Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Aggelos Kiayias
@article{DBLP:journals/joc/KiayiasLT24, author = {Aggelos Kiayias and Feng{-}Hao Liu and Yiannis Tselekounis}, title = {(Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates}, journal = {J. Cryptol.}, volume = {37}, number = {2}, pages = {17}, year = {2024}, url = {https://doi.org/10.1007/s00145-024-09498-2}, doi = {10.1007/S00145-024-09498-2}, timestamp = {Mon, 22 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/KiayiasLT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KiayiasLS24, author = {Aggelos Kiayias and Nikos Leonardos and Yu Shen}, editor = {Marc Joye and Gregor Leander}, title = {Ordering Transactions with Bounded Unfairness: Definitions, Complexity and Constructions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14653}, pages = {34--63}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58734-4\_2}, doi = {10.1007/978-3-031-58734-4\_2}, timestamp = {Thu, 09 May 2024 11:05:29 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KiayiasLS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChaidosKRZ24, author = {Pyrros Chaidos and Aggelos Kiayias and Leonid Reyzin and Anatoliy Zinovyev}, editor = {Marc Joye and Gregor Leander}, title = {Approximate Lower Bound Arguments}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14654}, pages = {55--84}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58737-5\_3}, doi = {10.1007/978-3-031-58737-5\_3}, timestamp = {Thu, 09 May 2024 11:05:30 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChaidosKRZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GarayKS24, author = {Juan A. Garay and Aggelos Kiayias and Yu Shen}, editor = {Marc Joye and Gregor Leander}, title = {Proof-of-Work-Based Consensus in Expected-Constant Time}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14653}, pages = {96--125}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58734-4\_4}, doi = {10.1007/978-3-031-58734-4\_4}, timestamp = {Thu, 09 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GarayKS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-06352, author = {Dimitris Karakostas and Aggelos Kiayias and Thomas Zacharias}, title = {Blockchain Bribing Attacks and the Efficacy of Counterincentives}, journal = {CoRR}, volume = {abs/2402.06352}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.06352}, doi = {10.48550/ARXIV.2402.06352}, eprinttype = {arXiv}, eprint = {2402.06352}, timestamp = {Fri, 16 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-06352.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-15429, author = {Aggelos Kiayias and Philip Lazos and Paolo Penna}, title = {Single-token vs Two-token Blockchain Tokenomics}, journal = {CoRR}, volume = {abs/2403.15429}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.15429}, doi = {10.48550/ARXIV.2403.15429}, eprinttype = {arXiv}, eprint = {2403.15429}, timestamp = {Tue, 09 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-15429.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CritesKS24, author = {Elizabeth Crites and Aggelos Kiayias and Amirreza Sarencheh}, title = {SyRA: Sybil-Resilient Anonymous Signatures with Applications to Decentralized Identity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {379}, year = {2024}, url = {https://eprint.iacr.org/2024/379}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CritesKS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fdgth/MuwongeWMNMBSKMJ23, author = {Adrian Muwonge and Bryan A. Wee and Ibrahimm Mugerwa and Emma Nabunya and Christine M. Mpyangu and Barend M. de C. Bronsvoort and Emmanuel Ssebaggala and Aggelos Kiayias and Erisa Mwaka and Moses Joloba}, title = {An open-source digital contact tracing system tailored to haulage}, journal = {Frontiers Digit. Health}, volume = {5}, year = {2023}, url = {https://doi.org/10.3389/fdgth.2023.1199635}, doi = {10.3389/FDGTH.2023.1199635}, timestamp = {Sun, 07 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fdgth/MuwongeWMNMBSKMJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/quantum/CojocaruGKSW23, author = {Alexandru Cojocaru and Juan A. Garay and Aggelos Kiayias and Fang Song and Petros Wallden}, title = {Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's Post-Quantum Security}, journal = {Quantum}, volume = {7}, pages = {944}, year = {2023}, url = {https://doi.org/10.22331/q-2023-03-09-944}, doi = {10.22331/Q-2023-03-09-944}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/quantum/CojocaruGKSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GaziKR23, author = {Peter Gazi and Aggelos Kiayias and Alexander Russell}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Fait Accompli Committee Selection: Improving the Size-Security Tradeoff of Stake-Based Committees}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {845--858}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3623194}, doi = {10.1145/3576915.3623194}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GaziKR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/KiayiasMQR23, author = {Aggelos Kiayias and Cristopher Moore and Saad Quader and Alexander Russell}, title = {Adaptively Secure Random Beacons for Ungrindable Blockchains}, booktitle = {43rd {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2023, Hong Kong, July 18-21, 2023}, pages = {62--72}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICDCS57875.2023.00021}, doi = {10.1109/ICDCS57875.2023.00021}, timestamp = {Tue, 24 Oct 2023 14:47:33 +0200}, biburl = {https://dblp.org/rec/conf/icdcs/KiayiasMQR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BadertscherCK23, author = {Christian Badertscher and Michele Ciampi and Aggelos Kiayias}, editor = {Guy N. Rothblum and Hoeteck Wee}, title = {Agile Cryptography: {A} Universally Composable Approach}, booktitle = {Theory of Cryptography - 21st International Conference, {TCC} 2023, Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14372}, pages = {480--509}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-48624-1\_18}, doi = {10.1007/978-3-031-48624-1\_18}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/BadertscherCK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wine/ChaidosKM23, author = {Pyrros Chaidos and Aggelos Kiayias and Evangelos Markakis}, editor = {Jugal Garg and Max Klimm and Yuqing Kong}, title = {Blockchain Participation Games}, booktitle = {Web and Internet Economics - 19th International Conference, {WINE} 2023, Shanghai, China, December 4-8, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14413}, pages = {169--187}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-48974-7\_10}, doi = {10.1007/978-3-031-48974-7\_10}, timestamp = {Thu, 11 Jan 2024 22:28:03 +0100}, biburl = {https://dblp.org/rec/conf/wine/ChaidosKM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tokenomics/2022, editor = {Yackolley Amoussou{-}Guenou and Aggelos Kiayias and Marianne Verdier}, title = {4th International Conference on Blockchain Economics, Security and Protocols, Tokenomics 2022, December 12-13, 2022, Paris, France}, series = {OASIcs}, volume = {110}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2023}, url = {https://www.dagstuhl.de/dagpub/978-3-95977-274-7}, isbn = {978-3-95977-274-7}, timestamp = {Mon, 24 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tokenomics/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-06014, author = {Aggelos Kiayias and Elias Koutsoupias and Philip Lazos and Giorgos Panagiotakos}, title = {Tiered Mechanisms for Blockchain Transaction Fees}, journal = {CoRR}, volume = {abs/2304.06014}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.06014}, doi = {10.48550/ARXIV.2304.06014}, eprinttype = {arXiv}, eprint = {2304.06014}, timestamp = {Wed, 19 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-06014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-17025, author = {Aggelos Kiayias and Philip Lazos and Jan Christoph Schlegel}, title = {Would Friedman Burn your Tokens?}, journal = {CoRR}, volume = {abs/2306.17025}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.17025}, doi = {10.48550/ARXIV.2306.17025}, eprinttype = {arXiv}, eprint = {2306.17025}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-17025.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-02769, author = {Pyrros Chaidos and Aggelos Kiayias and Evangelos Markakis}, title = {Blockchain Participation Games}, journal = {CoRR}, volume = {abs/2312.02769}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.02769}, doi = {10.48550/ARXIV.2312.02769}, eprinttype = {arXiv}, eprint = {2312.02769}, timestamp = {Thu, 28 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-02769.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasLS23, author = {Aggelos Kiayias and Nikos Leonardos and Yu Shen}, title = {Ordering Transactions with Bounded Unfairness: Definitions, Complexity and Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1253}, year = {2023}, url = {https://eprint.iacr.org/2023/1253}, timestamp = {Wed, 06 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaziKR23, author = {Peter Gazi and Aggelos Kiayias and Alexander Russell}, title = {Fait Accompli Committee Selection: Improving the Size-Security Tradeoff of Stake-Based Committees}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1273}, year = {2023}, url = {https://eprint.iacr.org/2023/1273}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaziKR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DasDKZ23, author = {Debajyoti Das and Claudia D{\'{\i}}az and Aggelos Kiayias and Thomas Zacharias}, title = {Are continuous stop-and-go mixnets provably secure?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1311}, year = {2023}, url = {https://eprint.iacr.org/2023/1311}, timestamp = {Thu, 19 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DasDKZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChaidosKRZ23, author = {Pyrros Chaidos and Aggelos Kiayias and Leonid Reyzin and Anatoliy Zinovyev}, title = {Approximate Lower Bound Arguments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1655}, year = {2023}, url = {https://eprint.iacr.org/2023/1655}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChaidosKRZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarayKS23, author = {Juan A. Garay and Aggelos Kiayias and Yu Shen}, title = {Proof-of-Work-based Consensus in Expected-Constant Time}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1663}, year = {2023}, url = {https://eprint.iacr.org/2023/1663}, timestamp = {Wed, 06 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GarayKS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SarenchehKK23, author = {Amirreza Sarencheh and Aggelos Kiayias and Markulf Kohlweiss}, title = {PARScoin: {A} Privacy-preserving, Auditable, and Regulation-friendly Stablecoin}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1908}, year = {2023}, url = {https://eprint.iacr.org/2023/1908}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SarenchehKK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangZKZR22, author = {Xinyu Zhang and Bingsheng Zhang and Aggelos Kiayias and Thomas Zacharias and Kui Ren}, title = {An Efficient {E2E} Crowd Verifiable E-Voting System}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {6}, pages = {3607--3620}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3103336}, doi = {10.1109/TDSC.2021.3103336}, timestamp = {Tue, 15 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangZKZR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ChakravartyKKJV22, author = {Manuel M. T. Chakravarty and Nikos Karayannidis and Aggelos Kiayias and Michael Peyton Jones and Polina Vinogradova}, editor = {Giuseppe Ateniese and Daniele Venturi}, title = {Babel Fees via Limited Liabilities}, booktitle = {Applied Cryptography and Network Security - 20th International Conference, {ACNS} 2022, Rome, Italy, June 20-23, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13269}, pages = {707--726}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-09234-3\_35}, doi = {10.1007/978-3-031-09234-3\_35}, timestamp = {Tue, 21 Jun 2022 15:24:40 +0200}, biburl = {https://dblp.org/rec/conf/acns/ChakravartyKKJV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aft/KiayiasL22, author = {Aggelos Kiayias and Philip Lazos}, editor = {Maurice Herlihy and Neha Narula}, title = {SoK: Blockchain Governance}, booktitle = {Proceedings of the 4th {ACM} Conference on Advances in Financial Technologies, {AFT} 2022, Cambridge, MA, USA, September 19-21, 2022}, pages = {61--73}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3558535.3559794}, doi = {10.1145/3558535.3559794}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aft/KiayiasL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aft/KarakostasK022, author = {Dimitris Karakostas and Aggelos Kiayias and Thomas Zacharias}, editor = {Maurice Herlihy and Neha Narula}, title = {Blockchain Nash Dynamics and the Pursuit of Compliance}, booktitle = {Proceedings of the 4th {ACM} Conference on Advances in Financial Technologies, {AFT} 2022, Cambridge, MA, USA, September 19-21, 2022}, pages = {281--293}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3558535.3559781}, doi = {10.1145/3558535.3559781}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aft/KarakostasK022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CorettiKMR22, author = {Sandro Coretti and Aggelos Kiayias and Cristopher Moore and Alexander Russell}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {The Generals' Scuttlebutt: Byzantine-Resilient Gossip Protocols}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {595--608}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560638}, doi = {10.1145/3548606.3560638}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CorettiKMR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FitziWKKLVW22, author = {Matthias Fitzi and Xuechao Wang and Sreeram Kannan and Aggelos Kiayias and Nikos Leonardos and Pramod Viswanath and Gerui Wang}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Minotaur: Multi-Resource Blockchain Consensus}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {1095--1108}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3559356}, doi = {10.1145/3548606.3559356}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FitziWKKLVW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KiayiasKS22, author = {Aggelos Kiayias and Markulf Kohlweiss and Amirreza Sarencheh}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {PEReDi: Privacy-Enhanced, Regulated and Distributed Central Bank Digital Currencies}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {1739--1752}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560707}, doi = {10.1145/3548606.3560707}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KiayiasKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FitziKPR22, author = {Matthias Fitzi and Aggelos Kiayias and Giorgos Panagiotakos and Alexander Russell}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Ofelimos: Combinatorial Optimization via Proof-of-Useful-Work - {A} Provably Secure Blockchain Protocol}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13508}, pages = {339--369}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15979-4\_12}, doi = {10.1007/978-3-031-15979-4\_12}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/FitziKPR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaif/OvezikK22, author = {Christina Ovezik and Aggelos Kiayias}, editor = {Daniele Magazzeni and Senthil Kumar and Rahul Savani and Renyuan Xu and Carmine Ventre and Blanka Horvath and Ruimeng Hu and Tucker Balch and Francesca Toni}, title = {Decentralization Analysis of Pooling Behavior in Cardano Proof of Stake}, booktitle = {3rd {ACM} International Conference on {AI} in Finance, {ICAIF} 2022, New York, NY, USA, November 2-4, 2022}, pages = {18--26}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3533271.3561787}, doi = {10.1145/3533271.3561787}, timestamp = {Tue, 25 Oct 2022 16:37:30 +0200}, biburl = {https://dblp.org/rec/conf/icaif/OvezikK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobihoc/RanaKKKV22, author = {Ranvir Rana and Dimitris Karakostas and Sreeram Kannan and Aggelos Kiayias and Pramod Viswanath}, title = {Optimal bootstrapping of PoW blockchains}, booktitle = {MobiHoc '22: The Twenty-third International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing, Seoul, Republic of Korea, October 17 - 20, 2022}, pages = {231--240}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3492866.3549731}, doi = {10.1145/3492866.3549731}, timestamp = {Tue, 27 Sep 2022 16:36:53 +0200}, biburl = {https://dblp.org/rec/conf/mobihoc/RanaKKKV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sagt/Kiayias22, author = {Aggelos Kiayias}, editor = {Panagiotis Kanellopoulos and Maria Kyropoulou and Alexandros A. Voudouris}, title = {Decentralizing Information Technology: The Advent of Resource Based Systems}, booktitle = {Algorithmic Game Theory - 15th International Symposium, {SAGT} 2022, Colchester, UK, September 12-15, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13584}, pages = {3--19}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15714-1\_1}, doi = {10.1007/978-3-031-15714-1\_1}, timestamp = {Mon, 19 Sep 2022 19:04:18 +0200}, biburl = {https://dblp.org/rec/conf/sagt/Kiayias22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/BaldimtsiKS22, author = {Foteini Baldimtsi and Aggelos Kiayias and Katerina Samari}, editor = {Clemente Galdi and Stanislaw Jarecki}, title = {Watermarkable Public Key Encryption with Efficient Extraction Under Standard Assumptions}, booktitle = {Security and Cryptography for Networks - 13th International Conference, {SCN} 2022, Amalfi, Italy, September 12-14, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13409}, pages = {244--267}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-14791-3\_11}, doi = {10.1007/978-3-031-14791-3\_11}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/BaldimtsiKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GarayKS22, author = {Juan A. Garay and Aggelos Kiayias and Yu Shen}, editor = {Eike Kiltz and Vinod Vaikuntanathan}, title = {Permissionless Clock Synchronization with Public Setup}, booktitle = {Theory of Cryptography - 20th International Conference, {TCC} 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13749}, pages = {181--211}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22368-6\_7}, doi = {10.1007/978-3-031-22368-6\_7}, timestamp = {Wed, 06 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/GarayKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-00858, author = {Dimitris Karakostas and Aggelos Kiayias and Thomas Zacharias}, title = {Blockchain Nash Dynamics and the Pursuit of Compliance}, journal = {CoRR}, volume = {abs/2201.00858}, year = {2022}, url = {https://arxiv.org/abs/2201.00858}, eprinttype = {arXiv}, eprint = {2201.00858}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-00858.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-07188, author = {Aggelos Kiayias and Philip Lazos}, title = {SoK: Blockchain Governance}, journal = {CoRR}, volume = {abs/2201.07188}, year = {2022}, url = {https://arxiv.org/abs/2201.07188}, eprinttype = {arXiv}, eprint = {2201.07188}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-07188.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-11780, author = {Matthias Fitzi and Xuechao Wang and Sreeram Kannan and Aggelos Kiayias and Nikos Leonardos and Pramod Viswanath and Gerui Wang}, title = {Minotaur: Multi-Resource Blockchain Consensus}, journal = {CoRR}, volume = {abs/2201.11780}, year = {2022}, url = {https://arxiv.org/abs/2201.11780}, eprinttype = {arXiv}, eprint = {2201.11780}, timestamp = {Wed, 02 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-11780.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-10618, author = {Ranvir Rana and Dimitris Karakostas and Sreeram Kannan and Aggelos Kiayias and Pramod Viswanath}, title = {Optimal Bootstrapping of PoW Blockchains}, journal = {CoRR}, volume = {abs/2208.10618}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.10618}, doi = {10.48550/ARXIV.2208.10618}, eprinttype = {arXiv}, eprint = {2208.10618}, timestamp = {Mon, 29 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-10618.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-01291, author = {Dimitris Karakostas and Aggelos Kiayias and Christina Ovezik}, title = {SoK: {A} Stratified Approach to Blockchain Decentralization}, journal = {CoRR}, volume = {abs/2211.01291}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.01291}, doi = {10.48550/ARXIV.2211.01291}, eprinttype = {arXiv}, eprint = {2211.01291}, timestamp = {Fri, 04 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-01291.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FitziWKKLVW22, author = {Matthias Fitzi and Xuechao Wang and Sreeram Kannan and Aggelos Kiayias and Nikos Leonardos and Pramod Viswanath and Gerui Wang}, title = {Minotaur: Multi-Resource Blockchain Consensus}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {104}, year = {2022}, url = {https://eprint.iacr.org/2022/104}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FitziWKKLVW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CorettiKMR22, author = {Sandro Coretti and Aggelos Kiayias and Cristopher Moore and Alexander Russell}, title = {The Generals{\^{a}}{\mbox{\texteuro}}{\texttrademark} Scuttlebutt: Byzantine-Resilient Gossip Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {541}, year = {2022}, url = {https://eprint.iacr.org/2022/541}, timestamp = {Mon, 16 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CorettiKMR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasTL22, author = {Aggelos Kiayias and Vanessa Teague and Orfeas Stefanos Thyfronitis Litos}, title = {Privacy Preserving Opinion Aggregation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {760}, year = {2022}, url = {https://eprint.iacr.org/2022/760}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasTL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaldimtsiKS22, author = {Foteini Baldimtsi and Aggelos Kiayias and Katerina Samari}, title = {Watermarkable Public key Encryption With Efficient Extraction Under Standard Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {876}, year = {2022}, url = {https://eprint.iacr.org/2022/876}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaldimtsiKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasKS22, author = {Aggelos Kiayias and Markulf Kohlweiss and Amirreza Sarencheh}, title = {PEReDi: Privacy-Enhanced, Regulated and Distributed Central Bank Digital Currencies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {974}, year = {2022}, url = {https://eprint.iacr.org/2022/974}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarayKS22, author = {Juan A. Garay and Aggelos Kiayias and Yu Shen}, title = {Permissionless Clock Synchronization with Public Setup}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1220}, year = {2022}, url = {https://eprint.iacr.org/2022/1220}, timestamp = {Wed, 06 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GarayKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadertscherCK22, author = {Christian Badertscher and Michele Ciampi and Aggelos Kiayias}, title = {Agile Cryptography: {A} Composable Approach}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1367}, year = {2022}, url = {https://eprint.iacr.org/2022/1367}, timestamp = {Sat, 22 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadertscherCK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasLT22, author = {Aggelos Kiayias and Feng{-}Hao Liu and Yiannis Tselekounis}, title = {Leakage Resilient l-more Extractable Hash and Applications to Non-Malleable Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1745}, year = {2022}, url = {https://eprint.iacr.org/2022/1745}, timestamp = {Mon, 30 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasLT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/BaldimtsiKS21, author = {Foteini Baldimtsi and Aggelos Kiayias and Katerina Samari}, title = {Watermarking public-key cryptographic functionalities and implementations: The case of encryption and signatures}, journal = {{IET} Inf. Secur.}, volume = {15}, number = {3}, pages = {205--222}, year = {2021}, url = {https://doi.org/10.1049/ise2.12013}, doi = {10.1049/ISE2.12013}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/BaldimtsiKS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aft/KiayiasS21, author = {Aggelos Kiayias and Aikaterini{-}Panagiota Stouka}, editor = {Foteini Baldimtsi and Tim Roughgarden}, title = {Coalition-safe equilibria with virtual payoffs}, booktitle = {{AFT} '21: 3rd {ACM} Conference on Advances in Financial Technologies, Arlington, Virginia, USA, September 26 - 28, 2021}, pages = {71--85}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3479722.3480795}, doi = {10.1145/3479722.3480795}, timestamp = {Wed, 01 Dec 2021 16:21:39 +0100}, biburl = {https://dblp.org/rec/conf/aft/KiayiasS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aft/KiayiasPZ21, author = {Aggelos Kiayias and Andrianna Polydouri and Dionysis Zindros}, editor = {Foteini Baldimtsi and Tim Roughgarden}, title = {The velvet path to superlight blockchain clients}, booktitle = {{AFT} '21: 3rd {ACM} Conference on Advances in Financial Technologies, Arlington, Virginia, USA, September 26 - 28, 2021}, pages = {205--218}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3479722.3480999}, doi = {10.1145/3479722.3480999}, timestamp = {Wed, 01 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aft/KiayiasPZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KiayiasLZ21, author = {Aggelos Kiayias and Nikos Leonardos and Dionysis Zindros}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {Mining in Logarithmic Space}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {3487--3501}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3484784}, doi = {10.1145/3460120.3484784}, timestamp = {Tue, 16 Nov 2021 12:59:46 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KiayiasLZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KerberKK21, author = {Thomas Kerber and Aggelos Kiayias and Markulf Kohlweiss}, editor = {Tal Malkin and Chris Peikert}, title = {Composition with Knowledge Assumptions}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {12828}, pages = {364--393}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84259-8\_13}, doi = {10.1007/978-3-030-84259-8\_13}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KerberKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BadertscherKKW21, author = {Christian Badertscher and Aggelos Kiayias and Markulf Kohlweiss and Hendrik Waldner}, title = {Consistency for Functional Encryption}, booktitle = {34th {IEEE} Computer Security Foundations Symposium, {CSF} 2021, Dubrovnik, Croatia, June 21-25, 2021}, pages = {1--16}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CSF51468.2021.00045}, doi = {10.1109/CSF51468.2021.00045}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/BadertscherKKW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/KerberKK21, author = {Thomas Kerber and Aggelos Kiayias and Markulf Kohlweiss}, title = {{KACHINA} - Foundations of Private Smart Contracts}, booktitle = {34th {IEEE} Computer Security Foundations Symposium, {CSF} 2021, Dubrovnik, Croatia, June 21-25, 2021}, pages = {1--16}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CSF51468.2021.00002}, doi = {10.1109/CSF51468.2021.00002}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/KerberKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dappcon/KiayiasKS21, author = {Aggelos Kiayias and Elias Koutsoupias and Aikaterini{-}Panagiota Stouka}, title = {Incentives Against Power Grabs or How to Engineer the Revolution in a Pooled Proof of Stake System}, booktitle = {{IEEE} International Conference on Decentralized Applications and Infrastructures, {DAPPS} 2021, Online Event, August 23-26, 2021}, pages = {1--10}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DAPPS52256.2021.00006}, doi = {10.1109/DAPPS52256.2021.00006}, timestamp = {Fri, 04 Nov 2022 16:07:31 +0100}, biburl = {https://dblp.org/rec/conf/dappcon/KiayiasKS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KarakostasK21, author = {Dimitris Karakostas and Aggelos Kiayias}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jose Luis Mu{\~{n}}oz{-}Tapia and Guillermo Navarro{-}Arribas and Miguel Soriano}, title = {Filling the Tax Gap via Programmable Money}, booktitle = {Data Privacy Management, Cryptocurrencies and Blockchain Technology - {ESORICS} 2021 International Workshops, {DPM} 2021 and {CBT} 2021, Darmstadt, Germany, October 8, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13140}, pages = {281--288}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-93944-1\_18}, doi = {10.1007/978-3-030-93944-1\_18}, timestamp = {Sun, 30 Jan 2022 13:24:47 +0100}, biburl = {https://dblp.org/rec/conf/esorics/KarakostasK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KarakostasKL21, author = {Dimitris Karakostas and Aggelos Kiayias and Mario Larangeira}, editor = {Elisa Bertino and Haya Schulmann and Michael Waidner}, title = {Conclave: {A} Collective Stake Pool Protocol}, booktitle = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12972}, pages = {370--389}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88418-5\_18}, doi = {10.1007/978-3-030-88418-5\_18}, timestamp = {Tue, 17 Oct 2023 10:41:56 +0200}, biburl = {https://dblp.org/rec/conf/esorics/KarakostasKL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BadertscherGKRZ21, author = {Christian Badertscher and Peter Gazi and Aggelos Kiayias and Alexander Russell and Vassilis Zikas}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Dynamic Ad Hoc Clock Synchronization}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12698}, pages = {399--428}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77883-5\_14}, doi = {10.1007/978-3-030-77883-5\_14}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BadertscherGKRZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ZamyatinAZKMKK21, author = {Alexei Zamyatin and Mustafa Al{-}Bassam and Dionysis Zindros and Eleftherios Kokoris{-}Kogias and Pedro Moreno{-}Sanchez and Aggelos Kiayias and William J. Knottenbelt}, editor = {Nikita Borisov and Claudia D{\'{\i}}az}, title = {SoK: Communication Across Distributed Ledgers}, booktitle = {Financial Cryptography and Data Security - 25th International Conference, {FC} 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12675}, pages = {3--36}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-662-64331-0\_1}, doi = {10.1007/978-3-662-64331-0\_1}, timestamp = {Thu, 16 Mar 2023 14:52:53 +0100}, biburl = {https://dblp.org/rec/conf/fc/ZamyatinAZKMKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KarakostasKK21, author = {Dimitris Karakostas and Nikos Karayannidis and Aggelos Kiayias}, editor = {Nikita Borisov and Claudia D{\'{\i}}az}, title = {Efficient State Management in Distributed Ledgers}, booktitle = {Financial Cryptography and Data Security - 25th International Conference, {FC} 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12675}, pages = {319--338}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-662-64331-0\_17}, doi = {10.1007/978-3-662-64331-0\_17}, timestamp = {Wed, 27 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/KarakostasKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ChakravartyCFGK21, author = {Manuel M. T. Chakravarty and Sandro Coretti and Matthias Fitzi and Peter Gazi and Philipp Kant and Aggelos Kiayias and Alexander Russell}, editor = {Nikita Borisov and Claudia D{\'{\i}}az}, title = {Fast Isomorphic State Channels}, booktitle = {Financial Cryptography and Data Security - 25th International Conference, {FC} 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12675}, pages = {339--358}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-662-64331-0\_18}, doi = {10.1007/978-3-662-64331-0\_18}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/ChakravartyCFGK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KerberKK21, author = {Thomas Kerber and Aggelos Kiayias and Markulf Kohlweiss}, editor = {Nikita Borisov and Claudia D{\'{\i}}az}, title = {Mining for Privacy: How to Bootstrap a Snarky Blockchain}, booktitle = {Financial Cryptography and Data Security - 25th International Conference, {FC} 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12674}, pages = {497--514}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-662-64322-8\_24}, doi = {10.1007/978-3-662-64322-8\_24}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/KerberKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/AbadiK21, author = {Aydin Abadi and Aggelos Kiayias}, editor = {Nikita Borisov and Claudia D{\'{\i}}az}, title = {Multi-instance Publicly Verifiable Time-Lock Puzzle and Its Applications}, booktitle = {Financial Cryptography and Data Security - 25th International Conference, {FC} 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12675}, pages = {541--559}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-662-64331-0\_28}, doi = {10.1007/978-3-662-64331-0\_28}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/AbadiK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbc2/KarakostasK21, author = {Dimitris Karakostas and Aggelos Kiayias}, title = {Securing Proof-of-Work Ledgers via Checkpointing}, booktitle = {{IEEE} International Conference on Blockchain and Cryptocurrency, {ICBC} 2021, Sydney, Australia, May 3-6, 2021}, pages = {1--5}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICBC51069.2021.9461066}, doi = {10.1109/ICBC51069.2021.9461066}, timestamp = {Wed, 30 Jun 2021 12:20:23 +0200}, biburl = {https://dblp.org/rec/conf/icbc2/KarakostasK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-01161, author = {Manuel M. T. Chakravarty and Nikos Karayannidis and Aggelos Kiayias and Michael Peyton Jones and Polina Vinogradova}, title = {Babel Fees via Limited Liabilities}, journal = {CoRR}, volume = {abs/2106.01161}, year = {2021}, url = {https://arxiv.org/abs/2106.01161}, eprinttype = {arXiv}, eprint = {2106.01161}, timestamp = {Thu, 10 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-01161.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-12069, author = {Dimitris Karakostas and Aggelos Kiayias}, title = {Filling the Tax Gap via Programmable Money}, journal = {CoRR}, volume = {abs/2107.12069}, year = {2021}, url = {https://arxiv.org/abs/2107.12069}, eprinttype = {arXiv}, eprint = {2107.12069}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-12069.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-08562, author = {Aggelos Kiayias and Elias Koutsoupias and Aikaterini{-}Panagiota Stouka}, title = {Incentives Against Power Grabs or How to Engineer the Revolution in a Pooled Proof of Stake System}, journal = {CoRR}, volume = {abs/2111.08562}, year = {2021}, url = {https://arxiv.org/abs/2111.08562}, eprinttype = {arXiv}, eprint = {2111.08562}, timestamp = {Mon, 22 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-08562.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-09941, author = {Aggelos Kiayias}, title = {Decentralizing Information Technology: The Advent of Resource Based Systems}, journal = {CoRR}, volume = {abs/2112.09941}, year = {2021}, url = {https://arxiv.org/abs/2112.09941}, eprinttype = {arXiv}, eprint = {2112.09941}, timestamp = {Tue, 04 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-09941.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KerberKK21, author = {Thomas Kerber and Aggelos Kiayias and Markulf Kohlweiss}, title = {Composition with Knowledge Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {165}, year = {2021}, url = {https://eprint.iacr.org/2021/165}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KerberKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KarakostasKK21, author = {Dimitris Karakostas and Nikos Karayannidis and Aggelos Kiayias}, title = {Efficient State Management in Distributed Ledgers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {183}, year = {2021}, url = {https://eprint.iacr.org/2021/183}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KarakostasKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasLZ21, author = {Aggelos Kiayias and Nikos Leonardos and Dionysis Zindros}, title = {Mining in Logarithmic Space}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {623}, year = {2021}, url = {https://eprint.iacr.org/2021/623}, timestamp = {Mon, 07 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasLZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KarakostasKL21, author = {Dimitris Karakostas and Aggelos Kiayias and Mario Larangeira}, title = {Conclave: {A} Collective Stake Pool Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {742}, year = {2021}, url = {https://eprint.iacr.org/2021/742}, timestamp = {Mon, 07 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KarakostasKL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasL21, author = {Aggelos Kiayias and Orfeas Stefanos Thyfronitis Litos}, title = {Elmo: Recursive Virtual Payment Channels for Bitcoin}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {747}, year = {2021}, url = {https://eprint.iacr.org/2021/747}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChaidosK21, author = {Pyrros Chaidos and Aggelos Kiayias}, title = {Mithril: Stake-based Threshold Multisignatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {916}, year = {2021}, url = {https://eprint.iacr.org/2021/916}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChaidosK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FitziKPR21, author = {Matthias Fitzi and Aggelos Kiayias and Giorgos Panagiotakos and Alexander Russell}, title = {Ofelimos: Combinatorial Optimization via Proof-of-Useful-Work {\textbackslash}{\textbackslash} {A} Provably Secure Blockchain Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1379}, year = {2021}, url = {https://eprint.iacr.org/2021/1379}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FitziKPR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasMQR21, author = {Aggelos Kiayias and Cristopher Moore and Saad Quader and Alexander Russell}, title = {Efficient Random Beacons with Adaptive Security for Ungrindable Blockchains}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1698}, year = {2021}, url = {https://eprint.iacr.org/2021/1698}, timestamp = {Thu, 13 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasMQR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/GarayJKY20, author = {Juan A. Garay and David S. Johnson and Aggelos Kiayias and Moti Yung}, title = {The combinatorics of hidden diversity}, journal = {Theor. Comput. Sci.}, volume = {812}, pages = {80--95}, year = {2020}, url = {https://doi.org/10.1016/j.tcs.2019.07.016}, doi = {10.1016/J.TCS.2019.07.016}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/GarayJKY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tem/PatsonakisSKR20, author = {Christos Patsonakis and Katerina Samari and Aggelos Kiayias and Mema Roussopoulos}, title = {Implementing a Smart Contract {PKI}}, journal = {{IEEE} Trans. Engineering Management}, volume = {67}, number = {4}, pages = {1425--1443}, year = {2020}, url = {https://doi.org/10.1109/TEM.2020.2972638}, doi = {10.1109/TEM.2020.2972638}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tem/PatsonakisSKR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/AbadiCKZ20, author = {Aydin Abadi and Michele Ciampi and Aggelos Kiayias and Vassilis Zikas}, editor = {Mauro Conti and Jianying Zhou and Emiliano Casalicchio and Angelo Spognardi}, title = {Timed Signatures and Zero-Knowledge Proofs - Timestamping in the Blockchain Era -}, booktitle = {Applied Cryptography and Network Security - 18th International Conference, {ACNS} 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12146}, pages = {335--354}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57808-4\_17}, doi = {10.1007/978-3-030-57808-4\_17}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/AbadiCKZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aft/DaveasKKZ20, author = {Stelios Daveas and Kostis Karantias and Aggelos Kiayias and Dionysis Zindros}, title = {A Gas-Efficient Superlight Bitcoin Client in Solidity}, booktitle = {{AFT} '20: 2nd {ACM} Conference on Advances in Financial Technologies, New York, NY, USA, October 21-23, 2020}, pages = {132--144}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3419614.3423255}, doi = {10.1145/3419614.3423255}, timestamp = {Thu, 29 Oct 2020 14:40:13 +0100}, biburl = {https://dblp.org/rec/conf/aft/DaveasKKZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BaldimtsiK0Z20, author = {Foteini Baldimtsi and Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Crowd Verifiable Zero-Knowledge and End-to-End Verifiable Multiparty Computation}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, pages = {717--748}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4\_24}, doi = {10.1007/978-3-030-64840-4\_24}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BaldimtsiK0Z20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GaziKR20, author = {Peter Gazi and Aggelos Kiayias and Alexander Russell}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {Tight Consistency Bounds for Bitcoin}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {819--838}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3423365}, doi = {10.1145/3372297.3423365}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/GaziKR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/KiayiasL20, author = {Aggelos Kiayias and Orfeas Stefanos Thyfronitis Litos}, title = {A Composable Security Treatment of the Lightning Network}, booktitle = {33rd {IEEE} Computer Security Foundations Symposium, {CSF} 2020, Boston, MA, USA, June 22-26, 2020}, pages = {334--349}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CSF49147.2020.00031}, doi = {10.1109/CSF49147.2020.00031}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/KiayiasL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/GarayK20, author = {Juan A. Garay and Aggelos Kiayias}, editor = {Stanislaw Jarecki}, title = {SoK: {A} Consensus Taxonomy in the Blockchain Era}, booktitle = {Topics in Cryptology - {CT-RSA} 2020 - The Cryptographers' Track at the {RSA} Conference 2020, San Francisco, CA, USA, February 24-28, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12006}, pages = {284--318}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-40186-3\_13}, doi = {10.1007/978-3-030-40186-3\_13}, timestamp = {Fri, 14 Feb 2020 13:00:36 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/GarayK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/GarayKP20, author = {Juan A. Garay and Aggelos Kiayias and Giorgos Panagiotakos}, editor = {Stanislaw Jarecki}, title = {Consensus from Signatures of Work}, booktitle = {Topics in Cryptology - {CT-RSA} 2020 - The Cryptographers' Track at the {RSA} Conference 2020, San Francisco, CA, USA, February 24-28, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12006}, pages = {319--344}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-40186-3\_14}, doi = {10.1007/978-3-030-40186-3\_14}, timestamp = {Fri, 14 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/GarayKP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/CiampiKKZ20, author = {Michele Ciampi and Nikos Karayannidis and Aggelos Kiayias and Dionysis Zindros}, editor = {Liqun Chen and Ninghui Li and Kaitai Liang and Steve A. Schneider}, title = {Updatable Blockchains}, booktitle = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12309}, pages = {590--609}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59013-0\_29}, doi = {10.1007/978-3-030-59013-0\_29}, timestamp = {Fri, 02 Jul 2021 20:12:27 +0200}, biburl = {https://dblp.org/rec/conf/esorics/CiampiKKZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GarayKOPZ20, author = {Juan A. Garay and Aggelos Kiayias and Rafail M. Ostrovsky and Giorgos Panagiotakos and Vassilis Zikas}, editor = {Anne Canteaut and Yuval Ishai}, title = {Resource-Restricted Cryptography: Revisiting {MPC} Bounds in the Proof-of-Work Era}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12106}, pages = {129--158}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45724-2\_5}, doi = {10.1007/978-3-030-45724-2\_5}, timestamp = {Mon, 04 May 2020 14:32:28 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GarayKOPZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/BrunjesKKS20, author = {Lars Br{\"{u}}njes and Aggelos Kiayias and Elias Koutsoupias and Aikaterini{-}Panagiota Stouka}, title = {Reward Sharing Schemes for Stake Pools}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2020, Genoa, Italy, September 7-11, 2020}, pages = {256--275}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/EuroSP48549.2020.00024}, doi = {10.1109/EUROSP48549.2020.00024}, timestamp = {Tue, 10 Nov 2020 11:45:04 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/BrunjesKKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Kiayias0Z20, author = {Aggelos Kiayias and Andrew Miller and Dionysis Zindros}, editor = {Joseph Bonneau and Nadia Heninger}, title = {Non-interactive Proofs of Proof-of-Work}, booktitle = {Financial Cryptography and Data Security - 24th International Conference, {FC} 2020, Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12059}, pages = {505--522}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-51280-4\_27}, doi = {10.1007/978-3-030-51280-4\_27}, timestamp = {Wed, 22 Jul 2020 12:13:31 +0200}, biburl = {https://dblp.org/rec/conf/fc/Kiayias0Z20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KarantiasKZ20, author = {Kostis Karantias and Aggelos Kiayias and Dionysis Zindros}, editor = {Joseph Bonneau and Nadia Heninger}, title = {Proof-of-Burn}, booktitle = {Financial Cryptography and Data Security - 24th International Conference, {FC} 2020, Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12059}, pages = {523--540}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-51280-4\_28}, doi = {10.1007/978-3-030-51280-4\_28}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/KarantiasKZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/KiayiasQR20, author = {Aggelos Kiayias and Saad Quader and Alexander Russell}, title = {Consistency of Proof-of-Stake Blockchains with Concurrent Honest Slot Leaders}, booktitle = {40th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2020, Singapore, November 29 - December 1, 2020}, pages = {776--786}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICDCS47774.2020.00065}, doi = {10.1109/ICDCS47774.2020.00065}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdcs/KiayiasQR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/marble/KarantiasKZ20, author = {Kostis Karantias and Aggelos Kiayias and Dionysis Zindros}, editor = {Panos M. Pardalos and Ilias S. Kotsireas and Yike Guo and William J. Knottenbelt}, title = {Smart Contract Derivatives}, booktitle = {2nd International Conference on Mathematical Research for Blockchain Economy, {MARBLE} 2020, online, August 24, 2020}, series = {Springer Proceedings in Business and Economics}, pages = {1--8}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-53356-4\_1}, doi = {10.1007/978-3-030-53356-4\_1}, timestamp = {Tue, 11 Jul 2023 16:48:23 +0200}, biburl = {https://dblp.org/rec/conf/marble/KarantiasKZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/KarakostasKL20, author = {Dimitris Karakostas and Aggelos Kiayias and Mario Larangeira}, editor = {Clemente Galdi and Vladimir Kolesnikov}, title = {Account Management in Proof of Stake Ledgers}, booktitle = {Security and Cryptography for Networks - 12th International Conference, {SCN} 2020, Amalfi, Italy, September 14-16, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12238}, pages = {3--23}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57990-6\_1}, doi = {10.1007/978-3-030-57990-6\_1}, timestamp = {Tue, 08 Sep 2020 19:15:32 +0200}, biburl = {https://dblp.org/rec/conf/scn/KarakostasKL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soda/BlumKMQR20, author = {Erica Blum and Aggelos Kiayias and Cristopher Moore and Saad Quader and Alexander Russell}, editor = {Shuchi Chawla}, title = {The Combinatorics of the Longest-Chain Rule: Linear Consistency for Proof-of-Stake Blockchains}, booktitle = {Proceedings of the 2020 {ACM-SIAM} Symposium on Discrete Algorithms, {SODA} 2020, Salt Lake City, UT, USA, January 5-8, 2020}, pages = {1135--1154}, publisher = {{SIAM}}, year = {2020}, url = {https://doi.org/10.1137/1.9781611975994.69}, doi = {10.1137/1.9781611975994.69}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/soda/BlumKMQR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/Amos0KZ20, author = {Ryan Amos and Marios Georgiou and Aggelos Kiayias and Mark Zhandry}, editor = {Konstantin Makarychev and Yury Makarychev and Madhur Tulsiani and Gautam Kamath and Julia Chuzhoy}, title = {One-shot signatures and applications to hybrid quantum/classical authentication}, booktitle = {Proceedings of the 52nd Annual {ACM} {SIGACT} Symposium on Theory of Computing, {STOC} 2020, Chicago, IL, USA, June 22-26, 2020}, pages = {255--268}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3357713.3384304}, doi = {10.1145/3357713.3384304}, timestamp = {Mon, 18 Dec 2023 07:33:37 +0100}, biburl = {https://dblp.org/rec/conf/stoc/Amos0KZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GarayKP20, author = {Juan A. Garay and Aggelos Kiayias and Giorgos Panagiotakos}, editor = {Rafael Pass and Krzysztof Pietrzak}, title = {Blockchains from Non-idealized Hash Functions}, booktitle = {Theory of Cryptography - 18th International Conference, {TCC} 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12550}, pages = {291--321}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64375-1\_11}, doi = {10.1007/978-3-030-64375-1\_11}, timestamp = {Tue, 15 Dec 2020 11:52:09 +0100}, biburl = {https://dblp.org/rec/conf/tcc/GarayKP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/FitziGKR20, author = {Matthias Fitzi and Peter Gazi and Aggelos Kiayias and Alexander Russell}, editor = {Rafael Pass and Krzysztof Pietrzak}, title = {Ledger Combiners for Fast Settlement}, booktitle = {Theory of Cryptography - 18th International Conference, {TCC} 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12550}, pages = {322--352}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64375-1\_12}, doi = {10.1007/978-3-030-64375-1\_12}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/FitziGKR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2020-1, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12110}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45374-9}, doi = {10.1007/978-3-030-45374-9}, isbn = {978-3-030-45373-2}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2020-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2020-2, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12111}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45388-6}, doi = {10.1007/978-3-030-45388-6}, isbn = {978-3-030-45387-9}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2020-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2001-00047, author = {Aggelos Kiayias and Aikaterini{-}Panagiota Stouka}, title = {Coalition-Safe Equilibria with Virtual Payoffs}, journal = {CoRR}, volume = {abs/2001.00047}, year = {2020}, url = {http://arxiv.org/abs/2001.00047}, eprinttype = {arXiv}, eprint = {2001.00047}, timestamp = {Fri, 10 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2001-00047.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2001-06403, author = {Aggelos Kiayias and Saad Quader and Alexander Russell}, title = {Consistency of Proof-of-Stake Blockchains with Concurrent Honest Slot Leaders}, journal = {CoRR}, volume = {abs/2001.06403}, year = {2020}, url = {https://arxiv.org/abs/2001.06403}, eprinttype = {arXiv}, eprint = {2001.06403}, timestamp = {Fri, 24 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2001-06403.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-15254, author = {Alexandru Cojocaru and Juan A. Garay and Aggelos Kiayias and Fang Song and Petros Wallden}, title = {Post-Quantum Security of the Bitcoin Backbone and Quantum Multi-Solution Bernoulli Search}, journal = {CoRR}, volume = {abs/2012.15254}, year = {2020}, url = {https://arxiv.org/abs/2012.15254}, eprinttype = {arXiv}, eprint = {2012.15254}, timestamp = {Mon, 01 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-15254.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FitziGKR20, author = {Matthias Fitzi and Peter Gazi and Aggelos Kiayias and Alexander Russell}, title = {Proof-of-Stake Blockchain Protocols with Near-Optimal Throughput}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {37}, year = {2020}, url = {https://eprint.iacr.org/2020/037}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FitziGKR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasQR20, author = {Aggelos Kiayias and Saad Quader and Alexander Russell}, title = {Consistency in Proof-of-Stake Blockchains with Concurrent Honest Slot Leaders}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {41}, year = {2020}, url = {https://eprint.iacr.org/2020/041}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasQR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AmosGKZ20, author = {Ryan Amos and Marios Georgiou and Aggelos Kiayias and Mark Zhandry}, title = {One-shot Signatures and Applications to Hybrid Quantum/Classical Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {107}, year = {2020}, url = {https://eprint.iacr.org/2020/107}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AmosGKZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadertscherKKW20, author = {Christian Badertscher and Aggelos Kiayias and Markulf Kohlweiss and Hendrik Waldner}, title = {Consistency for Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {137}, year = {2020}, url = {https://eprint.iacr.org/2020/137}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadertscherKKW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KarantiasKZ20, author = {Kostis Karantias and Aggelos Kiayias and Dionysis Zindros}, title = {Smart Contract Derivatives}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {138}, year = {2020}, url = {https://eprint.iacr.org/2020/138}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KarantiasKZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KarakostasK20, author = {Dimitris Karakostas and Aggelos Kiayias}, title = {Securing Proof-of-Work Ledgers via Checkpointing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {173}, year = {2020}, url = {https://eprint.iacr.org/2020/173}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KarakostasK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarayKL20, author = {Juan A. Garay and Aggelos Kiayias and Nikos Leonardos}, title = {Full Analysis of Nakamoto Consensus in Bounded-Delay Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {277}, year = {2020}, url = {https://eprint.iacr.org/2020/277}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GarayKL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChakravartyCFGK20, author = {Manuel M. T. Chakravarty and Sandro Coretti and Matthias Fitzi and Peter Gazi and Philipp Kant and Aggelos Kiayias and Alexander Russell}, title = {Hydra: Fast Isomorphic State Channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {299}, year = {2020}, url = {https://eprint.iacr.org/2020/299}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChakravartyCFGK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KerberKK20, author = {Thomas Kerber and Aggelos Kiayias and Markulf Kohlweiss}, title = {Mining for Privacy: How to Bootstrap a Snarky Blockchain}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {401}, year = {2020}, url = {https://eprint.iacr.org/2020/401}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KerberKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KarakostasKL20, author = {Dimitris Karakostas and Aggelos Kiayias and Mario Larangeira}, title = {Account Management in Proof of Stake Ledgers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {525}, year = {2020}, url = {https://eprint.iacr.org/2020/525}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KarakostasKL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KerberKK20a, author = {Thomas Kerber and Aggelos Kiayias and Markulf Kohlweiss}, title = {Kachina - Foundations of Private Smart Contracts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {543}, year = {2020}, url = {https://eprint.iacr.org/2020/543}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KerberKK20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaziKR20, author = {Peter Gazi and Aggelos Kiayias and Alexander Russell}, title = {Tight Consistency Bounds for Bitcoin}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {661}, year = {2020}, url = {https://eprint.iacr.org/2020/661}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaziKR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FitziGKR20a, author = {Matthias Fitzi and Peter Gazi and Aggelos Kiayias and Alexander Russell}, title = {Ledger Combiners for Fast Settlement}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {675}, year = {2020}, url = {https://eprint.iacr.org/2020/675}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FitziGKR20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaldimtsiKZZ20, author = {Foteini Baldimtsi and Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang}, title = {Crowd Verifiable Zero-Knowledge and End-to-end Verifiable Multiparty Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {711}, year = {2020}, url = {https://eprint.iacr.org/2020/711}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaldimtsiKZZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CiampiKKZ20, author = {Michele Ciampi and Nikos Karayannidis and Aggelos Kiayias and Dionysis Zindros}, title = {Updatable Blockchains}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {887}, year = {2020}, url = {https://eprint.iacr.org/2020/887}, timestamp = {Mon, 27 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CiampiKKZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaveasKKZ20, author = {Stelios Daveas and Kostis Karantias and Aggelos Kiayias and Dionysis Zindros}, title = {A Gas-Efficient Superlight Bitcoin Client in Solidity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {927}, year = {2020}, url = {https://eprint.iacr.org/2020/927}, timestamp = {Mon, 27 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DaveasKKZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadertscherGKRZ20, author = {Christian Badertscher and Peter Gazi and Aggelos Kiayias and Alexander Russell and Vassilis Zikas}, title = {Consensus Redux: Distributed Ledgers in the Face of Adversarial Supremacy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1021}, year = {2020}, url = {https://eprint.iacr.org/2020/1021}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadertscherGKRZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasPZ20, author = {Aggelos Kiayias and Andrianna Polydouri and Dionysis Zindros}, title = {The Velvet Path to Superlight Blockchain Clients}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1122}, year = {2020}, url = {https://eprint.iacr.org/2020/1122}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasPZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChondrosZZDMPDK19, author = {Nikos Chondros and Bingsheng Zhang and Thomas Zacharias and Panos Diamantopoulos and Stathis Maneas and Christos Patsonakis and Alex Delis and Aggelos Kiayias and Mema Roussopoulos}, title = {Distributed, end-to-end verifiable, and privacy-preserving internet voting systems}, journal = {Comput. Secur.}, volume = {83}, pages = {268--299}, year = {2019}, url = {https://doi.org/10.1016/j.cose.2019.03.001}, doi = {10.1016/J.COSE.2019.03.001}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ChondrosZZDMPDK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dappcon/PatsonakisSKR19, author = {Christos Patsonakis and Katerina Samari and Aggelos Kiayias and Mema Roussopoulos}, title = {On the Practicality of a Smart Contract {PKI}}, booktitle = {{IEEE} International Conference on Decentralized Applications and Infrastructures, {DAPPCON} 2019, Newark, CA, USA, April 4-9, 2019}, pages = {109--118}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DAPPCON.2019.00022}, doi = {10.1109/DAPPCON.2019.00022}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dappcon/PatsonakisSKR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KiayiasZ19, author = {Aggelos Kiayias and Dionysis Zindros}, editor = {Andrea Bracciali and Jeremy Clark and Federico Pintore and Peter B. R{\o}nne and Massimiliano Sala}, title = {Proof-of-Work Sidechains}, booktitle = {Financial Cryptography and Data Security - {FC} 2019 International Workshops, {VOTING} and WTSC, St. Kitts, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11599}, pages = {21--34}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-43725-1\_3}, doi = {10.1007/978-3-030-43725-1\_3}, timestamp = {Mon, 03 Jan 2022 22:29:34 +0100}, biburl = {https://dblp.org/rec/conf/fc/KiayiasZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ArapinisGKK19, author = {Myrto Arapinis and Andriana Gkaniatsou and Dimitris Karakostas and Aggelos Kiayias}, editor = {Ian Goldberg and Tyler Moore}, title = {A Formal Treatment of Hardware Wallets}, booktitle = {Financial Cryptography and Data Security - 23rd International Conference, {FC} 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11598}, pages = {426--445}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32101-7\_26}, doi = {10.1007/978-3-030-32101-7\_26}, timestamp = {Wed, 12 Aug 2020 17:59:02 +0200}, biburl = {https://dblp.org/rec/conf/fc/ArapinisGKK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/marble/KarantiasKZ19, author = {Kostis Karantias and Aggelos Kiayias and Dionysis Zindros}, editor = {Panos M. Pardalos and Ilias S. Kotsireas and Yike Guo and William J. Knottenbelt}, title = {Compact Storage of Superblocks for NIPoPoW Applications}, booktitle = {1st International Conference on Mathematical Research for Blockchain Economy, {MARBLE} 2019, Santorini, Greece, May 6-9, 2019}, series = {Springer Proceedings in Business and Economics}, pages = {77--91}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-37110-4\_6}, doi = {10.1007/978-3-030-37110-4\_6}, timestamp = {Tue, 11 Jul 2023 15:51:52 +0200}, biburl = {https://dblp.org/rec/conf/marble/KarantiasKZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/GaziKZ19, author = {Peter Gazi and Aggelos Kiayias and Dionysis Zindros}, title = {Proof-of-Stake Sidechains}, booktitle = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco, CA, USA, May 19-23, 2019}, pages = {139--156}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SP.2019.00040}, doi = {10.1109/SP.2019.00040}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/sp/GaziKZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KerberKKZ19, author = {Thomas Kerber and Aggelos Kiayias and Markulf Kohlweiss and Vassilis Zikas}, title = {Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake}, booktitle = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco, CA, USA, May 19-23, 2019}, pages = {157--174}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SP.2019.00063}, doi = {10.1109/SP.2019.00063}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/KerberKKZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tokenomics/KiayiasLML19, author = {Aggelos Kiayias and Benjamin Livshits and Andr{\'{e}}s Monteoliva Mosteiro and Orfeas Stefanos Thyfronitis Litos}, editor = {Vincent Danos and Maurice Herlihy and Maria Potop{-}Butucaru and Julien Prat and Sara Tucci Piergiovanni}, title = {A Puff of Steem: Security Analysis of Decentralized Content Curation}, booktitle = {International Conference on Blockchain Economics, Security and Protocols, Tokenomics 2019, May 6-7, 2019, Paris, France}, series = {OASIcs}, volume = {71}, pages = {3:1--3:21}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2019}, url = {https://doi.org/10.4230/OASIcs.Tokenomics.2019.3}, doi = {10.4230/OASICS.TOKENOMICS.2019.3}, timestamp = {Mon, 21 Dec 2020 13:23:22 +0100}, biburl = {https://dblp.org/rec/conf/tokenomics/KiayiasLML19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tokenomics/KarakostasKNZ19, author = {Dimitris Karakostas and Aggelos Kiayias and Christos Nasikas and Dionysis Zindros}, editor = {Vincent Danos and Maurice Herlihy and Maria Potop{-}Butucaru and Julien Prat and Sara Tucci Piergiovanni}, title = {Cryptocurrency Egalitarianism: {A} Quantitative Approach}, booktitle = {International Conference on Blockchain Economics, Security and Protocols, Tokenomics 2019, May 6-7, 2019, Paris, France}, series = {OASIcs}, volume = {71}, pages = {7:1--7:21}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2019}, url = {https://doi.org/10.4230/OASIcs.Tokenomics.2019.7}, doi = {10.4230/OASICS.TOKENOMICS.2019.7}, timestamp = {Wed, 16 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tokenomics/KarakostasKNZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1902-00878, author = {Christos Patsonakis and Katerina Samari and Aggelos Kiayias and Mema Roussopoulos}, title = {On the Practicality of Smart Contract {PKI}}, journal = {CoRR}, volume = {abs/1902.00878}, year = {2019}, url = {http://arxiv.org/abs/1902.00878}, eprinttype = {arXiv}, eprint = {1902.00878}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1902-00878.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-02434, author = {Dimitris Karakostas and Aggelos Kiayias and Christos Nasikas and Dionysis Zindros}, title = {Cryptocurrency Egalitarianism: {A} Quantitative Approach}, journal = {CoRR}, volume = {abs/1907.02434}, year = {2019}, url = {http://arxiv.org/abs/1907.02434}, eprinttype = {arXiv}, eprint = {1907.02434}, timestamp = {Mon, 08 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-02434.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-10187, author = {Erica Blum and Aggelos Kiayias and Cristopher Moore and Saad Quader and Alexander Russell}, title = {Linear Consistency for Proof-of-Stake Blockchains}, journal = {CoRR}, volume = {abs/1911.10187}, year = {2019}, url = {http://arxiv.org/abs/1911.10187}, eprinttype = {arXiv}, eprint = {1911.10187}, timestamp = {Tue, 03 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-10187.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArapinisGKK19, author = {Myrto Arapinis and Andriana Gkaniatsou and Dimitris Karakostas and Aggelos Kiayias}, title = {A Formal Treatment of Hardware Wallets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {34}, year = {2019}, url = {https://eprint.iacr.org/2019/034}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArapinisGKK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarayKP19, author = {Juan A. Garay and Aggelos Kiayias and Giorgos Panagiotakos}, title = {Iterated Search Problems and Blockchain Security under Falsifiable Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {315}, year = {2019}, url = {https://eprint.iacr.org/2019/315}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GarayKP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbadiCKZ19, author = {Aydin Abadi and Michele Ciampi and Aggelos Kiayias and Vassilis Zikas}, title = {Timed Signatures and Zero-Knowledge Proofs -Timestamping in the Blockchain Era-}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {644}, year = {2019}, url = {https://eprint.iacr.org/2019/644}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbadiCKZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasL19, author = {Aggelos Kiayias and Orfeas Stefanos Thyfronitis Litos}, title = {A Composable Security Treatment of the Lightning Network}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {778}, year = {2019}, url = {https://eprint.iacr.org/2019/778}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadertscherGKRZ19, author = {Christian Badertscher and Peter Gazi and Aggelos Kiayias and Alexander Russell and Vassilis Zikas}, title = {Ouroboros Chronos: Permissionless Clock Synchronization via Proof-of-Stake}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {838}, year = {2019}, url = {https://eprint.iacr.org/2019/838}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadertscherGKRZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KarantiasKZ19, author = {Kostis Karantias and Aggelos Kiayias and Dionysis Zindros}, title = {Proof-of-Burn}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1096}, year = {2019}, url = {https://eprint.iacr.org/2019/1096}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KarantiasKZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZamyatinAZKMKK19, author = {Alexei Zamyatin and Mustafa Al{-}Bassam and Dionysis Zindros and Eleftherios Kokoris{-}Kogias and Pedro Moreno{-}Sanchez and Aggelos Kiayias and William J. Knottenbelt}, title = {SoK: Communication Across Distributed Ledgers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1128}, year = {2019}, url = {https://eprint.iacr.org/2019/1128}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZamyatinAZKMKK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CojocaruGKSW19, author = {Alexandru Cojocaru and Juan A. Garay and Aggelos Kiayias and Fang Song and Petros Wallden}, title = {The Bitcoin Backbone Protocol Against Quantum Adversaries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1150}, year = {2019}, url = {https://eprint.iacr.org/2019/1150}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CojocaruGKSW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarayKOPZ19, author = {Juan A. Garay and Aggelos Kiayias and Rafail Ostrovsky and Giorgos Panagiotakos and Vassilis Zikas}, title = {Resource-Restricted Cryptography: Honest-Majority {MPC} from a {CRS} (and No Broadcast)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1264}, year = {2019}, url = {https://eprint.iacr.org/2019/1264}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GarayKOPZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KarantiasKLZ19, author = {Kostis Karantias and Aggelos Kiayias and Nikos Leonardos and Dionysis Zindros}, title = {Compact Storage of Superblocks for NIPoPoW Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1444}, year = {2019}, url = {https://eprint.iacr.org/2019/1444}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KarantiasKLZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ChaidosFK018, author = {Pyrros Chaidos and Olga Fourtounelli and Aggelos Kiayias and Thomas Zacharias}, editor = {Thomas Peyrin and Steven D. Galbraith}, title = {A Universally Composable Framework for the Privacy of Email Ecosystems}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11274}, pages = {191--221}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03332-3\_8}, doi = {10.1007/978-3-030-03332-3\_8}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/ChaidosFK018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BadertscherGKRZ18, author = {Christian Badertscher and Peter Gazi and Aggelos Kiayias and Alexander Russell and Vassilis Zikas}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {913--930}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243848}, doi = {10.1145/3243734.3243848}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BadertscherGKRZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KiayiasLT18, author = {Aggelos Kiayias and Feng{-}Hao Liu and Yiannis Tselekounis}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Non-Malleable Codes for Partial Functions with Manipulation Detection}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10993}, pages = {577--607}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96878-0\_20}, doi = {10.1007/978-3-319-96878-0\_20}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KiayiasLT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvcbt/GaziKR18, author = {Peter Gazi and Aggelos Kiayias and Alexander Russell}, title = {Stake-Bleeding Attacks on Proof-of-Stake Blockchains}, booktitle = {Crypto Valley Conference on Blockchain Technology, {CVCBT} 2018, Zug, Switzerland, June 20-22, 2018}, pages = {85--92}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CVCBT.2018.00015}, doi = {10.1109/CVCBT.2018.00015}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cvcbt/GaziKR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DavidGKR18, author = {Bernardo David and Peter Gazi and Aggelos Kiayias and Alexander Russell}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10821}, pages = {66--98}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78375-8\_3}, doi = {10.1007/978-3-319-78375-8\_3}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DavidGKR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GarayKLP18, author = {Juan A. Garay and Aggelos Kiayias and Nikos Leonardos and Giorgos Panagiotakos}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Bootstrapping the Blockchain, with Applications to Consensus and Fast {PKI} Setup}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10770}, pages = {465--495}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76581-5\_16}, doi = {10.1007/978-3-319-76581-5\_16}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GarayKLP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/AtenieseKMT018, author = {Giuseppe Ateniese and Aggelos Kiayias and Bernardo Magri and Yiannis Tselekounis and Daniele Venturi}, editor = {Joonsang Baek and Willy Susilo and Jongkil Kim}, title = {Secure Outsourcing of Cryptographic Circuits Manufacturing}, booktitle = {Provable Security - 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11192}, pages = {75--93}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01446-9\_5}, doi = {10.1007/978-3-030-01446-9\_5}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/AtenieseKMT018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/KiayiasKLS018, author = {Aggelos Kiayias and Annabell Kuldmaa and Helger Lipmaa and Janno Siim and Thomas Zacharias}, editor = {Dario Catalano and Roberto De Prisco}, title = {On the Security Properties of e-Voting Bulletin Boards}, booktitle = {Security and Cryptography for Networks - 11th International Conference, {SCN} 2018, Amalfi, Italy, September 5-7, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11035}, pages = {505--523}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98113-0\_27}, doi = {10.1007/978-3-319-98113-0\_27}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scn/KiayiasKLS018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1807-11218, author = {Lars Br{\"{u}}njes and Aggelos Kiayias and Elias Koutsoupias and Aikaterini{-}Panagiota Stouka}, title = {Reward Sharing Schemes for Stake Pools}, journal = {CoRR}, volume = {abs/1807.11218}, year = {2018}, url = {http://arxiv.org/abs/1807.11218}, eprinttype = {arXiv}, eprint = {1807.11218}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1807-11218.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-01719, author = {Aggelos Kiayias and Benjamin Livshits and Andr{\'{e}}s Monteoliva Mosteiro and Orfeas Stefanos Thyfronitis Litos}, title = {A Puff of Steem: Security Analysis of Decentralized Content Curation}, journal = {CoRR}, volume = {abs/1810.01719}, year = {2018}, url = {http://arxiv.org/abs/1810.01719}, eprinttype = {arXiv}, eprint = {1810.01719}, timestamp = {Tue, 30 Oct 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-01719.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1811-01348, author = {Georgia Avarikioti and Roman Brunner and Aggelos Kiayias and Roger Wattenhofer and Dionysis Zindros}, title = {Structure and Content of the Visible Darknet}, journal = {CoRR}, volume = {abs/1811.01348}, year = {2018}, url = {http://arxiv.org/abs/1811.01348}, eprinttype = {arXiv}, eprint = {1811.01348}, timestamp = {Thu, 22 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1811-01348.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaziKR18, author = {Peter Gazi and Aggelos Kiayias and Alexander Russell}, title = {Stake-Bleeding Attacks on Proof-of-Stake Blockchains}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {248}, year = {2018}, url = {http://eprint.iacr.org/2018/248}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaziKR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadertscherGKRZ18, author = {Christian Badertscher and Peter Gazi and Aggelos Kiayias and Alexander Russell and Vassilis Zikas}, title = {Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {378}, year = {2018}, url = {https://eprint.iacr.org/2018/378}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadertscherGKRZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasLT18, author = {Aggelos Kiayias and Feng{-}Hao Liu and Yiannis Tselekounis}, title = {Non-Malleable Codes for Partial Functions with Manipulation Detection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {538}, year = {2018}, url = {https://eprint.iacr.org/2018/538}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasLT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasKLSZ18, author = {Aggelos Kiayias and Annabell Kuldmaa and Helger Lipmaa and Janno Siim and Thomas Zacharias}, title = {On the Security Properties of e-Voting Bulletin Boards}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {567}, year = {2018}, url = {https://eprint.iacr.org/2018/567}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasKLSZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarayK18, author = {Juan A. Garay and Aggelos Kiayias}, title = {SoK: {A} Consensus Taxonomy in the Blockchain Era}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {754}, year = {2018}, url = {https://eprint.iacr.org/2018/754}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GarayK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChaidosFKZ18, author = {Pyrros Chaidos and Olga Fourtounelli and Aggelos Kiayias and Thomas Zacharias}, title = {A Universally Composable Framework for the Privacy of Email Ecosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {848}, year = {2018}, url = {https://eprint.iacr.org/2018/848}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChaidosFKZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatsonakisSRK18, author = {Christos Patsonakis and Katerina Samari and Mema Roussopoulos and Aggelos Kiayias}, title = {Towards a Smart Contract-based, Decentralized, Public-Key Infrastructure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {853}, year = {2018}, url = {https://eprint.iacr.org/2018/853}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatsonakisSRK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasORT18, author = {Aggelos Kiayias and Murat Osmanoglu and Alexander Russell and Qiang Tang}, title = {Space Efficient Computational Multi-Secret Sharing and Its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1010}, year = {2018}, url = {https://eprint.iacr.org/2018/1010}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasORT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasZ18, author = {Aggelos Kiayias and Dionysis Zindros}, title = {Proof-of-Work Sidechains}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1048}, year = {2018}, url = {https://eprint.iacr.org/2018/1048}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasR18, author = {Aggelos Kiayias and Alexander Russell}, title = {Ouroboros-BFT: {A} Simple Byzantine Fault Tolerant Consensus Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1049}, year = {2018}, url = {https://eprint.iacr.org/2018/1049}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FitziGKR18, author = {Matthias Fitzi and Peter Gazi and Aggelos Kiayias and Alexander Russell}, title = {Parallel Chains: Improving Throughput and Latency of Blockchain Protocols via Parallel Composition}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1119}, year = {2018}, url = {https://eprint.iacr.org/2018/1119}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FitziGKR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KerberKKZ18, author = {Thomas Kerber and Markulf Kohlweiss and Aggelos Kiayias and Vassilis Zikas}, title = {Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1132}, year = {2018}, url = {https://eprint.iacr.org/2018/1132}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KerberKKZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaziKZ18, author = {Peter Gazi and Aggelos Kiayias and Dionysis Zindros}, title = {Proof-of-Stake Sidechains}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1239}, year = {2018}, url = {https://eprint.iacr.org/2018/1239}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaziKZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/KiayiasZZ17, author = {Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang}, title = {An Efficient {E2E} Verifiable E-voting System without Setup Assumptions}, journal = {{IEEE} Secur. Priv.}, volume = {15}, number = {3}, pages = {14--23}, year = {2017}, url = {https://doi.org/10.1109/MSP.2017.71}, doi = {10.1109/MSP.2017.71}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/KiayiasZZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KiayiasZZ17, author = {Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang}, title = {Auditing for privacy in threshold {PKE} e-voting}, journal = {Inf. Comput. Secur.}, volume = {25}, number = {1}, pages = {100--116}, year = {2017}, url = {https://doi.org/10.1108/ICS-07-2016-0056}, doi = {10.1108/ICS-07-2016-0056}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/KiayiasZZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/JareckiKKX17, author = {Stanislaw Jarecki and Aggelos Kiayias and Hugo Krawczyk and Jiayu Xu}, editor = {Dieter Gollmann and Atsuko Miyaji and Hiroaki Kikuchi}, title = {{TOPPSS:} Cost-Minimal Password-Protected Secret Sharing Based on Threshold {OPRF}}, booktitle = {Applied Cryptography and Network Security - 15th International Conference, {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10355}, pages = {39--58}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61204-1\_3}, doi = {10.1007/978-3-319-61204-1\_3}, timestamp = {Tue, 07 May 2024 20:12:06 +0200}, biburl = {https://dblp.org/rec/conf/acns/JareckiKKX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/PatsonakisSRK17, author = {Christos Patsonakis and Katerina Samari and Mema Roussopoulos and Aggelos Kiayias}, editor = {Srdjan Capkun and Sherman S. M. Chow}, title = {Towards a Smart Contract-Based, Decentralized, Public-Key Infrastructure}, booktitle = {Cryptology and Network Security - 16th International Conference, {CANS} 2017, Hong Kong, China, November 30 - December 2, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11261}, pages = {299--321}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-030-02641-7\_14}, doi = {10.1007/978-3-030-02641-7\_14}, timestamp = {Wed, 25 Sep 2019 18:04:17 +0200}, biburl = {https://dblp.org/rec/conf/cans/PatsonakisSRK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GarayKL17, author = {Juan A. Garay and Aggelos Kiayias and Nikos Leonardos}, editor = {Jonathan Katz and Hovav Shacham}, title = {The Bitcoin Backbone Protocol with Chains of Variable Difficulty}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10401}, pages = {291--323}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63688-7\_10}, doi = {10.1007/978-3-319-63688-7\_10}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GarayKL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KiayiasRDO17, author = {Aggelos Kiayias and Alexander Russell and Bernardo David and Roman Oliynykov}, editor = {Jonathan Katz and Hovav Shacham}, title = {Ouroboros: {A} Provably Secure Proof-of-Stake Blockchain Protocol}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10401}, pages = {357--388}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63688-7\_12}, doi = {10.1007/978-3-319-63688-7\_12}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KiayiasRDO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/BaldimtsiKS17, author = {Foteini Baldimtsi and Aggelos Kiayias and Katerina Samari}, editor = {Phong Q. Nguyen and Jianying Zhou}, title = {Watermarking Public-Key Cryptographic Functionalities and Implementations}, booktitle = {Information Security - 20th International Conference, {ISC} 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10599}, pages = {173--191}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69659-1\_10}, doi = {10.1007/978-3-319-69659-1\_10}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/BaldimtsiKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/GkaniatsouAK17, author = {Andriana Gkaniatsou and Myrto Arapinis and Aggelos Kiayias}, editor = {Phong Q. Nguyen and Jianying Zhou}, title = {Low-Level Attacks in Bitcoin Wallets}, booktitle = {Information Security - 20th International Conference, {ISC} 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10599}, pages = {233--253}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69659-1\_13}, doi = {10.1007/978-3-319-69659-1\_13}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/GkaniatsouAK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/KiayiasP17, author = {Aggelos Kiayias and Giorgos Panagiotakos}, editor = {Tanja Lange and Orr Dunkelman}, title = {On Trees, Chains and Fast Transactions in the Blockchain}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2017 - 5th International Conference on Cryptology and Information Security in Latin America, Havana, Cuba, September 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11368}, pages = {327--351}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-030-25283-0\_18}, doi = {10.1007/978-3-030-25283-0\_18}, timestamp = {Mon, 22 Jul 2019 13:20:38 +0200}, biburl = {https://dblp.org/rec/conf/latincrypt/KiayiasP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Kiayias0Z17, author = {Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang}, editor = {Serge Fehr}, title = {Ceremonies for End-to-End Verifiable Elections}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10175}, pages = {305--334}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54388-7\_11}, doi = {10.1007/978-3-662-54388-7\_11}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/Kiayias0Z17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AlexopoulosKT017, author = {Nikolaos Alexopoulos and Aggelos Kiayias and Riivo Talviste and Thomas Zacharias}, editor = {Engin Kirda and Thomas Ristenpart}, title = {MCMix: Anonymous Messaging via Secure Multiparty Computation}, booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017}, pages = {1217--1234}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/alexopoulos}, timestamp = {Mon, 01 Feb 2021 08:42:59 +0100}, biburl = {https://dblp.org/rec/conf/uss/AlexopoulosKT017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2017, editor = {Aggelos Kiayias}, title = {Financial Cryptography and Data Security - 21st International Conference, {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10322}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70972-7}, doi = {10.1007/978-3-319-70972-7}, isbn = {978-3-319-70971-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasLT17, author = {Aggelos Kiayias and Feng{-}Hao Liu and Yiannis Tselekounis}, title = {Practical Non-Malleable Codes from {\(\mathscr{l}\)}-more Extractable Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {40}, year = {2017}, url = {http://eprint.iacr.org/2017/040}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasLT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RussellMKQ17, author = {Alexander Russell and Cristopher Moore and Aggelos Kiayias and Saad Quader}, title = {Forkable Strings are Rare}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {241}, year = {2017}, url = {http://eprint.iacr.org/2017/241}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RussellMKQ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JareckiKKX17, author = {Stanislaw Jarecki and Aggelos Kiayias and Hugo Krawczyk and Jiayu Xu}, title = {{TOPPSS:} Cost-minimal Password-Protected Secret Sharing based on Threshold {OPRF}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {363}, year = {2017}, url = {http://eprint.iacr.org/2017/363}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JareckiKKX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaldimtsiKS17, author = {Foteini Baldimtsi and Aggelos Kiayias and Katerina Samari}, title = {Watermarking Public-key Cryptographic Functionalities and Implementations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {557}, year = {2017}, url = {http://eprint.iacr.org/2017/557}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaldimtsiKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DavidGKR17, author = {Bernardo Machado David and Peter Gazi and Aggelos Kiayias and Alexander Russell}, title = {Ouroboros Praos: An adaptively-secure, semi-synchronous proof-of-stake protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {573}, year = {2017}, url = {http://eprint.iacr.org/2017/573}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DavidGKR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarayKP17, author = {Juan A. Garay and Aggelos Kiayias and Giorgos Panagiotakos}, title = {Proofs of Work for Blockchain Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {775}, year = {2017}, url = {http://eprint.iacr.org/2017/775}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GarayKP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlexopoulosKTZ17, author = {Nikolaos Alexopoulos and Aggelos Kiayias and Riivo Talviste and Thomas Zacharias}, title = {MCMix: Anonymous Messaging via Secure Multiparty Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {778}, year = {2017}, url = {http://eprint.iacr.org/2017/778}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlexopoulosKTZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasMZ17, author = {Aggelos Kiayias and Andrew Miller and Dionysis Zindros}, title = {Non-Interactive Proofs of Proof-of-Work}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {963}, year = {2017}, url = {http://eprint.iacr.org/2017/963}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasMZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/EdmanKTY16, author = {Matthew Edman and Aggelos Kiayias and Qiang Tang and B{\"{u}}lent Yener}, title = {On the Security of Key Extraction From Measuring Physical Quantities}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {8}, pages = {1796--1806}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2543687}, doi = {10.1109/TIFS.2016.2543687}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/EdmanKTY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BaldimtsiK0Z16, author = {Foteini Baldimtsi and Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {Indistinguishable Proofs of Work or Knowledge}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10032}, pages = {902--933}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53890-6\_30}, doi = {10.1007/978-3-662-53890-6\_30}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BaldimtsiK0Z16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KiayiasLT16, author = {Aggelos Kiayias and Feng{-}Hao Liu and Yiannis Tselekounis}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {Practical Non-Malleable Codes from l-more Extractable Hash Functions}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {1317--1328}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978352}, doi = {10.1145/2976749.2978352}, timestamp = {Tue, 10 Nov 2020 20:00:49 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KiayiasLT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ArgyrosSJKK16, author = {George Argyros and Ioannis Stais and Suman Jana and Angelos D. Keromytis and Aggelos Kiayias}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {SFADiff: Automated Evasion Attacks and Fingerprinting Using Black-box Differential Automata Learning}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {1690--1701}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978383}, doi = {10.1145/2976749.2978383}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ArgyrosSJKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KiayiasOR0W16, author = {Aggelos Kiayias and Ozgur Oksuz and Alexander Russell and Qiang Tang and Bing Wang}, editor = {Ioannis G. Askoxylakis and Sotiris Ioannidis and Sokratis K. Katsikas and Catherine Meadows}, title = {Efficient Encrypted Keyword Search for Multi-user Data Sharing}, booktitle = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9878}, pages = {173--195}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45744-4\_9}, doi = {10.1007/978-3-319-45744-4\_9}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/esorics/KiayiasOR0W16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KiayiasZZ16, author = {Aggelos Kiayias and Hong{-}Sheng Zhou and Vassilis Zikas}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Fair and Robust Multi-party Computation Using a Global Transaction Ledger}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {705--734}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_25}, doi = {10.1007/978-3-662-49896-5\_25}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KiayiasZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/JareckiKKX16, author = {Stanislaw Jarecki and Aggelos Kiayias and Hugo Krawczyk and Jiayu Xu}, title = {Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online)}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2016, Saarbr{\"{u}}cken, Germany, March 21-24, 2016}, pages = {276--291}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/EuroSP.2016.30}, doi = {10.1109/EUROSP.2016.30}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/JareckiKKX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KiayiasLS16, author = {Aggelos Kiayias and Nikolaos Lamprou and Aikaterini{-}Panagiota Stouka}, editor = {Jeremy Clark and Sarah Meiklejohn and Peter Y. A. Ryan and Dan S. Wallach and Michael Brenner and Kurt Rohloff}, title = {Proofs of Proofs of Work with Sublinear Complexity}, booktitle = {Financial Cryptography and Data Security - {FC} 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9604}, pages = {61--78}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53357-4\_5}, doi = {10.1007/978-3-662-53357-4\_5}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/KiayiasLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/ChondrosZ0DMPDK16, author = {Nikos Chondros and Bingsheng Zhang and Thomas Zacharias and Panos Diamantopoulos and Stathis Maneas and Christos Patsonakis and Alex Delis and Aggelos Kiayias and Mema Roussopoulos}, title = {{D-DEMOS:} {A} Distributed, End-to-End Verifiable, Internet Voting System}, booktitle = {36th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2016, Nara, Japan, June 27-30, 2016}, pages = {711--720}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ICDCS.2016.56}, doi = {10.1109/ICDCS.2016.56}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/ChondrosZ0DMPDK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigecom/KiayiasKKT16, author = {Aggelos Kiayias and Elias Koutsoupias and Maria Kyropoulou and Yiannis Tselekounis}, editor = {Vincent Conitzer and Dirk Bergemann and Yiling Chen}, title = {Blockchain Mining Games}, booktitle = {Proceedings of the 2016 {ACM} Conference on Economics and Computation, {EC} '16, Maastricht, The Netherlands, July 24-28, 2016}, pages = {365--382}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2940716.2940773}, doi = {10.1145/2940716.2940773}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigecom/KiayiasKKT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ArgyrosSKK16, author = {George Argyros and Ioannis Stais and Aggelos Kiayias and Angelos D. Keromytis}, title = {Back in Black: Towards Formal, Black Box Analysis of Sanitizers and Filters}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {91--109}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SP.2016.14}, doi = {10.1109/SP.2016.14}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ArgyrosSKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wimob/NazaryanJYOWSK16, author = {Levon Nazaryan and Ruofan Jin and Chaoqun Yue and Ozgur Oksuz and Bing Wang and Kyoungwon Suh and Aggelos Kiayias}, title = {Securely outsourcing cookies to the cloud via private information retrieval}, booktitle = {12th {IEEE} International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2016, New York, NY, USA, October 17-19, 2016}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/WiMOB.2016.7763250}, doi = {10.1109/WIMOB.2016.7763250}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wimob/NazaryanJYOWSK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wimob/ZhangONYWKB16, author = {Luqiao Zhang and Ozgur Oksuz and Levon Nazaryan and Chaoqun Yue and Bing Wang and Aggelos Kiayias and Athanasios Bamis}, title = {Encrypting wireless network traces to protect user privacy: {A} case study for smart campus}, booktitle = {12th {IEEE} International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2016, New York, NY, USA, October 17-19, 2016}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/WiMOB.2016.7763266}, doi = {10.1109/WIMOB.2016.7763266}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wimob/ZhangONYWKB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KiayiasKKT16, author = {Aggelos Kiayias and Elias Koutsoupias and Maria Kyropoulou and Yiannis Tselekounis}, title = {Blockchain Mining Games}, journal = {CoRR}, volume = {abs/1607.02420}, year = {2016}, url = {http://arxiv.org/abs/1607.02420}, eprinttype = {arXiv}, eprint = {1607.02420}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KiayiasKKT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ChondrosZ0DMPDK16, author = {Nikos Chondros and Bingsheng Zhang and Thomas Zacharias and Panos Diamantopoulos and Stathis Maneas and Christos Patsonakis and Alex Delis and Aggelos Kiayias and Mema Roussopoulos}, title = {Distributed, End-to-end Verifiable, and Privacy-Preserving Internet Voting Systems}, journal = {CoRR}, volume = {abs/1608.00849}, year = {2016}, url = {http://arxiv.org/abs/1608.00849}, eprinttype = {arXiv}, eprint = {1608.00849}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ChondrosZ0DMPDK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JareckiKKX16, author = {Stanislaw Jarecki and Aggelos Kiayias and Hugo Krawczyk and Jiayu Xu}, title = {Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {144}, year = {2016}, url = {http://eprint.iacr.org/2016/144}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JareckiKKX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseKMTV16, author = {Giuseppe Ateniese and Aggelos Kiayias and Bernardo Magri and Yiannis Tselekounis and Daniele Venturi}, title = {Secure Outsourcing of Circuit Manufacturing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {527}, year = {2016}, url = {http://eprint.iacr.org/2016/527}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseKMTV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasP16, author = {Aggelos Kiayias and Giorgos Panagiotakos}, title = {On Trees, Chains and Fast Transactions in the Blockchain}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {545}, year = {2016}, url = {http://eprint.iacr.org/2016/545}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasKRDO16, author = {Aggelos Kiayias and Ioannis Konstantinou and Alexander Russell and Bernardo David and Roman Oliynykov}, title = {A Provably Secure Proof-of-Stake Blockchain Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {889}, year = {2016}, url = {http://eprint.iacr.org/2016/889}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasKRDO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarayKLP16, author = {Juan A. Garay and Aggelos Kiayias and Nikos Leonardos and Giorgos Panagiotakos}, title = {Bootstrapping the Blockchain - Directly}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {991}, year = {2016}, url = {http://eprint.iacr.org/2016/991}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GarayKLP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarayKL16, author = {Juan A. Garay and Aggelos Kiayias and Nikos Leonardos}, title = {The Bitcoin Backbone Protocol with Chains of Variable Difficulty}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1048}, year = {2016}, url = {http://eprint.iacr.org/2016/1048}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GarayKL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/KiayiasLLPT15, author = {Aggelos Kiayias and Nikos Leonardos and Helger Lipmaa and Kateryna Pavlyk and Qiang Tang}, title = {Optimal Rate Private Information Retrieval from Homomorphic Encryption}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2015}, number = {2}, pages = {222--243}, year = {2015}, url = {https://doi.org/10.1515/popets-2015-0016}, doi = {10.1515/POPETS-2015-0016}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/KiayiasLLPT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KiayiasT15, author = {Aggelos Kiayias and Qiang Tang}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Traitor Deterring Schemes: Using Bitcoin as Collateral for Digital Content}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {231--242}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813698}, doi = {10.1145/2810103.2813698}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KiayiasT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Kiayias0Z15, author = {Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{DEMOS-2:} Scalable {E2E} Verifiable Elections without Random Oracles}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {352--363}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813727}, doi = {10.1145/2810103.2813727}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Kiayias0Z15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/KiayiasLLPT15, author = {Aggelos Kiayias and Nikos Leonardos and Helger Lipmaa and Kateryna Pavlyk and Qiang Tang}, editor = {Kaisa Nyberg}, title = {Communication Optimal Tardos-Based Asymmetric Fingerprinting}, booktitle = {Topics in Cryptology - {CT-RSA} 2015, The Cryptographer's Track at the {RSA} Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9048}, pages = {469--486}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-16715-2\_25}, doi = {10.1007/978-3-319-16715-2\_25}, timestamp = {Thu, 14 Oct 2021 10:27:48 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/KiayiasLLPT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edemocracy/Kiayias0Z15, author = {Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang}, editor = {Sokratis K. Katsikas and Alexander B. Sideridis}, title = {On the Necessity of Auditing for Election Privacy in e-Voting Systems}, booktitle = {E-Democracy - Citizen Rights in the World of the New Computing Paradigms - 6th International Conference, E-Democracy 2015, Athens, Greece, December 10-11, 2015, Proceedings}, series = {Communications in Computer and Information Science}, volume = {570}, pages = {3--17}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27164-4\_1}, doi = {10.1007/978-3-319-27164-4\_1}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edemocracy/Kiayias0Z15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KiayiasT15, author = {Aggelos Kiayias and Qiang Tang}, editor = {G{\"{u}}nther Pernul and Peter Y. A. Ryan and Edgar R. Weippl}, title = {Making Any Identity-Based Encryption Accountable, Efficiently}, booktitle = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9326}, pages = {326--346}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24174-6\_17}, doi = {10.1007/978-3-319-24174-6\_17}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/KiayiasT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GarayKL15, author = {Juan A. Garay and Aggelos Kiayias and Nikos Leonardos}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {The Bitcoin Backbone Protocol: Analysis and Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, pages = {281--310}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6\_10}, doi = {10.1007/978-3-662-46803-6\_10}, timestamp = {Thu, 14 Oct 2021 09:58:15 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GarayKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KiayiasZZ15, author = {Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {End-to-End Verifiable Elections in the Standard Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, pages = {468--498}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6\_16}, doi = {10.1007/978-3-662-46803-6\_16}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/KiayiasZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/KentrosKKR15, author = {Sotirios Kentros and Chadi Kari and Aggelos Kiayias and Alexander Russell}, title = {Asynchronous Adaptive Task Allocation}, booktitle = {35th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2015, Columbus, OH, USA, June 29 - July 2, 2015}, pages = {83--92}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICDCS.2015.17}, doi = {10.1109/ICDCS.2015.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/KentrosKKR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/KiayiasOT15, author = {Aggelos Kiayias and Murat Osmanoglu and Qiang Tang}, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {Graded Signatures}, booktitle = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, pages = {61--80}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5\_4}, doi = {10.1007/978-3-319-23318-5\_4}, timestamp = {Thu, 29 Aug 2019 08:10:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/KiayiasOT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/KiayiasOT15a, author = {Aggelos Kiayias and Ozgur Oksuz and Qiang Tang}, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {Distributed Parameter Generation for Bilinear Diffie Hellman Exponentiation and Applications}, booktitle = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, pages = {548--567}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5\_30}, doi = {10.1007/978-3-319-23318-5\_30}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/KiayiasOT15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GarayGJKY15, author = {Juan A. Garay and Ran Gelles and David S. Johnson and Aggelos Kiayias and Moti Yung}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {A Little Honesty Goes a Long Way - The Two-Tier Model for Secure Multiparty Computation}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, pages = {134--158}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6\_7}, doi = {10.1007/978-3-662-46494-6\_7}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GarayGJKY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ChondrosZ0DMPDK15, author = {Nikos Chondros and Bingsheng Zhang and Thomas Zacharias and Panos Diamantopoulos and Stathis Maneas and Christos Patsonakis and Alex Delis and Aggelos Kiayias and Mema Roussopoulos}, title = {A distributed, end-to-end verifiable, internet voting system}, journal = {CoRR}, volume = {abs/1507.06812}, year = {2015}, url = {http://arxiv.org/abs/1507.06812}, eprinttype = {arXiv}, eprint = {1507.06812}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ChondrosZ0DMPDK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasZZ15, author = {Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang}, title = {End-to-End Verifiable Elections in the Standard Model{\({_\ast}\)}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {346}, year = {2015}, url = {http://eprint.iacr.org/2015/346}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasZZ15a, author = {Aggelos Kiayias and Hong{-}Sheng Zhou and Vassilis Zikas}, title = {Fair and Robust Multi-Party Computation using a Global Transaction Ledger}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {574}, year = {2015}, url = {http://eprint.iacr.org/2015/574}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasZZ15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasRRS15, author = {Aggelos Kiayias and Yona Raekow and Alexander Russell and Narasimha K. Shashidhar}, title = {A One-time Stegosystem and Applications to Efficient Covert Communication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {684}, year = {2015}, url = {http://eprint.iacr.org/2015/684}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasRRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasP15, author = {Aggelos Kiayias and Giorgos Panagiotakos}, title = {Speed-Security Tradeoffs in Blockchain Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1019}, year = {2015}, url = {http://eprint.iacr.org/2015/1019}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kiayias0Z15, author = {Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang}, title = {Ceremonies for End-to-End Verifiable Elections}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1166}, year = {2015}, url = {http://eprint.iacr.org/2015/1166}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kiayias0Z15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaldimtsiK0Z15, author = {Foteini Baldimtsi and Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang}, title = {Indistinguishable Proofs of Work or Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1230}, year = {2015}, url = {http://eprint.iacr.org/2015/1230}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaldimtsiK0Z15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/KiayiasRRS14, author = {Aggelos Kiayias and Yona Raekow and Alexander Russell and Narasimha K. Shashidhar}, title = {A One-Time Stegosystem and Applications to Efficient Covert Communication}, journal = {J. Cryptol.}, volume = {27}, number = {1}, pages = {23--44}, year = {2014}, url = {https://doi.org/10.1007/s00145-012-9135-4}, doi = {10.1007/S00145-012-9135-4}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/KiayiasRRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LengyelMPWVK14, author = {Tamas K. Lengyel and Steve Maresca and Bryan D. Payne and George D. Webster and Sebastian Vogl and Aggelos Kiayias}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {Scalability, fidelity and stealth in the {DRAKVUF} dynamic malware analysis system}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {386--395}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664252}, doi = {10.1145/2664243.2664252}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LengyelMPWVK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/JareckiKK14, author = {Stanislaw Jarecki and Aggelos Kiayias and Hugo Krawczyk}, editor = {Palash Sarkar and Tetsu Iwata}, title = {Round-Optimal Password-Protected Secret Sharing and {T-PAKE} in the Password-Only Model}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8874}, pages = {233--253}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45608-8\_13}, doi = {10.1007/978-3-662-45608-8\_13}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/JareckiKK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ev/DelisGKKNPRSSVZZ14, author = {Alex Delis and Konstantina Gavatha and Aggelos Kiayias and Charalampos Koutalakis and Elias Nikolakopoulos and Lampros Paschos and Mema Roussopoulos and Georgios Sotirellis and Panos Stathopoulos and Pavlos Vasilopoulos and Thomas Zacharias and Bingsheng Zhang}, editor = {Robert Krimmer and Melanie Volkamer}, title = {Pressing the button for European elections: verifiable e-voting and public attitudes toward internet voting in Greece}, booktitle = {6th International Conference on Electronic Voting: Verifying the Vote, {EVOTE} 2014, Lochau / Bregenz, Austria, October 29-31, 2014}, pages = {1--8}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/EVOTE.2014.7001141}, doi = {10.1109/EVOTE.2014.7001141}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ev/DelisGKKNPRSSVZZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/KiayiasOT14, author = {Aggelos Kiayias and Murat Osmanoglu and Qiang Tang}, editor = {Sherman S. M. Chow and Jan Camenisch and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {Graded Encryption, or How to Play "Who Wants To Be {A} Millionaire?" Distributively}, booktitle = {Information Security - 17th International Conference, {ISC} 2014, Hong Kong, China, October 12-14, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8783}, pages = {377--387}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13257-0\_22}, doi = {10.1007/978-3-319-13257-0\_22}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/KiayiasOT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/KatzKZZ14, author = {Jonathan Katz and Aggelos Kiayias and Hong{-}Sheng Zhou and Vassilis Zikas}, editor = {Magn{\'{u}}s M. Halld{\'{o}}rsson and Shlomi Dolev}, title = {Distributing the setup in universally composable multi-party computation}, booktitle = {{ACM} Symposium on Principles of Distributed Computing, {PODC} '14, Paris, France, July 15-18, 2014}, pages = {20--29}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611462.2611480}, doi = {10.1145/2611462.2611480}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/podc/KatzKZZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/KarvelasK14, author = {Nikolaos P. Karvelas and Aggelos Kiayias}, editor = {Michel Abdalla and Roberto De Prisco}, title = {Efficient Proofs of Secure Erasure}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {520--537}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_30}, doi = {10.1007/978-3-319-10879-7\_30}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/KarvelasK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cans/2014, editor = {Dimitris Gritzalis and Aggelos Kiayias and Ioannis G. Askoxylakis}, title = {Cryptology and Network Security - 13th International Conference, {CANS} 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8813}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12280-9}, doi = {10.1007/978-3-319-12280-9}, isbn = {978-3-319-12279-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarayGJKY14, author = {Juan A. Garay and Ran Gelles and David S. Johnson and Aggelos Kiayias and Moti Yung}, title = {A Little Honesty Goes a Long Way: The Two-Tier Model for Secure Multiparty Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {209}, year = {2014}, url = {http://eprint.iacr.org/2014/209}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GarayGJKY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JareckiKK14a, author = {Stanislaw Jarecki and Aggelos Kiayias and Hugo Krawczyk}, title = {Round-Optimal Password-Protected Secret Sharing and {T-PAKE} in the Password-Only Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {650}, year = {2014}, url = {http://eprint.iacr.org/2014/650}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JareckiKK14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarayKL14, author = {Juan A. Garay and Aggelos Kiayias and Nikos Leonardos}, title = {The Bitcoin Backbone Protocol: Analysis and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {765}, year = {2014}, url = {http://eprint.iacr.org/2014/765}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GarayKL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasLLPT14, author = {Aggelos Kiayias and Nikos Leonardos and Helger Lipmaa and Kateryna Pavlyk and Qiang Tang}, title = {Near Optimal Rate Homomorphic Encryption for Branching Programs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {851}, year = {2014}, url = {http://eprint.iacr.org/2014/851}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasLLPT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/KentrosK13, author = {Sotiris Kentros and Aggelos Kiayias}, title = {Solving the at-most-once problem with nearly optimal effectiveness}, journal = {Theor. Comput. Sci.}, volume = {496}, pages = {69--88}, year = {2013}, url = {https://doi.org/10.1016/j.tcs.2013.04.017}, doi = {10.1016/J.TCS.2013.04.017}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/KentrosK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KiayiasT13, author = {Aggelos Kiayias and Yiannis Tselekounis}, editor = {Kazue Sako and Palash Sarkar}, title = {Tamper Resilient Circuits: The Adversary at the Gates}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8270}, pages = {161--180}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42045-0\_9}, doi = {10.1007/978-3-642-42045-0\_9}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KiayiasT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/ChronopoulosGK13, author = {Konstantinos Chronopoulos and Maria Gouseti and Aggelos Kiayias}, editor = {Michel Abdalla and Cristina Nita{-}Rotaru and Ricardo Dahab}, title = {Resource Access Control in the Facebook Model}, booktitle = {Cryptology and Network Security - 12th International Conference, {CANS} 2013, Paraty, Brazil, November 20-22. 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8257}, pages = {179--198}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-02937-5\_10}, doi = {10.1007/978-3-319-02937-5\_10}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/ChronopoulosGK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KiayiasPTZ13, author = {Aggelos Kiayias and Stavros Papadopoulos and Nikos Triandopoulos and Thomas Zacharias}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Delegatable pseudorandom functions and applications}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {669--684}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516668}, doi = {10.1145/2508859.2516668}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KiayiasPTZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KiayiasT13, author = {Aggelos Kiayias and Qiang Tang}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {How to keep a secret: leakage deterring public-key cryptosystems}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {943--954}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516691}, doi = {10.1145/2508859.2516691}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KiayiasT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edemocracy/ChondrosDGKKNPRSSVZZZ13, author = {Nikos Chondros and Alex Delis and Dina Gavatha and Aggelos Kiayias and Charalampos Koutalakis and Ilias Nicolacopoulos and Lampros Paschos and Mema Roussopoulos and Giorge Sotirelis and Panos Stathopoulos and Pavlos Vasilopoulos and Thomas Zacharias and Bingsheng Zhang and Fotis Zygoulis}, editor = {Alexander B. Sideridis and Zoe Kardasiadou and Constantine P. Yialouris and Vasilios Zorkadis}, title = {Electronic Voting Systems - From Theory to Implementation}, booktitle = {E-Democracy, Security, Privacy and Trust in a Digital World - 5th International Conference, E-Democracy 2013, Athens, Greece, December 5-6, 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {441}, pages = {113--122}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-11710-2\_11}, doi = {10.1007/978-3-319-11710-2\_11}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edemocracy/ChondrosDGKKNPRSSVZZZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/GarayJKY13, author = {Juan A. Garay and David S. Johnson and Aggelos Kiayias and Moti Yung}, editor = {Robert D. Kleinberg}, title = {Resource-based corruptions and the combinatorics of hidden diversity}, booktitle = {Innovations in Theoretical Computer Science, {ITCS} '13, Berkeley, CA, USA, January 9-12, 2013}, pages = {415--428}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2422436.2422482}, doi = {10.1145/2422436.2422482}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/innovations/GarayJKY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/LengyelNMK13, author = {Tamas K. Lengyel and Justin Neumann and Steve Maresca and Aggelos Kiayias}, editor = {Javier L{\'{o}}pez and Xinyi Huang and Ravi S. Sandhu}, title = {Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning}, booktitle = {Network and System Security - 7th International Conference, {NSS} 2013, Madrid, Spain, June 3-4, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7873}, pages = {164--177}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38631-2\_13}, doi = {10.1007/978-3-642-38631-2\_13}, timestamp = {Tue, 09 Feb 2021 08:50:29 +0100}, biburl = {https://dblp.org/rec/conf/nss/LengyelNMK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/JancewiczKMRS13, author = {Russell J. Jancewicz and Aggelos Kiayias and Laurent D. Michel and Alexander Russell and Alexander A. Shvartsman}, editor = {Sung Y. Shin and Jos{\'{e}} Carlos Maldonado}, title = {Malicious takeover of voting systems: arbitrary code execution on optical scan voting terminals}, booktitle = {Proceedings of the 28th Annual {ACM} Symposium on Applied Computing, {SAC} '13, Coimbra, Portugal, March 18-22, 2013}, pages = {1816--1823}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2480362.2480702}, doi = {10.1145/2480362.2480702}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/JancewiczKMRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/KiayiasO13, author = {Aggelos Kiayias and Anthi Orfanou}, editor = {James Heather and Steve A. Schneider and Vanessa Teague}, title = {Scaling Privacy Guarantees in Code-Verification Elections}, booktitle = {E-Voting and Identify - 4th International Conference, VoteID 2013, Guildford, UK, July 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7985}, pages = {1--24}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39185-9\_1}, doi = {10.1007/978-3-642-39185-9\_1}, timestamp = {Thu, 27 Feb 2020 13:11:16 +0100}, biburl = {https://dblp.org/rec/conf/voteid/KiayiasO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/EdmanKTY13, author = {Matthew Edman and Aggelos Kiayias and Qiang Tang and B{\"{u}}lent Yener}, title = {On the Security of Key Extraction from Measuring Physical Quantities}, journal = {CoRR}, volume = {abs/1311.4591}, year = {2013}, url = {http://arxiv.org/abs/1311.4591}, eprinttype = {arXiv}, eprint = {1311.4591}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/EdmanKTY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasPTZ13, author = {Aggelos Kiayias and Stavros Papadopoulos and Nikos Triandopoulos and Thomas Zacharias}, title = {Delegatable Pseudorandom Functions and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {379}, year = {2013}, url = {http://eprint.iacr.org/2013/379}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasPTZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasT13, author = {Aggelos Kiayias and Yiannis Tselekounis}, title = {Tamper Resilient Circuits: The Adversary at the Gates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {797}, year = {2013}, url = {http://eprint.iacr.org/2013/797}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasT13a, author = {Aggelos Kiayias and Qiang Tang}, title = {How to Keep a Secret: Leakage Deterring Public-key Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {845}, year = {2013}, url = {http://eprint.iacr.org/2013/845}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasT13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/PapadopoulosKP12, author = {Stavros Papadopoulos and Aggelos Kiayias and Dimitris Papadias}, title = {Exact In-Network Aggregation with Integrity and Confidentiality}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {24}, number = {10}, pages = {1760--1773}, year = {2012}, url = {https://doi.org/10.1109/TKDE.2012.64}, doi = {10.1109/TKDE.2012.64}, timestamp = {Tue, 02 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tkde/PapadopoulosKP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcn/KentrosK12, author = {Sotiris Kentros and Aggelos Kiayias}, editor = {Luciano Bononi and Ajoy Kumar Datta and St{\'{e}}phane Devismes and Archan Misra}, title = {Solving the At-Most-Once Problem with Nearly Optimal Effectiveness}, booktitle = {Distributed Computing and Networking - 13th International Conference, {ICDCN} 2012, Hong Kong, China, January 3-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7129}, pages = {122--137}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-25959-3\_9}, doi = {10.1007/978-3-642-25959-3\_9}, timestamp = {Mon, 26 Jun 2023 20:44:19 +0200}, biburl = {https://dblp.org/rec/conf/icdcn/KentrosK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/KiayiasRS12, author = {Aggelos Kiayias and Alexander Russell and Narasimha K. Shashidhar}, editor = {Matthias Kirchner and Dipak Ghosal}, title = {Key-Efficient Steganography}, booktitle = {Information Hiding - 14th International Conference, {IH} 2012, Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7692}, pages = {142--159}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-36373-3\_10}, doi = {10.1007/978-3-642-36373-3\_10}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/KiayiasRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/KiayiasS12, author = {Aggelos Kiayias and Katerina Samari}, editor = {Matthias Kirchner and Dipak Ghosal}, title = {Lower Bounds for Private Broadcast Encryption}, booktitle = {Information Hiding - 14th International Conference, {IH} 2012, Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7692}, pages = {176--190}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-36373-3\_12}, doi = {10.1007/978-3-642-36373-3\_12}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/KiayiasS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/DavtyanKMRS12, author = {Seda Davtyan and Aggelos Kiayias and Laurent Michel and Alexander Russell and Alexander A. Shvartsman}, editor = {Sascha Ossowski and Paola Lecca}, title = {Integrity of electronic voting systems: fallacious use of cryptography}, booktitle = {Proceedings of the {ACM} Symposium on Applied Computing, {SAC} 2012, Riva, Trento, Italy, March 26-30, 2012}, pages = {1486--1493}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2245276.2232013}, doi = {10.1145/2245276.2232013}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/DavtyanKMRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ArgyrosK12, author = {George Argyros and Aggelos Kiayias}, editor = {Tadayoshi Kohno}, title = {I Forgot Your Password: Randomness Attacks Against {PHP} Applications}, booktitle = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA, USA, August 8-10, 2012}, pages = {81--96}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/argyros}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/ArgyrosK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LengyelNMPK12, author = {Tamas K. Lengyel and Justin Neumann and Steve Maresca and Bryan D. Payne and Aggelos Kiayias}, editor = {Sean Peisert and Stephen Schwab}, title = {Virtual Machine Introspection in a Hybrid Honeypot Architecture}, booktitle = {5th Workshop on Cyber Security Experimentation and Test, {CSET} '12, Bellevue, WA, USA, August 6, 2012}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/cset12/workshop-program/presentation/lengyel}, timestamp = {Mon, 01 Feb 2021 08:43:04 +0100}, biburl = {https://dblp.org/rec/conf/uss/LengyelNMPK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wdag/KentrosKK12, author = {Sotiris Kentros and Chadi Kari and Aggelos Kiayias}, editor = {Marcos K. Aguilera}, title = {The Strong At-Most-Once Problem}, booktitle = {Distributed Computing - 26th International Symposium, {DISC} 2012, Salvador, Brazil, October 16-18, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7611}, pages = {386--400}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33651-5\_27}, doi = {10.1007/978-3-642-33651-5\_27}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/wdag/KentrosKK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/voteid/2011, editor = {Aggelos Kiayias and Helger Lipmaa}, title = {E-Voting and Identity - Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7187}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32747-6}, doi = {10.1007/978-3-642-32747-6}, isbn = {978-3-642-32746-9}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/voteid/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AkKPS12, author = {Murat Ak and Aggelos Kiayias and Serdar Pehlivanoglu and Ali Aydin Sel{\c{c}}uk}, title = {Generic Construction of Trace and Revoke Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {531}, year = {2012}, url = {http://eprint.iacr.org/2012/531}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AkKPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarayJKY12, author = {Juan A. Garay and David S. Johnson and Aggelos Kiayias and Moti Yung}, title = {Resource-based Corruptions and the Combinatorics of Hidden Diversity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {556}, year = {2012}, url = {http://eprint.iacr.org/2012/556}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GarayJKY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ChoiKM11, author = {Seung Geol Choi and Aggelos Kiayias and Tal Malkin}, editor = {Dong Hoon Lee and Xiaoyun Wang}, title = {BiTR: Built-in Tamper Resilience}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7073}, pages = {740--758}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25385-0\_40}, doi = {10.1007/978-3-642-25385-0\_40}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/ChoiKM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codcry/Kiayias11, author = {Aggelos Kiayias}, editor = {Yeow Meng Chee and Zhenbo Guo and San Ling and Fengjing Shao and Yuansheng Tang and Huaxiong Wang and Chaoping Xing}, title = {On the Effects of Pirate Evolution on the Design of Digital Content Distribution Systems}, booktitle = {Coding and Cryptology - Third International Workshop, {IWCC} 2011, Qingdao, China, May 30-June 3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6639}, pages = {223--237}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20901-7\_14}, doi = {10.1007/978-3-642-20901-7\_14}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/codcry/Kiayias11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosec/EdmanKY11, author = {Matthew Edman and Aggelos Kiayias and B{\"{u}}lent Yener}, editor = {Engin Kirda and Steven Hand}, title = {On passive inference attacks against physical-layer key extraction?}, booktitle = {Proceedings of the Fourth European Workshop on System Security, EUROSEC'11, April 10, 2011, Salzburg, Austria}, pages = {8}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1972551.1972559}, doi = {10.1145/1972551.1972559}, timestamp = {Tue, 20 Dec 2022 17:33:10 +0100}, biburl = {https://dblp.org/rec/conf/eurosec/EdmanKY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/PapadopoulosKP11, author = {Stavros Papadopoulos and Aggelos Kiayias and Dimitris Papadias}, editor = {Serge Abiteboul and Klemens B{\"{o}}hm and Christoph Koch and Kian{-}Lee Tan}, title = {Secure and efficient in-network processing of exact {SUM} queries}, booktitle = {Proceedings of the 27th International Conference on Data Engineering, {ICDE} 2011, April 11-16, 2011, Hannover, Germany}, pages = {517--528}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ICDE.2011.5767886}, doi = {10.1109/ICDE.2011.5767886}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icde/PapadopoulosKP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/KiayiasP11, author = {Aggelos Kiayias and Serdar Pehlivanoglu}, editor = {Xuejia Lai and Jianying Zhou and Hui Li}, title = {Attacking Traitor Tracing Schemes Using History Recording and Abrupt Decoders}, booktitle = {Information Security, 14th International Conference, {ISC} 2011, Xi'an, China, October 26-29, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7001}, pages = {17--31}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24861-0\_2}, doi = {10.1007/978-3-642-24861-0\_2}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/KiayiasP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/KentrosK11, author = {Sotiris Kentros and Aggelos Kiayias}, editor = {Cyril Gavoille and Pierre Fraigniaud}, title = {Solving the at-most-once problem with nearly optimal effectiveness}, booktitle = {Proceedings of the 30th Annual {ACM} Symposium on Principles of Distributed Computing, {PODC} 2011, San Jose, CA, USA, June 6-8, 2011}, pages = {229--230}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1993806.1993847}, doi = {10.1145/1993806.1993847}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/KentrosK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ctrsa/2011, editor = {Aggelos Kiayias}, title = {Topics in Cryptology - {CT-RSA} 2011 - The Cryptographers' Track at the {RSA} Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6558}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19074-2}, doi = {10.1007/978-3-642-19074-2}, isbn = {978-3-642-19073-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/KiayiasY11, author = {Aggelos Kiayias and B{\"{u}}lent Yener}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Key Generation Using Physical Properties of Wireless Communication}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {682--683}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_55}, doi = {10.1007/978-1-4419-5906-5\_55}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/KiayiasY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1107-2990, author = {Sotiris Kentros and Aggelos Kiayias}, title = {Solving the At-Most-Once Problem with Nearly Optimal Effectiveness}, journal = {CoRR}, volume = {abs/1107.2990}, year = {2011}, url = {http://arxiv.org/abs/1107.2990}, eprinttype = {arXiv}, eprint = {1107.2990}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1107-2990.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/KiayiasP10, author = {Aggelos Kiayias and Serdar Pehlivanoglu}, title = {Encryption for Digital Content}, series = {Advances in Information Security}, volume = {52}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-0044-9}, doi = {10.1007/978-1-4419-0044-9}, isbn = {978-1-4419-0043-2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/KiayiasP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/KiayiasP10, author = {Aggelos Kiayias and Serdar Pehlivanoglu}, editor = {Jianying Zhou and Moti Yung}, title = {Improving the Round Complexity of Traitor Tracing Schemes}, booktitle = {Applied Cryptography and Network Security, 8th International Conference, {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6123}, pages = {273--290}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13708-2\_17}, doi = {10.1007/978-3-642-13708-2\_17}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/KiayiasP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/GarayKZ10, author = {Juan A. Garay and Aggelos Kiayias and Hong{-}Sheng Zhou}, title = {A Framework for the Sound Specification of Cryptographic Tasks}, booktitle = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium, {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010}, pages = {277--289}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CSF.2010.26}, doi = {10.1109/CSF.2010.26}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/GarayKZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/BonehKM10, author = {Dan Boneh and Aggelos Kiayias and Hart William Montgomery}, editor = {Ehab Al{-}Shaer and Hongxia Jin and Marc Joye}, title = {Robust fingerprinting codes: a near optimal construction}, booktitle = {Proceedings of the 10th {ACM} Workshop on Digital Rights Management, Chicago, Illinois, USA, October 4, 2010}, pages = {3--12}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866870.1866873}, doi = {10.1145/1866870.1866873}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/BonehKM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KiayiasS10, author = {Aggelos Kiayias and Kazue Sako}, editor = {Radu Sion and Reza Curtmola and Sven Dietrich and Aggelos Kiayias and Josep M. Miret and Kazue Sako and Francesc Seb{\'{e}}}, title = {{RLCPS} Preface}, booktitle = {Financial Cryptography and Data Security, {FC} 2010 Workshops, RLCPS, WECSR, and {WLC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6054}, pages = {105}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14992-4\_10}, doi = {10.1007/978-3-642-14992-4\_10}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/KiayiasS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KiayiasY10, author = {Aggelos Kiayias and Moti Yung}, editor = {Radu Sion}, title = {Tree-Homomorphic Encryption and Scalable Hierarchical Secret-Ballot Elections}, booktitle = {Financial Cryptography and Data Security, 14th International Conference, {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6052}, pages = {257--271}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14577-3\_20}, doi = {10.1007/978-3-642-14577-3\_20}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/KiayiasY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GrothKL10, author = {Jens Groth and Aggelos Kiayias and Helger Lipmaa}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Multi-query Computationally-Private Information Retrieval with Constant Communication Rate}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {107--123}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_7}, doi = {10.1007/978-3-642-13013-7\_7}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GrothKL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wote/KiayiasY10, author = {Aggelos Kiayias and Moti Yung}, editor = {David Chaum and Markus Jakobsson and Ronald L. Rivest and Peter Y. A. Ryan and Josh Benaloh and Miroslaw Kutylowski and Ben Adida}, title = {The Vector-Ballot Approach for Online Voting Procedures}, booktitle = {Towards Trustworthy Elections, New Directions in Electronic Voting}, series = {Lecture Notes in Computer Science}, volume = {6000}, pages = {155--174}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12980-3\_9}, doi = {10.1007/978-3-642-12980-3\_9}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/wote/KiayiasY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2010w, editor = {Radu Sion and Reza Curtmola and Sven Dietrich and Aggelos Kiayias and Josep M. Miret and Kazue Sako and Francesc Seb{\'{e}}}, title = {Financial Cryptography and Data Security, {FC} 2010 Workshops, RLCPS, WECSR, and {WLC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6054}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14992-4}, doi = {10.1007/978-3-642-14992-4}, isbn = {978-3-642-14991-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2010w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Kiayias10, author = {Aggelos Kiayias}, editor = {Burton Rosenberg}, title = {Electronic Voting}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {59--81}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823-c3}, doi = {10.1201/9781420059823-C3}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/Kiayias10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoiKM10, author = {Seung Geol Choi and Aggelos Kiayias and Tal Malkin}, title = {BiTR: Built-in Tamper Resilience}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {503}, year = {2010}, url = {http://eprint.iacr.org/2010/503}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoiKM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/KiayiasZ09, author = {Aggelos Kiayias and Hong{-}Sheng Zhou}, title = {Hidden identity-based signatures}, journal = {{IET} Inf. Secur.}, volume = {3}, number = {3}, pages = {119--127}, year = {2009}, url = {https://doi.org/10.1049/iet-ifs.2007.0151}, doi = {10.1049/IET-IFS.2007.0151}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/KiayiasZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AntonyanDKKMNRS09, author = {Tigran Antonyan and Seda Davtyan and Sotiris Kentros and Aggelos Kiayias and Laurent Michel and Nicolas C. Nicolaou and Alexander Russell and Alexander A. Shvartsman}, title = {State-wide elections, optical scan voting systems, and the pursuit of integrity}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {597--610}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2033232}, doi = {10.1109/TIFS.2009.2033232}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AntonyanDKKMNRS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/KiayiasP09, author = {Aggelos Kiayias and Serdar Pehlivanoglu}, editor = {Michel Abdalla and David Pointcheval and Pierre{-}Alain Fouque and Damien Vergnaud}, title = {Tracing and Revoking Pirate Rebroadcasts}, booktitle = {Applied Cryptography and Network Security, 7th International Conference, {ACNS} 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5536}, pages = {253--271}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01957-9\_16}, doi = {10.1007/978-3-642-01957-9\_16}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/KiayiasP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/KiayiasP09, author = {Aggelos Kiayias and Serdar Pehlivanoglu}, editor = {Ehab Al{-}Shaer and Hongxia Jin and Gregory L. Heileman}, title = {On the security of a public-key traitor tracing scheme with sublinear ciphertext size}, booktitle = {Proceedings of the 9th {ACM} Workshop on Digital Rights Management, Chicago, Illinois, USA, November 9, 2009}, pages = {1--10}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655048.1655050}, doi = {10.1145/1655048.1655050}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/KiayiasP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CamenischKY09, author = {Jan Camenisch and Aggelos Kiayias and Moti Yung}, editor = {Antoine Joux}, title = {On the Portability of Generalized Schnorr Proofs}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5479}, pages = {425--442}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01001-9\_25}, doi = {10.1007/978-3-642-01001-9\_25}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CamenischKY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KiayiasYY09, author = {Aggelos Kiayias and B{\"{u}}lent Yener and Moti Yung}, editor = {Roger Dingledine and Philippe Golle}, title = {Privacy-Preserving Information Markets for Computing Statistical Data}, booktitle = {Financial Cryptography and Data Security, 13th International Conference, {FC} 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5628}, pages = {32--50}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03549-4\_3}, doi = {10.1007/978-3-642-03549-4\_3}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/KiayiasYY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/IbrahimKYZ09, author = {Maged H. Ibrahim and Aggelos Kiayias and Moti Yung and Hong{-}Sheng Zhou}, editor = {Susanne Albers and Alberto Marchetti{-}Spaccamela and Yossi Matias and Sotiris E. Nikoletseas and Wolfgang Thomas}, title = {Secure Function Collection with Sublinear Storage}, booktitle = {Automata, Languages and Programming, 36th Internatilonal Colloquium, {ICALP} 2009, Rhodes, Greece, July 5-12, 2009, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {5556}, pages = {534--545}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02930-1\_44}, doi = {10.1007/978-3-642-02930-1\_44}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/IbrahimKYZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mediaforensics/Kiayias09, author = {Aggelos Kiayias}, editor = {Edward J. Delp and Jana Dittmann and Nasir D. Memon and Ping Wah Wong}, title = {Robust fingerprinting codes and applications}, booktitle = {Media Forensics and Security I, part of the IS{\&}T-SPIE Electronic Imaging Symposium, San Jose, CA, USA, January 19-21, 2009, Proceedings}, series = {{SPIE} Proceedings}, volume = {7254}, pages = {72540N}, publisher = {{SPIE}}, year = {2009}, url = {https://doi.org/10.1117/12.810749}, doi = {10.1117/12.810749}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mediaforensics/Kiayias09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KiayiasZ09, author = {Aggelos Kiayias and Hong{-}Sheng Zhou}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Zero-Knowledge Proofs with Witness Elimination}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {124--138}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_8}, doi = {10.1007/978-3-642-00468-1\_8}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KiayiasZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/DavtyanKKMNRSSS09, author = {Seda Davtyan and Sotiris Kentros and Aggelos Kiayias and Laurent D. Michel and Nicolas C. Nicolaou and Alexander Russell and Andrew See and Narasimha K. Shashidhar and Alexander A. Shvartsman}, editor = {Sung Y. Shin and Sascha Ossowski}, title = {Taking total control of voting systems: firmware manipulations on an optical scan voting terminal}, booktitle = {Proceedings of the 2009 {ACM} Symposium on Applied Computing (SAC), Honolulu, Hawaii, USA, March 9-12, 2009}, pages = {2049--2053}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1529282.1529736}, doi = {10.1145/1529282.1529736}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/DavtyanKKMNRSSS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spaa/KentrosKNS09, author = {Sotiris Kentros and Aggelos Kiayias and Nicolas C. Nicolaou and Alexander A. Shvartsman}, editor = {Friedhelm Meyer auf der Heide and Michael A. Bender}, title = {At-most-once semantics in asynchronous shared memory}, booktitle = {{SPAA} 2009: Proceedings of the 21st Annual {ACM} Symposium on Parallelism in Algorithms and Architectures, Calgary, Alberta, Canada, August 11-13, 2009}, pages = {43--44}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1583991.1584003}, doi = {10.1145/1583991.1584003}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spaa/KentrosKNS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AntonyanDKKMNRS09, author = {Tigran Antonyan and Seda Davtyan and Sotiris Kentros and Aggelos Kiayias and Laurent Michel and Nicolas C. Nicolaou and Alexander Russell and Alexander A. Shvartsman}, editor = {David Jefferson and Joseph Lorenzo Hall and Tal Moran}, title = {Automating Voting Terminal Event Log Analysis}, booktitle = {2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, {EVT/WOTE} '09, Montreal, Canada, August 10-11, 2009}, publisher = {{USENIX} Association}, year = {2009}, url = {https://www.usenix.org/conference/evtwote-09/automating-voting-terminal-event-log-analysis}, timestamp = {Mon, 01 Feb 2021 08:43:14 +0100}, biburl = {https://dblp.org/rec/conf/uss/AntonyanDKKMNRS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wdag/KentrosKNS09, author = {Sotiris Kentros and Aggelos Kiayias and Nicolas C. Nicolaou and Alexander A. Shvartsman}, editor = {Idit Keidar}, title = {At-Most-Once Semantics in Asynchronous Shared Memory}, booktitle = {Distributed Computing, 23rd International Symposium, {DISC} 2009, Elche, Spain, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5805}, pages = {258--273}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04355-0\_27}, doi = {10.1007/978-3-642-04355-0\_27}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wdag/KentrosKNS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0909-3658, author = {Aggelos Kiayias and Yona Raekow and Alexander Russell and Narasimha K. Shashidhar}, title = {Efficient Steganography with Provable Security Guarantees}, journal = {CoRR}, volume = {abs/0909.3658}, year = {2009}, url = {http://arxiv.org/abs/0909.3658}, eprinttype = {arXiv}, eprint = {0909.3658}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-0909-3658.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0909-4575, author = {Aggelos Kiayias and Alexander Russell and Narasimha K. Shashidhar}, title = {Randomness-optimal Steganography}, journal = {CoRR}, volume = {abs/0909.4575}, year = {2009}, url = {http://arxiv.org/abs/0909.4575}, eprinttype = {arXiv}, eprint = {0909.4575}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-0909-4575.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CamenischKY09, author = {Jan Camenisch and Aggelos Kiayias and Moti Yung}, title = {On the Portability of Generalized Schnorr Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {50}, year = {2009}, url = {http://eprint.iacr.org/2009/050}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CamenischKY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/KiayiasY08, author = {Aggelos Kiayias and Moti Yung}, title = {Cryptographic Hardness Based on the Decoding of Reed-Solomon Codes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {54}, number = {6}, pages = {2752--2769}, year = {2008}, url = {https://doi.org/10.1109/TIT.2008.921876}, doi = {10.1109/TIT.2008.921876}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/KiayiasY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/KiayiasY08, author = {Aggelos Kiayias and Moti Yung}, editor = {Gregory L. Heileman and Marc Joye}, title = {Public-key traitor tracing from efficient decoding and unbounded enrollment: extended abstract}, booktitle = {Proceedings of the 8th {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 27, 2008}, pages = {9--18}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456520.1456525}, doi = {10.1145/1456520.1456525}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/KiayiasY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/KiayiasXY08, author = {Aggelos Kiayias and Shouhuai Xu and Moti Yung}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {Privacy Preserving Data Mining within Anonymous Credential Systems}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {57--76}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_5}, doi = {10.1007/978-3-540-85855-3\_5}, timestamp = {Tue, 25 Feb 2020 11:33:46 +0100}, biburl = {https://dblp.org/rec/conf/scn/KiayiasXY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/KiayiasZ08, author = {Aggelos Kiayias and Hong{-}Sheng Zhou}, editor = {Ran Canetti}, title = {Equivocal Blind Signatures and Adaptive UC-Security}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {340--355}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_19}, doi = {10.1007/978-3-540-78524-8\_19}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/KiayiasZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/DavtyanKKMNRSSS08, author = {Seda Davtyan and Sotiris Kentros and Aggelos Kiayias and Laurent Michel and Nicolas C. Nicolaou and Alexander Russell and Andrew See and Narasimha K. Shashidhar and Alexander A. Shvartsman}, editor = {David L. Dill and Tadayoshi Kohno}, title = {Pre-Election Testing and Post-Election Audit of Optical Scan Voting Terminal Memory Cards}, booktitle = {2008 {USENIX/ACCURATE} Electronic Voting Workshop, {EVT} 2008, July 28-29, 2008, San Jose, CA, USA, Proceedings}, publisher = {{USENIX} Association}, year = {2008}, url = {http://www.usenix.org/events/evt08/tech/full\_papers/davtyan/davtyan.pdf}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/DavtyanKKMNRSSS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/GarayKZ08, author = {Juan A. Garay and Aggelos Kiayias and Hong{-}Sheng Zhou}, editor = {Ran Canetti and Shafi Goldwasser and G{\"{u}}nter M{\"{u}}ller and Rainer Steinwandt}, title = {Sound and Fine-grain Specification of Ideal Functionalities}, booktitle = {Theoretical Foundations of Practical Information Security, 30.11. - 05.12.2008}, series = {Dagstuhl Seminar Proceedings}, volume = {08491}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2008}, url = {http://drops.dagstuhl.de/opus/volltexte/2009/1891/}, timestamp = {Thu, 10 Jun 2021 13:02:08 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/GarayKZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarayKZ08, author = {Juan A. Garay and Aggelos Kiayias and Hong{-}Sheng Zhou}, title = {A Framework for the Sound Specification of Cryptographic Tasks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {132}, year = {2008}, url = {http://eprint.iacr.org/2008/132}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GarayKZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KiayiasY07, author = {Aggelos Kiayias and Moti Yung}, title = {Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice}, journal = {Des. Codes Cryptogr.}, volume = {43}, number = {2-3}, pages = {61--78}, year = {2007}, url = {https://doi.org/10.1007/s10623-007-9055-8}, doi = {10.1007/S10623-007-9055-8}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KiayiasY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/BleichenbacherKY07, author = {Daniel Bleichenbacher and Aggelos Kiayias and Moti Yung}, title = {Decoding interleaved Reed-Solomon codes over noisy channels}, journal = {Theor. Comput. Sci.}, volume = {379}, number = {3}, pages = {348--360}, year = {2007}, url = {https://doi.org/10.1016/j.tcs.2007.02.043}, doi = {10.1016/J.TCS.2007.02.043}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/BleichenbacherKY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KiayiasMRSSSD07, author = {Aggelos Kiayias and Laurent Michel and Alexander Russell and Narasimha K. Shashidhar and Andrew See and Alexander A. Shvartsman and Seda Davtyan}, title = {Tampering with Special Purpose Trusted Computing Devices: {A} Case Study in Optical Scan E-Voting}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {30--39}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.16}, doi = {10.1109/ACSAC.2007.16}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KiayiasMRSSSD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KiayiasTY07, author = {Aggelos Kiayias and Yiannis Tsiounis and Moti Yung}, editor = {Kaoru Kurosawa}, title = {Group Encryption}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4833}, pages = {181--199}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76900-2\_11}, doi = {10.1007/978-3-540-76900-2\_11}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KiayiasTY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Azimi-SadjadiKMY07, author = {Babak Azimi{-}Sadjadi and Aggelos Kiayias and Alejandra Mercado and B{\"{u}}lent Yener}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Robust key generation from signal envelopes in wireless networks}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {401--410}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315295}, doi = {10.1145/1315245.1315295}, timestamp = {Tue, 10 Nov 2020 20:00:14 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Azimi-SadjadiKMY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KiayiasP07, author = {Aggelos Kiayias and Serdar Pehlivanoglu}, editor = {Alfred Menezes}, title = {Pirate Evolution: How to Make the Most of Your Traitor Keys}, booktitle = {Advances in Cryptology - {CRYPTO} 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4622}, pages = {448--465}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74143-5\_25}, doi = {10.1007/978-3-540-74143-5\_25}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KiayiasP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KiayiasZ07, author = {Aggelos Kiayias and Hong{-}Sheng Zhou}, editor = {Sven Dietrich and Rachna Dhamija}, title = {Hidden Identity-Based Signatures}, booktitle = {Financial Cryptography and Data Security, 11th International Conference, {FC} 2007, and 1st International Workshop on Usable Security, {USEC} 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4886}, pages = {134--147}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77366-5\_14}, doi = {10.1007/978-3-540-77366-5\_14}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/KiayiasZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/KiayiasZ07, author = {Aggelos Kiayias and Hong{-}Sheng Zhou}, editor = {Lars Arge and Christian Cachin and Tomasz Jurdzinski and Andrzej Tarlecki}, title = {Trading Static for Adaptive Security in Universally Composable Zero-Knowledge}, booktitle = {Automata, Languages and Programming, 34th International Colloquium, {ICALP} 2007, Wroclaw, Poland, July 9-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4596}, pages = {316--327}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73420-8\_29}, doi = {10.1007/978-3-540-73420-8\_29}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icalp/KiayiasZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KiayiasMRSSS07, author = {Aggelos Kiayias and Laurent Michel and Alexander Russell and Narasimha Sashidar and Andrew See and Alexander A. Shvartsman}, editor = {Ray Martinez and David A. Wagner}, title = {An Authentication and Ballot Layout Attack Against an Optical Scan Voting Terminal}, booktitle = {2007 {USENIX/ACCURATE} Electronic Voting Technology Workshop, EVT'07, Boston, MA, USA, August 6, 2007}, publisher = {{USENIX} Association}, year = {2007}, url = {https://www.usenix.org/conference/evt-07/authentication-and-ballot-layout-attack-against-optical-scan-voting-terminal}, timestamp = {Mon, 01 Feb 2021 08:42:55 +0100}, biburl = {https://dblp.org/rec/conf/uss/KiayiasMRSSS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/drm/2007, editor = {Moti Yung and Aggelos Kiayias and Ahmad{-}Reza Sadeghi}, title = {Proceedings of the Seventh {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 29, 2007}, publisher = {{ACM}}, year = {2007}, isbn = {978-1-59593-884-8}, timestamp = {Thu, 17 Jan 2008 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasTY07, author = {Aggelos Kiayias and Yiannis Tsiounis and Moti Yung}, title = {Group Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {15}, year = {2007}, url = {http://eprint.iacr.org/2007/015}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasTY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasZ07, author = {Aggelos Kiayias and Hong{-}Sheng Zhou}, title = {Equivocal Blind Signatures and Adaptive UC-Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {132}, year = {2007}, url = {http://eprint.iacr.org/2007/132}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasZ07a, author = {Aggelos Kiayias and Hong{-}Sheng Zhou}, title = {Hidden Identity-Based Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {140}, year = {2007}, url = {http://eprint.iacr.org/2007/140}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasZ07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasY07, author = {Aggelos Kiayias and Moti Yung}, title = {Cryptographic Hardness based on the Decoding of Reed-Solomon Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {153}, year = {2007}, url = {http://eprint.iacr.org/2007/153}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/KiayiasY06, author = {Aggelos Kiayias and Moti Yung}, title = {Secure scalable group signature with dynamic joins and separable authorities}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {1/2}, pages = {24--45}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.010821}, doi = {10.1504/IJSN.2006.010821}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/KiayiasY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/KiayiasM06, author = {Aggelos Kiayias and Antonina Mitrofanova}, editor = {Jianying Zhou and Moti Yung and Feng Bao}, title = {Syntax-Driven Private Evaluation of Quantified Membership Queries}, booktitle = {Applied Cryptography and Network Security, 4th International Conference, {ACNS} 2006, Singapore, June 6-9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3989}, pages = {470--485}, year = {2006}, url = {https://doi.org/10.1007/11767480\_33}, doi = {10.1007/11767480\_33}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/KiayiasM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KiayiasKW06, author = {Aggelos Kiayias and Michael Korman and David Walluck}, title = {An Internet Voting System Supporting User Privacy}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {165--174}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.12}, doi = {10.1109/ACSAC.2006.12}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KiayiasKW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KiayiasY06, author = {Aggelos Kiayias and Moti Yung}, editor = {Giovanni Di Crescenzo and Aviel D. Rubin}, title = {Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination}, booktitle = {Financial Cryptography and Data Security, 10th International Conference, {FC} 2006, Anguilla, British West Indies, February 27-March 2, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4107}, pages = {311--325}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11889663\_25}, doi = {10.1007/11889663\_25}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/KiayiasY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/KiayiasZ06, author = {Aggelos Kiayias and Hong{-}Sheng Zhou}, editor = {Roberto De Prisco and Moti Yung}, title = {Concurrent Blind Signatures Without Random Oracles}, booktitle = {Security and Cryptography for Networks, 5th International Conference, {SCN} 2006, Maiori, Italy, September 6-8, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4116}, pages = {49--62}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11832072\_4}, doi = {10.1007/11832072\_4}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scn/KiayiasZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2006, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853}, doi = {10.1007/11745853}, isbn = {3-540-33851-9}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasY06, author = {Aggelos Kiayias and Moti Yung}, title = {Copyrighting Public-key Functions and Applications to Black-box Traitor Tracing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {458}, year = {2006}, url = {http://eprint.iacr.org/2006/458}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dc/DodisFKY05, author = {Yevgeniy Dodis and Nelly Fazio and Aggelos Kiayias and Moti Yung}, title = {Scalable public-key tracing and revoking}, journal = {Distributed Comput.}, volume = {17}, number = {4}, pages = {323--347}, year = {2005}, url = {https://doi.org/10.1007/s00446-004-0120-5}, doi = {10.1007/S00446-004-0120-5}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dc/DodisFKY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KiayiasY05, author = {Aggelos Kiayias and Moti Yung}, editor = {Ronald Cramer}, title = {Group Signatures with Efficient Concurrent Join}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {198--214}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_12}, doi = {10.1007/11426639\_12}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KiayiasY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KiayiasM05, author = {Aggelos Kiayias and Antonina Mitrofanova}, editor = {Andrew S. Patrick and Moti Yung}, title = {Testing Disjointness of Private Datasets}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {109--124}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_13}, doi = {10.1007/11507840\_13}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/KiayiasM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/CrescenzoK05, author = {Giovanni Di Crescenzo and Aggelos Kiayias}, editor = {Lu{\'{\i}}s Caires and Giuseppe F. Italiano and Lu{\'{\i}}s Monteiro and Catuscia Palamidessi and Moti Yung}, title = {Asynchronous Perfectly Secure Communication over One-Time Pads}, booktitle = {Automata, Languages and Programming, 32nd International Colloquium, {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3580}, pages = {216--227}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11523468\_18}, doi = {10.1007/11523468\_18}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/CrescenzoK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/KiayiasY05, author = {Aggelos Kiayias and Moti Yung}, title = {Cryptography and decoding Reed-Solomon codes as a hard problem}, booktitle = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005}, pages = {48}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ITWTPI.2005.1543956}, doi = {10.1109/ITWTPI.2005.1543956}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icits/KiayiasY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/KiayiasRR05, author = {Aggelos Kiayias and Yona Raekow and Alexander Russell}, editor = {Mauro Barni and Jordi Herrera{-}Joancomart{\'{\i}} and Stefan Katzenbeisser and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez}, title = {Efficient Steganography with Provable Security Guarantees}, booktitle = {Information Hiding, 7th International Workshop, {IH} 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3727}, pages = {118--130}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11558859\_10}, doi = {10.1007/11558859\_10}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/KiayiasRR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/KiayiasY05, author = {Aggelos Kiayias and Moti Yung}, editor = {Ed Dawson and Serge Vaudenay}, title = {Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers}, booktitle = {Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3715}, pages = {151--170}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11554868\_11}, doi = {10.1007/11554868\_11}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/KiayiasY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/KarygiannisKT05, author = {A. Karygiannis and Aggelos Kiayias and Yiannis Tsiounis}, title = {A Solution for Wireless Privacy and Payments based on E-cash}, booktitle = {First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005, Athens, Greece, 5-9 September, 2005}, pages = {206--218}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/SECURECOMM.2005.9}, doi = {10.1109/SECURECOMM.2005.9}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/KarygiannisKT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasY05, author = {Aggelos Kiayias and Moti Yung}, title = {Group Signatures with Efficient Concurrent Join}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {345}, year = {2005}, url = {http://eprint.iacr.org/2005/345}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasZ05, author = {Aggelos Kiayias and Hong{-}Sheng Zhou}, title = {Concurrent Blind Signatures without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {435}, year = {2005}, url = {http://eprint.iacr.org/2005/435}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KiayiasY04, author = {Aggelos Kiayias and Moti Yung}, editor = {Pil Joong Lee}, title = {Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3329}, pages = {401--416}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30539-2\_28}, doi = {10.1007/978-3-540-30539-2\_28}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KiayiasY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KiayiasTY04, author = {Aggelos Kiayias and Yiannis Tsiounis and Moti Yung}, editor = {Christian Cachin and Jan Camenisch}, title = {Traceable Signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3027}, pages = {571--589}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24676-3\_34}, doi = {10.1007/978-3-540-24676-3\_34}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KiayiasTY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DodisKNS04, author = {Yevgeniy Dodis and Aggelos Kiayias and Antonio Nicolosi and Victor Shoup}, editor = {Christian Cachin and Jan Camenisch}, title = {Anonymous Identification in Ad Hoc Groups}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3027}, pages = {609--626}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24676-3\_36}, doi = {10.1007/978-3-540-24676-3\_36}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DodisKNS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KiayiasY04, author = {Aggelos Kiayias and Moti Yung}, editor = {Ari Juels}, title = {The Vector-Ballot e-Voting Approach}, booktitle = {Financial Cryptography, 8th International Conference, {FC} 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3110}, pages = {72--89}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27809-2\_9}, doi = {10.1007/978-3-540-27809-2\_9}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/KiayiasY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/drm/2004, editor = {Aggelos Kiayias and Moti Yung}, title = {Proceedings of the 2004 {ACM} Workshop on Digital Rights Management 2004, Washington, DC, USA, October 25, 2004}, publisher = {{ACM}}, year = {2004}, isbn = {1-58113-969-1}, timestamp = {Wed, 15 Dec 2004 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasTY04, author = {Aggelos Kiayias and Yiannis Tsiounis and Moti Yung}, title = {Traceable Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {7}, year = {2004}, url = {http://eprint.iacr.org/2004/007}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasTY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasY04, author = {Aggelos Kiayias and Moti Yung}, title = {Group Signatures: Provable Security, Efficient Constructions and Anonymity from Trapdoor-Holders}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {76}, year = {2004}, url = {http://eprint.iacr.org/2004/076}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisFKY04, author = {Yevgeniy Dodis and Nelly Fazio and Aggelos Kiayias and Moti Yung}, title = {Scalable Public-Key Tracing and Revoking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {160}, year = {2004}, url = {http://eprint.iacr.org/2004/160}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisFKY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasY04a, author = {Aggelos Kiayias and Moti Yung}, title = {Cryptanalyzing the Polynomial-Reconstruction based Public-Key System Under Optimal Parameter Choice}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {217}, year = {2004}, url = {http://eprint.iacr.org/2004/217}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasY04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KiayiasY03, author = {Aggelos Kiayias and Moti Yung}, editor = {Eli Biham}, title = {Extracting Group Signatures from Traitor Tracing Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2656}, pages = {630--648}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-39200-9\_39}, doi = {10.1007/3-540-39200-9\_39}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KiayiasY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KiayiasY03, author = {Aggelos Kiayias and Moti Yung}, editor = {Rebecca N. Wright}, title = {Non-interactive Zero-Sharing with Applications to Private Distributed Decision Making}, booktitle = {Financial Cryptography, 7th International Conference, {FC} 2003, Guadeloupe, French West Indies, January 27-30, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2742}, pages = {303--320}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45126-6\_22}, doi = {10.1007/978-3-540-45126-6\_22}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/KiayiasY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/BleichenbacherKY03, author = {Daniel Bleichenbacher and Aggelos Kiayias and Moti Yung}, editor = {Jos C. M. Baeten and Jan Karel Lenstra and Joachim Parrow and Gerhard J. Woeginger}, title = {Decoding of Interleaved Reed Solomon Codes over Noisy Data}, booktitle = {Automata, Languages and Programming, 30th International Colloquium, {ICALP} 2003, Eindhoven, The Netherlands, June 30 - July 4, 2003. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2719}, pages = {97--108}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45061-0\_9}, doi = {10.1007/3-540-45061-0\_9}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/BleichenbacherKY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/DodisFKY03, author = {Yevgeniy Dodis and Nelly Fazio and Aggelos Kiayias and Moti Yung}, editor = {Elizabeth Borowsky and Sergio Rajsbaum}, title = {Scalable public-key tracing and revoking}, booktitle = {Proceedings of the Twenty-Second {ACM} Symposium on Principles of Distributed Computing, {PODC} 2003, Boston, Massachusetts, USA, July 13-16, 2003}, pages = {190--199}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/872035.872062}, doi = {10.1145/872035.872062}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/DodisFKY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/KiayiasY03, author = {Aggelos Kiayias and Moti Yung}, editor = {Dimitris Gritzalis}, title = {Robust Verifiable non-Interactive Zero-Sharing - {A} Plug-in Utility for Enhanced Voters' Privacy}, booktitle = {Secure Electronic Voting}, series = {Advances in Information Security}, volume = {7}, pages = {139--151}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-1-4615-0239-5\_9}, doi = {10.1007/978-1-4615-0239-5\_9}, timestamp = {Tue, 16 May 2017 14:24:25 +0200}, biburl = {https://dblp.org/rec/series/ais/KiayiasY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KiayiasY02, author = {Aggelos Kiayias and Moti Yung}, editor = {Joan Feigenbaum}, title = {Breaking and Repairing Asymmetric Public-Key Traitor Tracing}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop, {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2696}, pages = {32--50}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-44993-5\_3}, doi = {10.1007/978-3-540-44993-5\_3}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KiayiasY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KiayiasY02, author = {Aggelos Kiayias and Moti Yung}, editor = {Lars R. Knudsen}, title = {Traitor Tracing with Constant Transmission Rate}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2332}, pages = {450--465}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-46035-7\_30}, doi = {10.1007/3-540-46035-7\_30}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KiayiasY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/KiayiasY02, author = {Aggelos Kiayias and Moti Yung}, editor = {Peter Widmayer and Francisco Triguero Ruiz and Rafael Morales Bueno and Matthew Hennessy and Stephan J. Eidenbenz and Ricardo Conejo}, title = {Cryptographic Hardness Based on the Decoding of Reed-Solomon Codes}, booktitle = {Automata, Languages and Programming, 29th International Colloquium, {ICALP} 2002, Malaga, Spain, July 8-13, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2380}, pages = {232--243}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45465-9\_21}, doi = {10.1007/3-540-45465-9\_21}, timestamp = {Wed, 11 Sep 2019 13:15:53 +0200}, biburl = {https://dblp.org/rec/conf/icalp/KiayiasY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KiayiasY02, author = {Aggelos Kiayias and Moti Yung}, editor = {David Naccache and Pascal Paillier}, title = {Self-tallying Elections and Perfect Ballot Secrecy}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {141--158}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_10}, doi = {10.1007/3-540-45664-3\_10}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KiayiasY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ECCC-TR02-017, author = {Aggelos Kiayias and Moti Yung}, title = {Cryptographic Hardness based on the Decoding of Reed-Solomon Codes with Applications}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR02-017}}, year = {2002}, url = {https://eccc.weizmann.ac.il/eccc-reports/2002/TR02-017/index.html}, eprinttype = {ECCC}, eprint = {TR02-017}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ECCC-TR02-017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KiayiasY01, author = {Aggelos Kiayias and Moti Yung}, editor = {Tomas Sander}, title = {On Crafty Pirates and Foxy Tracers}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2320}, pages = {22--39}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47870-1\_3}, doi = {10.1007/3-540-47870-1\_3}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KiayiasY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KiayiasY01, author = {Aggelos Kiayias and Moti Yung}, editor = {Joe Kilian}, title = {Self Protecting Pirates and Black-Box Traitor Tracing}, booktitle = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2139}, pages = {63--79}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44647-8\_4}, doi = {10.1007/3-540-44647-8\_4}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KiayiasY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/KiayiasY01, author = {Aggelos Kiayias and Moti Yung}, editor = {Fernando Orejas and Paul G. Spirakis and Jan van Leeuwen}, title = {Secure Games with Polynomial Expressions}, booktitle = {Automata, Languages and Programming, 28th International Colloquium, {ICALP} 2001, Crete, Greece, July 8-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2076}, pages = {939--950}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-48224-5\_76}, doi = {10.1007/3-540-48224-5\_76}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/KiayiasY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pci/KiayiasPSZ01, author = {Aggelos Kiayias and Aris Pagourtzis and Kiron Sharma and Stathis Zachos}, editor = {Yannis Manolopoulos and Skevos Evripidou and Antonis C. Kakas}, title = {Acceptor-Definable Counting Classes}, booktitle = {Advances in Informatics, 8th Panhellenic Conference on Informatics, {PCI} 2001. Nicosia, Cyprus, November 8-10, 2001, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {2563}, pages = {453--463}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-38076-0\_29}, doi = {10.1007/3-540-38076-0\_29}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/pci/KiayiasPSZ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/KiayiasY01, author = {Aggelos Kiayias and Moti Yung}, editor = {Serge Vaudenay and Amr M. Youssef}, title = {Polynomial Reconstruction Based Cryptography}, booktitle = {Selected Areas in Cryptography, 8th Annual International Workshop, {SAC} 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2259}, pages = {129--133}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45537-X\_10}, doi = {10.1007/3-540-45537-X\_10}, timestamp = {Tue, 01 Jun 2021 15:22:31 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/KiayiasY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.