BibTeX records: Aggelos Kiayias

download as .bib file

@article{DBLP:journals/joc/KiayiasLT24,
  author       = {Aggelos Kiayias and
                  Feng{-}Hao Liu and
                  Yiannis Tselekounis},
  title        = {(Continuous) Non-malleable Codes for Partial Functions with Manipulation
                  Detection and Light Updates},
  journal      = {J. Cryptol.},
  volume       = {37},
  number       = {2},
  pages        = {17},
  year         = {2024},
  url          = {https://doi.org/10.1007/s00145-024-09498-2},
  doi          = {10.1007/S00145-024-09498-2},
  timestamp    = {Mon, 22 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/KiayiasLT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KiayiasLS24,
  author       = {Aggelos Kiayias and
                  Nikos Leonardos and
                  Yu Shen},
  editor       = {Marc Joye and
                  Gregor Leander},
  title        = {Ordering Transactions with Bounded Unfairness: Definitions, Complexity
                  and Constructions},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14653},
  pages        = {34--63},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-58734-4\_2},
  doi          = {10.1007/978-3-031-58734-4\_2},
  timestamp    = {Thu, 09 May 2024 11:05:29 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KiayiasLS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ChaidosKRZ24,
  author       = {Pyrros Chaidos and
                  Aggelos Kiayias and
                  Leonid Reyzin and
                  Anatoliy Zinovyev},
  editor       = {Marc Joye and
                  Gregor Leander},
  title        = {Approximate Lower Bound Arguments},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14654},
  pages        = {55--84},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-58737-5\_3},
  doi          = {10.1007/978-3-031-58737-5\_3},
  timestamp    = {Thu, 09 May 2024 11:05:30 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/ChaidosKRZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GarayKS24,
  author       = {Juan A. Garay and
                  Aggelos Kiayias and
                  Yu Shen},
  editor       = {Marc Joye and
                  Gregor Leander},
  title        = {Proof-of-Work-Based Consensus in Expected-Constant Time},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14653},
  pages        = {96--125},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-58734-4\_4},
  doi          = {10.1007/978-3-031-58734-4\_4},
  timestamp    = {Thu, 09 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GarayKS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-06352,
  author       = {Dimitris Karakostas and
                  Aggelos Kiayias and
                  Thomas Zacharias},
  title        = {Blockchain Bribing Attacks and the Efficacy of Counterincentives},
  journal      = {CoRR},
  volume       = {abs/2402.06352},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.06352},
  doi          = {10.48550/ARXIV.2402.06352},
  eprinttype    = {arXiv},
  eprint       = {2402.06352},
  timestamp    = {Fri, 16 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-06352.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-15429,
  author       = {Aggelos Kiayias and
                  Philip Lazos and
                  Paolo Penna},
  title        = {Single-token vs Two-token Blockchain Tokenomics},
  journal      = {CoRR},
  volume       = {abs/2403.15429},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.15429},
  doi          = {10.48550/ARXIV.2403.15429},
  eprinttype    = {arXiv},
  eprint       = {2403.15429},
  timestamp    = {Tue, 09 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-15429.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CritesKS24,
  author       = {Elizabeth Crites and
                  Aggelos Kiayias and
                  Amirreza Sarencheh},
  title        = {SyRA: Sybil-Resilient Anonymous Signatures with Applications to Decentralized
                  Identity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {379},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/379},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CritesKS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fdgth/MuwongeWMNMBSKMJ23,
  author       = {Adrian Muwonge and
                  Bryan A. Wee and
                  Ibrahimm Mugerwa and
                  Emma Nabunya and
                  Christine M. Mpyangu and
                  Barend M. de C. Bronsvoort and
                  Emmanuel Ssebaggala and
                  Aggelos Kiayias and
                  Erisa Mwaka and
                  Moses Joloba},
  title        = {An open-source digital contact tracing system tailored to haulage},
  journal      = {Frontiers Digit. Health},
  volume       = {5},
  year         = {2023},
  url          = {https://doi.org/10.3389/fdgth.2023.1199635},
  doi          = {10.3389/FDGTH.2023.1199635},
  timestamp    = {Sun, 07 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fdgth/MuwongeWMNMBSKMJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/quantum/CojocaruGKSW23,
  author       = {Alexandru Cojocaru and
                  Juan A. Garay and
                  Aggelos Kiayias and
                  Fang Song and
                  Petros Wallden},
  title        = {Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's
                  Post-Quantum Security},
  journal      = {Quantum},
  volume       = {7},
  pages        = {944},
  year         = {2023},
  url          = {https://doi.org/10.22331/q-2023-03-09-944},
  doi          = {10.22331/Q-2023-03-09-944},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/quantum/CojocaruGKSW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GaziKR23,
  author       = {Peter Gazi and
                  Aggelos Kiayias and
                  Alexander Russell},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Fait Accompli Committee Selection: Improving the Size-Security Tradeoff
                  of Stake-Based Committees},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {845--858},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3623194},
  doi          = {10.1145/3576915.3623194},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GaziKR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/KiayiasMQR23,
  author       = {Aggelos Kiayias and
                  Cristopher Moore and
                  Saad Quader and
                  Alexander Russell},
  title        = {Adaptively Secure Random Beacons for Ungrindable Blockchains},
  booktitle    = {43rd {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2023, Hong Kong, July 18-21, 2023},
  pages        = {62--72},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICDCS57875.2023.00021},
  doi          = {10.1109/ICDCS57875.2023.00021},
  timestamp    = {Tue, 24 Oct 2023 14:47:33 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcs/KiayiasMQR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BadertscherCK23,
  author       = {Christian Badertscher and
                  Michele Ciampi and
                  Aggelos Kiayias},
  editor       = {Guy N. Rothblum and
                  Hoeteck Wee},
  title        = {Agile Cryptography: {A} Universally Composable Approach},
  booktitle    = {Theory of Cryptography - 21st International Conference, {TCC} 2023,
                  Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14372},
  pages        = {480--509},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-48624-1\_18},
  doi          = {10.1007/978-3-031-48624-1\_18},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/BadertscherCK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wine/ChaidosKM23,
  author       = {Pyrros Chaidos and
                  Aggelos Kiayias and
                  Evangelos Markakis},
  editor       = {Jugal Garg and
                  Max Klimm and
                  Yuqing Kong},
  title        = {Blockchain Participation Games},
  booktitle    = {Web and Internet Economics - 19th International Conference, {WINE}
                  2023, Shanghai, China, December 4-8, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14413},
  pages        = {169--187},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-48974-7\_10},
  doi          = {10.1007/978-3-031-48974-7\_10},
  timestamp    = {Thu, 11 Jan 2024 22:28:03 +0100},
  biburl       = {https://dblp.org/rec/conf/wine/ChaidosKM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tokenomics/2022,
  editor       = {Yackolley Amoussou{-}Guenou and
                  Aggelos Kiayias and
                  Marianne Verdier},
  title        = {4th International Conference on Blockchain Economics, Security and
                  Protocols, Tokenomics 2022, December 12-13, 2022, Paris, France},
  series       = {OASIcs},
  volume       = {110},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2023},
  url          = {https://www.dagstuhl.de/dagpub/978-3-95977-274-7},
  isbn         = {978-3-95977-274-7},
  timestamp    = {Mon, 24 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tokenomics/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-06014,
  author       = {Aggelos Kiayias and
                  Elias Koutsoupias and
                  Philip Lazos and
                  Giorgos Panagiotakos},
  title        = {Tiered Mechanisms for Blockchain Transaction Fees},
  journal      = {CoRR},
  volume       = {abs/2304.06014},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.06014},
  doi          = {10.48550/ARXIV.2304.06014},
  eprinttype    = {arXiv},
  eprint       = {2304.06014},
  timestamp    = {Wed, 19 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-06014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-17025,
  author       = {Aggelos Kiayias and
                  Philip Lazos and
                  Jan Christoph Schlegel},
  title        = {Would Friedman Burn your Tokens?},
  journal      = {CoRR},
  volume       = {abs/2306.17025},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.17025},
  doi          = {10.48550/ARXIV.2306.17025},
  eprinttype    = {arXiv},
  eprint       = {2306.17025},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-17025.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-02769,
  author       = {Pyrros Chaidos and
                  Aggelos Kiayias and
                  Evangelos Markakis},
  title        = {Blockchain Participation Games},
  journal      = {CoRR},
  volume       = {abs/2312.02769},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.02769},
  doi          = {10.48550/ARXIV.2312.02769},
  eprinttype    = {arXiv},
  eprint       = {2312.02769},
  timestamp    = {Thu, 28 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-02769.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasLS23,
  author       = {Aggelos Kiayias and
                  Nikos Leonardos and
                  Yu Shen},
  title        = {Ordering Transactions with Bounded Unfairness: Definitions, Complexity
                  and Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1253},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1253},
  timestamp    = {Wed, 06 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaziKR23,
  author       = {Peter Gazi and
                  Aggelos Kiayias and
                  Alexander Russell},
  title        = {Fait Accompli Committee Selection: Improving the Size-Security Tradeoff
                  of Stake-Based Committees},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1273},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1273},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaziKR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DasDKZ23,
  author       = {Debajyoti Das and
                  Claudia D{\'{\i}}az and
                  Aggelos Kiayias and
                  Thomas Zacharias},
  title        = {Are continuous stop-and-go mixnets provably secure?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1311},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1311},
  timestamp    = {Thu, 19 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DasDKZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaidosKRZ23,
  author       = {Pyrros Chaidos and
                  Aggelos Kiayias and
                  Leonid Reyzin and
                  Anatoliy Zinovyev},
  title        = {Approximate Lower Bound Arguments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1655},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1655},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaidosKRZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarayKS23,
  author       = {Juan A. Garay and
                  Aggelos Kiayias and
                  Yu Shen},
  title        = {Proof-of-Work-based Consensus in Expected-Constant Time},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1663},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1663},
  timestamp    = {Wed, 06 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GarayKS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SarenchehKK23,
  author       = {Amirreza Sarencheh and
                  Aggelos Kiayias and
                  Markulf Kohlweiss},
  title        = {PARScoin: {A} Privacy-preserving, Auditable, and Regulation-friendly
                  Stablecoin},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1908},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1908},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SarenchehKK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangZKZR22,
  author       = {Xinyu Zhang and
                  Bingsheng Zhang and
                  Aggelos Kiayias and
                  Thomas Zacharias and
                  Kui Ren},
  title        = {An Efficient {E2E} Crowd Verifiable E-Voting System},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {6},
  pages        = {3607--3620},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3103336},
  doi          = {10.1109/TDSC.2021.3103336},
  timestamp    = {Tue, 15 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhangZKZR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ChakravartyKKJV22,
  author       = {Manuel M. T. Chakravarty and
                  Nikos Karayannidis and
                  Aggelos Kiayias and
                  Michael Peyton Jones and
                  Polina Vinogradova},
  editor       = {Giuseppe Ateniese and
                  Daniele Venturi},
  title        = {Babel Fees via Limited Liabilities},
  booktitle    = {Applied Cryptography and Network Security - 20th International Conference,
                  {ACNS} 2022, Rome, Italy, June 20-23, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13269},
  pages        = {707--726},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-09234-3\_35},
  doi          = {10.1007/978-3-031-09234-3\_35},
  timestamp    = {Tue, 21 Jun 2022 15:24:40 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ChakravartyKKJV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aft/KiayiasL22,
  author       = {Aggelos Kiayias and
                  Philip Lazos},
  editor       = {Maurice Herlihy and
                  Neha Narula},
  title        = {SoK: Blockchain Governance},
  booktitle    = {Proceedings of the 4th {ACM} Conference on Advances in Financial Technologies,
                  {AFT} 2022, Cambridge, MA, USA, September 19-21, 2022},
  pages        = {61--73},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3558535.3559794},
  doi          = {10.1145/3558535.3559794},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aft/KiayiasL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aft/KarakostasK022,
  author       = {Dimitris Karakostas and
                  Aggelos Kiayias and
                  Thomas Zacharias},
  editor       = {Maurice Herlihy and
                  Neha Narula},
  title        = {Blockchain Nash Dynamics and the Pursuit of Compliance},
  booktitle    = {Proceedings of the 4th {ACM} Conference on Advances in Financial Technologies,
                  {AFT} 2022, Cambridge, MA, USA, September 19-21, 2022},
  pages        = {281--293},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3558535.3559781},
  doi          = {10.1145/3558535.3559781},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aft/KarakostasK022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CorettiKMR22,
  author       = {Sandro Coretti and
                  Aggelos Kiayias and
                  Cristopher Moore and
                  Alexander Russell},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {The Generals' Scuttlebutt: Byzantine-Resilient Gossip Protocols},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {595--608},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560638},
  doi          = {10.1145/3548606.3560638},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CorettiKMR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FitziWKKLVW22,
  author       = {Matthias Fitzi and
                  Xuechao Wang and
                  Sreeram Kannan and
                  Aggelos Kiayias and
                  Nikos Leonardos and
                  Pramod Viswanath and
                  Gerui Wang},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Minotaur: Multi-Resource Blockchain Consensus},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {1095--1108},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3559356},
  doi          = {10.1145/3548606.3559356},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/FitziWKKLVW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KiayiasKS22,
  author       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Amirreza Sarencheh},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {PEReDi: Privacy-Enhanced, Regulated and Distributed Central Bank Digital
                  Currencies},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {1739--1752},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560707},
  doi          = {10.1145/3548606.3560707},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/KiayiasKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FitziKPR22,
  author       = {Matthias Fitzi and
                  Aggelos Kiayias and
                  Giorgos Panagiotakos and
                  Alexander Russell},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Ofelimos: Combinatorial Optimization via Proof-of-Useful-Work - {A}
                  Provably Secure Blockchain Protocol},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13508},
  pages        = {339--369},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15979-4\_12},
  doi          = {10.1007/978-3-031-15979-4\_12},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/FitziKPR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaif/OvezikK22,
  author       = {Christina Ovezik and
                  Aggelos Kiayias},
  editor       = {Daniele Magazzeni and
                  Senthil Kumar and
                  Rahul Savani and
                  Renyuan Xu and
                  Carmine Ventre and
                  Blanka Horvath and
                  Ruimeng Hu and
                  Tucker Balch and
                  Francesca Toni},
  title        = {Decentralization Analysis of Pooling Behavior in Cardano Proof of
                  Stake},
  booktitle    = {3rd {ACM} International Conference on {AI} in Finance, {ICAIF} 2022,
                  New York, NY, USA, November 2-4, 2022},
  pages        = {18--26},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3533271.3561787},
  doi          = {10.1145/3533271.3561787},
  timestamp    = {Tue, 25 Oct 2022 16:37:30 +0200},
  biburl       = {https://dblp.org/rec/conf/icaif/OvezikK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobihoc/RanaKKKV22,
  author       = {Ranvir Rana and
                  Dimitris Karakostas and
                  Sreeram Kannan and
                  Aggelos Kiayias and
                  Pramod Viswanath},
  title        = {Optimal bootstrapping of PoW blockchains},
  booktitle    = {MobiHoc '22: The Twenty-third International Symposium on Theory, Algorithmic
                  Foundations, and Protocol Design for Mobile Networks and Mobile Computing,
                  Seoul, Republic of Korea, October 17 - 20, 2022},
  pages        = {231--240},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3492866.3549731},
  doi          = {10.1145/3492866.3549731},
  timestamp    = {Tue, 27 Sep 2022 16:36:53 +0200},
  biburl       = {https://dblp.org/rec/conf/mobihoc/RanaKKKV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sagt/Kiayias22,
  author       = {Aggelos Kiayias},
  editor       = {Panagiotis Kanellopoulos and
                  Maria Kyropoulou and
                  Alexandros A. Voudouris},
  title        = {Decentralizing Information Technology: The Advent of Resource Based
                  Systems},
  booktitle    = {Algorithmic Game Theory - 15th International Symposium, {SAGT} 2022,
                  Colchester, UK, September 12-15, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13584},
  pages        = {3--19},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15714-1\_1},
  doi          = {10.1007/978-3-031-15714-1\_1},
  timestamp    = {Mon, 19 Sep 2022 19:04:18 +0200},
  biburl       = {https://dblp.org/rec/conf/sagt/Kiayias22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/BaldimtsiKS22,
  author       = {Foteini Baldimtsi and
                  Aggelos Kiayias and
                  Katerina Samari},
  editor       = {Clemente Galdi and
                  Stanislaw Jarecki},
  title        = {Watermarkable Public Key Encryption with Efficient Extraction Under
                  Standard Assumptions},
  booktitle    = {Security and Cryptography for Networks - 13th International Conference,
                  {SCN} 2022, Amalfi, Italy, September 12-14, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13409},
  pages        = {244--267},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-14791-3\_11},
  doi          = {10.1007/978-3-031-14791-3\_11},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/BaldimtsiKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GarayKS22,
  author       = {Juan A. Garay and
                  Aggelos Kiayias and
                  Yu Shen},
  editor       = {Eike Kiltz and
                  Vinod Vaikuntanathan},
  title        = {Permissionless Clock Synchronization with Public Setup},
  booktitle    = {Theory of Cryptography - 20th International Conference, {TCC} 2022,
                  Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13749},
  pages        = {181--211},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22368-6\_7},
  doi          = {10.1007/978-3-031-22368-6\_7},
  timestamp    = {Wed, 06 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/GarayKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-00858,
  author       = {Dimitris Karakostas and
                  Aggelos Kiayias and
                  Thomas Zacharias},
  title        = {Blockchain Nash Dynamics and the Pursuit of Compliance},
  journal      = {CoRR},
  volume       = {abs/2201.00858},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.00858},
  eprinttype    = {arXiv},
  eprint       = {2201.00858},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-00858.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-07188,
  author       = {Aggelos Kiayias and
                  Philip Lazos},
  title        = {SoK: Blockchain Governance},
  journal      = {CoRR},
  volume       = {abs/2201.07188},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.07188},
  eprinttype    = {arXiv},
  eprint       = {2201.07188},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-07188.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-11780,
  author       = {Matthias Fitzi and
                  Xuechao Wang and
                  Sreeram Kannan and
                  Aggelos Kiayias and
                  Nikos Leonardos and
                  Pramod Viswanath and
                  Gerui Wang},
  title        = {Minotaur: Multi-Resource Blockchain Consensus},
  journal      = {CoRR},
  volume       = {abs/2201.11780},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.11780},
  eprinttype    = {arXiv},
  eprint       = {2201.11780},
  timestamp    = {Wed, 02 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-11780.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-10618,
  author       = {Ranvir Rana and
                  Dimitris Karakostas and
                  Sreeram Kannan and
                  Aggelos Kiayias and
                  Pramod Viswanath},
  title        = {Optimal Bootstrapping of PoW Blockchains},
  journal      = {CoRR},
  volume       = {abs/2208.10618},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.10618},
  doi          = {10.48550/ARXIV.2208.10618},
  eprinttype    = {arXiv},
  eprint       = {2208.10618},
  timestamp    = {Mon, 29 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-10618.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-01291,
  author       = {Dimitris Karakostas and
                  Aggelos Kiayias and
                  Christina Ovezik},
  title        = {SoK: {A} Stratified Approach to Blockchain Decentralization},
  journal      = {CoRR},
  volume       = {abs/2211.01291},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.01291},
  doi          = {10.48550/ARXIV.2211.01291},
  eprinttype    = {arXiv},
  eprint       = {2211.01291},
  timestamp    = {Fri, 04 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-01291.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FitziWKKLVW22,
  author       = {Matthias Fitzi and
                  Xuechao Wang and
                  Sreeram Kannan and
                  Aggelos Kiayias and
                  Nikos Leonardos and
                  Pramod Viswanath and
                  Gerui Wang},
  title        = {Minotaur: Multi-Resource Blockchain Consensus},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {104},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/104},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FitziWKKLVW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CorettiKMR22,
  author       = {Sandro Coretti and
                  Aggelos Kiayias and
                  Cristopher Moore and
                  Alexander Russell},
  title        = {The Generals{\^{a}}{\mbox{\texteuro}}{\texttrademark} Scuttlebutt:
                  Byzantine-Resilient Gossip Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {541},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/541},
  timestamp    = {Mon, 16 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CorettiKMR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasTL22,
  author       = {Aggelos Kiayias and
                  Vanessa Teague and
                  Orfeas Stefanos Thyfronitis Litos},
  title        = {Privacy Preserving Opinion Aggregation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {760},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/760},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasTL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaldimtsiKS22,
  author       = {Foteini Baldimtsi and
                  Aggelos Kiayias and
                  Katerina Samari},
  title        = {Watermarkable Public key Encryption With Efficient Extraction Under
                  Standard Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {876},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/876},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaldimtsiKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasKS22,
  author       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Amirreza Sarencheh},
  title        = {PEReDi: Privacy-Enhanced, Regulated and Distributed Central Bank Digital
                  Currencies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {974},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/974},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarayKS22,
  author       = {Juan A. Garay and
                  Aggelos Kiayias and
                  Yu Shen},
  title        = {Permissionless Clock Synchronization with Public Setup},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1220},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1220},
  timestamp    = {Wed, 06 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GarayKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadertscherCK22,
  author       = {Christian Badertscher and
                  Michele Ciampi and
                  Aggelos Kiayias},
  title        = {Agile Cryptography: {A} Composable Approach},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1367},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1367},
  timestamp    = {Sat, 22 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BadertscherCK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasLT22,
  author       = {Aggelos Kiayias and
                  Feng{-}Hao Liu and
                  Yiannis Tselekounis},
  title        = {Leakage Resilient l-more Extractable Hash and Applications to Non-Malleable
                  Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1745},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1745},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasLT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/BaldimtsiKS21,
  author       = {Foteini Baldimtsi and
                  Aggelos Kiayias and
                  Katerina Samari},
  title        = {Watermarking public-key cryptographic functionalities and implementations:
                  The case of encryption and signatures},
  journal      = {{IET} Inf. Secur.},
  volume       = {15},
  number       = {3},
  pages        = {205--222},
  year         = {2021},
  url          = {https://doi.org/10.1049/ise2.12013},
  doi          = {10.1049/ISE2.12013},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/BaldimtsiKS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aft/KiayiasS21,
  author       = {Aggelos Kiayias and
                  Aikaterini{-}Panagiota Stouka},
  editor       = {Foteini Baldimtsi and
                  Tim Roughgarden},
  title        = {Coalition-safe equilibria with virtual payoffs},
  booktitle    = {{AFT} '21: 3rd {ACM} Conference on Advances in Financial Technologies,
                  Arlington, Virginia, USA, September 26 - 28, 2021},
  pages        = {71--85},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3479722.3480795},
  doi          = {10.1145/3479722.3480795},
  timestamp    = {Wed, 01 Dec 2021 16:21:39 +0100},
  biburl       = {https://dblp.org/rec/conf/aft/KiayiasS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aft/KiayiasPZ21,
  author       = {Aggelos Kiayias and
                  Andrianna Polydouri and
                  Dionysis Zindros},
  editor       = {Foteini Baldimtsi and
                  Tim Roughgarden},
  title        = {The velvet path to superlight blockchain clients},
  booktitle    = {{AFT} '21: 3rd {ACM} Conference on Advances in Financial Technologies,
                  Arlington, Virginia, USA, September 26 - 28, 2021},
  pages        = {205--218},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3479722.3480999},
  doi          = {10.1145/3479722.3480999},
  timestamp    = {Wed, 01 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aft/KiayiasPZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KiayiasLZ21,
  author       = {Aggelos Kiayias and
                  Nikos Leonardos and
                  Dionysis Zindros},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {Mining in Logarithmic Space},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {3487--3501},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3484784},
  doi          = {10.1145/3460120.3484784},
  timestamp    = {Tue, 16 Nov 2021 12:59:46 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KiayiasLZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KerberKK21,
  author       = {Thomas Kerber and
                  Aggelos Kiayias and
                  Markulf Kohlweiss},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Composition with Knowledge Assumptions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12828},
  pages        = {364--393},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84259-8\_13},
  doi          = {10.1007/978-3-030-84259-8\_13},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KerberKK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BadertscherKKW21,
  author       = {Christian Badertscher and
                  Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Hendrik Waldner},
  title        = {Consistency for Functional Encryption},
  booktitle    = {34th {IEEE} Computer Security Foundations Symposium, {CSF} 2021, Dubrovnik,
                  Croatia, June 21-25, 2021},
  pages        = {1--16},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSF51468.2021.00045},
  doi          = {10.1109/CSF51468.2021.00045},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/BadertscherKKW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/KerberKK21,
  author       = {Thomas Kerber and
                  Aggelos Kiayias and
                  Markulf Kohlweiss},
  title        = {{KACHINA} - Foundations of Private Smart Contracts},
  booktitle    = {34th {IEEE} Computer Security Foundations Symposium, {CSF} 2021, Dubrovnik,
                  Croatia, June 21-25, 2021},
  pages        = {1--16},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSF51468.2021.00002},
  doi          = {10.1109/CSF51468.2021.00002},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/KerberKK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dappcon/KiayiasKS21,
  author       = {Aggelos Kiayias and
                  Elias Koutsoupias and
                  Aikaterini{-}Panagiota Stouka},
  title        = {Incentives Against Power Grabs or How to Engineer the Revolution in
                  a Pooled Proof of Stake System},
  booktitle    = {{IEEE} International Conference on Decentralized Applications and
                  Infrastructures, {DAPPS} 2021, Online Event, August 23-26, 2021},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DAPPS52256.2021.00006},
  doi          = {10.1109/DAPPS52256.2021.00006},
  timestamp    = {Fri, 04 Nov 2022 16:07:31 +0100},
  biburl       = {https://dblp.org/rec/conf/dappcon/KiayiasKS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KarakostasK21,
  author       = {Dimitris Karakostas and
                  Aggelos Kiayias},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Jose Luis Mu{\~{n}}oz{-}Tapia and
                  Guillermo Navarro{-}Arribas and
                  Miguel Soriano},
  title        = {Filling the Tax Gap via Programmable Money},
  booktitle    = {Data Privacy Management, Cryptocurrencies and Blockchain Technology
                  - {ESORICS} 2021 International Workshops, {DPM} 2021 and {CBT} 2021,
                  Darmstadt, Germany, October 8, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13140},
  pages        = {281--288},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-93944-1\_18},
  doi          = {10.1007/978-3-030-93944-1\_18},
  timestamp    = {Sun, 30 Jan 2022 13:24:47 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/KarakostasK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KarakostasKL21,
  author       = {Dimitris Karakostas and
                  Aggelos Kiayias and
                  Mario Larangeira},
  editor       = {Elisa Bertino and
                  Haya Schulmann and
                  Michael Waidner},
  title        = {Conclave: {A} Collective Stake Pool Protocol},
  booktitle    = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research
                  in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12972},
  pages        = {370--389},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88418-5\_18},
  doi          = {10.1007/978-3-030-88418-5\_18},
  timestamp    = {Tue, 17 Oct 2023 10:41:56 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/KarakostasKL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BadertscherGKRZ21,
  author       = {Christian Badertscher and
                  Peter Gazi and
                  Aggelos Kiayias and
                  Alexander Russell and
                  Vassilis Zikas},
  editor       = {Anne Canteaut and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Dynamic Ad Hoc Clock Synchronization},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12698},
  pages        = {399--428},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-77883-5\_14},
  doi          = {10.1007/978-3-030-77883-5\_14},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BadertscherGKRZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ZamyatinAZKMKK21,
  author       = {Alexei Zamyatin and
                  Mustafa Al{-}Bassam and
                  Dionysis Zindros and
                  Eleftherios Kokoris{-}Kogias and
                  Pedro Moreno{-}Sanchez and
                  Aggelos Kiayias and
                  William J. Knottenbelt},
  editor       = {Nikita Borisov and
                  Claudia D{\'{\i}}az},
  title        = {SoK: Communication Across Distributed Ledgers},
  booktitle    = {Financial Cryptography and Data Security - 25th International Conference,
                  {FC} 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12675},
  pages        = {3--36},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-662-64331-0\_1},
  doi          = {10.1007/978-3-662-64331-0\_1},
  timestamp    = {Thu, 16 Mar 2023 14:52:53 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/ZamyatinAZKMKK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KarakostasKK21,
  author       = {Dimitris Karakostas and
                  Nikos Karayannidis and
                  Aggelos Kiayias},
  editor       = {Nikita Borisov and
                  Claudia D{\'{\i}}az},
  title        = {Efficient State Management in Distributed Ledgers},
  booktitle    = {Financial Cryptography and Data Security - 25th International Conference,
                  {FC} 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12675},
  pages        = {319--338},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-662-64331-0\_17},
  doi          = {10.1007/978-3-662-64331-0\_17},
  timestamp    = {Wed, 27 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/KarakostasKK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ChakravartyCFGK21,
  author       = {Manuel M. T. Chakravarty and
                  Sandro Coretti and
                  Matthias Fitzi and
                  Peter Gazi and
                  Philipp Kant and
                  Aggelos Kiayias and
                  Alexander Russell},
  editor       = {Nikita Borisov and
                  Claudia D{\'{\i}}az},
  title        = {Fast Isomorphic State Channels},
  booktitle    = {Financial Cryptography and Data Security - 25th International Conference,
                  {FC} 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12675},
  pages        = {339--358},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-662-64331-0\_18},
  doi          = {10.1007/978-3-662-64331-0\_18},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/ChakravartyCFGK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KerberKK21,
  author       = {Thomas Kerber and
                  Aggelos Kiayias and
                  Markulf Kohlweiss},
  editor       = {Nikita Borisov and
                  Claudia D{\'{\i}}az},
  title        = {Mining for Privacy: How to Bootstrap a Snarky Blockchain},
  booktitle    = {Financial Cryptography and Data Security - 25th International Conference,
                  {FC} 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12674},
  pages        = {497--514},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-662-64322-8\_24},
  doi          = {10.1007/978-3-662-64322-8\_24},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/KerberKK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AbadiK21,
  author       = {Aydin Abadi and
                  Aggelos Kiayias},
  editor       = {Nikita Borisov and
                  Claudia D{\'{\i}}az},
  title        = {Multi-instance Publicly Verifiable Time-Lock Puzzle and Its Applications},
  booktitle    = {Financial Cryptography and Data Security - 25th International Conference,
                  {FC} 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12675},
  pages        = {541--559},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-662-64331-0\_28},
  doi          = {10.1007/978-3-662-64331-0\_28},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/AbadiK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icbc2/KarakostasK21,
  author       = {Dimitris Karakostas and
                  Aggelos Kiayias},
  title        = {Securing Proof-of-Work Ledgers via Checkpointing},
  booktitle    = {{IEEE} International Conference on Blockchain and Cryptocurrency,
                  {ICBC} 2021, Sydney, Australia, May 3-6, 2021},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICBC51069.2021.9461066},
  doi          = {10.1109/ICBC51069.2021.9461066},
  timestamp    = {Wed, 30 Jun 2021 12:20:23 +0200},
  biburl       = {https://dblp.org/rec/conf/icbc2/KarakostasK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-01161,
  author       = {Manuel M. T. Chakravarty and
                  Nikos Karayannidis and
                  Aggelos Kiayias and
                  Michael Peyton Jones and
                  Polina Vinogradova},
  title        = {Babel Fees via Limited Liabilities},
  journal      = {CoRR},
  volume       = {abs/2106.01161},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.01161},
  eprinttype    = {arXiv},
  eprint       = {2106.01161},
  timestamp    = {Thu, 10 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-01161.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2107-12069,
  author       = {Dimitris Karakostas and
                  Aggelos Kiayias},
  title        = {Filling the Tax Gap via Programmable Money},
  journal      = {CoRR},
  volume       = {abs/2107.12069},
  year         = {2021},
  url          = {https://arxiv.org/abs/2107.12069},
  eprinttype    = {arXiv},
  eprint       = {2107.12069},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2107-12069.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-08562,
  author       = {Aggelos Kiayias and
                  Elias Koutsoupias and
                  Aikaterini{-}Panagiota Stouka},
  title        = {Incentives Against Power Grabs or How to Engineer the Revolution in
                  a Pooled Proof of Stake System},
  journal      = {CoRR},
  volume       = {abs/2111.08562},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.08562},
  eprinttype    = {arXiv},
  eprint       = {2111.08562},
  timestamp    = {Mon, 22 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-08562.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2112-09941,
  author       = {Aggelos Kiayias},
  title        = {Decentralizing Information Technology: The Advent of Resource Based
                  Systems},
  journal      = {CoRR},
  volume       = {abs/2112.09941},
  year         = {2021},
  url          = {https://arxiv.org/abs/2112.09941},
  eprinttype    = {arXiv},
  eprint       = {2112.09941},
  timestamp    = {Tue, 04 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-09941.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KerberKK21,
  author       = {Thomas Kerber and
                  Aggelos Kiayias and
                  Markulf Kohlweiss},
  title        = {Composition with Knowledge Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {165},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/165},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KerberKK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KarakostasKK21,
  author       = {Dimitris Karakostas and
                  Nikos Karayannidis and
                  Aggelos Kiayias},
  title        = {Efficient State Management in Distributed Ledgers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {183},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/183},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KarakostasKK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasLZ21,
  author       = {Aggelos Kiayias and
                  Nikos Leonardos and
                  Dionysis Zindros},
  title        = {Mining in Logarithmic Space},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {623},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/623},
  timestamp    = {Mon, 07 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasLZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KarakostasKL21,
  author       = {Dimitris Karakostas and
                  Aggelos Kiayias and
                  Mario Larangeira},
  title        = {Conclave: {A} Collective Stake Pool Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {742},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/742},
  timestamp    = {Mon, 07 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KarakostasKL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasL21,
  author       = {Aggelos Kiayias and
                  Orfeas Stefanos Thyfronitis Litos},
  title        = {Elmo: Recursive Virtual Payment Channels for Bitcoin},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {747},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/747},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaidosK21,
  author       = {Pyrros Chaidos and
                  Aggelos Kiayias},
  title        = {Mithril: Stake-based Threshold Multisignatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {916},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/916},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaidosK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FitziKPR21,
  author       = {Matthias Fitzi and
                  Aggelos Kiayias and
                  Giorgos Panagiotakos and
                  Alexander Russell},
  title        = {Ofelimos: Combinatorial Optimization via Proof-of-Useful-Work {\textbackslash}{\textbackslash}
                  {A} Provably Secure Blockchain Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1379},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1379},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FitziKPR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasMQR21,
  author       = {Aggelos Kiayias and
                  Cristopher Moore and
                  Saad Quader and
                  Alexander Russell},
  title        = {Efficient Random Beacons with Adaptive Security for Ungrindable Blockchains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1698},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1698},
  timestamp    = {Thu, 13 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasMQR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/GarayJKY20,
  author       = {Juan A. Garay and
                  David S. Johnson and
                  Aggelos Kiayias and
                  Moti Yung},
  title        = {The combinatorics of hidden diversity},
  journal      = {Theor. Comput. Sci.},
  volume       = {812},
  pages        = {80--95},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.tcs.2019.07.016},
  doi          = {10.1016/J.TCS.2019.07.016},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/GarayJKY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tem/PatsonakisSKR20,
  author       = {Christos Patsonakis and
                  Katerina Samari and
                  Aggelos Kiayias and
                  Mema Roussopoulos},
  title        = {Implementing a Smart Contract {PKI}},
  journal      = {{IEEE} Trans. Engineering Management},
  volume       = {67},
  number       = {4},
  pages        = {1425--1443},
  year         = {2020},
  url          = {https://doi.org/10.1109/TEM.2020.2972638},
  doi          = {10.1109/TEM.2020.2972638},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tem/PatsonakisSKR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/AbadiCKZ20,
  author       = {Aydin Abadi and
                  Michele Ciampi and
                  Aggelos Kiayias and
                  Vassilis Zikas},
  editor       = {Mauro Conti and
                  Jianying Zhou and
                  Emiliano Casalicchio and
                  Angelo Spognardi},
  title        = {Timed Signatures and Zero-Knowledge Proofs - Timestamping in the Blockchain
                  Era -},
  booktitle    = {Applied Cryptography and Network Security - 18th International Conference,
                  {ACNS} 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12146},
  pages        = {335--354},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57808-4\_17},
  doi          = {10.1007/978-3-030-57808-4\_17},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/AbadiCKZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aft/DaveasKKZ20,
  author       = {Stelios Daveas and
                  Kostis Karantias and
                  Aggelos Kiayias and
                  Dionysis Zindros},
  title        = {A Gas-Efficient Superlight Bitcoin Client in Solidity},
  booktitle    = {{AFT} '20: 2nd {ACM} Conference on Advances in Financial Technologies,
                  New York, NY, USA, October 21-23, 2020},
  pages        = {132--144},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3419614.3423255},
  doi          = {10.1145/3419614.3423255},
  timestamp    = {Thu, 29 Oct 2020 14:40:13 +0100},
  biburl       = {https://dblp.org/rec/conf/aft/DaveasKKZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BaldimtsiK0Z20,
  author       = {Foteini Baldimtsi and
                  Aggelos Kiayias and
                  Thomas Zacharias and
                  Bingsheng Zhang},
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {Crowd Verifiable Zero-Knowledge and End-to-End Verifiable Multiparty
                  Computation},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12493},
  pages        = {717--748},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64840-4\_24},
  doi          = {10.1007/978-3-030-64840-4\_24},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BaldimtsiK0Z20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GaziKR20,
  author       = {Peter Gazi and
                  Aggelos Kiayias and
                  Alexander Russell},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {Tight Consistency Bounds for Bitcoin},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {819--838},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3423365},
  doi          = {10.1145/3372297.3423365},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/GaziKR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/KiayiasL20,
  author       = {Aggelos Kiayias and
                  Orfeas Stefanos Thyfronitis Litos},
  title        = {A Composable Security Treatment of the Lightning Network},
  booktitle    = {33rd {IEEE} Computer Security Foundations Symposium, {CSF} 2020, Boston,
                  MA, USA, June 22-26, 2020},
  pages        = {334--349},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CSF49147.2020.00031},
  doi          = {10.1109/CSF49147.2020.00031},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/KiayiasL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/GarayK20,
  author       = {Juan A. Garay and
                  Aggelos Kiayias},
  editor       = {Stanislaw Jarecki},
  title        = {SoK: {A} Consensus Taxonomy in the Blockchain Era},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2020 - The Cryptographers' Track at
                  the {RSA} Conference 2020, San Francisco, CA, USA, February 24-28,
                  2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12006},
  pages        = {284--318},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-40186-3\_13},
  doi          = {10.1007/978-3-030-40186-3\_13},
  timestamp    = {Fri, 14 Feb 2020 13:00:36 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/GarayK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/GarayKP20,
  author       = {Juan A. Garay and
                  Aggelos Kiayias and
                  Giorgos Panagiotakos},
  editor       = {Stanislaw Jarecki},
  title        = {Consensus from Signatures of Work},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2020 - The Cryptographers' Track at
                  the {RSA} Conference 2020, San Francisco, CA, USA, February 24-28,
                  2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12006},
  pages        = {319--344},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-40186-3\_14},
  doi          = {10.1007/978-3-030-40186-3\_14},
  timestamp    = {Fri, 14 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/GarayKP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CiampiKKZ20,
  author       = {Michele Ciampi and
                  Nikos Karayannidis and
                  Aggelos Kiayias and
                  Dionysis Zindros},
  editor       = {Liqun Chen and
                  Ninghui Li and
                  Kaitai Liang and
                  Steve A. Schneider},
  title        = {Updatable Blockchains},
  booktitle    = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research
                  in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18,
                  2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12309},
  pages        = {590--609},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-59013-0\_29},
  doi          = {10.1007/978-3-030-59013-0\_29},
  timestamp    = {Fri, 02 Jul 2021 20:12:27 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/CiampiKKZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GarayKOPZ20,
  author       = {Juan A. Garay and
                  Aggelos Kiayias and
                  Rafail M. Ostrovsky and
                  Giorgos Panagiotakos and
                  Vassilis Zikas},
  editor       = {Anne Canteaut and
                  Yuval Ishai},
  title        = {Resource-Restricted Cryptography: Revisiting {MPC} Bounds in the Proof-of-Work
                  Era},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12106},
  pages        = {129--158},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45724-2\_5},
  doi          = {10.1007/978-3-030-45724-2\_5},
  timestamp    = {Mon, 04 May 2020 14:32:28 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GarayKOPZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/BrunjesKKS20,
  author       = {Lars Br{\"{u}}njes and
                  Aggelos Kiayias and
                  Elias Koutsoupias and
                  Aikaterini{-}Panagiota Stouka},
  title        = {Reward Sharing Schemes for Stake Pools},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2020, Genoa, Italy, September 7-11, 2020},
  pages        = {256--275},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/EuroSP48549.2020.00024},
  doi          = {10.1109/EUROSP48549.2020.00024},
  timestamp    = {Tue, 10 Nov 2020 11:45:04 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/BrunjesKKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Kiayias0Z20,
  author       = {Aggelos Kiayias and
                  Andrew Miller and
                  Dionysis Zindros},
  editor       = {Joseph Bonneau and
                  Nadia Heninger},
  title        = {Non-interactive Proofs of Proof-of-Work},
  booktitle    = {Financial Cryptography and Data Security - 24th International Conference,
                  {FC} 2020, Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12059},
  pages        = {505--522},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-51280-4\_27},
  doi          = {10.1007/978-3-030-51280-4\_27},
  timestamp    = {Wed, 22 Jul 2020 12:13:31 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Kiayias0Z20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KarantiasKZ20,
  author       = {Kostis Karantias and
                  Aggelos Kiayias and
                  Dionysis Zindros},
  editor       = {Joseph Bonneau and
                  Nadia Heninger},
  title        = {Proof-of-Burn},
  booktitle    = {Financial Cryptography and Data Security - 24th International Conference,
                  {FC} 2020, Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12059},
  pages        = {523--540},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-51280-4\_28},
  doi          = {10.1007/978-3-030-51280-4\_28},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/KarantiasKZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/KiayiasQR20,
  author       = {Aggelos Kiayias and
                  Saad Quader and
                  Alexander Russell},
  title        = {Consistency of Proof-of-Stake Blockchains with Concurrent Honest Slot
                  Leaders},
  booktitle    = {40th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2020, Singapore, November 29 - December 1, 2020},
  pages        = {776--786},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICDCS47774.2020.00065},
  doi          = {10.1109/ICDCS47774.2020.00065},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcs/KiayiasQR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/marble/KarantiasKZ20,
  author       = {Kostis Karantias and
                  Aggelos Kiayias and
                  Dionysis Zindros},
  editor       = {Panos M. Pardalos and
                  Ilias S. Kotsireas and
                  Yike Guo and
                  William J. Knottenbelt},
  title        = {Smart Contract Derivatives},
  booktitle    = {2nd International Conference on Mathematical Research for Blockchain
                  Economy, {MARBLE} 2020, online, August 24, 2020},
  series       = {Springer Proceedings in Business and Economics},
  pages        = {1--8},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-53356-4\_1},
  doi          = {10.1007/978-3-030-53356-4\_1},
  timestamp    = {Tue, 11 Jul 2023 16:48:23 +0200},
  biburl       = {https://dblp.org/rec/conf/marble/KarantiasKZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/KarakostasKL20,
  author       = {Dimitris Karakostas and
                  Aggelos Kiayias and
                  Mario Larangeira},
  editor       = {Clemente Galdi and
                  Vladimir Kolesnikov},
  title        = {Account Management in Proof of Stake Ledgers},
  booktitle    = {Security and Cryptography for Networks - 12th International Conference,
                  {SCN} 2020, Amalfi, Italy, September 14-16, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12238},
  pages        = {3--23},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57990-6\_1},
  doi          = {10.1007/978-3-030-57990-6\_1},
  timestamp    = {Tue, 08 Sep 2020 19:15:32 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/KarakostasKL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soda/BlumKMQR20,
  author       = {Erica Blum and
                  Aggelos Kiayias and
                  Cristopher Moore and
                  Saad Quader and
                  Alexander Russell},
  editor       = {Shuchi Chawla},
  title        = {The Combinatorics of the Longest-Chain Rule: Linear Consistency for
                  Proof-of-Stake Blockchains},
  booktitle    = {Proceedings of the 2020 {ACM-SIAM} Symposium on Discrete Algorithms,
                  {SODA} 2020, Salt Lake City, UT, USA, January 5-8, 2020},
  pages        = {1135--1154},
  publisher    = {{SIAM}},
  year         = {2020},
  url          = {https://doi.org/10.1137/1.9781611975994.69},
  doi          = {10.1137/1.9781611975994.69},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/soda/BlumKMQR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/Amos0KZ20,
  author       = {Ryan Amos and
                  Marios Georgiou and
                  Aggelos Kiayias and
                  Mark Zhandry},
  editor       = {Konstantin Makarychev and
                  Yury Makarychev and
                  Madhur Tulsiani and
                  Gautam Kamath and
                  Julia Chuzhoy},
  title        = {One-shot signatures and applications to hybrid quantum/classical authentication},
  booktitle    = {Proceedings of the 52nd Annual {ACM} {SIGACT} Symposium on Theory
                  of Computing, {STOC} 2020, Chicago, IL, USA, June 22-26, 2020},
  pages        = {255--268},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3357713.3384304},
  doi          = {10.1145/3357713.3384304},
  timestamp    = {Mon, 18 Dec 2023 07:33:37 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/Amos0KZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GarayKP20,
  author       = {Juan A. Garay and
                  Aggelos Kiayias and
                  Giorgos Panagiotakos},
  editor       = {Rafael Pass and
                  Krzysztof Pietrzak},
  title        = {Blockchains from Non-idealized Hash Functions},
  booktitle    = {Theory of Cryptography - 18th International Conference, {TCC} 2020,
                  Durham, NC, USA, November 16-19, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12550},
  pages        = {291--321},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64375-1\_11},
  doi          = {10.1007/978-3-030-64375-1\_11},
  timestamp    = {Tue, 15 Dec 2020 11:52:09 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/GarayKP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/FitziGKR20,
  author       = {Matthias Fitzi and
                  Peter Gazi and
                  Aggelos Kiayias and
                  Alexander Russell},
  editor       = {Rafael Pass and
                  Krzysztof Pietrzak},
  title        = {Ledger Combiners for Fast Settlement},
  booktitle    = {Theory of Cryptography - 18th International Conference, {TCC} 2020,
                  Durham, NC, USA, November 16-19, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12550},
  pages        = {322--352},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64375-1\_12},
  doi          = {10.1007/978-3-030-64375-1\_12},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/FitziGKR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2020-1,
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12110},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45374-9},
  doi          = {10.1007/978-3-030-45374-9},
  isbn         = {978-3-030-45373-2},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2020-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2020-2,
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12111},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45388-6},
  doi          = {10.1007/978-3-030-45388-6},
  isbn         = {978-3-030-45387-9},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2020-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2001-00047,
  author       = {Aggelos Kiayias and
                  Aikaterini{-}Panagiota Stouka},
  title        = {Coalition-Safe Equilibria with Virtual Payoffs},
  journal      = {CoRR},
  volume       = {abs/2001.00047},
  year         = {2020},
  url          = {http://arxiv.org/abs/2001.00047},
  eprinttype    = {arXiv},
  eprint       = {2001.00047},
  timestamp    = {Fri, 10 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2001-00047.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2001-06403,
  author       = {Aggelos Kiayias and
                  Saad Quader and
                  Alexander Russell},
  title        = {Consistency of Proof-of-Stake Blockchains with Concurrent Honest Slot
                  Leaders},
  journal      = {CoRR},
  volume       = {abs/2001.06403},
  year         = {2020},
  url          = {https://arxiv.org/abs/2001.06403},
  eprinttype    = {arXiv},
  eprint       = {2001.06403},
  timestamp    = {Fri, 24 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2001-06403.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-15254,
  author       = {Alexandru Cojocaru and
                  Juan A. Garay and
                  Aggelos Kiayias and
                  Fang Song and
                  Petros Wallden},
  title        = {Post-Quantum Security of the Bitcoin Backbone and Quantum Multi-Solution
                  Bernoulli Search},
  journal      = {CoRR},
  volume       = {abs/2012.15254},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.15254},
  eprinttype    = {arXiv},
  eprint       = {2012.15254},
  timestamp    = {Mon, 01 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-15254.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FitziGKR20,
  author       = {Matthias Fitzi and
                  Peter Gazi and
                  Aggelos Kiayias and
                  Alexander Russell},
  title        = {Proof-of-Stake Blockchain Protocols with Near-Optimal Throughput},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {37},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/037},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FitziGKR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasQR20,
  author       = {Aggelos Kiayias and
                  Saad Quader and
                  Alexander Russell},
  title        = {Consistency in Proof-of-Stake Blockchains with Concurrent Honest Slot
                  Leaders},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {41},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/041},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasQR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AmosGKZ20,
  author       = {Ryan Amos and
                  Marios Georgiou and
                  Aggelos Kiayias and
                  Mark Zhandry},
  title        = {One-shot Signatures and Applications to Hybrid Quantum/Classical Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {107},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/107},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AmosGKZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadertscherKKW20,
  author       = {Christian Badertscher and
                  Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Hendrik Waldner},
  title        = {Consistency for Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {137},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/137},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BadertscherKKW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KarantiasKZ20,
  author       = {Kostis Karantias and
                  Aggelos Kiayias and
                  Dionysis Zindros},
  title        = {Smart Contract Derivatives},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {138},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/138},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KarantiasKZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KarakostasK20,
  author       = {Dimitris Karakostas and
                  Aggelos Kiayias},
  title        = {Securing Proof-of-Work Ledgers via Checkpointing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {173},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/173},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KarakostasK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarayKL20,
  author       = {Juan A. Garay and
                  Aggelos Kiayias and
                  Nikos Leonardos},
  title        = {Full Analysis of Nakamoto Consensus in Bounded-Delay Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {277},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/277},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarayKL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChakravartyCFGK20,
  author       = {Manuel M. T. Chakravarty and
                  Sandro Coretti and
                  Matthias Fitzi and
                  Peter Gazi and
                  Philipp Kant and
                  Aggelos Kiayias and
                  Alexander Russell},
  title        = {Hydra: Fast Isomorphic State Channels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {299},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/299},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChakravartyCFGK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KerberKK20,
  author       = {Thomas Kerber and
                  Aggelos Kiayias and
                  Markulf Kohlweiss},
  title        = {Mining for Privacy: How to Bootstrap a Snarky Blockchain},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {401},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/401},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KerberKK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KarakostasKL20,
  author       = {Dimitris Karakostas and
                  Aggelos Kiayias and
                  Mario Larangeira},
  title        = {Account Management in Proof of Stake Ledgers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {525},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/525},
  timestamp    = {Wed, 27 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KarakostasKL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KerberKK20a,
  author       = {Thomas Kerber and
                  Aggelos Kiayias and
                  Markulf Kohlweiss},
  title        = {Kachina - Foundations of Private Smart Contracts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {543},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/543},
  timestamp    = {Wed, 27 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KerberKK20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaziKR20,
  author       = {Peter Gazi and
                  Aggelos Kiayias and
                  Alexander Russell},
  title        = {Tight Consistency Bounds for Bitcoin},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {661},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/661},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaziKR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FitziGKR20a,
  author       = {Matthias Fitzi and
                  Peter Gazi and
                  Aggelos Kiayias and
                  Alexander Russell},
  title        = {Ledger Combiners for Fast Settlement},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {675},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/675},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FitziGKR20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaldimtsiKZZ20,
  author       = {Foteini Baldimtsi and
                  Aggelos Kiayias and
                  Thomas Zacharias and
                  Bingsheng Zhang},
  title        = {Crowd Verifiable Zero-Knowledge and End-to-end Verifiable Multiparty
                  Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {711},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/711},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaldimtsiKZZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CiampiKKZ20,
  author       = {Michele Ciampi and
                  Nikos Karayannidis and
                  Aggelos Kiayias and
                  Dionysis Zindros},
  title        = {Updatable Blockchains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {887},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/887},
  timestamp    = {Mon, 27 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CiampiKKZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaveasKKZ20,
  author       = {Stelios Daveas and
                  Kostis Karantias and
                  Aggelos Kiayias and
                  Dionysis Zindros},
  title        = {A Gas-Efficient Superlight Bitcoin Client in Solidity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {927},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/927},
  timestamp    = {Mon, 27 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DaveasKKZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadertscherGKRZ20,
  author       = {Christian Badertscher and
                  Peter Gazi and
                  Aggelos Kiayias and
                  Alexander Russell and
                  Vassilis Zikas},
  title        = {Consensus Redux: Distributed Ledgers in the Face of Adversarial Supremacy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1021},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1021},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BadertscherGKRZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasPZ20,
  author       = {Aggelos Kiayias and
                  Andrianna Polydouri and
                  Dionysis Zindros},
  title        = {The Velvet Path to Superlight Blockchain Clients},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1122},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1122},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasPZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChondrosZZDMPDK19,
  author       = {Nikos Chondros and
                  Bingsheng Zhang and
                  Thomas Zacharias and
                  Panos Diamantopoulos and
                  Stathis Maneas and
                  Christos Patsonakis and
                  Alex Delis and
                  Aggelos Kiayias and
                  Mema Roussopoulos},
  title        = {Distributed, end-to-end verifiable, and privacy-preserving internet
                  voting systems},
  journal      = {Comput. Secur.},
  volume       = {83},
  pages        = {268--299},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.cose.2019.03.001},
  doi          = {10.1016/J.COSE.2019.03.001},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ChondrosZZDMPDK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dappcon/PatsonakisSKR19,
  author       = {Christos Patsonakis and
                  Katerina Samari and
                  Aggelos Kiayias and
                  Mema Roussopoulos},
  title        = {On the Practicality of a Smart Contract {PKI}},
  booktitle    = {{IEEE} International Conference on Decentralized Applications and
                  Infrastructures, {DAPPCON} 2019, Newark, CA, USA, April 4-9, 2019},
  pages        = {109--118},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/DAPPCON.2019.00022},
  doi          = {10.1109/DAPPCON.2019.00022},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dappcon/PatsonakisSKR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KiayiasZ19,
  author       = {Aggelos Kiayias and
                  Dionysis Zindros},
  editor       = {Andrea Bracciali and
                  Jeremy Clark and
                  Federico Pintore and
                  Peter B. R{\o}nne and
                  Massimiliano Sala},
  title        = {Proof-of-Work Sidechains},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2019 International
                  Workshops, {VOTING} and WTSC, St. Kitts, St. Kitts and Nevis, February
                  18-22, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11599},
  pages        = {21--34},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43725-1\_3},
  doi          = {10.1007/978-3-030-43725-1\_3},
  timestamp    = {Mon, 03 Jan 2022 22:29:34 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/KiayiasZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ArapinisGKK19,
  author       = {Myrto Arapinis and
                  Andriana Gkaniatsou and
                  Dimitris Karakostas and
                  Aggelos Kiayias},
  editor       = {Ian Goldberg and
                  Tyler Moore},
  title        = {A Formal Treatment of Hardware Wallets},
  booktitle    = {Financial Cryptography and Data Security - 23rd International Conference,
                  {FC} 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11598},
  pages        = {426--445},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32101-7\_26},
  doi          = {10.1007/978-3-030-32101-7\_26},
  timestamp    = {Wed, 12 Aug 2020 17:59:02 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/ArapinisGKK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/marble/KarantiasKZ19,
  author       = {Kostis Karantias and
                  Aggelos Kiayias and
                  Dionysis Zindros},
  editor       = {Panos M. Pardalos and
                  Ilias S. Kotsireas and
                  Yike Guo and
                  William J. Knottenbelt},
  title        = {Compact Storage of Superblocks for NIPoPoW Applications},
  booktitle    = {1st International Conference on Mathematical Research for Blockchain
                  Economy, {MARBLE} 2019, Santorini, Greece, May 6-9, 2019},
  series       = {Springer Proceedings in Business and Economics},
  pages        = {77--91},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-37110-4\_6},
  doi          = {10.1007/978-3-030-37110-4\_6},
  timestamp    = {Tue, 11 Jul 2023 15:51:52 +0200},
  biburl       = {https://dblp.org/rec/conf/marble/KarantiasKZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/GaziKZ19,
  author       = {Peter Gazi and
                  Aggelos Kiayias and
                  Dionysis Zindros},
  title        = {Proof-of-Stake Sidechains},
  booktitle    = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco,
                  CA, USA, May 19-23, 2019},
  pages        = {139--156},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SP.2019.00040},
  doi          = {10.1109/SP.2019.00040},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/GaziKZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KerberKKZ19,
  author       = {Thomas Kerber and
                  Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Vassilis Zikas},
  title        = {Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake},
  booktitle    = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco,
                  CA, USA, May 19-23, 2019},
  pages        = {157--174},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SP.2019.00063},
  doi          = {10.1109/SP.2019.00063},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/KerberKKZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tokenomics/KiayiasLML19,
  author       = {Aggelos Kiayias and
                  Benjamin Livshits and
                  Andr{\'{e}}s Monteoliva Mosteiro and
                  Orfeas Stefanos Thyfronitis Litos},
  editor       = {Vincent Danos and
                  Maurice Herlihy and
                  Maria Potop{-}Butucaru and
                  Julien Prat and
                  Sara Tucci Piergiovanni},
  title        = {A Puff of Steem: Security Analysis of Decentralized Content Curation},
  booktitle    = {International Conference on Blockchain Economics, Security and Protocols,
                  Tokenomics 2019, May 6-7, 2019, Paris, France},
  series       = {OASIcs},
  volume       = {71},
  pages        = {3:1--3:21},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2019},
  url          = {https://doi.org/10.4230/OASIcs.Tokenomics.2019.3},
  doi          = {10.4230/OASICS.TOKENOMICS.2019.3},
  timestamp    = {Mon, 21 Dec 2020 13:23:22 +0100},
  biburl       = {https://dblp.org/rec/conf/tokenomics/KiayiasLML19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tokenomics/KarakostasKNZ19,
  author       = {Dimitris Karakostas and
                  Aggelos Kiayias and
                  Christos Nasikas and
                  Dionysis Zindros},
  editor       = {Vincent Danos and
                  Maurice Herlihy and
                  Maria Potop{-}Butucaru and
                  Julien Prat and
                  Sara Tucci Piergiovanni},
  title        = {Cryptocurrency Egalitarianism: {A} Quantitative Approach},
  booktitle    = {International Conference on Blockchain Economics, Security and Protocols,
                  Tokenomics 2019, May 6-7, 2019, Paris, France},
  series       = {OASIcs},
  volume       = {71},
  pages        = {7:1--7:21},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2019},
  url          = {https://doi.org/10.4230/OASIcs.Tokenomics.2019.7},
  doi          = {10.4230/OASICS.TOKENOMICS.2019.7},
  timestamp    = {Wed, 16 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tokenomics/KarakostasKNZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1902-00878,
  author       = {Christos Patsonakis and
                  Katerina Samari and
                  Aggelos Kiayias and
                  Mema Roussopoulos},
  title        = {On the Practicality of Smart Contract {PKI}},
  journal      = {CoRR},
  volume       = {abs/1902.00878},
  year         = {2019},
  url          = {http://arxiv.org/abs/1902.00878},
  eprinttype    = {arXiv},
  eprint       = {1902.00878},
  timestamp    = {Tue, 21 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1902-00878.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-02434,
  author       = {Dimitris Karakostas and
                  Aggelos Kiayias and
                  Christos Nasikas and
                  Dionysis Zindros},
  title        = {Cryptocurrency Egalitarianism: {A} Quantitative Approach},
  journal      = {CoRR},
  volume       = {abs/1907.02434},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.02434},
  eprinttype    = {arXiv},
  eprint       = {1907.02434},
  timestamp    = {Mon, 08 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-02434.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-10187,
  author       = {Erica Blum and
                  Aggelos Kiayias and
                  Cristopher Moore and
                  Saad Quader and
                  Alexander Russell},
  title        = {Linear Consistency for Proof-of-Stake Blockchains},
  journal      = {CoRR},
  volume       = {abs/1911.10187},
  year         = {2019},
  url          = {http://arxiv.org/abs/1911.10187},
  eprinttype    = {arXiv},
  eprint       = {1911.10187},
  timestamp    = {Tue, 03 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1911-10187.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArapinisGKK19,
  author       = {Myrto Arapinis and
                  Andriana Gkaniatsou and
                  Dimitris Karakostas and
                  Aggelos Kiayias},
  title        = {A Formal Treatment of Hardware Wallets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {34},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/034},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArapinisGKK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarayKP19,
  author       = {Juan A. Garay and
                  Aggelos Kiayias and
                  Giorgos Panagiotakos},
  title        = {Iterated Search Problems and Blockchain Security under Falsifiable
                  Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {315},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/315},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarayKP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbadiCKZ19,
  author       = {Aydin Abadi and
                  Michele Ciampi and
                  Aggelos Kiayias and
                  Vassilis Zikas},
  title        = {Timed Signatures and Zero-Knowledge Proofs -Timestamping in the Blockchain
                  Era-},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {644},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/644},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbadiCKZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasL19,
  author       = {Aggelos Kiayias and
                  Orfeas Stefanos Thyfronitis Litos},
  title        = {A Composable Security Treatment of the Lightning Network},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {778},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/778},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadertscherGKRZ19,
  author       = {Christian Badertscher and
                  Peter Gazi and
                  Aggelos Kiayias and
                  Alexander Russell and
                  Vassilis Zikas},
  title        = {Ouroboros Chronos: Permissionless Clock Synchronization via Proof-of-Stake},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {838},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/838},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BadertscherGKRZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KarantiasKZ19,
  author       = {Kostis Karantias and
                  Aggelos Kiayias and
                  Dionysis Zindros},
  title        = {Proof-of-Burn},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1096},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1096},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KarantiasKZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZamyatinAZKMKK19,
  author       = {Alexei Zamyatin and
                  Mustafa Al{-}Bassam and
                  Dionysis Zindros and
                  Eleftherios Kokoris{-}Kogias and
                  Pedro Moreno{-}Sanchez and
                  Aggelos Kiayias and
                  William J. Knottenbelt},
  title        = {SoK: Communication Across Distributed Ledgers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1128},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1128},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZamyatinAZKMKK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CojocaruGKSW19,
  author       = {Alexandru Cojocaru and
                  Juan A. Garay and
                  Aggelos Kiayias and
                  Fang Song and
                  Petros Wallden},
  title        = {The Bitcoin Backbone Protocol Against Quantum Adversaries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1150},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1150},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CojocaruGKSW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarayKOPZ19,
  author       = {Juan A. Garay and
                  Aggelos Kiayias and
                  Rafail Ostrovsky and
                  Giorgos Panagiotakos and
                  Vassilis Zikas},
  title        = {Resource-Restricted Cryptography: Honest-Majority {MPC} from a {CRS}
                  (and No Broadcast)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1264},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1264},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarayKOPZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KarantiasKLZ19,
  author       = {Kostis Karantias and
                  Aggelos Kiayias and
                  Nikos Leonardos and
                  Dionysis Zindros},
  title        = {Compact Storage of Superblocks for NIPoPoW Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1444},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1444},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KarantiasKLZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ChaidosFK018,
  author       = {Pyrros Chaidos and
                  Olga Fourtounelli and
                  Aggelos Kiayias and
                  Thomas Zacharias},
  editor       = {Thomas Peyrin and
                  Steven D. Galbraith},
  title        = {A Universally Composable Framework for the Privacy of Email Ecosystems},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11274},
  pages        = {191--221},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03332-3\_8},
  doi          = {10.1007/978-3-030-03332-3\_8},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ChaidosFK018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BadertscherGKRZ18,
  author       = {Christian Badertscher and
                  Peter Gazi and
                  Aggelos Kiayias and
                  Alexander Russell and
                  Vassilis Zikas},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic
                  Availability},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {913--930},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243848},
  doi          = {10.1145/3243734.3243848},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BadertscherGKRZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KiayiasLT18,
  author       = {Aggelos Kiayias and
                  Feng{-}Hao Liu and
                  Yiannis Tselekounis},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Non-Malleable Codes for Partial Functions with Manipulation Detection},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10993},
  pages        = {577--607},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96878-0\_20},
  doi          = {10.1007/978-3-319-96878-0\_20},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KiayiasLT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvcbt/GaziKR18,
  author       = {Peter Gazi and
                  Aggelos Kiayias and
                  Alexander Russell},
  title        = {Stake-Bleeding Attacks on Proof-of-Stake Blockchains},
  booktitle    = {Crypto Valley Conference on Blockchain Technology, {CVCBT} 2018, Zug,
                  Switzerland, June 20-22, 2018},
  pages        = {85--92},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CVCBT.2018.00015},
  doi          = {10.1109/CVCBT.2018.00015},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cvcbt/GaziKR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DavidGKR18,
  author       = {Bernardo David and
                  Peter Gazi and
                  Aggelos Kiayias and
                  Alexander Russell},
  editor       = {Jesper Buus Nielsen and
                  Vincent Rijmen},
  title        = {Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake
                  Blockchain},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10821},
  pages        = {66--98},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-78375-8\_3},
  doi          = {10.1007/978-3-319-78375-8\_3},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DavidGKR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GarayKLP18,
  author       = {Juan A. Garay and
                  Aggelos Kiayias and
                  Nikos Leonardos and
                  Giorgos Panagiotakos},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Bootstrapping the Blockchain, with Applications to Consensus and Fast
                  {PKI} Setup},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10770},
  pages        = {465--495},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76581-5\_16},
  doi          = {10.1007/978-3-319-76581-5\_16},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GarayKLP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/AtenieseKMT018,
  author       = {Giuseppe Ateniese and
                  Aggelos Kiayias and
                  Bernardo Magri and
                  Yiannis Tselekounis and
                  Daniele Venturi},
  editor       = {Joonsang Baek and
                  Willy Susilo and
                  Jongkil Kim},
  title        = {Secure Outsourcing of Cryptographic Circuits Manufacturing},
  booktitle    = {Provable Security - 12th International Conference, ProvSec 2018, Jeju,
                  South Korea, October 25-28, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11192},
  pages        = {75--93},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01446-9\_5},
  doi          = {10.1007/978-3-030-01446-9\_5},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/AtenieseKMT018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/KiayiasKLS018,
  author       = {Aggelos Kiayias and
                  Annabell Kuldmaa and
                  Helger Lipmaa and
                  Janno Siim and
                  Thomas Zacharias},
  editor       = {Dario Catalano and
                  Roberto De Prisco},
  title        = {On the Security Properties of e-Voting Bulletin Boards},
  booktitle    = {Security and Cryptography for Networks - 11th International Conference,
                  {SCN} 2018, Amalfi, Italy, September 5-7, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11035},
  pages        = {505--523},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98113-0\_27},
  doi          = {10.1007/978-3-319-98113-0\_27},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scn/KiayiasKLS018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1807-11218,
  author       = {Lars Br{\"{u}}njes and
                  Aggelos Kiayias and
                  Elias Koutsoupias and
                  Aikaterini{-}Panagiota Stouka},
  title        = {Reward Sharing Schemes for Stake Pools},
  journal      = {CoRR},
  volume       = {abs/1807.11218},
  year         = {2018},
  url          = {http://arxiv.org/abs/1807.11218},
  eprinttype    = {arXiv},
  eprint       = {1807.11218},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1807-11218.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-01719,
  author       = {Aggelos Kiayias and
                  Benjamin Livshits and
                  Andr{\'{e}}s Monteoliva Mosteiro and
                  Orfeas Stefanos Thyfronitis Litos},
  title        = {A Puff of Steem: Security Analysis of Decentralized Content Curation},
  journal      = {CoRR},
  volume       = {abs/1810.01719},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.01719},
  eprinttype    = {arXiv},
  eprint       = {1810.01719},
  timestamp    = {Tue, 30 Oct 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-01719.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1811-01348,
  author       = {Georgia Avarikioti and
                  Roman Brunner and
                  Aggelos Kiayias and
                  Roger Wattenhofer and
                  Dionysis Zindros},
  title        = {Structure and Content of the Visible Darknet},
  journal      = {CoRR},
  volume       = {abs/1811.01348},
  year         = {2018},
  url          = {http://arxiv.org/abs/1811.01348},
  eprinttype    = {arXiv},
  eprint       = {1811.01348},
  timestamp    = {Thu, 22 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1811-01348.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaziKR18,
  author       = {Peter Gazi and
                  Aggelos Kiayias and
                  Alexander Russell},
  title        = {Stake-Bleeding Attacks on Proof-of-Stake Blockchains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {248},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/248},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaziKR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadertscherGKRZ18,
  author       = {Christian Badertscher and
                  Peter Gazi and
                  Aggelos Kiayias and
                  Alexander Russell and
                  Vassilis Zikas},
  title        = {Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic
                  Availability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {378},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/378},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BadertscherGKRZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasLT18,
  author       = {Aggelos Kiayias and
                  Feng{-}Hao Liu and
                  Yiannis Tselekounis},
  title        = {Non-Malleable Codes for Partial Functions with Manipulation Detection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {538},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/538},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasLT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasKLSZ18,
  author       = {Aggelos Kiayias and
                  Annabell Kuldmaa and
                  Helger Lipmaa and
                  Janno Siim and
                  Thomas Zacharias},
  title        = {On the Security Properties of e-Voting Bulletin Boards},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {567},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/567},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasKLSZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarayK18,
  author       = {Juan A. Garay and
                  Aggelos Kiayias},
  title        = {SoK: {A} Consensus Taxonomy in the Blockchain Era},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {754},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/754},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarayK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaidosFKZ18,
  author       = {Pyrros Chaidos and
                  Olga Fourtounelli and
                  Aggelos Kiayias and
                  Thomas Zacharias},
  title        = {A Universally Composable Framework for the Privacy of Email Ecosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {848},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/848},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaidosFKZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatsonakisSRK18,
  author       = {Christos Patsonakis and
                  Katerina Samari and
                  Mema Roussopoulos and
                  Aggelos Kiayias},
  title        = {Towards a Smart Contract-based, Decentralized, Public-Key Infrastructure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {853},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/853},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatsonakisSRK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasORT18,
  author       = {Aggelos Kiayias and
                  Murat Osmanoglu and
                  Alexander Russell and
                  Qiang Tang},
  title        = {Space Efficient Computational Multi-Secret Sharing and Its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1010},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1010},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasORT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasZ18,
  author       = {Aggelos Kiayias and
                  Dionysis Zindros},
  title        = {Proof-of-Work Sidechains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1048},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1048},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasR18,
  author       = {Aggelos Kiayias and
                  Alexander Russell},
  title        = {Ouroboros-BFT: {A} Simple Byzantine Fault Tolerant Consensus Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1049},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1049},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FitziGKR18,
  author       = {Matthias Fitzi and
                  Peter Gazi and
                  Aggelos Kiayias and
                  Alexander Russell},
  title        = {Parallel Chains: Improving Throughput and Latency of Blockchain Protocols
                  via Parallel Composition},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1119},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1119},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FitziGKR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KerberKKZ18,
  author       = {Thomas Kerber and
                  Markulf Kohlweiss and
                  Aggelos Kiayias and
                  Vassilis Zikas},
  title        = {Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1132},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1132},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KerberKKZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaziKZ18,
  author       = {Peter Gazi and
                  Aggelos Kiayias and
                  Dionysis Zindros},
  title        = {Proof-of-Stake Sidechains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1239},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1239},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaziKZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/KiayiasZZ17,
  author       = {Aggelos Kiayias and
                  Thomas Zacharias and
                  Bingsheng Zhang},
  title        = {An Efficient {E2E} Verifiable E-voting System without Setup Assumptions},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {15},
  number       = {3},
  pages        = {14--23},
  year         = {2017},
  url          = {https://doi.org/10.1109/MSP.2017.71},
  doi          = {10.1109/MSP.2017.71},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/KiayiasZZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KiayiasZZ17,
  author       = {Aggelos Kiayias and
                  Thomas Zacharias and
                  Bingsheng Zhang},
  title        = {Auditing for privacy in threshold {PKE} e-voting},
  journal      = {Inf. Comput. Secur.},
  volume       = {25},
  number       = {1},
  pages        = {100--116},
  year         = {2017},
  url          = {https://doi.org/10.1108/ICS-07-2016-0056},
  doi          = {10.1108/ICS-07-2016-0056},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/KiayiasZZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/JareckiKKX17,
  author       = {Stanislaw Jarecki and
                  Aggelos Kiayias and
                  Hugo Krawczyk and
                  Jiayu Xu},
  editor       = {Dieter Gollmann and
                  Atsuko Miyaji and
                  Hiroaki Kikuchi},
  title        = {{TOPPSS:} Cost-Minimal Password-Protected Secret Sharing Based on
                  Threshold {OPRF}},
  booktitle    = {Applied Cryptography and Network Security - 15th International Conference,
                  {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10355},
  pages        = {39--58},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61204-1\_3},
  doi          = {10.1007/978-3-319-61204-1\_3},
  timestamp    = {Tue, 07 May 2024 20:12:06 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/JareckiKKX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/PatsonakisSRK17,
  author       = {Christos Patsonakis and
                  Katerina Samari and
                  Mema Roussopoulos and
                  Aggelos Kiayias},
  editor       = {Srdjan Capkun and
                  Sherman S. M. Chow},
  title        = {Towards a Smart Contract-Based, Decentralized, Public-Key Infrastructure},
  booktitle    = {Cryptology and Network Security - 16th International Conference, {CANS}
                  2017, Hong Kong, China, November 30 - December 2, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11261},
  pages        = {299--321},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-030-02641-7\_14},
  doi          = {10.1007/978-3-030-02641-7\_14},
  timestamp    = {Wed, 25 Sep 2019 18:04:17 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/PatsonakisSRK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GarayKL17,
  author       = {Juan A. Garay and
                  Aggelos Kiayias and
                  Nikos Leonardos},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {The Bitcoin Backbone Protocol with Chains of Variable Difficulty},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10401},
  pages        = {291--323},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63688-7\_10},
  doi          = {10.1007/978-3-319-63688-7\_10},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GarayKL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KiayiasRDO17,
  author       = {Aggelos Kiayias and
                  Alexander Russell and
                  Bernardo David and
                  Roman Oliynykov},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Ouroboros: {A} Provably Secure Proof-of-Stake Blockchain Protocol},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10401},
  pages        = {357--388},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63688-7\_12},
  doi          = {10.1007/978-3-319-63688-7\_12},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KiayiasRDO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/BaldimtsiKS17,
  author       = {Foteini Baldimtsi and
                  Aggelos Kiayias and
                  Katerina Samari},
  editor       = {Phong Q. Nguyen and
                  Jianying Zhou},
  title        = {Watermarking Public-Key Cryptographic Functionalities and Implementations},
  booktitle    = {Information Security - 20th International Conference, {ISC} 2017,
                  Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10599},
  pages        = {173--191},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69659-1\_10},
  doi          = {10.1007/978-3-319-69659-1\_10},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/BaldimtsiKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/GkaniatsouAK17,
  author       = {Andriana Gkaniatsou and
                  Myrto Arapinis and
                  Aggelos Kiayias},
  editor       = {Phong Q. Nguyen and
                  Jianying Zhou},
  title        = {Low-Level Attacks in Bitcoin Wallets},
  booktitle    = {Information Security - 20th International Conference, {ISC} 2017,
                  Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10599},
  pages        = {233--253},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69659-1\_13},
  doi          = {10.1007/978-3-319-69659-1\_13},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/GkaniatsouAK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/KiayiasP17,
  author       = {Aggelos Kiayias and
                  Giorgos Panagiotakos},
  editor       = {Tanja Lange and
                  Orr Dunkelman},
  title        = {On Trees, Chains and Fast Transactions in the Blockchain},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2017 - 5th International Conference
                  on Cryptology and Information Security in Latin America, Havana, Cuba,
                  September 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11368},
  pages        = {327--351},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-030-25283-0\_18},
  doi          = {10.1007/978-3-030-25283-0\_18},
  timestamp    = {Mon, 22 Jul 2019 13:20:38 +0200},
  biburl       = {https://dblp.org/rec/conf/latincrypt/KiayiasP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Kiayias0Z17,
  author       = {Aggelos Kiayias and
                  Thomas Zacharias and
                  Bingsheng Zhang},
  editor       = {Serge Fehr},
  title        = {Ceremonies for End-to-End Verifiable Elections},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10175},
  pages        = {305--334},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54388-7\_11},
  doi          = {10.1007/978-3-662-54388-7\_11},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/Kiayias0Z17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AlexopoulosKT017,
  author       = {Nikolaos Alexopoulos and
                  Aggelos Kiayias and
                  Riivo Talviste and
                  Thomas Zacharias},
  editor       = {Engin Kirda and
                  Thomas Ristenpart},
  title        = {MCMix: Anonymous Messaging via Secure Multiparty Computation},
  booktitle    = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
                  BC, Canada, August 16-18, 2017},
  pages        = {1217--1234},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/alexopoulos},
  timestamp    = {Mon, 01 Feb 2021 08:42:59 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/AlexopoulosKT017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2017,
  editor       = {Aggelos Kiayias},
  title        = {Financial Cryptography and Data Security - 21st International Conference,
                  {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10322},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70972-7},
  doi          = {10.1007/978-3-319-70972-7},
  isbn         = {978-3-319-70971-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasLT17,
  author       = {Aggelos Kiayias and
                  Feng{-}Hao Liu and
                  Yiannis Tselekounis},
  title        = {Practical Non-Malleable Codes from {\(\mathscr{l}\)}-more Extractable
                  Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {40},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/040},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasLT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RussellMKQ17,
  author       = {Alexander Russell and
                  Cristopher Moore and
                  Aggelos Kiayias and
                  Saad Quader},
  title        = {Forkable Strings are Rare},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {241},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/241},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RussellMKQ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JareckiKKX17,
  author       = {Stanislaw Jarecki and
                  Aggelos Kiayias and
                  Hugo Krawczyk and
                  Jiayu Xu},
  title        = {{TOPPSS:} Cost-minimal Password-Protected Secret Sharing based on
                  Threshold {OPRF}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {363},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/363},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JareckiKKX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaldimtsiKS17,
  author       = {Foteini Baldimtsi and
                  Aggelos Kiayias and
                  Katerina Samari},
  title        = {Watermarking Public-key Cryptographic Functionalities and Implementations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {557},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/557},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaldimtsiKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DavidGKR17,
  author       = {Bernardo Machado David and
                  Peter Gazi and
                  Aggelos Kiayias and
                  Alexander Russell},
  title        = {Ouroboros Praos: An adaptively-secure, semi-synchronous proof-of-stake
                  protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {573},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/573},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DavidGKR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarayKP17,
  author       = {Juan A. Garay and
                  Aggelos Kiayias and
                  Giorgos Panagiotakos},
  title        = {Proofs of Work for Blockchain Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {775},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/775},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarayKP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlexopoulosKTZ17,
  author       = {Nikolaos Alexopoulos and
                  Aggelos Kiayias and
                  Riivo Talviste and
                  Thomas Zacharias},
  title        = {MCMix: Anonymous Messaging via Secure Multiparty Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {778},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/778},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlexopoulosKTZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasMZ17,
  author       = {Aggelos Kiayias and
                  Andrew Miller and
                  Dionysis Zindros},
  title        = {Non-Interactive Proofs of Proof-of-Work},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {963},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/963},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasMZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/EdmanKTY16,
  author       = {Matthew Edman and
                  Aggelos Kiayias and
                  Qiang Tang and
                  B{\"{u}}lent Yener},
  title        = {On the Security of Key Extraction From Measuring Physical Quantities},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {8},
  pages        = {1796--1806},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2543687},
  doi          = {10.1109/TIFS.2016.2543687},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/EdmanKTY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BaldimtsiK0Z16,
  author       = {Foteini Baldimtsi and
                  Aggelos Kiayias and
                  Thomas Zacharias and
                  Bingsheng Zhang},
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {Indistinguishable Proofs of Work or Knowledge},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10032},
  pages        = {902--933},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53890-6\_30},
  doi          = {10.1007/978-3-662-53890-6\_30},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BaldimtsiK0Z16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KiayiasLT16,
  author       = {Aggelos Kiayias and
                  Feng{-}Hao Liu and
                  Yiannis Tselekounis},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {Practical Non-Malleable Codes from l-more Extractable Hash Functions},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {1317--1328},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978352},
  doi          = {10.1145/2976749.2978352},
  timestamp    = {Tue, 10 Nov 2020 20:00:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KiayiasLT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ArgyrosSJKK16,
  author       = {George Argyros and
                  Ioannis Stais and
                  Suman Jana and
                  Angelos D. Keromytis and
                  Aggelos Kiayias},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {SFADiff: Automated Evasion Attacks and Fingerprinting Using Black-box
                  Differential Automata Learning},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {1690--1701},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978383},
  doi          = {10.1145/2976749.2978383},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ArgyrosSJKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KiayiasOR0W16,
  author       = {Aggelos Kiayias and
                  Ozgur Oksuz and
                  Alexander Russell and
                  Qiang Tang and
                  Bing Wang},
  editor       = {Ioannis G. Askoxylakis and
                  Sotiris Ioannidis and
                  Sokratis K. Katsikas and
                  Catherine Meadows},
  title        = {Efficient Encrypted Keyword Search for Multi-user Data Sharing},
  booktitle    = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research
                  in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9878},
  pages        = {173--195},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45744-4\_9},
  doi          = {10.1007/978-3-319-45744-4\_9},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/KiayiasOR0W16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KiayiasZZ16,
  author       = {Aggelos Kiayias and
                  Hong{-}Sheng Zhou and
                  Vassilis Zikas},
  editor       = {Marc Fischlin and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Fair and Robust Multi-party Computation Using a Global Transaction
                  Ledger},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9666},
  pages        = {705--734},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49896-5\_25},
  doi          = {10.1007/978-3-662-49896-5\_25},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KiayiasZZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/JareckiKKX16,
  author       = {Stanislaw Jarecki and
                  Aggelos Kiayias and
                  Hugo Krawczyk and
                  Jiayu Xu},
  title        = {Highly-Efficient and Composable Password-Protected Secret Sharing
                  (Or: How to Protect Your Bitcoin Wallet Online)},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2016, Saarbr{\"{u}}cken, Germany, March 21-24, 2016},
  pages        = {276--291},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/EuroSP.2016.30},
  doi          = {10.1109/EUROSP.2016.30},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/JareckiKKX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KiayiasLS16,
  author       = {Aggelos Kiayias and
                  Nikolaos Lamprou and
                  Aikaterini{-}Panagiota Stouka},
  editor       = {Jeremy Clark and
                  Sarah Meiklejohn and
                  Peter Y. A. Ryan and
                  Dan S. Wallach and
                  Michael Brenner and
                  Kurt Rohloff},
  title        = {Proofs of Proofs of Work with Sublinear Complexity},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2016 International
                  Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February
                  26, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9604},
  pages        = {61--78},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53357-4\_5},
  doi          = {10.1007/978-3-662-53357-4\_5},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/KiayiasLS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/ChondrosZ0DMPDK16,
  author       = {Nikos Chondros and
                  Bingsheng Zhang and
                  Thomas Zacharias and
                  Panos Diamantopoulos and
                  Stathis Maneas and
                  Christos Patsonakis and
                  Alex Delis and
                  Aggelos Kiayias and
                  Mema Roussopoulos},
  title        = {{D-DEMOS:} {A} Distributed, End-to-End Verifiable, Internet Voting
                  System},
  booktitle    = {36th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2016, Nara, Japan, June 27-30, 2016},
  pages        = {711--720},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICDCS.2016.56},
  doi          = {10.1109/ICDCS.2016.56},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/ChondrosZ0DMPDK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigecom/KiayiasKKT16,
  author       = {Aggelos Kiayias and
                  Elias Koutsoupias and
                  Maria Kyropoulou and
                  Yiannis Tselekounis},
  editor       = {Vincent Conitzer and
                  Dirk Bergemann and
                  Yiling Chen},
  title        = {Blockchain Mining Games},
  booktitle    = {Proceedings of the 2016 {ACM} Conference on Economics and Computation,
                  {EC} '16, Maastricht, The Netherlands, July 24-28, 2016},
  pages        = {365--382},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2940716.2940773},
  doi          = {10.1145/2940716.2940773},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigecom/KiayiasKKT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ArgyrosSKK16,
  author       = {George Argyros and
                  Ioannis Stais and
                  Aggelos Kiayias and
                  Angelos D. Keromytis},
  title        = {Back in Black: Towards Formal, Black Box Analysis of Sanitizers and
                  Filters},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA,
                  USA, May 22-26, 2016},
  pages        = {91--109},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SP.2016.14},
  doi          = {10.1109/SP.2016.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ArgyrosSKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wimob/NazaryanJYOWSK16,
  author       = {Levon Nazaryan and
                  Ruofan Jin and
                  Chaoqun Yue and
                  Ozgur Oksuz and
                  Bing Wang and
                  Kyoungwon Suh and
                  Aggelos Kiayias},
  title        = {Securely outsourcing cookies to the cloud via private information
                  retrieval},
  booktitle    = {12th {IEEE} International Conference on Wireless and Mobile Computing,
                  Networking and Communications, WiMob 2016, New York, NY, USA, October
                  17-19, 2016},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/WiMOB.2016.7763250},
  doi          = {10.1109/WIMOB.2016.7763250},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wimob/NazaryanJYOWSK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wimob/ZhangONYWKB16,
  author       = {Luqiao Zhang and
                  Ozgur Oksuz and
                  Levon Nazaryan and
                  Chaoqun Yue and
                  Bing Wang and
                  Aggelos Kiayias and
                  Athanasios Bamis},
  title        = {Encrypting wireless network traces to protect user privacy: {A} case
                  study for smart campus},
  booktitle    = {12th {IEEE} International Conference on Wireless and Mobile Computing,
                  Networking and Communications, WiMob 2016, New York, NY, USA, October
                  17-19, 2016},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/WiMOB.2016.7763266},
  doi          = {10.1109/WIMOB.2016.7763266},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wimob/ZhangONYWKB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KiayiasKKT16,
  author       = {Aggelos Kiayias and
                  Elias Koutsoupias and
                  Maria Kyropoulou and
                  Yiannis Tselekounis},
  title        = {Blockchain Mining Games},
  journal      = {CoRR},
  volume       = {abs/1607.02420},
  year         = {2016},
  url          = {http://arxiv.org/abs/1607.02420},
  eprinttype    = {arXiv},
  eprint       = {1607.02420},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KiayiasKKT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ChondrosZ0DMPDK16,
  author       = {Nikos Chondros and
                  Bingsheng Zhang and
                  Thomas Zacharias and
                  Panos Diamantopoulos and
                  Stathis Maneas and
                  Christos Patsonakis and
                  Alex Delis and
                  Aggelos Kiayias and
                  Mema Roussopoulos},
  title        = {Distributed, End-to-end Verifiable, and Privacy-Preserving Internet
                  Voting Systems},
  journal      = {CoRR},
  volume       = {abs/1608.00849},
  year         = {2016},
  url          = {http://arxiv.org/abs/1608.00849},
  eprinttype    = {arXiv},
  eprint       = {1608.00849},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ChondrosZ0DMPDK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JareckiKKX16,
  author       = {Stanislaw Jarecki and
                  Aggelos Kiayias and
                  Hugo Krawczyk and
                  Jiayu Xu},
  title        = {Highly-Efficient and Composable Password-Protected Secret Sharing
                  (Or: How to Protect Your Bitcoin Wallet Online)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {144},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/144},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JareckiKKX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseKMTV16,
  author       = {Giuseppe Ateniese and
                  Aggelos Kiayias and
                  Bernardo Magri and
                  Yiannis Tselekounis and
                  Daniele Venturi},
  title        = {Secure Outsourcing of Circuit Manufacturing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {527},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/527},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseKMTV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasP16,
  author       = {Aggelos Kiayias and
                  Giorgos Panagiotakos},
  title        = {On Trees, Chains and Fast Transactions in the Blockchain},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {545},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/545},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasKRDO16,
  author       = {Aggelos Kiayias and
                  Ioannis Konstantinou and
                  Alexander Russell and
                  Bernardo David and
                  Roman Oliynykov},
  title        = {A Provably Secure Proof-of-Stake Blockchain Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {889},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/889},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasKRDO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarayKLP16,
  author       = {Juan A. Garay and
                  Aggelos Kiayias and
                  Nikos Leonardos and
                  Giorgos Panagiotakos},
  title        = {Bootstrapping the Blockchain - Directly},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {991},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/991},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarayKLP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarayKL16,
  author       = {Juan A. Garay and
                  Aggelos Kiayias and
                  Nikos Leonardos},
  title        = {The Bitcoin Backbone Protocol with Chains of Variable Difficulty},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1048},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1048},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarayKL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/KiayiasLLPT15,
  author       = {Aggelos Kiayias and
                  Nikos Leonardos and
                  Helger Lipmaa and
                  Kateryna Pavlyk and
                  Qiang Tang},
  title        = {Optimal Rate Private Information Retrieval from Homomorphic Encryption},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2015},
  number       = {2},
  pages        = {222--243},
  year         = {2015},
  url          = {https://doi.org/10.1515/popets-2015-0016},
  doi          = {10.1515/POPETS-2015-0016},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/KiayiasLLPT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KiayiasT15,
  author       = {Aggelos Kiayias and
                  Qiang Tang},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {Traitor Deterring Schemes: Using Bitcoin as Collateral for Digital
                  Content},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {231--242},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813698},
  doi          = {10.1145/2810103.2813698},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/KiayiasT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Kiayias0Z15,
  author       = {Aggelos Kiayias and
                  Thomas Zacharias and
                  Bingsheng Zhang},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {{DEMOS-2:} Scalable {E2E} Verifiable Elections without Random Oracles},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {352--363},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813727},
  doi          = {10.1145/2810103.2813727},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Kiayias0Z15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/KiayiasLLPT15,
  author       = {Aggelos Kiayias and
                  Nikos Leonardos and
                  Helger Lipmaa and
                  Kateryna Pavlyk and
                  Qiang Tang},
  editor       = {Kaisa Nyberg},
  title        = {Communication Optimal Tardos-Based Asymmetric Fingerprinting},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2015, The Cryptographer's Track at
                  the {RSA} Conference 2015, San Francisco, CA, USA, April 20-24, 2015.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9048},
  pages        = {469--486},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-16715-2\_25},
  doi          = {10.1007/978-3-319-16715-2\_25},
  timestamp    = {Thu, 14 Oct 2021 10:27:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/KiayiasLLPT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edemocracy/Kiayias0Z15,
  author       = {Aggelos Kiayias and
                  Thomas Zacharias and
                  Bingsheng Zhang},
  editor       = {Sokratis K. Katsikas and
                  Alexander B. Sideridis},
  title        = {On the Necessity of Auditing for Election Privacy in e-Voting Systems},
  booktitle    = {E-Democracy - Citizen Rights in the World of the New Computing Paradigms
                  - 6th International Conference, E-Democracy 2015, Athens, Greece,
                  December 10-11, 2015, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {570},
  pages        = {3--17},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27164-4\_1},
  doi          = {10.1007/978-3-319-27164-4\_1},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edemocracy/Kiayias0Z15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KiayiasT15,
  author       = {Aggelos Kiayias and
                  Qiang Tang},
  editor       = {G{\"{u}}nther Pernul and
                  Peter Y. A. Ryan and
                  Edgar R. Weippl},
  title        = {Making Any Identity-Based Encryption Accountable, Efficiently},
  booktitle    = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research
                  in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9326},
  pages        = {326--346},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24174-6\_17},
  doi          = {10.1007/978-3-319-24174-6\_17},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/KiayiasT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GarayKL15,
  author       = {Juan A. Garay and
                  Aggelos Kiayias and
                  Nikos Leonardos},
  editor       = {Elisabeth Oswald and
                  Marc Fischlin},
  title        = {The Bitcoin Backbone Protocol: Analysis and Applications},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9057},
  pages        = {281--310},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46803-6\_10},
  doi          = {10.1007/978-3-662-46803-6\_10},
  timestamp    = {Thu, 14 Oct 2021 09:58:15 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GarayKL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KiayiasZZ15,
  author       = {Aggelos Kiayias and
                  Thomas Zacharias and
                  Bingsheng Zhang},
  editor       = {Elisabeth Oswald and
                  Marc Fischlin},
  title        = {End-to-End Verifiable Elections in the Standard Model},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9057},
  pages        = {468--498},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46803-6\_16},
  doi          = {10.1007/978-3-662-46803-6\_16},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KiayiasZZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/KentrosKKR15,
  author       = {Sotirios Kentros and
                  Chadi Kari and
                  Aggelos Kiayias and
                  Alexander Russell},
  title        = {Asynchronous Adaptive Task Allocation},
  booktitle    = {35th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2015, Columbus, OH, USA, June 29 - July 2, 2015},
  pages        = {83--92},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICDCS.2015.17},
  doi          = {10.1109/ICDCS.2015.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/KentrosKKR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/KiayiasOT15,
  author       = {Aggelos Kiayias and
                  Murat Osmanoglu and
                  Qiang Tang},
  editor       = {Javier L{\'{o}}pez and
                  Chris J. Mitchell},
  title        = {Graded Signatures},
  booktitle    = {Information Security - 18th International Conference, {ISC} 2015,
                  Trondheim, Norway, September 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9290},
  pages        = {61--80},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23318-5\_4},
  doi          = {10.1007/978-3-319-23318-5\_4},
  timestamp    = {Thu, 29 Aug 2019 08:10:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/KiayiasOT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/KiayiasOT15a,
  author       = {Aggelos Kiayias and
                  Ozgur Oksuz and
                  Qiang Tang},
  editor       = {Javier L{\'{o}}pez and
                  Chris J. Mitchell},
  title        = {Distributed Parameter Generation for Bilinear Diffie Hellman Exponentiation
                  and Applications},
  booktitle    = {Information Security - 18th International Conference, {ISC} 2015,
                  Trondheim, Norway, September 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9290},
  pages        = {548--567},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23318-5\_30},
  doi          = {10.1007/978-3-319-23318-5\_30},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/KiayiasOT15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GarayGJKY15,
  author       = {Juan A. Garay and
                  Ran Gelles and
                  David S. Johnson and
                  Aggelos Kiayias and
                  Moti Yung},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {A Little Honesty Goes a Long Way - The Two-Tier Model for Secure Multiparty
                  Computation},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  pages        = {134--158},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6\_7},
  doi          = {10.1007/978-3-662-46494-6\_7},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GarayGJKY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ChondrosZ0DMPDK15,
  author       = {Nikos Chondros and
                  Bingsheng Zhang and
                  Thomas Zacharias and
                  Panos Diamantopoulos and
                  Stathis Maneas and
                  Christos Patsonakis and
                  Alex Delis and
                  Aggelos Kiayias and
                  Mema Roussopoulos},
  title        = {A distributed, end-to-end verifiable, internet voting system},
  journal      = {CoRR},
  volume       = {abs/1507.06812},
  year         = {2015},
  url          = {http://arxiv.org/abs/1507.06812},
  eprinttype    = {arXiv},
  eprint       = {1507.06812},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ChondrosZ0DMPDK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasZZ15,
  author       = {Aggelos Kiayias and
                  Thomas Zacharias and
                  Bingsheng Zhang},
  title        = {End-to-End Verifiable Elections in the Standard Model{\({_\ast}\)}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {346},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/346},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasZZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasZZ15a,
  author       = {Aggelos Kiayias and
                  Hong{-}Sheng Zhou and
                  Vassilis Zikas},
  title        = {Fair and Robust Multi-Party Computation using a Global Transaction
                  Ledger},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {574},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/574},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasZZ15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasRRS15,
  author       = {Aggelos Kiayias and
                  Yona Raekow and
                  Alexander Russell and
                  Narasimha K. Shashidhar},
  title        = {A One-time Stegosystem and Applications to Efficient Covert Communication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {684},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/684},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasRRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasP15,
  author       = {Aggelos Kiayias and
                  Giorgos Panagiotakos},
  title        = {Speed-Security Tradeoffs in Blockchain Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1019},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1019},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kiayias0Z15,
  author       = {Aggelos Kiayias and
                  Thomas Zacharias and
                  Bingsheng Zhang},
  title        = {Ceremonies for End-to-End Verifiable Elections},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1166},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1166},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kiayias0Z15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaldimtsiK0Z15,
  author       = {Foteini Baldimtsi and
                  Aggelos Kiayias and
                  Thomas Zacharias and
                  Bingsheng Zhang},
  title        = {Indistinguishable Proofs of Work or Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1230},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1230},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaldimtsiK0Z15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/KiayiasRRS14,
  author       = {Aggelos Kiayias and
                  Yona Raekow and
                  Alexander Russell and
                  Narasimha K. Shashidhar},
  title        = {A One-Time Stegosystem and Applications to Efficient Covert Communication},
  journal      = {J. Cryptol.},
  volume       = {27},
  number       = {1},
  pages        = {23--44},
  year         = {2014},
  url          = {https://doi.org/10.1007/s00145-012-9135-4},
  doi          = {10.1007/S00145-012-9135-4},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/KiayiasRRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LengyelMPWVK14,
  author       = {Tamas K. Lengyel and
                  Steve Maresca and
                  Bryan D. Payne and
                  George D. Webster and
                  Sebastian Vogl and
                  Aggelos Kiayias},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {Scalability, fidelity and stealth in the {DRAKVUF} dynamic malware
                  analysis system},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {386--395},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664252},
  doi          = {10.1145/2664243.2664252},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LengyelMPWVK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/JareckiKK14,
  author       = {Stanislaw Jarecki and
                  Aggelos Kiayias and
                  Hugo Krawczyk},
  editor       = {Palash Sarkar and
                  Tetsu Iwata},
  title        = {Round-Optimal Password-Protected Secret Sharing and {T-PAKE} in the
                  Password-Only Model},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8874},
  pages        = {233--253},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45608-8\_13},
  doi          = {10.1007/978-3-662-45608-8\_13},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/JareckiKK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ev/DelisGKKNPRSSVZZ14,
  author       = {Alex Delis and
                  Konstantina Gavatha and
                  Aggelos Kiayias and
                  Charalampos Koutalakis and
                  Elias Nikolakopoulos and
                  Lampros Paschos and
                  Mema Roussopoulos and
                  Georgios Sotirellis and
                  Panos Stathopoulos and
                  Pavlos Vasilopoulos and
                  Thomas Zacharias and
                  Bingsheng Zhang},
  editor       = {Robert Krimmer and
                  Melanie Volkamer},
  title        = {Pressing the button for European elections: verifiable e-voting and
                  public attitudes toward internet voting in Greece},
  booktitle    = {6th International Conference on Electronic Voting: Verifying the Vote,
                  {EVOTE} 2014, Lochau / Bregenz, Austria, October 29-31, 2014},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/EVOTE.2014.7001141},
  doi          = {10.1109/EVOTE.2014.7001141},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ev/DelisGKKNPRSSVZZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/KiayiasOT14,
  author       = {Aggelos Kiayias and
                  Murat Osmanoglu and
                  Qiang Tang},
  editor       = {Sherman S. M. Chow and
                  Jan Camenisch and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Graded Encryption, or How to Play "Who Wants To Be {A} Millionaire?"
                  Distributively},
  booktitle    = {Information Security - 17th International Conference, {ISC} 2014,
                  Hong Kong, China, October 12-14, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8783},
  pages        = {377--387},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13257-0\_22},
  doi          = {10.1007/978-3-319-13257-0\_22},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/KiayiasOT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/KatzKZZ14,
  author       = {Jonathan Katz and
                  Aggelos Kiayias and
                  Hong{-}Sheng Zhou and
                  Vassilis Zikas},
  editor       = {Magn{\'{u}}s M. Halld{\'{o}}rsson and
                  Shlomi Dolev},
  title        = {Distributing the setup in universally composable multi-party computation},
  booktitle    = {{ACM} Symposium on Principles of Distributed Computing, {PODC} '14,
                  Paris, France, July 15-18, 2014},
  pages        = {20--29},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611462.2611480},
  doi          = {10.1145/2611462.2611480},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/podc/KatzKZZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/KarvelasK14,
  author       = {Nikolaos P. Karvelas and
                  Aggelos Kiayias},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Efficient Proofs of Secure Erasure},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {520--537},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_30},
  doi          = {10.1007/978-3-319-10879-7\_30},
  timestamp    = {Thu, 23 Jun 2022 19:58:57 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/KarvelasK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cans/2014,
  editor       = {Dimitris Gritzalis and
                  Aggelos Kiayias and
                  Ioannis G. Askoxylakis},
  title        = {Cryptology and Network Security - 13th International Conference, {CANS}
                  2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8813},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12280-9},
  doi          = {10.1007/978-3-319-12280-9},
  isbn         = {978-3-319-12279-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarayGJKY14,
  author       = {Juan A. Garay and
                  Ran Gelles and
                  David S. Johnson and
                  Aggelos Kiayias and
                  Moti Yung},
  title        = {A Little Honesty Goes a Long Way: The Two-Tier Model for Secure Multiparty
                  Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {209},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/209},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarayGJKY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JareckiKK14a,
  author       = {Stanislaw Jarecki and
                  Aggelos Kiayias and
                  Hugo Krawczyk},
  title        = {Round-Optimal Password-Protected Secret Sharing and {T-PAKE} in the
                  Password-Only Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {650},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/650},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JareckiKK14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarayKL14,
  author       = {Juan A. Garay and
                  Aggelos Kiayias and
                  Nikos Leonardos},
  title        = {The Bitcoin Backbone Protocol: Analysis and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {765},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/765},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarayKL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasLLPT14,
  author       = {Aggelos Kiayias and
                  Nikos Leonardos and
                  Helger Lipmaa and
                  Kateryna Pavlyk and
                  Qiang Tang},
  title        = {Near Optimal Rate Homomorphic Encryption for Branching Programs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {851},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/851},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasLLPT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/KentrosK13,
  author       = {Sotiris Kentros and
                  Aggelos Kiayias},
  title        = {Solving the at-most-once problem with nearly optimal effectiveness},
  journal      = {Theor. Comput. Sci.},
  volume       = {496},
  pages        = {69--88},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.tcs.2013.04.017},
  doi          = {10.1016/J.TCS.2013.04.017},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/KentrosK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KiayiasT13,
  author       = {Aggelos Kiayias and
                  Yiannis Tselekounis},
  editor       = {Kazue Sako and
                  Palash Sarkar},
  title        = {Tamper Resilient Circuits: The Adversary at the Gates},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8270},
  pages        = {161--180},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42045-0\_9},
  doi          = {10.1007/978-3-642-42045-0\_9},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KiayiasT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/ChronopoulosGK13,
  author       = {Konstantinos Chronopoulos and
                  Maria Gouseti and
                  Aggelos Kiayias},
  editor       = {Michel Abdalla and
                  Cristina Nita{-}Rotaru and
                  Ricardo Dahab},
  title        = {Resource Access Control in the Facebook Model},
  booktitle    = {Cryptology and Network Security - 12th International Conference, {CANS}
                  2013, Paraty, Brazil, November 20-22. 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8257},
  pages        = {179--198},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-02937-5\_10},
  doi          = {10.1007/978-3-319-02937-5\_10},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/ChronopoulosGK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KiayiasPTZ13,
  author       = {Aggelos Kiayias and
                  Stavros Papadopoulos and
                  Nikos Triandopoulos and
                  Thomas Zacharias},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Delegatable pseudorandom functions and applications},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {669--684},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516668},
  doi          = {10.1145/2508859.2516668},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KiayiasPTZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KiayiasT13,
  author       = {Aggelos Kiayias and
                  Qiang Tang},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {How to keep a secret: leakage deterring public-key cryptosystems},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {943--954},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516691},
  doi          = {10.1145/2508859.2516691},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KiayiasT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edemocracy/ChondrosDGKKNPRSSVZZZ13,
  author       = {Nikos Chondros and
                  Alex Delis and
                  Dina Gavatha and
                  Aggelos Kiayias and
                  Charalampos Koutalakis and
                  Ilias Nicolacopoulos and
                  Lampros Paschos and
                  Mema Roussopoulos and
                  Giorge Sotirelis and
                  Panos Stathopoulos and
                  Pavlos Vasilopoulos and
                  Thomas Zacharias and
                  Bingsheng Zhang and
                  Fotis Zygoulis},
  editor       = {Alexander B. Sideridis and
                  Zoe Kardasiadou and
                  Constantine P. Yialouris and
                  Vasilios Zorkadis},
  title        = {Electronic Voting Systems - From Theory to Implementation},
  booktitle    = {E-Democracy, Security, Privacy and Trust in a Digital World - 5th
                  International Conference, E-Democracy 2013, Athens, Greece, December
                  5-6, 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {441},
  pages        = {113--122},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-11710-2\_11},
  doi          = {10.1007/978-3-319-11710-2\_11},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edemocracy/ChondrosDGKKNPRSSVZZZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/GarayJKY13,
  author       = {Juan A. Garay and
                  David S. Johnson and
                  Aggelos Kiayias and
                  Moti Yung},
  editor       = {Robert D. Kleinberg},
  title        = {Resource-based corruptions and the combinatorics of hidden diversity},
  booktitle    = {Innovations in Theoretical Computer Science, {ITCS} '13, Berkeley,
                  CA, USA, January 9-12, 2013},
  pages        = {415--428},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2422436.2422482},
  doi          = {10.1145/2422436.2422482},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/GarayJKY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/LengyelNMK13,
  author       = {Tamas K. Lengyel and
                  Justin Neumann and
                  Steve Maresca and
                  Aggelos Kiayias},
  editor       = {Javier L{\'{o}}pez and
                  Xinyi Huang and
                  Ravi S. Sandhu},
  title        = {Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning},
  booktitle    = {Network and System Security - 7th International Conference, {NSS}
                  2013, Madrid, Spain, June 3-4, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7873},
  pages        = {164--177},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38631-2\_13},
  doi          = {10.1007/978-3-642-38631-2\_13},
  timestamp    = {Tue, 09 Feb 2021 08:50:29 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/LengyelNMK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/JancewiczKMRS13,
  author       = {Russell J. Jancewicz and
                  Aggelos Kiayias and
                  Laurent D. Michel and
                  Alexander Russell and
                  Alexander A. Shvartsman},
  editor       = {Sung Y. Shin and
                  Jos{\'{e}} Carlos Maldonado},
  title        = {Malicious takeover of voting systems: arbitrary code execution on
                  optical scan voting terminals},
  booktitle    = {Proceedings of the 28th Annual {ACM} Symposium on Applied Computing,
                  {SAC} '13, Coimbra, Portugal, March 18-22, 2013},
  pages        = {1816--1823},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2480362.2480702},
  doi          = {10.1145/2480362.2480702},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/JancewiczKMRS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/KiayiasO13,
  author       = {Aggelos Kiayias and
                  Anthi Orfanou},
  editor       = {James Heather and
                  Steve A. Schneider and
                  Vanessa Teague},
  title        = {Scaling Privacy Guarantees in Code-Verification Elections},
  booktitle    = {E-Voting and Identify - 4th International Conference, VoteID 2013,
                  Guildford, UK, July 17-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7985},
  pages        = {1--24},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39185-9\_1},
  doi          = {10.1007/978-3-642-39185-9\_1},
  timestamp    = {Thu, 27 Feb 2020 13:11:16 +0100},
  biburl       = {https://dblp.org/rec/conf/voteid/KiayiasO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/EdmanKTY13,
  author       = {Matthew Edman and
                  Aggelos Kiayias and
                  Qiang Tang and
                  B{\"{u}}lent Yener},
  title        = {On the Security of Key Extraction from Measuring Physical Quantities},
  journal      = {CoRR},
  volume       = {abs/1311.4591},
  year         = {2013},
  url          = {http://arxiv.org/abs/1311.4591},
  eprinttype    = {arXiv},
  eprint       = {1311.4591},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/EdmanKTY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasPTZ13,
  author       = {Aggelos Kiayias and
                  Stavros Papadopoulos and
                  Nikos Triandopoulos and
                  Thomas Zacharias},
  title        = {Delegatable Pseudorandom Functions and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {379},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/379},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasPTZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasT13,
  author       = {Aggelos Kiayias and
                  Yiannis Tselekounis},
  title        = {Tamper Resilient Circuits: The Adversary at the Gates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {797},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/797},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasT13a,
  author       = {Aggelos Kiayias and
                  Qiang Tang},
  title        = {How to Keep a Secret: Leakage Deterring Public-key Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {845},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/845},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasT13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/PapadopoulosKP12,
  author       = {Stavros Papadopoulos and
                  Aggelos Kiayias and
                  Dimitris Papadias},
  title        = {Exact In-Network Aggregation with Integrity and Confidentiality},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {24},
  number       = {10},
  pages        = {1760--1773},
  year         = {2012},
  url          = {https://doi.org/10.1109/TKDE.2012.64},
  doi          = {10.1109/TKDE.2012.64},
  timestamp    = {Tue, 02 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tkde/PapadopoulosKP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcn/KentrosK12,
  author       = {Sotiris Kentros and
                  Aggelos Kiayias},
  editor       = {Luciano Bononi and
                  Ajoy Kumar Datta and
                  St{\'{e}}phane Devismes and
                  Archan Misra},
  title        = {Solving the At-Most-Once Problem with Nearly Optimal Effectiveness},
  booktitle    = {Distributed Computing and Networking - 13th International Conference,
                  {ICDCN} 2012, Hong Kong, China, January 3-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7129},
  pages        = {122--137},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-25959-3\_9},
  doi          = {10.1007/978-3-642-25959-3\_9},
  timestamp    = {Mon, 26 Jun 2023 20:44:19 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcn/KentrosK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/KiayiasRS12,
  author       = {Aggelos Kiayias and
                  Alexander Russell and
                  Narasimha K. Shashidhar},
  editor       = {Matthias Kirchner and
                  Dipak Ghosal},
  title        = {Key-Efficient Steganography},
  booktitle    = {Information Hiding - 14th International Conference, {IH} 2012, Berkeley,
                  CA, USA, May 15-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7692},
  pages        = {142--159},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-36373-3\_10},
  doi          = {10.1007/978-3-642-36373-3\_10},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/KiayiasRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/KiayiasS12,
  author       = {Aggelos Kiayias and
                  Katerina Samari},
  editor       = {Matthias Kirchner and
                  Dipak Ghosal},
  title        = {Lower Bounds for Private Broadcast Encryption},
  booktitle    = {Information Hiding - 14th International Conference, {IH} 2012, Berkeley,
                  CA, USA, May 15-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7692},
  pages        = {176--190},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-36373-3\_12},
  doi          = {10.1007/978-3-642-36373-3\_12},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/KiayiasS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/DavtyanKMRS12,
  author       = {Seda Davtyan and
                  Aggelos Kiayias and
                  Laurent Michel and
                  Alexander Russell and
                  Alexander A. Shvartsman},
  editor       = {Sascha Ossowski and
                  Paola Lecca},
  title        = {Integrity of electronic voting systems: fallacious use of cryptography},
  booktitle    = {Proceedings of the {ACM} Symposium on Applied Computing, {SAC} 2012,
                  Riva, Trento, Italy, March 26-30, 2012},
  pages        = {1486--1493},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2245276.2232013},
  doi          = {10.1145/2245276.2232013},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/DavtyanKMRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ArgyrosK12,
  author       = {George Argyros and
                  Aggelos Kiayias},
  editor       = {Tadayoshi Kohno},
  title        = {I Forgot Your Password: Randomness Attacks Against {PHP} Applications},
  booktitle    = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA,
                  USA, August 8-10, 2012},
  pages        = {81--96},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/argyros},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ArgyrosK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LengyelNMPK12,
  author       = {Tamas K. Lengyel and
                  Justin Neumann and
                  Steve Maresca and
                  Bryan D. Payne and
                  Aggelos Kiayias},
  editor       = {Sean Peisert and
                  Stephen Schwab},
  title        = {Virtual Machine Introspection in a Hybrid Honeypot Architecture},
  booktitle    = {5th Workshop on Cyber Security Experimentation and Test, {CSET} '12,
                  Bellevue, WA, USA, August 6, 2012},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/cset12/workshop-program/presentation/lengyel},
  timestamp    = {Mon, 01 Feb 2021 08:43:04 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/LengyelNMPK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wdag/KentrosKK12,
  author       = {Sotiris Kentros and
                  Chadi Kari and
                  Aggelos Kiayias},
  editor       = {Marcos K. Aguilera},
  title        = {The Strong At-Most-Once Problem},
  booktitle    = {Distributed Computing - 26th International Symposium, {DISC} 2012,
                  Salvador, Brazil, October 16-18, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7611},
  pages        = {386--400},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33651-5\_27},
  doi          = {10.1007/978-3-642-33651-5\_27},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/wdag/KentrosKK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/voteid/2011,
  editor       = {Aggelos Kiayias and
                  Helger Lipmaa},
  title        = {E-Voting and Identity - Third International Conference, VoteID 2011,
                  Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7187},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32747-6},
  doi          = {10.1007/978-3-642-32747-6},
  isbn         = {978-3-642-32746-9},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/voteid/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AkKPS12,
  author       = {Murat Ak and
                  Aggelos Kiayias and
                  Serdar Pehlivanoglu and
                  Ali Aydin Sel{\c{c}}uk},
  title        = {Generic Construction of Trace and Revoke Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {531},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/531},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AkKPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarayJKY12,
  author       = {Juan A. Garay and
                  David S. Johnson and
                  Aggelos Kiayias and
                  Moti Yung},
  title        = {Resource-based Corruptions and the Combinatorics of Hidden Diversity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {556},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/556},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarayJKY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ChoiKM11,
  author       = {Seung Geol Choi and
                  Aggelos Kiayias and
                  Tal Malkin},
  editor       = {Dong Hoon Lee and
                  Xiaoyun Wang},
  title        = {BiTR: Built-in Tamper Resilience},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Seoul, South Korea, December 4-8, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7073},
  pages        = {740--758},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25385-0\_40},
  doi          = {10.1007/978-3-642-25385-0\_40},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ChoiKM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codcry/Kiayias11,
  author       = {Aggelos Kiayias},
  editor       = {Yeow Meng Chee and
                  Zhenbo Guo and
                  San Ling and
                  Fengjing Shao and
                  Yuansheng Tang and
                  Huaxiong Wang and
                  Chaoping Xing},
  title        = {On the Effects of Pirate Evolution on the Design of Digital Content
                  Distribution Systems},
  booktitle    = {Coding and Cryptology - Third International Workshop, {IWCC} 2011,
                  Qingdao, China, May 30-June 3, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6639},
  pages        = {223--237},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20901-7\_14},
  doi          = {10.1007/978-3-642-20901-7\_14},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/codcry/Kiayias11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosec/EdmanKY11,
  author       = {Matthew Edman and
                  Aggelos Kiayias and
                  B{\"{u}}lent Yener},
  editor       = {Engin Kirda and
                  Steven Hand},
  title        = {On passive inference attacks against physical-layer key extraction?},
  booktitle    = {Proceedings of the Fourth European Workshop on System Security, EUROSEC'11,
                  April 10, 2011, Salzburg, Austria},
  pages        = {8},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1972551.1972559},
  doi          = {10.1145/1972551.1972559},
  timestamp    = {Tue, 20 Dec 2022 17:33:10 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosec/EdmanKY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/PapadopoulosKP11,
  author       = {Stavros Papadopoulos and
                  Aggelos Kiayias and
                  Dimitris Papadias},
  editor       = {Serge Abiteboul and
                  Klemens B{\"{o}}hm and
                  Christoph Koch and
                  Kian{-}Lee Tan},
  title        = {Secure and efficient in-network processing of exact {SUM} queries},
  booktitle    = {Proceedings of the 27th International Conference on Data Engineering,
                  {ICDE} 2011, April 11-16, 2011, Hannover, Germany},
  pages        = {517--528},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICDE.2011.5767886},
  doi          = {10.1109/ICDE.2011.5767886},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icde/PapadopoulosKP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/KiayiasP11,
  author       = {Aggelos Kiayias and
                  Serdar Pehlivanoglu},
  editor       = {Xuejia Lai and
                  Jianying Zhou and
                  Hui Li},
  title        = {Attacking Traitor Tracing Schemes Using History Recording and Abrupt
                  Decoders},
  booktitle    = {Information Security, 14th International Conference, {ISC} 2011, Xi'an,
                  China, October 26-29, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7001},
  pages        = {17--31},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24861-0\_2},
  doi          = {10.1007/978-3-642-24861-0\_2},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/KiayiasP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/KentrosK11,
  author       = {Sotiris Kentros and
                  Aggelos Kiayias},
  editor       = {Cyril Gavoille and
                  Pierre Fraigniaud},
  title        = {Solving the at-most-once problem with nearly optimal effectiveness},
  booktitle    = {Proceedings of the 30th Annual {ACM} Symposium on Principles of Distributed
                  Computing, {PODC} 2011, San Jose, CA, USA, June 6-8, 2011},
  pages        = {229--230},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1993806.1993847},
  doi          = {10.1145/1993806.1993847},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/KentrosK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2011,
  editor       = {Aggelos Kiayias},
  title        = {Topics in Cryptology - {CT-RSA} 2011 - The Cryptographers' Track at
                  the {RSA} Conference 2011, San Francisco, CA, USA, February 14-18,
                  2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6558},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19074-2},
  doi          = {10.1007/978-3-642-19074-2},
  isbn         = {978-3-642-19073-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/KiayiasY11,
  author       = {Aggelos Kiayias and
                  B{\"{u}}lent Yener},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Key Generation Using Physical Properties of Wireless Communication},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {682--683},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_55},
  doi          = {10.1007/978-1-4419-5906-5\_55},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/KiayiasY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1107-2990,
  author       = {Sotiris Kentros and
                  Aggelos Kiayias},
  title        = {Solving the At-Most-Once Problem with Nearly Optimal Effectiveness},
  journal      = {CoRR},
  volume       = {abs/1107.2990},
  year         = {2011},
  url          = {http://arxiv.org/abs/1107.2990},
  eprinttype    = {arXiv},
  eprint       = {1107.2990},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1107-2990.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/KiayiasP10,
  author       = {Aggelos Kiayias and
                  Serdar Pehlivanoglu},
  title        = {Encryption for Digital Content},
  series       = {Advances in Information Security},
  volume       = {52},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-0044-9},
  doi          = {10.1007/978-1-4419-0044-9},
  isbn         = {978-1-4419-0043-2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/KiayiasP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/KiayiasP10,
  author       = {Aggelos Kiayias and
                  Serdar Pehlivanoglu},
  editor       = {Jianying Zhou and
                  Moti Yung},
  title        = {Improving the Round Complexity of Traitor Tracing Schemes},
  booktitle    = {Applied Cryptography and Network Security, 8th International Conference,
                  {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6123},
  pages        = {273--290},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13708-2\_17},
  doi          = {10.1007/978-3-642-13708-2\_17},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/KiayiasP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/GarayKZ10,
  author       = {Juan A. Garay and
                  Aggelos Kiayias and
                  Hong{-}Sheng Zhou},
  title        = {A Framework for the Sound Specification of Cryptographic Tasks},
  booktitle    = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010},
  pages        = {277--289},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CSF.2010.26},
  doi          = {10.1109/CSF.2010.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/GarayKZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/BonehKM10,
  author       = {Dan Boneh and
                  Aggelos Kiayias and
                  Hart William Montgomery},
  editor       = {Ehab Al{-}Shaer and
                  Hongxia Jin and
                  Marc Joye},
  title        = {Robust fingerprinting codes: a near optimal construction},
  booktitle    = {Proceedings of the 10th {ACM} Workshop on Digital Rights Management,
                  Chicago, Illinois, USA, October 4, 2010},
  pages        = {3--12},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866870.1866873},
  doi          = {10.1145/1866870.1866873},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/BonehKM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KiayiasS10,
  author       = {Aggelos Kiayias and
                  Kazue Sako},
  editor       = {Radu Sion and
                  Reza Curtmola and
                  Sven Dietrich and
                  Aggelos Kiayias and
                  Josep M. Miret and
                  Kazue Sako and
                  Francesc Seb{\'{e}}},
  title        = {{RLCPS} Preface},
  booktitle    = {Financial Cryptography and Data Security, {FC} 2010 Workshops, RLCPS,
                  WECSR, and {WLC} 2010, Tenerife, Canary Islands, Spain, January 25-28,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6054},
  pages        = {105},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14992-4\_10},
  doi          = {10.1007/978-3-642-14992-4\_10},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/KiayiasS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KiayiasY10,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  editor       = {Radu Sion},
  title        = {Tree-Homomorphic Encryption and Scalable Hierarchical Secret-Ballot
                  Elections},
  booktitle    = {Financial Cryptography and Data Security, 14th International Conference,
                  {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6052},
  pages        = {257--271},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14577-3\_20},
  doi          = {10.1007/978-3-642-14577-3\_20},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/KiayiasY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GrothKL10,
  author       = {Jens Groth and
                  Aggelos Kiayias and
                  Helger Lipmaa},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Multi-query Computationally-Private Information Retrieval with Constant
                  Communication Rate},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {107--123},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_7},
  doi          = {10.1007/978-3-642-13013-7\_7},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GrothKL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wote/KiayiasY10,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  editor       = {David Chaum and
                  Markus Jakobsson and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan and
                  Josh Benaloh and
                  Miroslaw Kutylowski and
                  Ben Adida},
  title        = {The Vector-Ballot Approach for Online Voting Procedures},
  booktitle    = {Towards Trustworthy Elections, New Directions in Electronic Voting},
  series       = {Lecture Notes in Computer Science},
  volume       = {6000},
  pages        = {155--174},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12980-3\_9},
  doi          = {10.1007/978-3-642-12980-3\_9},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/wote/KiayiasY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2010w,
  editor       = {Radu Sion and
                  Reza Curtmola and
                  Sven Dietrich and
                  Aggelos Kiayias and
                  Josep M. Miret and
                  Kazue Sako and
                  Francesc Seb{\'{e}}},
  title        = {Financial Cryptography and Data Security, {FC} 2010 Workshops, RLCPS,
                  WECSR, and {WLC} 2010, Tenerife, Canary Islands, Spain, January 25-28,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6054},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14992-4},
  doi          = {10.1007/978-3-642-14992-4},
  isbn         = {978-3-642-14991-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2010w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/Kiayias10,
  author       = {Aggelos Kiayias},
  editor       = {Burton Rosenberg},
  title        = {Electronic Voting},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {59--81},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010},
  url          = {https://doi.org/10.1201/9781420059823-c3},
  doi          = {10.1201/9781420059823-C3},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/Kiayias10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoiKM10,
  author       = {Seung Geol Choi and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {BiTR: Built-in Tamper Resilience},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {503},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/503},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoiKM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/KiayiasZ09,
  author       = {Aggelos Kiayias and
                  Hong{-}Sheng Zhou},
  title        = {Hidden identity-based signatures},
  journal      = {{IET} Inf. Secur.},
  volume       = {3},
  number       = {3},
  pages        = {119--127},
  year         = {2009},
  url          = {https://doi.org/10.1049/iet-ifs.2007.0151},
  doi          = {10.1049/IET-IFS.2007.0151},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/KiayiasZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AntonyanDKKMNRS09,
  author       = {Tigran Antonyan and
                  Seda Davtyan and
                  Sotiris Kentros and
                  Aggelos Kiayias and
                  Laurent Michel and
                  Nicolas C. Nicolaou and
                  Alexander Russell and
                  Alexander A. Shvartsman},
  title        = {State-wide elections, optical scan voting systems, and the pursuit
                  of integrity},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {597--610},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2033232},
  doi          = {10.1109/TIFS.2009.2033232},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AntonyanDKKMNRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/KiayiasP09,
  author       = {Aggelos Kiayias and
                  Serdar Pehlivanoglu},
  editor       = {Michel Abdalla and
                  David Pointcheval and
                  Pierre{-}Alain Fouque and
                  Damien Vergnaud},
  title        = {Tracing and Revoking Pirate Rebroadcasts},
  booktitle    = {Applied Cryptography and Network Security, 7th International Conference,
                  {ACNS} 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5536},
  pages        = {253--271},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01957-9\_16},
  doi          = {10.1007/978-3-642-01957-9\_16},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/KiayiasP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/KiayiasP09,
  author       = {Aggelos Kiayias and
                  Serdar Pehlivanoglu},
  editor       = {Ehab Al{-}Shaer and
                  Hongxia Jin and
                  Gregory L. Heileman},
  title        = {On the security of a public-key traitor tracing scheme with sublinear
                  ciphertext size},
  booktitle    = {Proceedings of the 9th {ACM} Workshop on Digital Rights Management,
                  Chicago, Illinois, USA, November 9, 2009},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655048.1655050},
  doi          = {10.1145/1655048.1655050},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/KiayiasP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CamenischKY09,
  author       = {Jan Camenisch and
                  Aggelos Kiayias and
                  Moti Yung},
  editor       = {Antoine Joux},
  title        = {On the Portability of Generalized Schnorr Proofs},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cologne, Germany, April 26-30, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5479},
  pages        = {425--442},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01001-9\_25},
  doi          = {10.1007/978-3-642-01001-9\_25},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CamenischKY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KiayiasYY09,
  author       = {Aggelos Kiayias and
                  B{\"{u}}lent Yener and
                  Moti Yung},
  editor       = {Roger Dingledine and
                  Philippe Golle},
  title        = {Privacy-Preserving Information Markets for Computing Statistical Data},
  booktitle    = {Financial Cryptography and Data Security, 13th International Conference,
                  {FC} 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5628},
  pages        = {32--50},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03549-4\_3},
  doi          = {10.1007/978-3-642-03549-4\_3},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/KiayiasYY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/IbrahimKYZ09,
  author       = {Maged H. Ibrahim and
                  Aggelos Kiayias and
                  Moti Yung and
                  Hong{-}Sheng Zhou},
  editor       = {Susanne Albers and
                  Alberto Marchetti{-}Spaccamela and
                  Yossi Matias and
                  Sotiris E. Nikoletseas and
                  Wolfgang Thomas},
  title        = {Secure Function Collection with Sublinear Storage},
  booktitle    = {Automata, Languages and Programming, 36th Internatilonal Colloquium,
                  {ICALP} 2009, Rhodes, Greece, July 5-12, 2009, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5556},
  pages        = {534--545},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02930-1\_44},
  doi          = {10.1007/978-3-642-02930-1\_44},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/IbrahimKYZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mediaforensics/Kiayias09,
  author       = {Aggelos Kiayias},
  editor       = {Edward J. Delp and
                  Jana Dittmann and
                  Nasir D. Memon and
                  Ping Wah Wong},
  title        = {Robust fingerprinting codes and applications},
  booktitle    = {Media Forensics and Security I, part of the IS{\&}T-SPIE Electronic
                  Imaging Symposium, San Jose, CA, USA, January 19-21, 2009, Proceedings},
  series       = {{SPIE} Proceedings},
  volume       = {7254},
  pages        = {72540N},
  publisher    = {{SPIE}},
  year         = {2009},
  url          = {https://doi.org/10.1117/12.810749},
  doi          = {10.1117/12.810749},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mediaforensics/Kiayias09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KiayiasZ09,
  author       = {Aggelos Kiayias and
                  Hong{-}Sheng Zhou},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Zero-Knowledge Proofs with Witness Elimination},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {124--138},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_8},
  doi          = {10.1007/978-3-642-00468-1\_8},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KiayiasZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/DavtyanKKMNRSSS09,
  author       = {Seda Davtyan and
                  Sotiris Kentros and
                  Aggelos Kiayias and
                  Laurent D. Michel and
                  Nicolas C. Nicolaou and
                  Alexander Russell and
                  Andrew See and
                  Narasimha K. Shashidhar and
                  Alexander A. Shvartsman},
  editor       = {Sung Y. Shin and
                  Sascha Ossowski},
  title        = {Taking total control of voting systems: firmware manipulations on
                  an optical scan voting terminal},
  booktitle    = {Proceedings of the 2009 {ACM} Symposium on Applied Computing (SAC),
                  Honolulu, Hawaii, USA, March 9-12, 2009},
  pages        = {2049--2053},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1529282.1529736},
  doi          = {10.1145/1529282.1529736},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/DavtyanKKMNRSSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spaa/KentrosKNS09,
  author       = {Sotiris Kentros and
                  Aggelos Kiayias and
                  Nicolas C. Nicolaou and
                  Alexander A. Shvartsman},
  editor       = {Friedhelm Meyer auf der Heide and
                  Michael A. Bender},
  title        = {At-most-once semantics in asynchronous shared memory},
  booktitle    = {{SPAA} 2009: Proceedings of the 21st Annual {ACM} Symposium on Parallelism
                  in Algorithms and Architectures, Calgary, Alberta, Canada, August
                  11-13, 2009},
  pages        = {43--44},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1583991.1584003},
  doi          = {10.1145/1583991.1584003},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spaa/KentrosKNS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AntonyanDKKMNRS09,
  author       = {Tigran Antonyan and
                  Seda Davtyan and
                  Sotiris Kentros and
                  Aggelos Kiayias and
                  Laurent Michel and
                  Nicolas C. Nicolaou and
                  Alexander Russell and
                  Alexander A. Shvartsman},
  editor       = {David Jefferson and
                  Joseph Lorenzo Hall and
                  Tal Moran},
  title        = {Automating Voting Terminal Event Log Analysis},
  booktitle    = {2009 Electronic Voting Technology Workshop / Workshop on Trustworthy
                  Elections, {EVT/WOTE} '09, Montreal, Canada, August 10-11, 2009},
  publisher    = {{USENIX} Association},
  year         = {2009},
  url          = {https://www.usenix.org/conference/evtwote-09/automating-voting-terminal-event-log-analysis},
  timestamp    = {Mon, 01 Feb 2021 08:43:14 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/AntonyanDKKMNRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wdag/KentrosKNS09,
  author       = {Sotiris Kentros and
                  Aggelos Kiayias and
                  Nicolas C. Nicolaou and
                  Alexander A. Shvartsman},
  editor       = {Idit Keidar},
  title        = {At-Most-Once Semantics in Asynchronous Shared Memory},
  booktitle    = {Distributed Computing, 23rd International Symposium, {DISC} 2009,
                  Elche, Spain, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5805},
  pages        = {258--273},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04355-0\_27},
  doi          = {10.1007/978-3-642-04355-0\_27},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wdag/KentrosKNS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0909-3658,
  author       = {Aggelos Kiayias and
                  Yona Raekow and
                  Alexander Russell and
                  Narasimha K. Shashidhar},
  title        = {Efficient Steganography with Provable Security Guarantees},
  journal      = {CoRR},
  volume       = {abs/0909.3658},
  year         = {2009},
  url          = {http://arxiv.org/abs/0909.3658},
  eprinttype    = {arXiv},
  eprint       = {0909.3658},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0909-3658.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0909-4575,
  author       = {Aggelos Kiayias and
                  Alexander Russell and
                  Narasimha K. Shashidhar},
  title        = {Randomness-optimal Steganography},
  journal      = {CoRR},
  volume       = {abs/0909.4575},
  year         = {2009},
  url          = {http://arxiv.org/abs/0909.4575},
  eprinttype    = {arXiv},
  eprint       = {0909.4575},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0909-4575.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischKY09,
  author       = {Jan Camenisch and
                  Aggelos Kiayias and
                  Moti Yung},
  title        = {On the Portability of Generalized Schnorr Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {50},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/050},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CamenischKY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/KiayiasY08,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  title        = {Cryptographic Hardness Based on the Decoding of Reed-Solomon Codes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {54},
  number       = {6},
  pages        = {2752--2769},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIT.2008.921876},
  doi          = {10.1109/TIT.2008.921876},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/KiayiasY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/KiayiasY08,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  editor       = {Gregory L. Heileman and
                  Marc Joye},
  title        = {Public-key traitor tracing from efficient decoding and unbounded enrollment:
                  extended abstract},
  booktitle    = {Proceedings of the 8th {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 27, 2008},
  pages        = {9--18},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456520.1456525},
  doi          = {10.1145/1456520.1456525},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/KiayiasY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/KiayiasXY08,
  author       = {Aggelos Kiayias and
                  Shouhuai Xu and
                  Moti Yung},
  editor       = {Rafail Ostrovsky and
                  Roberto De Prisco and
                  Ivan Visconti},
  title        = {Privacy Preserving Data Mining within Anonymous Credential Systems},
  booktitle    = {Security and Cryptography for Networks, 6th International Conference,
                  {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5229},
  pages        = {57--76},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85855-3\_5},
  doi          = {10.1007/978-3-540-85855-3\_5},
  timestamp    = {Tue, 25 Feb 2020 11:33:46 +0100},
  biburl       = {https://dblp.org/rec/conf/scn/KiayiasXY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/KiayiasZ08,
  author       = {Aggelos Kiayias and
                  Hong{-}Sheng Zhou},
  editor       = {Ran Canetti},
  title        = {Equivocal Blind Signatures and Adaptive UC-Security},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {340--355},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_19},
  doi          = {10.1007/978-3-540-78524-8\_19},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/KiayiasZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DavtyanKKMNRSSS08,
  author       = {Seda Davtyan and
                  Sotiris Kentros and
                  Aggelos Kiayias and
                  Laurent Michel and
                  Nicolas C. Nicolaou and
                  Alexander Russell and
                  Andrew See and
                  Narasimha K. Shashidhar and
                  Alexander A. Shvartsman},
  editor       = {David L. Dill and
                  Tadayoshi Kohno},
  title        = {Pre-Election Testing and Post-Election Audit of Optical Scan Voting
                  Terminal Memory Cards},
  booktitle    = {2008 {USENIX/ACCURATE} Electronic Voting Workshop, {EVT} 2008, July
                  28-29, 2008, San Jose, CA, USA, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/evt08/tech/full\_papers/davtyan/davtyan.pdf},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/DavtyanKKMNRSSS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/GarayKZ08,
  author       = {Juan A. Garay and
                  Aggelos Kiayias and
                  Hong{-}Sheng Zhou},
  editor       = {Ran Canetti and
                  Shafi Goldwasser and
                  G{\"{u}}nter M{\"{u}}ller and
                  Rainer Steinwandt},
  title        = {Sound and Fine-grain Specification of Ideal Functionalities},
  booktitle    = {Theoretical Foundations of Practical Information Security, 30.11.
                  - 05.12.2008},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {08491},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2008},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2009/1891/},
  timestamp    = {Thu, 10 Jun 2021 13:02:08 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/GarayKZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarayKZ08,
  author       = {Juan A. Garay and
                  Aggelos Kiayias and
                  Hong{-}Sheng Zhou},
  title        = {A Framework for the Sound Specification of Cryptographic Tasks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {132},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/132},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarayKZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KiayiasY07,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  title        = {Cryptanalyzing the polynomial-reconstruction based public-key system
                  under optimal parameter choice},
  journal      = {Des. Codes Cryptogr.},
  volume       = {43},
  number       = {2-3},
  pages        = {61--78},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10623-007-9055-8},
  doi          = {10.1007/S10623-007-9055-8},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KiayiasY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/BleichenbacherKY07,
  author       = {Daniel Bleichenbacher and
                  Aggelos Kiayias and
                  Moti Yung},
  title        = {Decoding interleaved Reed-Solomon codes over noisy channels},
  journal      = {Theor. Comput. Sci.},
  volume       = {379},
  number       = {3},
  pages        = {348--360},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.tcs.2007.02.043},
  doi          = {10.1016/J.TCS.2007.02.043},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/BleichenbacherKY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KiayiasMRSSSD07,
  author       = {Aggelos Kiayias and
                  Laurent Michel and
                  Alexander Russell and
                  Narasimha K. Shashidhar and
                  Andrew See and
                  Alexander A. Shvartsman and
                  Seda Davtyan},
  title        = {Tampering with Special Purpose Trusted Computing Devices: {A} Case
                  Study in Optical Scan E-Voting},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {30--39},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.16},
  doi          = {10.1109/ACSAC.2007.16},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KiayiasMRSSSD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KiayiasTY07,
  author       = {Aggelos Kiayias and
                  Yiannis Tsiounis and
                  Moti Yung},
  editor       = {Kaoru Kurosawa},
  title        = {Group Encryption},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kuching, Malaysia, December 2-6, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4833},
  pages        = {181--199},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76900-2\_11},
  doi          = {10.1007/978-3-540-76900-2\_11},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KiayiasTY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Azimi-SadjadiKMY07,
  author       = {Babak Azimi{-}Sadjadi and
                  Aggelos Kiayias and
                  Alejandra Mercado and
                  B{\"{u}}lent Yener},
  editor       = {Peng Ning and
                  Sabrina De Capitani di Vimercati and
                  Paul F. Syverson},
  title        = {Robust key generation from signal envelopes in wireless networks},
  booktitle    = {Proceedings of the 2007 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007},
  pages        = {401--410},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1315245.1315295},
  doi          = {10.1145/1315245.1315295},
  timestamp    = {Tue, 10 Nov 2020 20:00:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Azimi-SadjadiKMY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KiayiasP07,
  author       = {Aggelos Kiayias and
                  Serdar Pehlivanoglu},
  editor       = {Alfred Menezes},
  title        = {Pirate Evolution: How to Make the Most of Your Traitor Keys},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2007, 27th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4622},
  pages        = {448--465},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74143-5\_25},
  doi          = {10.1007/978-3-540-74143-5\_25},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KiayiasP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KiayiasZ07,
  author       = {Aggelos Kiayias and
                  Hong{-}Sheng Zhou},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Hidden Identity-Based Signatures},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {134--147},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_14},
  doi          = {10.1007/978-3-540-77366-5\_14},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/KiayiasZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/KiayiasZ07,
  author       = {Aggelos Kiayias and
                  Hong{-}Sheng Zhou},
  editor       = {Lars Arge and
                  Christian Cachin and
                  Tomasz Jurdzinski and
                  Andrzej Tarlecki},
  title        = {Trading Static for Adaptive Security in Universally Composable Zero-Knowledge},
  booktitle    = {Automata, Languages and Programming, 34th International Colloquium,
                  {ICALP} 2007, Wroclaw, Poland, July 9-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4596},
  pages        = {316--327},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73420-8\_29},
  doi          = {10.1007/978-3-540-73420-8\_29},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icalp/KiayiasZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KiayiasMRSSS07,
  author       = {Aggelos Kiayias and
                  Laurent Michel and
                  Alexander Russell and
                  Narasimha Sashidar and
                  Andrew See and
                  Alexander A. Shvartsman},
  editor       = {Ray Martinez and
                  David A. Wagner},
  title        = {An Authentication and Ballot Layout Attack Against an Optical Scan
                  Voting Terminal},
  booktitle    = {2007 {USENIX/ACCURATE} Electronic Voting Technology Workshop, EVT'07,
                  Boston, MA, USA, August 6, 2007},
  publisher    = {{USENIX} Association},
  year         = {2007},
  url          = {https://www.usenix.org/conference/evt-07/authentication-and-ballot-layout-attack-against-optical-scan-voting-terminal},
  timestamp    = {Mon, 01 Feb 2021 08:42:55 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/KiayiasMRSSS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/drm/2007,
  editor       = {Moti Yung and
                  Aggelos Kiayias and
                  Ahmad{-}Reza Sadeghi},
  title        = {Proceedings of the Seventh {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 29, 2007},
  publisher    = {{ACM}},
  year         = {2007},
  isbn         = {978-1-59593-884-8},
  timestamp    = {Thu, 17 Jan 2008 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasTY07,
  author       = {Aggelos Kiayias and
                  Yiannis Tsiounis and
                  Moti Yung},
  title        = {Group Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {15},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/015},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasTY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasZ07,
  author       = {Aggelos Kiayias and
                  Hong{-}Sheng Zhou},
  title        = {Equivocal Blind Signatures and Adaptive UC-Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {132},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/132},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasZ07a,
  author       = {Aggelos Kiayias and
                  Hong{-}Sheng Zhou},
  title        = {Hidden Identity-Based Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {140},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/140},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasZ07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasY07,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  title        = {Cryptographic Hardness based on the Decoding of Reed-Solomon Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {153},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/153},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/KiayiasY06,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  title        = {Secure scalable group signature with dynamic joins and separable authorities},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {1/2},
  pages        = {24--45},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.010821},
  doi          = {10.1504/IJSN.2006.010821},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/KiayiasY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/KiayiasM06,
  author       = {Aggelos Kiayias and
                  Antonina Mitrofanova},
  editor       = {Jianying Zhou and
                  Moti Yung and
                  Feng Bao},
  title        = {Syntax-Driven Private Evaluation of Quantified Membership Queries},
  booktitle    = {Applied Cryptography and Network Security, 4th International Conference,
                  {ACNS} 2006, Singapore, June 6-9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3989},
  pages        = {470--485},
  year         = {2006},
  url          = {https://doi.org/10.1007/11767480\_33},
  doi          = {10.1007/11767480\_33},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/KiayiasM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KiayiasKW06,
  author       = {Aggelos Kiayias and
                  Michael Korman and
                  David Walluck},
  title        = {An Internet Voting System Supporting User Privacy},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {165--174},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.12},
  doi          = {10.1109/ACSAC.2006.12},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KiayiasKW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KiayiasY06,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  editor       = {Giovanni Di Crescenzo and
                  Aviel D. Rubin},
  title        = {Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination},
  booktitle    = {Financial Cryptography and Data Security, 10th International Conference,
                  {FC} 2006, Anguilla, British West Indies, February 27-March 2, 2006,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4107},
  pages        = {311--325},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11889663\_25},
  doi          = {10.1007/11889663\_25},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/KiayiasY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/KiayiasZ06,
  author       = {Aggelos Kiayias and
                  Hong{-}Sheng Zhou},
  editor       = {Roberto De Prisco and
                  Moti Yung},
  title        = {Concurrent Blind Signatures Without Random Oracles},
  booktitle    = {Security and Cryptography for Networks, 5th International Conference,
                  {SCN} 2006, Maiori, Italy, September 6-8, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4116},
  pages        = {49--62},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11832072\_4},
  doi          = {10.1007/11832072\_4},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scn/KiayiasZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2006,
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853},
  doi          = {10.1007/11745853},
  isbn         = {3-540-33851-9},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasY06,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  title        = {Copyrighting Public-key Functions and Applications to Black-box Traitor
                  Tracing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {458},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/458},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dc/DodisFKY05,
  author       = {Yevgeniy Dodis and
                  Nelly Fazio and
                  Aggelos Kiayias and
                  Moti Yung},
  title        = {Scalable public-key tracing and revoking},
  journal      = {Distributed Comput.},
  volume       = {17},
  number       = {4},
  pages        = {323--347},
  year         = {2005},
  url          = {https://doi.org/10.1007/s00446-004-0120-5},
  doi          = {10.1007/S00446-004-0120-5},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dc/DodisFKY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KiayiasY05,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  editor       = {Ronald Cramer},
  title        = {Group Signatures with Efficient Concurrent Join},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {198--214},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_12},
  doi          = {10.1007/11426639\_12},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KiayiasY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KiayiasM05,
  author       = {Aggelos Kiayias and
                  Antonina Mitrofanova},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Testing Disjointness of Private Datasets},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {109--124},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_13},
  doi          = {10.1007/11507840\_13},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/KiayiasM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/CrescenzoK05,
  author       = {Giovanni Di Crescenzo and
                  Aggelos Kiayias},
  editor       = {Lu{\'{\i}}s Caires and
                  Giuseppe F. Italiano and
                  Lu{\'{\i}}s Monteiro and
                  Catuscia Palamidessi and
                  Moti Yung},
  title        = {Asynchronous Perfectly Secure Communication over One-Time Pads},
  booktitle    = {Automata, Languages and Programming, 32nd International Colloquium,
                  {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3580},
  pages        = {216--227},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11523468\_18},
  doi          = {10.1007/11523468\_18},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/CrescenzoK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/KiayiasY05,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  title        = {Cryptography and decoding Reed-Solomon codes as a hard problem},
  booktitle    = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic
                  Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005},
  pages        = {48},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ITWTPI.2005.1543956},
  doi          = {10.1109/ITWTPI.2005.1543956},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/KiayiasY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/KiayiasRR05,
  author       = {Aggelos Kiayias and
                  Yona Raekow and
                  Alexander Russell},
  editor       = {Mauro Barni and
                  Jordi Herrera{-}Joancomart{\'{\i}} and
                  Stefan Katzenbeisser and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Efficient Steganography with Provable Security Guarantees},
  booktitle    = {Information Hiding, 7th International Workshop, {IH} 2005, Barcelona,
                  Spain, June 6-8, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3727},
  pages        = {118--130},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11558859\_10},
  doi          = {10.1007/11558859\_10},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/KiayiasRR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/KiayiasY05,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  editor       = {Ed Dawson and
                  Serge Vaudenay},
  title        = {Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity
                  Against Group Managers},
  booktitle    = {Progress in Cryptology - Mycrypt 2005, First International Conference
                  on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3715},
  pages        = {151--170},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11554868\_11},
  doi          = {10.1007/11554868\_11},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/KiayiasY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/KarygiannisKT05,
  author       = {A. Karygiannis and
                  Aggelos Kiayias and
                  Yiannis Tsiounis},
  title        = {A Solution for Wireless Privacy and Payments based on E-cash},
  booktitle    = {First International Conference on Security and Privacy for Emerging
                  Areas in Communications Networks, SecureComm 2005, Athens, Greece,
                  5-9 September, 2005},
  pages        = {206--218},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/SECURECOMM.2005.9},
  doi          = {10.1109/SECURECOMM.2005.9},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/KarygiannisKT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasY05,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  title        = {Group Signatures with Efficient Concurrent Join},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {345},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/345},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasZ05,
  author       = {Aggelos Kiayias and
                  Hong{-}Sheng Zhou},
  title        = {Concurrent Blind Signatures without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {435},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/435},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KiayiasY04,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  editor       = {Pil Joong Lee},
  title        = {Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System
                  Under Optimal Parameter Choice},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2004, 10th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Jeju Island, Korea, December 5-9, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3329},
  pages        = {401--416},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30539-2\_28},
  doi          = {10.1007/978-3-540-30539-2\_28},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KiayiasY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KiayiasTY04,
  author       = {Aggelos Kiayias and
                  Yiannis Tsiounis and
                  Moti Yung},
  editor       = {Christian Cachin and
                  Jan Camenisch},
  title        = {Traceable Signatures},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Interlaken,
                  Switzerland, May 2-6, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3027},
  pages        = {571--589},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24676-3\_34},
  doi          = {10.1007/978-3-540-24676-3\_34},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KiayiasTY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DodisKNS04,
  author       = {Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Antonio Nicolosi and
                  Victor Shoup},
  editor       = {Christian Cachin and
                  Jan Camenisch},
  title        = {Anonymous Identification in Ad Hoc Groups},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Interlaken,
                  Switzerland, May 2-6, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3027},
  pages        = {609--626},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24676-3\_36},
  doi          = {10.1007/978-3-540-24676-3\_36},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DodisKNS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KiayiasY04,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  editor       = {Ari Juels},
  title        = {The Vector-Ballot e-Voting Approach},
  booktitle    = {Financial Cryptography, 8th International Conference, {FC} 2004, Key
                  West, FL, USA, February 9-12, 2004. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3110},
  pages        = {72--89},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27809-2\_9},
  doi          = {10.1007/978-3-540-27809-2\_9},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/KiayiasY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/drm/2004,
  editor       = {Aggelos Kiayias and
                  Moti Yung},
  title        = {Proceedings of the 2004 {ACM} Workshop on Digital Rights Management
                  2004, Washington, DC, USA, October 25, 2004},
  publisher    = {{ACM}},
  year         = {2004},
  isbn         = {1-58113-969-1},
  timestamp    = {Wed, 15 Dec 2004 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasTY04,
  author       = {Aggelos Kiayias and
                  Yiannis Tsiounis and
                  Moti Yung},
  title        = {Traceable Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {7},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/007},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasTY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasY04,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  title        = {Group Signatures: Provable Security, Efficient Constructions and Anonymity
                  from Trapdoor-Holders},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {76},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/076},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisFKY04,
  author       = {Yevgeniy Dodis and
                  Nelly Fazio and
                  Aggelos Kiayias and
                  Moti Yung},
  title        = {Scalable Public-Key Tracing and Revoking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {160},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/160},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisFKY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasY04a,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  title        = {Cryptanalyzing the Polynomial-Reconstruction based Public-Key System
                  Under Optimal Parameter Choice},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {217},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/217},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasY04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KiayiasY03,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  editor       = {Eli Biham},
  title        = {Extracting Group Signatures from Traitor Tracing Schemes},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Warsaw,
                  Poland, May 4-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2656},
  pages        = {630--648},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-39200-9\_39},
  doi          = {10.1007/3-540-39200-9\_39},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KiayiasY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KiayiasY03,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  editor       = {Rebecca N. Wright},
  title        = {Non-interactive Zero-Sharing with Applications to Private Distributed
                  Decision Making},
  booktitle    = {Financial Cryptography, 7th International Conference, {FC} 2003, Guadeloupe,
                  French West Indies, January 27-30, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2742},
  pages        = {303--320},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45126-6\_22},
  doi          = {10.1007/978-3-540-45126-6\_22},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/KiayiasY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/BleichenbacherKY03,
  author       = {Daniel Bleichenbacher and
                  Aggelos Kiayias and
                  Moti Yung},
  editor       = {Jos C. M. Baeten and
                  Jan Karel Lenstra and
                  Joachim Parrow and
                  Gerhard J. Woeginger},
  title        = {Decoding of Interleaved Reed Solomon Codes over Noisy Data},
  booktitle    = {Automata, Languages and Programming, 30th International Colloquium,
                  {ICALP} 2003, Eindhoven, The Netherlands, June 30 - July 4, 2003.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2719},
  pages        = {97--108},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45061-0\_9},
  doi          = {10.1007/3-540-45061-0\_9},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/BleichenbacherKY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/DodisFKY03,
  author       = {Yevgeniy Dodis and
                  Nelly Fazio and
                  Aggelos Kiayias and
                  Moti Yung},
  editor       = {Elizabeth Borowsky and
                  Sergio Rajsbaum},
  title        = {Scalable public-key tracing and revoking},
  booktitle    = {Proceedings of the Twenty-Second {ACM} Symposium on Principles of
                  Distributed Computing, {PODC} 2003, Boston, Massachusetts, USA, July
                  13-16, 2003},
  pages        = {190--199},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/872035.872062},
  doi          = {10.1145/872035.872062},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/DodisFKY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/KiayiasY03,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  editor       = {Dimitris Gritzalis},
  title        = {Robust Verifiable non-Interactive Zero-Sharing - {A} Plug-in Utility
                  for Enhanced Voters' Privacy},
  booktitle    = {Secure Electronic Voting},
  series       = {Advances in Information Security},
  volume       = {7},
  pages        = {139--151},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-1-4615-0239-5\_9},
  doi          = {10.1007/978-1-4615-0239-5\_9},
  timestamp    = {Tue, 16 May 2017 14:24:25 +0200},
  biburl       = {https://dblp.org/rec/series/ais/KiayiasY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KiayiasY02,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  editor       = {Joan Feigenbaum},
  title        = {Breaking and Repairing Asymmetric Public-Key Traitor Tracing},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop,
                  {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2696},
  pages        = {32--50},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-44993-5\_3},
  doi          = {10.1007/978-3-540-44993-5\_3},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KiayiasY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KiayiasY02,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  editor       = {Lars R. Knudsen},
  title        = {Traitor Tracing with Constant Transmission Rate},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Amsterdam,
                  The Netherlands, April 28 - May 2, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2332},
  pages        = {450--465},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-46035-7\_30},
  doi          = {10.1007/3-540-46035-7\_30},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KiayiasY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/KiayiasY02,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  editor       = {Peter Widmayer and
                  Francisco Triguero Ruiz and
                  Rafael Morales Bueno and
                  Matthew Hennessy and
                  Stephan J. Eidenbenz and
                  Ricardo Conejo},
  title        = {Cryptographic Hardness Based on the Decoding of Reed-Solomon Codes},
  booktitle    = {Automata, Languages and Programming, 29th International Colloquium,
                  {ICALP} 2002, Malaga, Spain, July 8-13, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2380},
  pages        = {232--243},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45465-9\_21},
  doi          = {10.1007/3-540-45465-9\_21},
  timestamp    = {Wed, 11 Sep 2019 13:15:53 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/KiayiasY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KiayiasY02,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {Self-tallying Elections and Perfect Ballot Secrecy},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {141--158},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_10},
  doi          = {10.1007/3-540-45664-3\_10},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KiayiasY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR02-017,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  title        = {Cryptographic Hardness based on the Decoding of Reed-Solomon Codes
                  with Applications},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR02-017}},
  year         = {2002},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/2002/TR02-017/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR02-017},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/ECCC-TR02-017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KiayiasY01,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  editor       = {Tomas Sander},
  title        = {On Crafty Pirates and Foxy Tracers},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop
                  {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2320},
  pages        = {22--39},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47870-1\_3},
  doi          = {10.1007/3-540-47870-1\_3},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KiayiasY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KiayiasY01,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  editor       = {Joe Kilian},
  title        = {Self Protecting Pirates and Black-Box Traitor Tracing},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 19-23,
                  2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2139},
  pages        = {63--79},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44647-8\_4},
  doi          = {10.1007/3-540-44647-8\_4},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KiayiasY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/KiayiasY01,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  editor       = {Fernando Orejas and
                  Paul G. Spirakis and
                  Jan van Leeuwen},
  title        = {Secure Games with Polynomial Expressions},
  booktitle    = {Automata, Languages and Programming, 28th International Colloquium,
                  {ICALP} 2001, Crete, Greece, July 8-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2076},
  pages        = {939--950},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-48224-5\_76},
  doi          = {10.1007/3-540-48224-5\_76},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/KiayiasY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pci/KiayiasPSZ01,
  author       = {Aggelos Kiayias and
                  Aris Pagourtzis and
                  Kiron Sharma and
                  Stathis Zachos},
  editor       = {Yannis Manolopoulos and
                  Skevos Evripidou and
                  Antonis C. Kakas},
  title        = {Acceptor-Definable Counting Classes},
  booktitle    = {Advances in Informatics, 8th Panhellenic Conference on Informatics,
                  {PCI} 2001. Nicosia, Cyprus, November 8-10, 2001, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2563},
  pages        = {453--463},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-38076-0\_29},
  doi          = {10.1007/3-540-38076-0\_29},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/pci/KiayiasPSZ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/KiayiasY01,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  editor       = {Serge Vaudenay and
                  Amr M. Youssef},
  title        = {Polynomial Reconstruction Based Cryptography},
  booktitle    = {Selected Areas in Cryptography, 8th Annual International Workshop,
                  {SAC} 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2259},
  pages        = {129--133},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45537-X\_10},
  doi          = {10.1007/3-540-45537-X\_10},
  timestamp    = {Tue, 01 Jun 2021 15:22:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/KiayiasY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics