Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Vassilis Zikas
@article{DBLP:journals/iacr/BrazitikosZ24, author = {Konstantinos Brazitikos and Vassilis Zikas}, title = {General Adversary Structures in Byzantine Agreement and Multi-Party Computation with Active and Omission Corruption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {209}, year = {2024}, url = {https://eprint.iacr.org/2024/209}, timestamp = {Fri, 16 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BrazitikosZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/AndrewsCZ23, author = {John Andrews and Michele Ciampi and Vassilis Zikas}, title = {Etherless Ethereum tokens: Simulating native tokens in Ethereum}, journal = {J. Comput. Syst. Sci.}, volume = {135}, pages = {55--72}, year = {2023}, url = {https://doi.org/10.1016/j.jcss.2023.02.001}, doi = {10.1016/J.JCSS.2023.02.001}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcss/AndrewsCZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LevyISKMZ23, author = {Benjamin Levy and Muhammad Ishaq and Benjamin Sherman and Lindsey Kennard and Ana L. Milanova and Vassilis Zikas}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {{COMBINE:} COMpilation and Backend-INdependent vEctorization for Multi-Party Computation}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {2531--2545}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3623181}, doi = {10.1145/3576915.3623181}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LevyISKMZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CohenGZ23, author = {Ran Cohen and Juan A. Garay and Vassilis Zikas}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Completeness Theorems for Adaptively Secure Broadcast}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14081}, pages = {3--38}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38557-5\_1}, doi = {10.1007/978-3-031-38557-5\_1}, timestamp = {Mon, 14 Aug 2023 16:16:25 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CohenGZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CohenFGPZ23, author = {Ran Cohen and Pouyan Forghani and Juan A. Garay and Rutvik Patel and Vassilis Zikas}, editor = {Guy N. Rothblum and Hoeteck Wee}, title = {Concurrent Asynchronous Byzantine Agreement in Expected-Constant Rounds, Revisited}, booktitle = {Theory of Cryptography - 21st International Conference, {TCC} 2023, Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14372}, pages = {422--451}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-48624-1\_16}, doi = {10.1007/978-3-031-48624-1\_16}, timestamp = {Wed, 06 Dec 2023 13:56:15 +0100}, biburl = {https://dblp.org/rec/conf/tcc/CohenFGPZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-05520, author = {Eli Gafni and Vasileios Zikas}, title = {Synchrony/Asynchrony vs. Stationary/Mobile? The Latter is Superior...in Theory}, journal = {CoRR}, volume = {abs/2302.05520}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.05520}, doi = {10.48550/ARXIV.2302.05520}, eprinttype = {arXiv}, eprint = {2302.05520}, timestamp = {Sun, 19 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-05520.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-01243, author = {Yun Lu and Malik Magdon{-}Ismail and Yu Wei and Vassilis Zikas}, title = {Privacy-Utility Tradeoff of {OLS} with Random Projections}, journal = {CoRR}, volume = {abs/2309.01243}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.01243}, doi = {10.48550/ARXIV.2309.01243}, eprinttype = {arXiv}, eprint = {2309.01243}, timestamp = {Mon, 11 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-01243.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-14506, author = {Ran Cohen and Pouyan Forghani and Juan A. Garay and Rutvik Patel and Vassilis Zikas}, title = {Concurrent Asynchronous Byzantine Agreement in Expected-Constant Rounds, Revisited}, journal = {CoRR}, volume = {abs/2312.14506}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.14506}, doi = {10.48550/ARXIV.2312.14506}, eprinttype = {arXiv}, eprint = {2312.14506}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-14506.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-16253, author = {Timoth{\'{e}} Albouy and Davide Frey and Ran Gelles and Carmit Hazay and Michel Raynal and Elad Michael Schiller and Fran{\c{c}}ois Ta{\"{\i}}ani and Vassilis Zikas}, title = {Towards Optimal Communication Byzantine Reliable Broadcast under a Message Adversary}, journal = {CoRR}, volume = {abs/2312.16253}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.16253}, doi = {10.48550/ARXIV.2312.16253}, eprinttype = {arXiv}, eprint = {2312.16253}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-16253.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LevySIKMZ23, author = {Benjamin Levy and Benjamin Sherman and Muhammad Ishaq and Lindsey Kennard and Ana L. Milanova and Vassilis Zikas}, title = {Compilation and Backend-Independent Vectorization for Multi-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {89}, year = {2023}, url = {https://eprint.iacr.org/2023/089}, timestamp = {Wed, 22 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LevySIKMZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CohenFGPZ23, author = {Ran Cohen and Pouyan Forghani and Juan A. Garay and Rutvik Patel and Vassilis Zikas}, title = {Concurrent Asynchronous Byzantine Agreement in Expected-Constant Rounds, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1003}, year = {2023}, url = {https://eprint.iacr.org/2023/1003}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CohenFGPZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoiHWZ23, author = {Wonseok Choi and Minki Hhan and Yu Wei and Vassilis Zikas}, title = {Fine-Tuning Ideal Worlds for the Xor of Two Permutation Outputs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1704}, year = {2023}, url = {https://eprint.iacr.org/2023/1704}, timestamp = {Mon, 27 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChoiHWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoiLZ23, author = {Wonseok Choi and Xiangyu Liu and Vassilis Zikas}, title = {Blockchain Governance via Sharp Anonymous Multisignatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1881}, year = {2023}, url = {https://eprint.iacr.org/2023/1881}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChoiLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/citc/ChandranFGOPZ22, author = {Nishanth Chandran and Pouyan Forghani and Juan A. Garay and Rafail Ostrovsky and Rutvik Patel and Vassilis Zikas}, editor = {Dana Dachman{-}Soled}, title = {Universally Composable Almost-Everywhere Secure Computation}, booktitle = {3rd Conference on Information-Theoretic Cryptography, {ITC} 2022, July 5-7, 2022, Cambridge, MA, {USA}}, series = {LIPIcs}, volume = {230}, pages = {14:1--14:25}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2022}, url = {https://doi.org/10.4230/LIPIcs.ITC.2022.14}, doi = {10.4230/LIPICS.ITC.2022.14}, timestamp = {Thu, 30 Jun 2022 16:13:48 +0200}, biburl = {https://dblp.org/rec/conf/citc/ChandranFGOPZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscml/AndrewsCZ22, author = {John Andrews and Michele Ciampi and Vassilis Zikas}, editor = {Shlomi Dolev and Jonathan Katz and Amnon Meisels}, title = {Etherless Ethereum Tokens: Simulating Native Tokens in Ethereum}, booktitle = {Cyber Security, Cryptology, and Machine Learning - 6th International Symposium, {CSCML} 2022, Be'er Sheva, Israel, June 30 - July 1, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13301}, pages = {388--407}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07689-3\_29}, doi = {10.1007/978-3-031-07689-3\_29}, timestamp = {Fri, 24 Jun 2022 18:23:22 +0200}, biburl = {https://dblp.org/rec/conf/cscml/AndrewsCZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscml/CiampiIMOZ22, author = {Michele Ciampi and Muhammad Ishaq and Malik Magdon{-}Ismail and Rafail Ostrovsky and Vassilis Zikas}, editor = {Shlomi Dolev and Jonathan Katz and Amnon Meisels}, title = {FairMM: {A} Fast and Frontrunning-Resistant Crypto Market-Maker}, booktitle = {Cyber Security, Cryptology, and Machine Learning - 6th International Symposium, {CSCML} 2022, Be'er Sheva, Israel, June 30 - July 1, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13301}, pages = {428--446}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07689-3\_31}, doi = {10.1007/978-3-031-07689-3\_31}, timestamp = {Fri, 24 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cscml/CiampiIMOZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/CiampiLZ22, author = {Michele Ciampi and Yun Lu and Vassilis Zikas}, title = {Collusion-Preserving Computation without a Mediator}, booktitle = {35th {IEEE} Computer Security Foundations Symposium, {CSF} 2022, Haifa, Israel, August 7-10, 2022}, pages = {211--226}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CSF54842.2022.9919678}, doi = {10.1109/CSF54842.2022.9919678}, timestamp = {Fri, 11 Nov 2022 16:53:14 +0100}, biburl = {https://dblp.org/rec/conf/csfw/CiampiLZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CiampiOWZ22, author = {Michele Ciampi and Rafail Ostrovsky and Hendrik Waldner and Vassilis Zikas}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Round-Optimal and Communication-Efficient Multiparty Computation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13275}, pages = {65--95}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06944-4\_3}, doi = {10.1007/978-3-031-06944-4\_3}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CiampiOWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuWMZ22, author = {Yun Lu and Yu Wei and Malik Magdon{-}Ismail and Vassilis Zikas}, title = {Eureka: {A} General Framework for Black-box Differential Privacy Estimators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1250}, year = {2022}, url = {https://eprint.iacr.org/2022/1250}, timestamp = {Sat, 22 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuWMZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/CohenCGZ21, author = {Ran Cohen and Sandro Coretti and Juan A. Garay and Vassilis Zikas}, title = {Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols}, journal = {J. Cryptol.}, volume = {34}, number = {2}, pages = {12}, year = {2021}, url = {https://doi.org/10.1007/s00145-021-09377-0}, doi = {10.1007/S00145-021-09377-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/CohenCGZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BadertscherLZ21, author = {Christian Badertscher and Yun Lu and Vassilis Zikas}, editor = {Tal Malkin and Chris Peikert}, title = {A Rational Protocol Treatment of 51{\%} Attacks}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12827}, pages = {3--32}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84252-9\_1}, doi = {10.1007/978-3-030-84252-9\_1}, timestamp = {Tue, 25 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BadertscherLZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BadertscherGKRZ21, author = {Christian Badertscher and Peter Gazi and Aggelos Kiayias and Alexander Russell and Vassilis Zikas}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Dynamic Ad Hoc Clock Synchronization}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12698}, pages = {399--428}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77883-5\_14}, doi = {10.1007/978-3-030-77883-5\_14}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BadertscherGKRZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BadertscherHZ21, author = {Christian Badertscher and Julia Hesse and Vassilis Zikas}, editor = {Kobbi Nissim and Brent Waters}, title = {On the (Ir)Replaceability of Global Setups, or How (Not) to Use a Global Ledger}, booktitle = {Theory of Cryptography - 19th International Conference, {TCC} 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13043}, pages = {626--657}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90453-1\_22}, doi = {10.1007/978-3-030-90453-1\_22}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/BadertscherHZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuLXZ21, author = {Ao Liu and Yun Lu and Lirong Xia and Vassilis Zikas}, title = {How Private Are Commonly-Used Voting Rules?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {392}, year = {2021}, url = {https://eprint.iacr.org/2021/392}, timestamp = {Tue, 25 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LiuLXZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CiampiIMOZ21, author = {Michele Ciampi and Muhammad Ishaq and Malik Magdon{-}Ismail and Rafail Ostrovsky and Vassilis Zikas}, title = {FairMM: {A} Fast and Frontrunning-Resistant Crypto Market-Maker}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {609}, year = {2021}, url = {https://eprint.iacr.org/2021/609}, timestamp = {Mon, 07 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CiampiIMOZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AndrewsCZ21, author = {John Andrews and Michele Ciampi and Vassilis Zikas}, title = {Etherless Ethereum Tokens: Simulating Native Tokens in Ethereum}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {766}, year = {2021}, url = {https://eprint.iacr.org/2021/766}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AndrewsCZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CohenGZ21, author = {Ran Cohen and Juan A. Garay and Vassilis Zikas}, title = {Adaptively Secure Broadcast in Resource-Restricted Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {775}, year = {2021}, url = {https://eprint.iacr.org/2021/775}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CohenGZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadertscherLZ21, author = {Christian Badertscher and Yun Lu and Vassilis Zikas}, title = {A Rational Protocol Treatment of 51{\%} Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {897}, year = {2021}, url = {https://eprint.iacr.org/2021/897}, timestamp = {Tue, 25 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BadertscherLZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChandranFGOPZ21, author = {Nishanth Chandran and Pouyan Forghani and Juan A. Garay and Rafail Ostrovsky and Rutvik Patel and Vassilis Zikas}, title = {Universally Composable Almost-Everywhere Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1398}, year = {2021}, url = {https://eprint.iacr.org/2021/1398}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChandranFGOPZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/AbadiCKZ20, author = {Aydin Abadi and Michele Ciampi and Aggelos Kiayias and Vassilis Zikas}, editor = {Mauro Conti and Jianying Zhou and Emiliano Casalicchio and Angelo Spognardi}, title = {Timed Signatures and Zero-Knowledge Proofs - Timestamping in the Blockchain Era -}, booktitle = {Applied Cryptography and Network Security - 18th International Conference, {ACNS} 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12146}, pages = {335--354}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57808-4\_17}, doi = {10.1007/978-3-030-57808-4\_17}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/AbadiCKZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GarayKOPZ20, author = {Juan A. Garay and Aggelos Kiayias and Rafail M. Ostrovsky and Giorgos Panagiotakos and Vassilis Zikas}, editor = {Anne Canteaut and Yuval Ishai}, title = {Resource-Restricted Cryptography: Revisiting {MPC} Bounds in the Proof-of-Work Era}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12106}, pages = {129--158}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45724-2\_5}, doi = {10.1007/978-3-030-45724-2\_5}, timestamp = {Mon, 04 May 2020 14:32:28 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GarayKOPZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CohenGZ20, author = {Ran Cohen and Juan A. Garay and Vassilis Zikas}, editor = {Anne Canteaut and Yuval Ishai}, title = {Broadcast-Optimal Two-Round {MPC}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12106}, pages = {828--858}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45724-2\_28}, doi = {10.1007/978-3-030-45724-2\_28}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CohenGZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/KleinrockOZ20, author = {Leonard Kleinrock and Rafail Ostrovsky and Vassilis Zikas}, editor = {Karthikeyan Bhargavan and Elisabeth Oswald and Manoj Prabhakaran}, title = {Proof-of-Reputation Blockchain with Nakamoto Fallback}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2020 - 21st International Conference on Cryptology in India, Bangalore, India, December 13-16, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12578}, pages = {16--38}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65277-7\_2}, doi = {10.1007/978-3-030-65277-7\_2}, timestamp = {Wed, 17 Apr 2024 21:39:19 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/KleinrockOZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BadertscherCHTZ20, author = {Christian Badertscher and Ran Canetti and Julia Hesse and Bj{\"{o}}rn Tackmann and Vassilis Zikas}, editor = {Rafael Pass and Krzysztof Pietrzak}, title = {Universal Composition with Global Subroutines: Capturing Global Setup Within Plain {UC}}, booktitle = {Theory of Cryptography - 18th International Conference, {TCC} 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12552}, pages = {1--30}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64381-2\_1}, doi = {10.1007/978-3-030-64381-2\_1}, timestamp = {Thu, 17 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/BadertscherCHTZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uai/LiuLXZ20, author = {Ao Liu and Yun Lu and Lirong Xia and Vassilis Zikas}, editor = {Ryan P. Adams and Vibhav Gogate}, title = {How Private Are Commonly-Used Voting Rules?}, booktitle = {Proceedings of the Thirty-Sixth Conference on Uncertainty in Artificial Intelligence, {UAI} 2020, virtual online, August 3-6, 2020}, series = {Proceedings of Machine Learning Research}, volume = {124}, pages = {629--638}, publisher = {{AUAI} Press}, year = {2020}, url = {http://proceedings.mlr.press/v124/liu20b.html}, timestamp = {Tue, 25 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uai/LiuLXZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2020-1, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12110}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45374-9}, doi = {10.1007/978-3-030-45374-9}, isbn = {978-3-030-45373-2}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2020-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2020-2, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12111}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45388-6}, doi = {10.1007/978-3-030-45388-6}, isbn = {978-3-030-45387-9}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2020-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KleinrockOZ20, author = {Leonard Kleinrock and Rafail Ostrovsky and Vassilis Zikas}, title = {A PoR/PoS-Hybrid Blockchain: Proof of Reputation with Nakamoto Fallback}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {381}, year = {2020}, url = {https://eprint.iacr.org/2020/381}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KleinrockOZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CiampiLZ20, author = {Michele Ciampi and Yun Lu and Vassilis Zikas}, title = {Collusion-Preserving Computation without a Mediator}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {497}, year = {2020}, url = {https://eprint.iacr.org/2020/497}, timestamp = {Tue, 25 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CiampiLZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadertscherGKRZ20, author = {Christian Badertscher and Peter Gazi and Aggelos Kiayias and Alexander Russell and Vassilis Zikas}, title = {Consensus Redux: Distributed Ledgers in the Face of Adversarial Supremacy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1021}, year = {2020}, url = {https://eprint.iacr.org/2020/1021}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadertscherGKRZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadertscherCHTZ20, author = {Christian Badertscher and Ran Canetti and Julia Hesse and Bj{\"{o}}rn Tackmann and Vassilis Zikas}, title = {Universal Composition with Global Subroutines: Capturing Global Setup within plain {UC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1209}, year = {2020}, url = {https://eprint.iacr.org/2020/1209}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BadertscherCHTZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CiampiOWZ20, author = {Michele Ciampi and Rafail Ostrovsky and Hendrik Waldner and Vassilis Zikas}, title = {Round-Optimal and Communication-Efficient Multiparty Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1437}, year = {2020}, url = {https://eprint.iacr.org/2020/1437}, timestamp = {Wed, 02 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CiampiOWZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadertscherHZ20, author = {Christian Badertscher and Julia Hesse and Vassilis Zikas}, title = {On the (Ir)Replaceability of Global Setups, or How (Not) to Use a Global Ledger}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1489}, year = {2020}, url = {https://eprint.iacr.org/2020/1489}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BadertscherHZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Chung0LZ19, author = {Kai{-}Min Chung and Marios Georgiou and Ching{-}Yi Lai and Vassilis Zikas}, title = {Cryptography with Disposable Backdoors}, journal = {Cryptogr.}, volume = {3}, number = {3}, pages = {22}, year = {2019}, url = {https://doi.org/10.3390/cryptography3030022}, doi = {10.3390/CRYPTOGRAPHY3030022}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/Chung0LZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/CohenCGZ19, author = {Ran Cohen and Sandro Coretti and Juan A. Garay and Vassilis Zikas}, title = {Probabilistic Termination and Composability of Cryptographic Protocols}, journal = {J. Cryptol.}, volume = {32}, number = {3}, pages = {690--741}, year = {2019}, url = {https://doi.org/10.1007/s00145-018-9279-y}, doi = {10.1007/S00145-018-9279-Y}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/CohenCGZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/IshaqMZ19, author = {Muhammad Ishaq and Ana L. Milanova and Vassilis Zikas}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Efficient {MPC} via Program Analysis: {A} Framework for Efficient Optimal Mixing}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {1539--1556}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3339818}, doi = {10.1145/3319535.3339818}, timestamp = {Tue, 10 Nov 2020 20:00:36 +0100}, biburl = {https://dblp.org/rec/conf/ccs/IshaqMZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/TsikhanovichMIZ19, author = {Maksim Tsikhanovich and Malik Magdon{-}Ismail and Muhammad Ishaq and Vassilis Zikas}, editor = {Zhiqiang Lin and Charalampos Papamanthou and Michalis Polychronakis}, title = {PD-ML-Lite: Private Distributed Machine Learning from Lightweight Cryptography}, booktitle = {Information Security - 22nd International Conference, {ISC} 2019, New York City, NY, USA, September 16-18, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11723}, pages = {149--167}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30215-3\_8}, doi = {10.1007/978-3-030-30215-3\_8}, timestamp = {Mon, 02 Sep 2019 15:19:30 +0200}, biburl = {https://dblp.org/rec/conf/isw/TsikhanovichMIZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KerberKKZ19, author = {Thomas Kerber and Aggelos Kiayias and Markulf Kohlweiss and Vassilis Zikas}, title = {Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake}, booktitle = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco, CA, USA, May 19-23, 2019}, pages = {157--174}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SP.2019.00063}, doi = {10.1109/SP.2019.00063}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/KerberKKZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-07986, author = {Maksim Tsikhanovich and Malik Magdon{-}Ismail and Muhammad Ishaq and Vassilis Zikas}, title = {PD-ML-Lite: Private Distributed Machine Learning from Lighweight Cryptography}, journal = {CoRR}, volume = {abs/1901.07986}, year = {2019}, url = {http://arxiv.org/abs/1901.07986}, eprinttype = {arXiv}, eprint = {1901.07986}, timestamp = {Sat, 02 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-07986.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbadiCKZ19, author = {Aydin Abadi and Michele Ciampi and Aggelos Kiayias and Vassilis Zikas}, title = {Timed Signatures and Zero-Knowledge Proofs -Timestamping in the Blockchain Era-}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {644}, year = {2019}, url = {https://eprint.iacr.org/2019/644}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbadiCKZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaqMZ19, author = {Muhammad Ishaq and Ana L. Milanova and Vassilis Zikas}, title = {Efficient {MPC} via Program Analysis: {A} Framework for Efficient Optimal Mixing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {651}, year = {2019}, url = {https://eprint.iacr.org/2019/651}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaqMZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadertscherGKRZ19, author = {Christian Badertscher and Peter Gazi and Aggelos Kiayias and Alexander Russell and Vassilis Zikas}, title = {Ouroboros Chronos: Permissionless Clock Synchronization via Proof-of-Stake}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {838}, year = {2019}, url = {https://eprint.iacr.org/2019/838}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadertscherGKRZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CohenGZ19, author = {Ran Cohen and Juan A. Garay and Vassilis Zikas}, title = {Broadcast-Optimal Two-Round {MPC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1183}, year = {2019}, url = {https://eprint.iacr.org/2019/1183}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CohenGZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarayKOPZ19, author = {Juan A. Garay and Aggelos Kiayias and Rafail Ostrovsky and Giorgos Panagiotakos and Vassilis Zikas}, title = {Resource-Restricted Cryptography: Honest-Majority {MPC} from a {CRS} (and No Broadcast)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1264}, year = {2019}, url = {https://eprint.iacr.org/2019/1264}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GarayKOPZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BadertscherGKRZ18, author = {Christian Badertscher and Peter Gazi and Aggelos Kiayias and Alexander Russell and Vassilis Zikas}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {913--930}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243848}, doi = {10.1145/3243734.3243848}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BadertscherGKRZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LuMOWZ18, author = {Yun Lu and Konstantinos Mitropoulos and Rafail Ostrovsky and Avraham Weinstock and Vassilis Zikas}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {Cryptographically Secure Detection of Injection Attacks}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {2240--2242}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3278503}, doi = {10.1145/3243734.3278503}, timestamp = {Tue, 25 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LuMOWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BadertscherGMTZ18, author = {Christian Badertscher and Juan A. Garay and Ueli Maurer and Daniel Tschudi and Vassilis Zikas}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {But Why Does It Work? {A} Rational Protocol Design Treatment of Bitcoin}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10821}, pages = {34--65}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78375-8\_2}, doi = {10.1007/978-3-319-78375-8\_2}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BadertscherGMTZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/GellesPZ18, author = {Ran Gelles and Anat Paskin{-}Cherniavsky and Vassilis Zikas}, editor = {Dario Catalano and Roberto De Prisco}, title = {Secure Two-Party Computation over Unreliable Channels}, booktitle = {Security and Cryptography for Networks - 11th International Conference, {SCN} 2018, Amalfi, Italy, September 5-7, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11035}, pages = {445--463}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98113-0\_24}, doi = {10.1007/978-3-319-98113-0\_24}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/GellesPZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1805-05750, author = {Ao Liu and Yun Lu and Lirong Xia and Vassilis Zikas}, title = {How Private Is Your Voting? {A} Framework for Comparing the Privacy of Voting Mechanisms}, journal = {CoRR}, volume = {abs/1805.05750}, year = {2018}, url = {http://arxiv.org/abs/1805.05750}, eprinttype = {arXiv}, eprint = {1805.05750}, timestamp = {Tue, 25 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1805-05750.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadertscherGMTZ18, author = {Christian Badertscher and Juan A. Garay and Ueli Maurer and Daniel Tschudi and Vassilis Zikas}, title = {But Why does it Work? {A} Rational Protocol Design Treatment of Bitcoin}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {138}, year = {2018}, url = {http://eprint.iacr.org/2018/138}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadertscherGMTZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChungGLZ18, author = {Kai{-}Min Chung and Marios Georgiou and Ching{-}Yi Lai and Vassilis Zikas}, title = {Cryptography with Dispensable Backdoors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {352}, year = {2018}, url = {https://eprint.iacr.org/2018/352}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChungGLZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadertscherGKRZ18, author = {Christian Badertscher and Peter Gazi and Aggelos Kiayias and Alexander Russell and Vassilis Zikas}, title = {Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {378}, year = {2018}, url = {https://eprint.iacr.org/2018/378}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadertscherGKRZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GellesPZ18, author = {Ran Gelles and Anat Paskin{-}Cherniavsky and Vassilis Zikas}, title = {Secure Two-Party Computation over Unreliable Channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {506}, year = {2018}, url = {https://eprint.iacr.org/2018/506}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GellesPZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KerberKKZ18, author = {Thomas Kerber and Markulf Kohlweiss and Aggelos Kiayias and Vassilis Zikas}, title = {Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1132}, year = {2018}, url = {https://eprint.iacr.org/2018/1132}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KerberKKZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BadertscherMTZ17, author = {Christian Badertscher and Ueli Maurer and Daniel Tschudi and Vassilis Zikas}, editor = {Jonathan Katz and Hovav Shacham}, title = {Bitcoin as a Transaction Ledger: {A} Composable Treatment}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10401}, pages = {324--356}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63688-7\_11}, doi = {10.1007/978-3-319-63688-7\_11}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BadertscherMTZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GarayIOZ17, author = {Juan A. Garay and Yuval Ishai and Rafail Ostrovsky and Vassilis Zikas}, editor = {Jonathan Katz and Hovav Shacham}, title = {The Price of Low Communication in Secure Multi-party Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10401}, pages = {420--446}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63688-7\_14}, doi = {10.1007/978-3-319-63688-7\_14}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GarayIOZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/CohenCGZ17, author = {Ran Cohen and Sandro Coretti and Juan A. Garay and Vassilis Zikas}, editor = {Ioannis Chatzigiannakis and Piotr Indyk and Fabian Kuhn and Anca Muscholl}, title = {Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols}, booktitle = {44th International Colloquium on Automata, Languages, and Programming, {ICALP} 2017, July 10-14, 2017, Warsaw, Poland}, series = {LIPIcs}, volume = {80}, pages = {37:1--37:15}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2017}, url = {https://doi.org/10.4230/LIPIcs.ICALP.2017.37}, doi = {10.4230/LIPICS.ICALP.2017.37}, timestamp = {Tue, 11 Feb 2020 15:52:14 +0100}, biburl = {https://dblp.org/rec/conf/icalp/CohenCGZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadertscherMTZ17, author = {Christian Badertscher and Ueli Maurer and Daniel Tschudi and Vassilis Zikas}, title = {Bitcoin as a Transaction Ledger: {A} Composable Treatment}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {149}, year = {2017}, url = {http://eprint.iacr.org/2017/149}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadertscherMTZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CohenCGZ17, author = {Ran Cohen and Sandro Coretti and Juan A. Garay and Vassilis Zikas}, title = {Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {364}, year = {2017}, url = {http://eprint.iacr.org/2017/364}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CohenCGZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarayIOZ17, author = {Juan A. Garay and Yuval Ishai and Rafail Ostrovsky and Vassilis Zikas}, title = {The Price of Low Communication in Secure Multi-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {520}, year = {2017}, url = {http://eprint.iacr.org/2017/520}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GarayIOZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/CorettiGHZ16, author = {Sandro Coretti and Juan A. Garay and Martin Hirt and Vassilis Zikas}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {Constant-Round Asynchronous Multi-Party Computation Based on One-Way Functions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10032}, pages = {998--1021}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53890-6\_33}, doi = {10.1007/978-3-662-53890-6\_33}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/CorettiGHZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CohenCGZ16, author = {Ran Cohen and Sandro Coretti and Juan A. Garay and Vassilis Zikas}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Probabilistic Termination and Composability of Cryptographic Protocols}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {9816}, pages = {240--269}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53015-3\_9}, doi = {10.1007/978-3-662-53015-3\_9}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CohenCGZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HirtMTZ16, author = {Martin Hirt and Ueli Maurer and Daniel Tschudi and Vassilis Zikas}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Network-Hiding Communication and Applications to Multi-party Protocols}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, pages = {335--365}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5\_12}, doi = {10.1007/978-3-662-53008-5\_12}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HirtMTZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KiayiasZZ16, author = {Aggelos Kiayias and Hong{-}Sheng Zhou and Vassilis Zikas}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Fair and Robust Multi-party Computation Using a Global Transaction Ledger}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {705--734}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_25}, doi = {10.1007/978-3-662-49896-5\_25}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KiayiasZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/LiptonOZ16, author = {Richard J. Lipton and Rafail Ostrovsky and Vassilis Zikas}, editor = {Ioannis Chatzigiannakis and Michael Mitzenmacher and Yuval Rabani and Davide Sangiorgi}, title = {Provably Secure Virus Detection: Using The Observer Effect Against Malware}, booktitle = {43rd International Colloquium on Automata, Languages, and Programming, {ICALP} 2016, July 11-15, 2016, Rome, Italy}, series = {LIPIcs}, volume = {55}, pages = {32:1--32:14}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2016}, url = {https://doi.org/10.4230/LIPIcs.ICALP.2016.32}, doi = {10.4230/LIPICS.ICALP.2016.32}, timestamp = {Tue, 11 Feb 2020 15:52:14 +0100}, biburl = {https://dblp.org/rec/conf/icalp/LiptonOZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/scn/2016, editor = {Vassilis Zikas and Roberto De Prisco}, title = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9}, doi = {10.1007/978-3-319-44618-9}, isbn = {978-3-319-44617-2}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CorettiGHZ16, author = {Sandro Coretti and Juan A. Garay and Martin Hirt and Vassilis Zikas}, title = {Constant-Round Asynchronous Multi-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {208}, year = {2016}, url = {http://eprint.iacr.org/2016/208}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CorettiGHZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CohenCGZ16, author = {Ran Cohen and Sandro Coretti and Juan A. Garay and Vassilis Zikas}, title = {Probabilistic Termination and Composability of Cryptographic Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {350}, year = {2016}, url = {http://eprint.iacr.org/2016/350}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CohenCGZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HirtMTZ16, author = {Martin Hirt and Ueli Maurer and Daniel Tschudi and Vassilis Zikas}, title = {Network-Hiding Communication and Applications to Multi-Party Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {556}, year = {2016}, url = {http://eprint.iacr.org/2016/556}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HirtMTZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AlwenOZZ15, author = {Jo{\"{e}}l Alwen and Rafail Ostrovsky and Hong{-}Sheng Zhou and Vassilis Zikas}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Incoercible Multi-party Computation and Universally Composable Receipt-Free Voting}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {763--780}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_37}, doi = {10.1007/978-3-662-48000-7\_37}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AlwenOZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/ChandranCGGOZ15, author = {Nishanth Chandran and Wutichai Chongchitmate and Juan A. Garay and Shafi Goldwasser and Rafail Ostrovsky and Vassilis Zikas}, editor = {Tim Roughgarden}, title = {The Hidden Graph Model: Communication Locality and Optimal Resiliency with Adaptive Faults}, booktitle = {Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, {ITCS} 2015, Rehovot, Israel, January 11-13, 2015}, pages = {153--162}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2688073.2688102}, doi = {10.1145/2688073.2688102}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/innovations/ChandranCGGOZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/GarayKTZ15, author = {Juan A. Garay and Jonathan Katz and Bj{\"{o}}rn Tackmann and Vassilis Zikas}, editor = {Chryssis Georgiou and Paul G. Spirakis}, title = {How Fair is Your Protocol?: {A} Utility-based Approach to Protocol Optimality}, booktitle = {Proceedings of the 2015 {ACM} Symposium on Principles of Distributed Computing, {PODC} 2015, Donostia-San Sebasti{\'{a}}n, Spain, July 21 - 23, 2015}, pages = {281--290}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2767386.2767431}, doi = {10.1145/2767386.2767431}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/GarayKTZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wdag/GarayTZ15, author = {Juan A. Garay and Bj{\"{o}}rn Tackmann and Vassilis Zikas}, editor = {Yoram Moses}, title = {Fair Distributed Computation of Reactive Functions}, booktitle = {Distributed Computing - 29th International Symposium, {DISC} 2015, Tokyo, Japan, October 7-9, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9363}, pages = {497--512}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48653-5\_33}, doi = {10.1007/978-3-662-48653-5\_33}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/wdag/GarayTZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarayKTZ15, author = {Juan A. Garay and Jonathan Katz and Bj{\"{o}}rn Tackmann and Vassilis Zikas}, title = {How Fair is Your Protocol? {A} Utility-based Approach to Protocol Optimality}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {187}, year = {2015}, url = {http://eprint.iacr.org/2015/187}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GarayKTZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiOZ15, author = {Yuval Ishai and Rafail Ostrovsky and Vassilis Zikas}, title = {Secure Multi-Party Computation with Identifiable Abort}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {325}, year = {2015}, url = {http://eprint.iacr.org/2015/325}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaiOZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FehrK0ZZ15, author = {Serge Fehr and Jonathan Katz and Fang Song and Hong{-}Sheng Zhou and Vassilis Zikas}, title = {Feasibility and Completeness of Cryptographic Tasks in the Quantum World}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {385}, year = {2015}, url = {http://eprint.iacr.org/2015/385}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FehrK0ZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasZZ15a, author = {Aggelos Kiayias and Hong{-}Sheng Zhou and Vassilis Zikas}, title = {Fair and Robust Multi-Party Computation using a Global Transaction Ledger}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {574}, year = {2015}, url = {http://eprint.iacr.org/2015/574}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasZZ15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiptonOZ15, author = {Richard J. Lipton and Rafail Ostrovsky and Vassilis Zikas}, title = {Provable Virus Detection: Using the Uncertainty Principle to Protect Against Malware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {728}, year = {2015}, url = {http://eprint.iacr.org/2015/728}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiptonOZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarayTZ15, author = {Juan A. Garay and Bj{\"{o}}rn Tackmann and Vassilis Zikas}, title = {Fair Distributed Computation of Reactive Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {807}, year = {2015}, url = {http://eprint.iacr.org/2015/807}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GarayTZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IshaiOZ14, author = {Yuval Ishai and Rafail Ostrovsky and Vassilis Zikas}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Secure Multi-Party Computation with Identifiable Abort}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {369--386}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_21}, doi = {10.1007/978-3-662-44381-1\_21}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/IshaiOZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChoiKMZ14, author = {Seung Geol Choi and Jonathan Katz and Alex J. Malozemoff and Vassilis Zikas}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Efficient Three-Party Computation from Cut-and-Choose}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {513--530}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_29}, doi = {10.1007/978-3-662-44381-1\_29}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChoiKMZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/KatzKZZ14, author = {Jonathan Katz and Aggelos Kiayias and Hong{-}Sheng Zhou and Vassilis Zikas}, editor = {Magn{\'{u}}s M. Halld{\'{o}}rsson and Shlomi Dolev}, title = {Distributing the setup in universally composable multi-party computation}, booktitle = {{ACM} Symposium on Principles of Distributed Computing, {PODC} '14, Paris, France, July 15-18, 2014}, pages = {20--29}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611462.2611480}, doi = {10.1145/2611462.2611480}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/podc/KatzKZZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoiKMZ14, author = {Seung Geol Choi and Jonathan Katz and Alex J. Malozemoff and Vassilis Zikas}, title = {Efficient Three-Party Computation from Cut-and-Choose}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {128}, year = {2014}, url = {http://eprint.iacr.org/2014/128}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoiKMZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChandranCGGOZ14, author = {Nishanth Chandran and Wutichai Chongchitmate and Juan A. Garay and Shafi Goldwasser and Rafail Ostrovsky and Vassilis Zikas}, title = {Optimally Resilient and Adaptively Secure Multi-Party Computation with Low Communication Locality}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {615}, year = {2014}, url = {http://eprint.iacr.org/2014/615}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChandranCGGOZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/GarayKMTZ13, author = {Juan A. Garay and Jonathan Katz and Ueli Maurer and Bj{\"{o}}rn Tackmann and Vassilis Zikas}, title = {Rational Protocol Design: Cryptography against Incentive-Driven Adversaries}, booktitle = {54th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS} 2013, 26-29 October, 2013, Berkeley, CA, {USA}}, pages = {648--657}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/FOCS.2013.75}, doi = {10.1109/FOCS.2013.75}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/GarayKMTZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/FehrKSZZ13, author = {Serge Fehr and Jonathan Katz and Fang Song and Hong{-}Sheng Zhou and Vassilis Zikas}, editor = {Amit Sahai}, title = {Feasibility and Completeness of Cryptographic Tasks in the Quantum World}, booktitle = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC} 2013, Tokyo, Japan, March 3-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7785}, pages = {281--296}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36594-2\_16}, doi = {10.1007/978-3-642-36594-2\_16}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/FehrKSZZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/KatzMTZ13, author = {Jonathan Katz and Ueli Maurer and Bj{\"{o}}rn Tackmann and Vassilis Zikas}, editor = {Amit Sahai}, title = {Universally Composable Synchronous Computation}, booktitle = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC} 2013, Tokyo, Japan, March 3-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7785}, pages = {477--498}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36594-2\_27}, doi = {10.1007/978-3-642-36594-2\_27}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/KatzMTZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ciss/MaurerZ13, author = {Ueli Maurer and Vassilis Zikas}, editor = {Manoj Prabhakaran and Amit Sahai}, title = {Information-Theoretic Secure Multiparty Computation}, booktitle = {Secure Multi-Party Computation}, series = {Cryptology and Information Security Series}, volume = {10}, pages = {168--200}, publisher = {{IOS} Press}, year = {2013}, url = {https://doi.org/10.3233/978-1-61499-169-4-168}, doi = {10.3233/978-1-61499-169-4-168}, timestamp = {Wed, 17 Apr 2024 21:39:22 +0200}, biburl = {https://dblp.org/rec/series/ciss/MaurerZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarayKMTZ13, author = {Juan A. Garay and Jonathan Katz and Ueli Maurer and Bj{\"{o}}rn Tackmann and Vassilis Zikas}, title = {Rational Protocol Design: Cryptography Against Incentive-driven Adversaries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {496}, year = {2013}, url = {http://eprint.iacr.org/2013/496}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GarayKMTZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AlwenKMZ12, author = {Jo{\"{e}}l Alwen and Jonathan Katz and Ueli Maurer and Vassilis Zikas}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Collusion-Preserving Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {124--143}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_9}, doi = {10.1007/978-3-642-32009-5\_9}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AlwenKMZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/GroceKTZ12, author = {Adam Groce and Jonathan Katz and Aishwarya Thiruvengadam and Vassilis Zikas}, editor = {Artur Czumaj and Kurt Mehlhorn and Andrew M. Pitts and Roger Wattenhofer}, title = {Byzantine Agreement with a Rational Adversary}, booktitle = {Automata, Languages, and Programming - 39th International Colloquium, {ICALP} 2012, Warwick, UK, July 9-13, 2012, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {7392}, pages = {561--572}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31585-5\_50}, doi = {10.1007/978-3-642-31585-5\_50}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/GroceKTZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/HirtZ11, author = {Martin Hirt and Vassilis Zikas}, editor = {Luca Aceto and Monika Henzinger and Jir{\'{\i}} Sgall}, title = {Player-Centric Byzantine Agreement}, booktitle = {Automata, Languages and Programming - 38th International Colloquium, {ICALP} 2011, Zurich, Switzerland, July 4-8, 2011, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {6755}, pages = {281--292}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22006-7\_24}, doi = {10.1007/978-3-642-22006-7\_24}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/HirtZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KatzMTZ11, author = {Jonathan Katz and Ueli Maurer and Bj{\"{o}}rn Tackmann and Vassilis Zikas}, title = {Universally Composable Synchronous Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {310}, year = {2011}, url = {http://eprint.iacr.org/2011/310}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KatzMTZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlwenKMZ11, author = {Jo{\"{e}}l Alwen and Jonathan Katz and Ueli Maurer and Vassilis Zikas}, title = {Collusion-Preserving Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {433}, year = {2011}, url = {http://eprint.iacr.org/2011/433}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlwenKMZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ch/Zikas2010, author = {Vassilis Zikas}, title = {Generalized corruption models in secure multi-party computation}, school = {{ETH} Zurich}, year = {2010}, url = {https://d-nb.info/1005005729}, isbn = {978-3-86628-338-1}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ch/Zikas2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HirtZ10, author = {Martin Hirt and Vassilis Zikas}, editor = {Henri Gilbert}, title = {Adaptively Secure Broadcast}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6110}, pages = {466--485}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13190-5\_24}, doi = {10.1007/978-3-642-13190-5\_24}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HirtZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/ZikasHM09, author = {Vassilis Zikas and Sarah Hauser and Ueli M. Maurer}, editor = {Omer Reingold}, title = {Realistic Failures in Secure Multi-party Computation}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {274--293}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_17}, doi = {10.1007/978-3-642-00457-5\_17}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/ZikasHM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HirtZ09, author = {Martin Hirt and Vassilis Zikas}, title = {Adaptively Secure Broadcast}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {230}, year = {2009}, url = {http://eprint.iacr.org/2009/230}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HirtZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/HirtMZ08, author = {Martin Hirt and Ueli M. Maurer and Vassilis Zikas}, editor = {Josef Pieprzyk}, title = {{MPC} vs. {SFE} : Unconditional and Computational Security}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5350}, pages = {1--18}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89255-7\_1}, doi = {10.1007/978-3-540-89255-7\_1}, timestamp = {Sun, 02 Jun 2019 21:16:53 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/HirtMZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Beerliova-TrubiniovaFHMZ08, author = {Zuzana Beerliov{\'{a}}{-}Trub{\'{\i}}niov{\'{a}} and Matthias Fitzi and Martin Hirt and Ueli M. Maurer and Vassilis Zikas}, editor = {Ran Canetti}, title = {{MPC} vs. {SFE:} Perfect Security in a Unified Corruption Model}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {231--250}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_14}, doi = {10.1007/978-3-540-78524-8\_14}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Beerliova-TrubiniovaFHMZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Beerliova-TrubiniovaFHMZ07, author = {Zuzana Beerliov{\'{a}}{-}Trub{\'{\i}}niov{\'{a}} and Matthias Fitzi and Martin Hirt and Ueli Maurer and Vassilis Zikas}, title = {{MPC} vs. {SFE:} Perfect Security in a Unified Corruption Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {78}, year = {2007}, url = {http://eprint.iacr.org/2007/078}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Beerliova-TrubiniovaFHMZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.