography and Security 2010: 59-81 - [i18]Seung Geol Choi, Aggelos Kiayias, Tal Malkin:
BiTR: Built-in Tamper Resilience. IACR Cryptol. ePrint Arch. 2010: 503 (2010)
2000 – 2009
- 2009
- [j7]Aggelos Kiayias, Hong-Sheng Zhou:
Hidden identity-based signatures. IET Inf. Secur. 3(3): 119-127 (2009) - [j6]Tigran Antonyan, Seda Davtyan, Sotiris Kentros, Aggelos Kiayias, Laurent Michel, Nicolas C. Nicolaou, Alexander Russell, Alexander A. Shvartsman:
State-wide elections, optical scan voting systems, and the pursuit of integrity. IEEE Trans. Inf. Forensics Secur. 4(4): 597-610 (2009) - [c50]Aggelos Kiayias, Serdar Pehlivanoglu:
Tracing and Revoking Pirate Rebroadcasts. ACNS 2009: 253-271 - [c49]Aggelos Kiayias, Serdar Pehlivanoglu:
On the security of a public-key traitor tracing scheme with sublinear ciphertext size. Digital Rights Management Workshop 2009: 1-10 - [c48]Jan Camenisch, Aggelos Kiayias, Moti Yung:
On the Portability of Generalized Schnorr Proofs. EUROCRYPT 2009: 425-442 - [c47]Aggelos Kiayias, Bülent Yener, Moti Yung:
Privacy-Preserving Information Markets for Computing Statistical Data. Financial Cryptography 2009: 32-50 - [c46]Maged H. Ibrahim, Aggelos Kiayias, Moti Yung, Hong-Sheng Zhou:
Secure Function Collection with Sublinear Storage. ICALP (2) 2009: 534-545 - [c45]Aggelos Kiayias:
Robust fingerprinting codes and applications. Media Forensics and Security 2009: 72540N - [c44]Aggelos Kiayias, Hong-Sheng Zhou:
Zero-Knowledge Proofs with Witness Elimination. Public Key Cryptography 2009: 124-138 - [c43]Seda Davtyan, Sotiris Kentros, Aggelos Kiayias, Laurent D. Michel, Nicolas C. Nicolaou, Alexander Russell, Andrew See, Narasimha K. Shashidhar, Alexander A. Shvartsman:
Taking total control of voting systems: firmware manipulations on an optical scan voting terminal. SAC 2009: 2049-2053 - [c42]Sotiris Kentros, Aggelos Kiayias, Nicolas C. Nicolaou, Alexander A. Shvartsman:
At-most-once semantics in asynchronous shared memory. SPAA 2009: 43-44 - [c41]Tigran Antonyan, Seda Davtyan, Sotiris Kentros, Aggelos Kiayias, Laurent Michel, Nicolas C. Nicolaou, Alexander Russell, Alexander A. Shvartsman:
Automating Voting Terminal Event Log Analysis. EVT/WOTE 2009 - [c40]Sotiris Kentros, Aggelos Kiayias, Nicolas C. Nicolaou, Alexander A. Shvartsman:
At-Most-Once Semantics in Asynchronous Shared Memory. DISC 2009: 258-273 - [i17]Aggelos Kiayias, Yona Raekow, Alexander Russell, Narasimha K. Shashidhar:
Efficient Steganography with Provable Security Guarantees. CoRR abs/0909.3658 (2009) - [i16]Aggelos Kiayias, Alexander Russell, Narasimha K. Shashidhar:
Randomness-optimal Steganography. CoRR abs/0909.4575 (2009) - [i15]Jan Camenisch, Aggelos Kiayias, Moti Yung:
On the Portability of Generalized Schnorr Proofs. IACR Cryptol. ePrint Arch. 2009: 50 (2009) - 2008
- [j5]Aggelos Kiayias, Moti Yung:
Cryptographic Hardness Based on the Decoding of Reed-Solomon Codes. IEEE Trans. Inf. Theory 54(6): 2752-2769 (2008) - [c39]Aggelos Kiayias, Moti Yung:
Public-key traitor tracing from efficient decoding and unbounded enrollment: extended abstract. Digital Rights Management Workshop 2008: 9-18 - [c38]Aggelos Kiayias, Shouhuai Xu, Moti Yung:
Privacy Preserving Data Mining within Anonymous Credential Systems. SCN 2008: 57-76 - [c37]Aggelos Kiayias, Hong-Sheng Zhou:
Equivocal Blind Signatures and Adaptive UC-Security. TCC 2008: 340-355 - [c36]Seda Davtyan, Sotiris Kentros, Aggelos Kiayias, Laurent Michel, Nicolas C. Nicolaou, Alexander Russell, Andrew See, Narasimha K. Shashidhar, Alexander A. Shvartsman:
Pre-Election Testing and Post-Election Audit of Optical Scan Voting Terminal Memory Cards. EVT 2008 - [i14]Juan A. Garay, Aggelos Kiayias, Hong-Sheng Zhou:
Sound and Fine-grain Specification of Ideal Functionalities. Theoretical Foundations of Practical Information Security 2008 - [i13]Juan A. Garay, Aggelos Kiayias, Hong-Sheng Zhou:
A Framework for the Sound Specification of Cryptographic Tasks. IACR Cryptol. ePrint Arch. 2008: 132 (2008) - 2007
- [j4]Aggelos Kiayias, Moti Yung:
Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice. Des. Codes Cryptogr. 43(2-3): 61-78 (2007) - [j3]Daniel Bleichenbacher, Aggelos Kiayias, Moti Yung:
Decoding interleaved Reed-Solomon codes over noisy channels. Theor. Comput. Sci. 379(3): 348-360 (2007) - [c35]Aggelos Kiayias, Laurent Michel, Alexander Russell, Narasimha K. Shashidhar, Andrew See, Alexander A. Shvartsman, Seda Davtyan:
Tampering with Special Purpose Trusted Computing Devices: A Case Study in Optical Scan E-Voting. ACSAC 2007: 30-39 - [c34]Aggelos Kiayias, Yiannis Tsiounis, Moti Yung:
Group Encryption. ASIACRYPT 2007: 181-199 - [c33]Babak Azimi-Sadjadi, Aggelos Kiayias, Alejandra Mercado, Bülent Yener:
Robust key generation from signal envelopes in wireless networks. CCS 2007: 401-410 - [c32]Aggelos Kiayias, Serdar Pehlivanoglu:
Pirate Evolution: How to Make the Most of Your Traitor Keys. CRYPTO 2007: 448-465 - [c31]Aggelos Kiayias, Hong-Sheng Zhou:
Hidden Identity-Based Signatures. Financial Cryptography 2007: 134-147 - [c30]Aggelos Kiayias, Hong-Sheng Zhou:
Trading Static for Adaptive Security in Universally Composable Zero-Knowledge. ICALP 2007: 316-327 - [c29]Aggelos Kiayias, Laurent Michel, Alexander Russell, Narasimha Sashidar, Andrew See, Alexander A. Shvartsman:
An Authentication and Ballot Layout Attack Against an Optical Scan Voting Terminal. EVT 2007 - [e3]Moti Yung, Aggelos Kiayias, Ahmad-Reza Sadeghi:
Proceedings of the Seventh ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 29, 2007. ACM 2007, ISBN 978-1-59593-884-8 [contents] - [i12]Aggelos Kiayias, Yiannis Tsiounis, Moti Yung:
Group Encryption. IACR Cryptol. ePrint Arch. 2007: 15 (2007) - [i11]Aggelos Kiayias, Hong-Sheng Zhou:
Equivocal Blind Signatures and Adaptive UC-Security. IACR Cryptol. ePrint Arch. 2007: 132 (2007) - [i10]Aggelos Kiayias, Hong-Sheng Zhou:
Hidden Identity-Based Signatures. IACR Cryptol. ePrint Arch. 2007: 140 (2007) - [i9]Aggelos Kiayias, Moti Yung:
Cryptographic Hardness based on the Decoding of Reed-Solomon Codes. IACR Cryptol. ePrint Arch. 2007: 153 (2007) - 2006
- [j2]Aggelos Kiayias, Moti Yung:
Secure scalable group signature with dynamic joins and separable authorities. Int. J. Secur. Networks 1(1/2): 24-45 (2006) - [c28]Aggelos Kiayias, Antonina Mitrofanova:
Syntax-Driven Private Evaluation of Quantified Membership Queries. ACNS 2006: 470-485 - [c27]Aggelos Kiayias, Michael Korman, David Walluck:
An Internet Voting System Supporting User Privacy. ACSAC 2006: 165-174 - [c26]Aggelos Kiayias, Moti Yung:
Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination. Financial Cryptography 2006: 311-325 - [c25]Aggelos Kiayias, Hong-Sheng Zhou:
Concurrent Blind Signatures Without Random Oracles. SCN 2006: 49-62 - [e2]Moti Yung, Yevgeniy Dodis, Aggelos Kiayias, Tal Malkin:
Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings. Lecture Notes in Computer Science 3958, Springer 2006, ISBN 3-540-33851-9 [contents] - [i8]Aggelos Kiayias, Moti Yung:
Copyrighting Public-key Functions and Applications to Black-box Traitor Tracing. IACR Cryptol. ePrint Arch. 2006: 458 (2006) - 2005
- [j1]Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung:
Scalable public-key tracing and revoking. Distributed Comput. 17(4): 323-347 (2005) - [c24]Aggelos Kiayias, Moti Yung:
Group Signatures with Efficient Concurrent Join. EUROCRYPT 2005: 198-214 - [c23]Aggelos Kiayias, Antonina Mitrofanova:
Testing Disjointness of Private Datasets. Financial Cryptography 2005: 109-124 - [c22]Giovanni Di Crescenzo, Aggelos Kiayias:
Asynchronous Perfectly Secure Communication over One-Time Pads. ICALP 2005: 216-227 - [c21]Aggelos Kiayias, Moti Yung:
Cryptography and decoding Reed-Solomon codes as a hard problem. ICITS 2005: 48 - [c20]Aggelos Kiayias, Yona Raekow, Alexander Russell:
Efficient Steganography with Provable Security Guarantees. Information Hiding 2005: 118-130 - [c19]Aggelos Kiayias, Moti Yung:
Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers. Mycrypt 2005: 151-170 - [c18]A. Karygiannis, Aggelos Kiayias, Yiannis Tsiounis:
A Solution for Wireless Privacy and Payments based on E-cash. SecureComm 2005: 206-218 - [i7]Aggelos Kiayias, Moti Yung:
Group Signatures with Efficient Concurrent Join. IACR Cryptol. ePrint Arch. 2005: 345 (2005) - [i6]Aggelos Kiayias, Hong-Sheng Zhou:
Concurrent Blind Signatures without Random Oracles. IACR Cryptol. ePrint Arch. 2005: 435 (2005) - 2004
- [c17]Aggelos Kiayias, Moti Yung:
Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice. ASIACRYPT 2004: 401-416 - [c16]Aggelos Kiayias, Yiannis Tsiounis, Moti Yung:
Traceable Signatures. EUROCRYPT 2004: 571-589 - [c15]Yevgeniy Dodis, Aggelos Kiayias, Antonio Nicolosi, Victor Shoup:
Anonymous Identification in Ad Hoc Groups. EUROCRYPT 2004: 609-626 - [c14]Aggelos Kiayias, Moti Yung:
The Vector-Ballot e-Voting Approach. Financial Cryptography 2004: 72-89 - [e1]Aggelos Kiayias, Moti Yung:
Proceedings of the 2004 ACM Workshop on Digital Rights Management 2004, Washington, DC, USA, October 25, 2004. ACM 2004, ISBN 1-58113-969-1 [contents] - [i5]Aggelos Kiayias, Yiannis Tsiounis, Moti Yung:
Traceable Signatures. IACR Cryptol. ePrint Arch. 2004: 7 (2004) - [i4]Aggelos Kiayias, Moti Yung:
Group Signatures: Provable Security, Efficient Constructions and Anonymity from Trapdoor-Holders. IACR Cryptol. ePrint Arch. 2004: 76 (2004) - [i3]Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung:
Scalable Public-Key Tracing and Revoking. IACR Cryptol. ePrint Arch. 2004: 160 (2004) - [i2]Aggelos Kiayias, Moti Yung:
Cryptanalyzing the Polynomial-Reconstruction based Public-Key System Under Optimal Parameter Choice. IACR Cryptol. ePrint Arch. 2004: 217 (2004) - 2003
- [c13]Aggelos Kiayias, Moti Yung:
Extracting Group Signatures from Traitor Tracing Schemes. EUROCRYPT 2003: 630-648 - [c12]Aggelos Kiayias, Moti Yung:
Non-interactive Zero-Sharing with Applications to Private Distributed Decision Making. Financial Cryptography 2003: 303-320 - [c11]Daniel Bleichenbacher, Aggelos Kiayias, Moti Yung:
Decoding of Interleaved Reed Solomon Codes over Noisy Data. ICALP 2003: 97-108 - [c10]Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung:
Scalable public-key tracing and revoking. PODC 2003: 190-199 - [p1]Aggelos Kiayias, Moti Yung:
Robust Verifiable non-Interactive Zero-Sharing - A Plug-in Utility for Enhanced Voters' Privacy. Secure Electronic Voting 2003: 139-151 - 2002
- [c9]Aggelos Kiayias, Moti Yung:
Breaking and Repairing Asymmetric Public-Key Traitor Tracing. Digital Rights Management Workshop 2002: 32-50 - [c8]Aggelos Kiayias, Moti Yung:
Traitor Tracing with Constant Transmission Rate. EUROCRYPT 2002: 450-465 - [c7]Aggelos Kiayias, Moti Yung:
Cryptographic Hardness Based on the Decoding of Reed-Solomon Codes. ICALP 2002: 232-243 - [c6]Aggelos Kiayias, Moti Yung:
Self-tallying Elections and Perfect Ballot Secrecy. Public Key Cryptography 2002: 141-158 - [i1]Aggelos Kiayias, Moti Yung:
Cryptographic Hardness based on the Decoding of Reed-Solomon Codes with Applications. Electron. Colloquium Comput. Complex. TR02 (2002) - 2001
- [c5]Aggelos Kiayias, Moti Yung:
On Crafty Pirates and Foxy Tracers. Digital Rights Management Workshop 2001: 22-39 - [c4]Aggelos Kiayias, Moti Yung:
Self Protecting Pirates and Black-Box Traitor Tracing. CRYPTO 2001: 63-79 - [c3]Aggelos Kiayias, Moti Yung:
Secure Games with Polynomial Expressions. ICALP 2001: 939-950 - [c2]Aggelos Kiayias, Aris Pagourtzis, Kiron Sharma, Stathis Zachos:
Acceptor-Definable Counting Classes. Panhellenic Conference on Informatics 2001: 453-463 - [c1]Aggelos Kiayias, Moti Yung:
Polynomial Reconstruction Based Cryptography. Selected Areas in Cryptography 2001: 129-133
Coauthor Index
aka: Sotirios Kentros
aka: Alexander A. Shvartsman
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 20:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint