BibTeX records: Vassilis Zikas

download as .bib file

@article{DBLP:journals/iacr/BrazitikosZ24,
  author       = {Konstantinos Brazitikos and
                  Vassilis Zikas},
  title        = {General Adversary Structures in Byzantine Agreement and Multi-Party
                  Computation with Active and Omission Corruption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {209},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/209},
  timestamp    = {Fri, 16 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BrazitikosZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/AndrewsCZ23,
  author       = {John Andrews and
                  Michele Ciampi and
                  Vassilis Zikas},
  title        = {Etherless Ethereum tokens: Simulating native tokens in Ethereum},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {135},
  pages        = {55--72},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jcss.2023.02.001},
  doi          = {10.1016/J.JCSS.2023.02.001},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcss/AndrewsCZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LevyISKMZ23,
  author       = {Benjamin Levy and
                  Muhammad Ishaq and
                  Benjamin Sherman and
                  Lindsey Kennard and
                  Ana L. Milanova and
                  Vassilis Zikas},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {{COMBINE:} COMpilation and Backend-INdependent vEctorization for Multi-Party
                  Computation},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {2531--2545},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3623181},
  doi          = {10.1145/3576915.3623181},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LevyISKMZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CohenGZ23,
  author       = {Ran Cohen and
                  Juan A. Garay and
                  Vassilis Zikas},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Completeness Theorems for Adaptively Secure Broadcast},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14081},
  pages        = {3--38},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38557-5\_1},
  doi          = {10.1007/978-3-031-38557-5\_1},
  timestamp    = {Mon, 14 Aug 2023 16:16:25 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CohenGZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CohenFGPZ23,
  author       = {Ran Cohen and
                  Pouyan Forghani and
                  Juan A. Garay and
                  Rutvik Patel and
                  Vassilis Zikas},
  editor       = {Guy N. Rothblum and
                  Hoeteck Wee},
  title        = {Concurrent Asynchronous Byzantine Agreement in Expected-Constant Rounds,
                  Revisited},
  booktitle    = {Theory of Cryptography - 21st International Conference, {TCC} 2023,
                  Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14372},
  pages        = {422--451},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-48624-1\_16},
  doi          = {10.1007/978-3-031-48624-1\_16},
  timestamp    = {Wed, 06 Dec 2023 13:56:15 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/CohenFGPZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-05520,
  author       = {Eli Gafni and
                  Vasileios Zikas},
  title        = {Synchrony/Asynchrony vs. Stationary/Mobile? The Latter is Superior...in
                  Theory},
  journal      = {CoRR},
  volume       = {abs/2302.05520},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.05520},
  doi          = {10.48550/ARXIV.2302.05520},
  eprinttype    = {arXiv},
  eprint       = {2302.05520},
  timestamp    = {Sun, 19 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-05520.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-01243,
  author       = {Yun Lu and
                  Malik Magdon{-}Ismail and
                  Yu Wei and
                  Vassilis Zikas},
  title        = {Privacy-Utility Tradeoff of {OLS} with Random Projections},
  journal      = {CoRR},
  volume       = {abs/2309.01243},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.01243},
  doi          = {10.48550/ARXIV.2309.01243},
  eprinttype    = {arXiv},
  eprint       = {2309.01243},
  timestamp    = {Mon, 11 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-01243.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-14506,
  author       = {Ran Cohen and
                  Pouyan Forghani and
                  Juan A. Garay and
                  Rutvik Patel and
                  Vassilis Zikas},
  title        = {Concurrent Asynchronous Byzantine Agreement in Expected-Constant Rounds,
                  Revisited},
  journal      = {CoRR},
  volume       = {abs/2312.14506},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.14506},
  doi          = {10.48550/ARXIV.2312.14506},
  eprinttype    = {arXiv},
  eprint       = {2312.14506},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-14506.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-16253,
  author       = {Timoth{\'{e}} Albouy and
                  Davide Frey and
                  Ran Gelles and
                  Carmit Hazay and
                  Michel Raynal and
                  Elad Michael Schiller and
                  Fran{\c{c}}ois Ta{\"{\i}}ani and
                  Vassilis Zikas},
  title        = {Towards Optimal Communication Byzantine Reliable Broadcast under a
                  Message Adversary},
  journal      = {CoRR},
  volume       = {abs/2312.16253},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.16253},
  doi          = {10.48550/ARXIV.2312.16253},
  eprinttype    = {arXiv},
  eprint       = {2312.16253},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-16253.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LevySIKMZ23,
  author       = {Benjamin Levy and
                  Benjamin Sherman and
                  Muhammad Ishaq and
                  Lindsey Kennard and
                  Ana L. Milanova and
                  Vassilis Zikas},
  title        = {Compilation and Backend-Independent Vectorization for Multi-Party
                  Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {89},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/089},
  timestamp    = {Wed, 22 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LevySIKMZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CohenFGPZ23,
  author       = {Ran Cohen and
                  Pouyan Forghani and
                  Juan A. Garay and
                  Rutvik Patel and
                  Vassilis Zikas},
  title        = {Concurrent Asynchronous Byzantine Agreement in Expected-Constant Rounds,
                  Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1003},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1003},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CohenFGPZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoiHWZ23,
  author       = {Wonseok Choi and
                  Minki Hhan and
                  Yu Wei and
                  Vassilis Zikas},
  title        = {Fine-Tuning Ideal Worlds for the Xor of Two Permutation Outputs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1704},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1704},
  timestamp    = {Mon, 27 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoiHWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoiLZ23,
  author       = {Wonseok Choi and
                  Xiangyu Liu and
                  Vassilis Zikas},
  title        = {Blockchain Governance via Sharp Anonymous Multisignatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1881},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1881},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoiLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/citc/ChandranFGOPZ22,
  author       = {Nishanth Chandran and
                  Pouyan Forghani and
                  Juan A. Garay and
                  Rafail Ostrovsky and
                  Rutvik Patel and
                  Vassilis Zikas},
  editor       = {Dana Dachman{-}Soled},
  title        = {Universally Composable Almost-Everywhere Secure Computation},
  booktitle    = {3rd Conference on Information-Theoretic Cryptography, {ITC} 2022,
                  July 5-7, 2022, Cambridge, MA, {USA}},
  series       = {LIPIcs},
  volume       = {230},
  pages        = {14:1--14:25},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2022},
  url          = {https://doi.org/10.4230/LIPIcs.ITC.2022.14},
  doi          = {10.4230/LIPICS.ITC.2022.14},
  timestamp    = {Thu, 30 Jun 2022 16:13:48 +0200},
  biburl       = {https://dblp.org/rec/conf/citc/ChandranFGOPZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/AndrewsCZ22,
  author       = {John Andrews and
                  Michele Ciampi and
                  Vassilis Zikas},
  editor       = {Shlomi Dolev and
                  Jonathan Katz and
                  Amnon Meisels},
  title        = {Etherless Ethereum Tokens: Simulating Native Tokens in Ethereum},
  booktitle    = {Cyber Security, Cryptology, and Machine Learning - 6th International
                  Symposium, {CSCML} 2022, Be'er Sheva, Israel, June 30 - July 1, 2022,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13301},
  pages        = {388--407},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-07689-3\_29},
  doi          = {10.1007/978-3-031-07689-3\_29},
  timestamp    = {Fri, 24 Jun 2022 18:23:22 +0200},
  biburl       = {https://dblp.org/rec/conf/cscml/AndrewsCZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/CiampiIMOZ22,
  author       = {Michele Ciampi and
                  Muhammad Ishaq and
                  Malik Magdon{-}Ismail and
                  Rafail Ostrovsky and
                  Vassilis Zikas},
  editor       = {Shlomi Dolev and
                  Jonathan Katz and
                  Amnon Meisels},
  title        = {FairMM: {A} Fast and Frontrunning-Resistant Crypto Market-Maker},
  booktitle    = {Cyber Security, Cryptology, and Machine Learning - 6th International
                  Symposium, {CSCML} 2022, Be'er Sheva, Israel, June 30 - July 1, 2022,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13301},
  pages        = {428--446},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-07689-3\_31},
  doi          = {10.1007/978-3-031-07689-3\_31},
  timestamp    = {Fri, 24 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cscml/CiampiIMOZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/CiampiLZ22,
  author       = {Michele Ciampi and
                  Yun Lu and
                  Vassilis Zikas},
  title        = {Collusion-Preserving Computation without a Mediator},
  booktitle    = {35th {IEEE} Computer Security Foundations Symposium, {CSF} 2022, Haifa,
                  Israel, August 7-10, 2022},
  pages        = {211--226},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CSF54842.2022.9919678},
  doi          = {10.1109/CSF54842.2022.9919678},
  timestamp    = {Fri, 11 Nov 2022 16:53:14 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/CiampiLZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CiampiOWZ22,
  author       = {Michele Ciampi and
                  Rafail Ostrovsky and
                  Hendrik Waldner and
                  Vassilis Zikas},
  editor       = {Orr Dunkelman and
                  Stefan Dziembowski},
  title        = {Round-Optimal and Communication-Efficient Multiparty Computation},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13275},
  pages        = {65--95},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-06944-4\_3},
  doi          = {10.1007/978-3-031-06944-4\_3},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CiampiOWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuWMZ22,
  author       = {Yun Lu and
                  Yu Wei and
                  Malik Magdon{-}Ismail and
                  Vassilis Zikas},
  title        = {Eureka: {A} General Framework for Black-box Differential Privacy Estimators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1250},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1250},
  timestamp    = {Sat, 22 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuWMZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/CohenCGZ21,
  author       = {Ran Cohen and
                  Sandro Coretti and
                  Juan A. Garay and
                  Vassilis Zikas},
  title        = {Round-Preserving Parallel Composition of Probabilistic-Termination
                  Cryptographic Protocols},
  journal      = {J. Cryptol.},
  volume       = {34},
  number       = {2},
  pages        = {12},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00145-021-09377-0},
  doi          = {10.1007/S00145-021-09377-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/CohenCGZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BadertscherLZ21,
  author       = {Christian Badertscher and
                  Yun Lu and
                  Vassilis Zikas},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {A Rational Protocol Treatment of 51{\%} Attacks},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12827},
  pages        = {3--32},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84252-9\_1},
  doi          = {10.1007/978-3-030-84252-9\_1},
  timestamp    = {Tue, 25 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BadertscherLZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BadertscherGKRZ21,
  author       = {Christian Badertscher and
                  Peter Gazi and
                  Aggelos Kiayias and
                  Alexander Russell and
                  Vassilis Zikas},
  editor       = {Anne Canteaut and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Dynamic Ad Hoc Clock Synchronization},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12698},
  pages        = {399--428},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-77883-5\_14},
  doi          = {10.1007/978-3-030-77883-5\_14},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BadertscherGKRZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BadertscherHZ21,
  author       = {Christian Badertscher and
                  Julia Hesse and
                  Vassilis Zikas},
  editor       = {Kobbi Nissim and
                  Brent Waters},
  title        = {On the (Ir)Replaceability of Global Setups, or How (Not) to Use a
                  Global Ledger},
  booktitle    = {Theory of Cryptography - 19th International Conference, {TCC} 2021,
                  Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13043},
  pages        = {626--657},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90453-1\_22},
  doi          = {10.1007/978-3-030-90453-1\_22},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/BadertscherHZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuLXZ21,
  author       = {Ao Liu and
                  Yun Lu and
                  Lirong Xia and
                  Vassilis Zikas},
  title        = {How Private Are Commonly-Used Voting Rules?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {392},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/392},
  timestamp    = {Tue, 25 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuLXZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CiampiIMOZ21,
  author       = {Michele Ciampi and
                  Muhammad Ishaq and
                  Malik Magdon{-}Ismail and
                  Rafail Ostrovsky and
                  Vassilis Zikas},
  title        = {FairMM: {A} Fast and Frontrunning-Resistant Crypto Market-Maker},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {609},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/609},
  timestamp    = {Mon, 07 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CiampiIMOZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AndrewsCZ21,
  author       = {John Andrews and
                  Michele Ciampi and
                  Vassilis Zikas},
  title        = {Etherless Ethereum Tokens: Simulating Native Tokens in Ethereum},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {766},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/766},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AndrewsCZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CohenGZ21,
  author       = {Ran Cohen and
                  Juan A. Garay and
                  Vassilis Zikas},
  title        = {Adaptively Secure Broadcast in Resource-Restricted Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {775},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/775},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CohenGZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadertscherLZ21,
  author       = {Christian Badertscher and
                  Yun Lu and
                  Vassilis Zikas},
  title        = {A Rational Protocol Treatment of 51{\%} Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {897},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/897},
  timestamp    = {Tue, 25 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BadertscherLZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChandranFGOPZ21,
  author       = {Nishanth Chandran and
                  Pouyan Forghani and
                  Juan A. Garay and
                  Rafail Ostrovsky and
                  Rutvik Patel and
                  Vassilis Zikas},
  title        = {Universally Composable Almost-Everywhere Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1398},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1398},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChandranFGOPZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/AbadiCKZ20,
  author       = {Aydin Abadi and
                  Michele Ciampi and
                  Aggelos Kiayias and
                  Vassilis Zikas},
  editor       = {Mauro Conti and
                  Jianying Zhou and
                  Emiliano Casalicchio and
                  Angelo Spognardi},
  title        = {Timed Signatures and Zero-Knowledge Proofs - Timestamping in the Blockchain
                  Era -},
  booktitle    = {Applied Cryptography and Network Security - 18th International Conference,
                  {ACNS} 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12146},
  pages        = {335--354},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57808-4\_17},
  doi          = {10.1007/978-3-030-57808-4\_17},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/AbadiCKZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GarayKOPZ20,
  author       = {Juan A. Garay and
                  Aggelos Kiayias and
                  Rafail M. Ostrovsky and
                  Giorgos Panagiotakos and
                  Vassilis Zikas},
  editor       = {Anne Canteaut and
                  Yuval Ishai},
  title        = {Resource-Restricted Cryptography: Revisiting {MPC} Bounds in the Proof-of-Work
                  Era},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12106},
  pages        = {129--158},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45724-2\_5},
  doi          = {10.1007/978-3-030-45724-2\_5},
  timestamp    = {Mon, 04 May 2020 14:32:28 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GarayKOPZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CohenGZ20,
  author       = {Ran Cohen and
                  Juan A. Garay and
                  Vassilis Zikas},
  editor       = {Anne Canteaut and
                  Yuval Ishai},
  title        = {Broadcast-Optimal Two-Round {MPC}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12106},
  pages        = {828--858},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45724-2\_28},
  doi          = {10.1007/978-3-030-45724-2\_28},
  timestamp    = {Mon, 04 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CohenGZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/KleinrockOZ20,
  author       = {Leonard Kleinrock and
                  Rafail Ostrovsky and
                  Vassilis Zikas},
  editor       = {Karthikeyan Bhargavan and
                  Elisabeth Oswald and
                  Manoj Prabhakaran},
  title        = {Proof-of-Reputation Blockchain with Nakamoto Fallback},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2020 - 21st International Conference
                  on Cryptology in India, Bangalore, India, December 13-16, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12578},
  pages        = {16--38},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65277-7\_2},
  doi          = {10.1007/978-3-030-65277-7\_2},
  timestamp    = {Wed, 17 Apr 2024 21:39:19 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/KleinrockOZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BadertscherCHTZ20,
  author       = {Christian Badertscher and
                  Ran Canetti and
                  Julia Hesse and
                  Bj{\"{o}}rn Tackmann and
                  Vassilis Zikas},
  editor       = {Rafael Pass and
                  Krzysztof Pietrzak},
  title        = {Universal Composition with Global Subroutines: Capturing Global Setup
                  Within Plain {UC}},
  booktitle    = {Theory of Cryptography - 18th International Conference, {TCC} 2020,
                  Durham, NC, USA, November 16-19, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12552},
  pages        = {1--30},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64381-2\_1},
  doi          = {10.1007/978-3-030-64381-2\_1},
  timestamp    = {Thu, 17 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/BadertscherCHTZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uai/LiuLXZ20,
  author       = {Ao Liu and
                  Yun Lu and
                  Lirong Xia and
                  Vassilis Zikas},
  editor       = {Ryan P. Adams and
                  Vibhav Gogate},
  title        = {How Private Are Commonly-Used Voting Rules?},
  booktitle    = {Proceedings of the Thirty-Sixth Conference on Uncertainty in Artificial
                  Intelligence, {UAI} 2020, virtual online, August 3-6, 2020},
  series       = {Proceedings of Machine Learning Research},
  volume       = {124},
  pages        = {629--638},
  publisher    = {{AUAI} Press},
  year         = {2020},
  url          = {http://proceedings.mlr.press/v124/liu20b.html},
  timestamp    = {Tue, 25 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uai/LiuLXZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2020-1,
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12110},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45374-9},
  doi          = {10.1007/978-3-030-45374-9},
  isbn         = {978-3-030-45373-2},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2020-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2020-2,
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12111},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45388-6},
  doi          = {10.1007/978-3-030-45388-6},
  isbn         = {978-3-030-45387-9},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2020-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KleinrockOZ20,
  author       = {Leonard Kleinrock and
                  Rafail Ostrovsky and
                  Vassilis Zikas},
  title        = {A PoR/PoS-Hybrid Blockchain: Proof of Reputation with Nakamoto Fallback},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {381},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/381},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KleinrockOZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CiampiLZ20,
  author       = {Michele Ciampi and
                  Yun Lu and
                  Vassilis Zikas},
  title        = {Collusion-Preserving Computation without a Mediator},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {497},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/497},
  timestamp    = {Tue, 25 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CiampiLZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadertscherGKRZ20,
  author       = {Christian Badertscher and
                  Peter Gazi and
                  Aggelos Kiayias and
                  Alexander Russell and
                  Vassilis Zikas},
  title        = {Consensus Redux: Distributed Ledgers in the Face of Adversarial Supremacy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1021},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1021},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BadertscherGKRZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadertscherCHTZ20,
  author       = {Christian Badertscher and
                  Ran Canetti and
                  Julia Hesse and
                  Bj{\"{o}}rn Tackmann and
                  Vassilis Zikas},
  title        = {Universal Composition with Global Subroutines: Capturing Global Setup
                  within plain {UC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1209},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1209},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BadertscherCHTZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CiampiOWZ20,
  author       = {Michele Ciampi and
                  Rafail Ostrovsky and
                  Hendrik Waldner and
                  Vassilis Zikas},
  title        = {Round-Optimal and Communication-Efficient Multiparty Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1437},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1437},
  timestamp    = {Wed, 02 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CiampiOWZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadertscherHZ20,
  author       = {Christian Badertscher and
                  Julia Hesse and
                  Vassilis Zikas},
  title        = {On the (Ir)Replaceability of Global Setups, or How (Not) to Use a
                  Global Ledger},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1489},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1489},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BadertscherHZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Chung0LZ19,
  author       = {Kai{-}Min Chung and
                  Marios Georgiou and
                  Ching{-}Yi Lai and
                  Vassilis Zikas},
  title        = {Cryptography with Disposable Backdoors},
  journal      = {Cryptogr.},
  volume       = {3},
  number       = {3},
  pages        = {22},
  year         = {2019},
  url          = {https://doi.org/10.3390/cryptography3030022},
  doi          = {10.3390/CRYPTOGRAPHY3030022},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/Chung0LZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/CohenCGZ19,
  author       = {Ran Cohen and
                  Sandro Coretti and
                  Juan A. Garay and
                  Vassilis Zikas},
  title        = {Probabilistic Termination and Composability of Cryptographic Protocols},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {3},
  pages        = {690--741},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-018-9279-y},
  doi          = {10.1007/S00145-018-9279-Y},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/CohenCGZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/IshaqMZ19,
  author       = {Muhammad Ishaq and
                  Ana L. Milanova and
                  Vassilis Zikas},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Efficient {MPC} via Program Analysis: {A} Framework for Efficient
                  Optimal Mixing},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {1539--1556},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3339818},
  doi          = {10.1145/3319535.3339818},
  timestamp    = {Tue, 10 Nov 2020 20:00:36 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/IshaqMZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/TsikhanovichMIZ19,
  author       = {Maksim Tsikhanovich and
                  Malik Magdon{-}Ismail and
                  Muhammad Ishaq and
                  Vassilis Zikas},
  editor       = {Zhiqiang Lin and
                  Charalampos Papamanthou and
                  Michalis Polychronakis},
  title        = {PD-ML-Lite: Private Distributed Machine Learning from Lightweight
                  Cryptography},
  booktitle    = {Information Security - 22nd International Conference, {ISC} 2019,
                  New York City, NY, USA, September 16-18, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11723},
  pages        = {149--167},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30215-3\_8},
  doi          = {10.1007/978-3-030-30215-3\_8},
  timestamp    = {Mon, 02 Sep 2019 15:19:30 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/TsikhanovichMIZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KerberKKZ19,
  author       = {Thomas Kerber and
                  Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Vassilis Zikas},
  title        = {Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake},
  booktitle    = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco,
                  CA, USA, May 19-23, 2019},
  pages        = {157--174},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SP.2019.00063},
  doi          = {10.1109/SP.2019.00063},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/KerberKKZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-07986,
  author       = {Maksim Tsikhanovich and
                  Malik Magdon{-}Ismail and
                  Muhammad Ishaq and
                  Vassilis Zikas},
  title        = {PD-ML-Lite: Private Distributed Machine Learning from Lighweight Cryptography},
  journal      = {CoRR},
  volume       = {abs/1901.07986},
  year         = {2019},
  url          = {http://arxiv.org/abs/1901.07986},
  eprinttype    = {arXiv},
  eprint       = {1901.07986},
  timestamp    = {Sat, 02 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1901-07986.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbadiCKZ19,
  author       = {Aydin Abadi and
                  Michele Ciampi and
                  Aggelos Kiayias and
                  Vassilis Zikas},
  title        = {Timed Signatures and Zero-Knowledge Proofs -Timestamping in the Blockchain
                  Era-},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {644},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/644},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbadiCKZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshaqMZ19,
  author       = {Muhammad Ishaq and
                  Ana L. Milanova and
                  Vassilis Zikas},
  title        = {Efficient {MPC} via Program Analysis: {A} Framework for Efficient
                  Optimal Mixing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {651},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/651},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshaqMZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadertscherGKRZ19,
  author       = {Christian Badertscher and
                  Peter Gazi and
                  Aggelos Kiayias and
                  Alexander Russell and
                  Vassilis Zikas},
  title        = {Ouroboros Chronos: Permissionless Clock Synchronization via Proof-of-Stake},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {838},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/838},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BadertscherGKRZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CohenGZ19,
  author       = {Ran Cohen and
                  Juan A. Garay and
                  Vassilis Zikas},
  title        = {Broadcast-Optimal Two-Round {MPC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1183},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1183},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CohenGZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarayKOPZ19,
  author       = {Juan A. Garay and
                  Aggelos Kiayias and
                  Rafail Ostrovsky and
                  Giorgos Panagiotakos and
                  Vassilis Zikas},
  title        = {Resource-Restricted Cryptography: Honest-Majority {MPC} from a {CRS}
                  (and No Broadcast)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1264},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1264},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarayKOPZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BadertscherGKRZ18,
  author       = {Christian Badertscher and
                  Peter Gazi and
                  Aggelos Kiayias and
                  Alexander Russell and
                  Vassilis Zikas},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic
                  Availability},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {913--930},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243848},
  doi          = {10.1145/3243734.3243848},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BadertscherGKRZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LuMOWZ18,
  author       = {Yun Lu and
                  Konstantinos Mitropoulos and
                  Rafail Ostrovsky and
                  Avraham Weinstock and
                  Vassilis Zikas},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {Cryptographically Secure Detection of Injection Attacks},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {2240--2242},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3278503},
  doi          = {10.1145/3243734.3278503},
  timestamp    = {Tue, 25 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LuMOWZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BadertscherGMTZ18,
  author       = {Christian Badertscher and
                  Juan A. Garay and
                  Ueli Maurer and
                  Daniel Tschudi and
                  Vassilis Zikas},
  editor       = {Jesper Buus Nielsen and
                  Vincent Rijmen},
  title        = {But Why Does It Work? {A} Rational Protocol Design Treatment of Bitcoin},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10821},
  pages        = {34--65},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-78375-8\_2},
  doi          = {10.1007/978-3-319-78375-8\_2},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BadertscherGMTZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/GellesPZ18,
  author       = {Ran Gelles and
                  Anat Paskin{-}Cherniavsky and
                  Vassilis Zikas},
  editor       = {Dario Catalano and
                  Roberto De Prisco},
  title        = {Secure Two-Party Computation over Unreliable Channels},
  booktitle    = {Security and Cryptography for Networks - 11th International Conference,
                  {SCN} 2018, Amalfi, Italy, September 5-7, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11035},
  pages        = {445--463},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98113-0\_24},
  doi          = {10.1007/978-3-319-98113-0\_24},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/GellesPZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1805-05750,
  author       = {Ao Liu and
                  Yun Lu and
                  Lirong Xia and
                  Vassilis Zikas},
  title        = {How Private Is Your Voting? {A} Framework for Comparing the Privacy
                  of Voting Mechanisms},
  journal      = {CoRR},
  volume       = {abs/1805.05750},
  year         = {2018},
  url          = {http://arxiv.org/abs/1805.05750},
  eprinttype    = {arXiv},
  eprint       = {1805.05750},
  timestamp    = {Tue, 25 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1805-05750.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadertscherGMTZ18,
  author       = {Christian Badertscher and
                  Juan A. Garay and
                  Ueli Maurer and
                  Daniel Tschudi and
                  Vassilis Zikas},
  title        = {But Why does it Work? {A} Rational Protocol Design Treatment of Bitcoin},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {138},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/138},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BadertscherGMTZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChungGLZ18,
  author       = {Kai{-}Min Chung and
                  Marios Georgiou and
                  Ching{-}Yi Lai and
                  Vassilis Zikas},
  title        = {Cryptography with Dispensable Backdoors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {352},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/352},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChungGLZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadertscherGKRZ18,
  author       = {Christian Badertscher and
                  Peter Gazi and
                  Aggelos Kiayias and
                  Alexander Russell and
                  Vassilis Zikas},
  title        = {Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic
                  Availability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {378},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/378},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BadertscherGKRZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GellesPZ18,
  author       = {Ran Gelles and
                  Anat Paskin{-}Cherniavsky and
                  Vassilis Zikas},
  title        = {Secure Two-Party Computation over Unreliable Channels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {506},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/506},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GellesPZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KerberKKZ18,
  author       = {Thomas Kerber and
                  Markulf Kohlweiss and
                  Aggelos Kiayias and
                  Vassilis Zikas},
  title        = {Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1132},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1132},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KerberKKZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BadertscherMTZ17,
  author       = {Christian Badertscher and
                  Ueli Maurer and
                  Daniel Tschudi and
                  Vassilis Zikas},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Bitcoin as a Transaction Ledger: {A} Composable Treatment},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10401},
  pages        = {324--356},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63688-7\_11},
  doi          = {10.1007/978-3-319-63688-7\_11},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BadertscherMTZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GarayIOZ17,
  author       = {Juan A. Garay and
                  Yuval Ishai and
                  Rafail Ostrovsky and
                  Vassilis Zikas},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {The Price of Low Communication in Secure Multi-party Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10401},
  pages        = {420--446},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63688-7\_14},
  doi          = {10.1007/978-3-319-63688-7\_14},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GarayIOZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/CohenCGZ17,
  author       = {Ran Cohen and
                  Sandro Coretti and
                  Juan A. Garay and
                  Vassilis Zikas},
  editor       = {Ioannis Chatzigiannakis and
                  Piotr Indyk and
                  Fabian Kuhn and
                  Anca Muscholl},
  title        = {Round-Preserving Parallel Composition of Probabilistic-Termination
                  Cryptographic Protocols},
  booktitle    = {44th International Colloquium on Automata, Languages, and Programming,
                  {ICALP} 2017, July 10-14, 2017, Warsaw, Poland},
  series       = {LIPIcs},
  volume       = {80},
  pages        = {37:1--37:15},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2017},
  url          = {https://doi.org/10.4230/LIPIcs.ICALP.2017.37},
  doi          = {10.4230/LIPICS.ICALP.2017.37},
  timestamp    = {Tue, 11 Feb 2020 15:52:14 +0100},
  biburl       = {https://dblp.org/rec/conf/icalp/CohenCGZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadertscherMTZ17,
  author       = {Christian Badertscher and
                  Ueli Maurer and
                  Daniel Tschudi and
                  Vassilis Zikas},
  title        = {Bitcoin as a Transaction Ledger: {A} Composable Treatment},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {149},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/149},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BadertscherMTZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CohenCGZ17,
  author       = {Ran Cohen and
                  Sandro Coretti and
                  Juan A. Garay and
                  Vassilis Zikas},
  title        = {Round-Preserving Parallel Composition of Probabilistic-Termination
                  Cryptographic Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {364},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/364},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CohenCGZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarayIOZ17,
  author       = {Juan A. Garay and
                  Yuval Ishai and
                  Rafail Ostrovsky and
                  Vassilis Zikas},
  title        = {The Price of Low Communication in Secure Multi-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {520},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/520},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarayIOZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CorettiGHZ16,
  author       = {Sandro Coretti and
                  Juan A. Garay and
                  Martin Hirt and
                  Vassilis Zikas},
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {Constant-Round Asynchronous Multi-Party Computation Based on One-Way
                  Functions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10032},
  pages        = {998--1021},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53890-6\_33},
  doi          = {10.1007/978-3-662-53890-6\_33},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/CorettiGHZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CohenCGZ16,
  author       = {Ran Cohen and
                  Sandro Coretti and
                  Juan A. Garay and
                  Vassilis Zikas},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Probabilistic Termination and Composability of Cryptographic Protocols},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9816},
  pages        = {240--269},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53015-3\_9},
  doi          = {10.1007/978-3-662-53015-3\_9},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CohenCGZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HirtMTZ16,
  author       = {Martin Hirt and
                  Ueli Maurer and
                  Daniel Tschudi and
                  Vassilis Zikas},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Network-Hiding Communication and Applications to Multi-party Protocols},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9815},
  pages        = {335--365},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53008-5\_12},
  doi          = {10.1007/978-3-662-53008-5\_12},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HirtMTZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KiayiasZZ16,
  author       = {Aggelos Kiayias and
                  Hong{-}Sheng Zhou and
                  Vassilis Zikas},
  editor       = {Marc Fischlin and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Fair and Robust Multi-party Computation Using a Global Transaction
                  Ledger},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9666},
  pages        = {705--734},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49896-5\_25},
  doi          = {10.1007/978-3-662-49896-5\_25},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KiayiasZZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/LiptonOZ16,
  author       = {Richard J. Lipton and
                  Rafail Ostrovsky and
                  Vassilis Zikas},
  editor       = {Ioannis Chatzigiannakis and
                  Michael Mitzenmacher and
                  Yuval Rabani and
                  Davide Sangiorgi},
  title        = {Provably Secure Virus Detection: Using The Observer Effect Against
                  Malware},
  booktitle    = {43rd International Colloquium on Automata, Languages, and Programming,
                  {ICALP} 2016, July 11-15, 2016, Rome, Italy},
  series       = {LIPIcs},
  volume       = {55},
  pages        = {32:1--32:14},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2016},
  url          = {https://doi.org/10.4230/LIPIcs.ICALP.2016.32},
  doi          = {10.4230/LIPICS.ICALP.2016.32},
  timestamp    = {Tue, 11 Feb 2020 15:52:14 +0100},
  biburl       = {https://dblp.org/rec/conf/icalp/LiptonOZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/scn/2016,
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9},
  doi          = {10.1007/978-3-319-44618-9},
  isbn         = {978-3-319-44617-2},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CorettiGHZ16,
  author       = {Sandro Coretti and
                  Juan A. Garay and
                  Martin Hirt and
                  Vassilis Zikas},
  title        = {Constant-Round Asynchronous Multi-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {208},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/208},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CorettiGHZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CohenCGZ16,
  author       = {Ran Cohen and
                  Sandro Coretti and
                  Juan A. Garay and
                  Vassilis Zikas},
  title        = {Probabilistic Termination and Composability of Cryptographic Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {350},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/350},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CohenCGZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HirtMTZ16,
  author       = {Martin Hirt and
                  Ueli Maurer and
                  Daniel Tschudi and
                  Vassilis Zikas},
  title        = {Network-Hiding Communication and Applications to Multi-Party Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {556},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/556},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HirtMTZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AlwenOZZ15,
  author       = {Jo{\"{e}}l Alwen and
                  Rafail Ostrovsky and
                  Hong{-}Sheng Zhou and
                  Vassilis Zikas},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Incoercible Multi-party Computation and Universally Composable Receipt-Free
                  Voting},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {763--780},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_37},
  doi          = {10.1007/978-3-662-48000-7\_37},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AlwenOZZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/ChandranCGGOZ15,
  author       = {Nishanth Chandran and
                  Wutichai Chongchitmate and
                  Juan A. Garay and
                  Shafi Goldwasser and
                  Rafail Ostrovsky and
                  Vassilis Zikas},
  editor       = {Tim Roughgarden},
  title        = {The Hidden Graph Model: Communication Locality and Optimal Resiliency
                  with Adaptive Faults},
  booktitle    = {Proceedings of the 2015 Conference on Innovations in Theoretical Computer
                  Science, {ITCS} 2015, Rehovot, Israel, January 11-13, 2015},
  pages        = {153--162},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2688073.2688102},
  doi          = {10.1145/2688073.2688102},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/ChandranCGGOZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/GarayKTZ15,
  author       = {Juan A. Garay and
                  Jonathan Katz and
                  Bj{\"{o}}rn Tackmann and
                  Vassilis Zikas},
  editor       = {Chryssis Georgiou and
                  Paul G. Spirakis},
  title        = {How Fair is Your Protocol?: {A} Utility-based Approach to Protocol
                  Optimality},
  booktitle    = {Proceedings of the 2015 {ACM} Symposium on Principles of Distributed
                  Computing, {PODC} 2015, Donostia-San Sebasti{\'{a}}n, Spain,
                  July 21 - 23, 2015},
  pages        = {281--290},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2767386.2767431},
  doi          = {10.1145/2767386.2767431},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/GarayKTZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wdag/GarayTZ15,
  author       = {Juan A. Garay and
                  Bj{\"{o}}rn Tackmann and
                  Vassilis Zikas},
  editor       = {Yoram Moses},
  title        = {Fair Distributed Computation of Reactive Functions},
  booktitle    = {Distributed Computing - 29th International Symposium, {DISC} 2015,
                  Tokyo, Japan, October 7-9, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9363},
  pages        = {497--512},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48653-5\_33},
  doi          = {10.1007/978-3-662-48653-5\_33},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/wdag/GarayTZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarayKTZ15,
  author       = {Juan A. Garay and
                  Jonathan Katz and
                  Bj{\"{o}}rn Tackmann and
                  Vassilis Zikas},
  title        = {How Fair is Your Protocol? {A} Utility-based Approach to Protocol
                  Optimality},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {187},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/187},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarayKTZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshaiOZ15,
  author       = {Yuval Ishai and
                  Rafail Ostrovsky and
                  Vassilis Zikas},
  title        = {Secure Multi-Party Computation with Identifiable Abort},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {325},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/325},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshaiOZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FehrK0ZZ15,
  author       = {Serge Fehr and
                  Jonathan Katz and
                  Fang Song and
                  Hong{-}Sheng Zhou and
                  Vassilis Zikas},
  title        = {Feasibility and Completeness of Cryptographic Tasks in the Quantum
                  World},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {385},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/385},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FehrK0ZZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasZZ15a,
  author       = {Aggelos Kiayias and
                  Hong{-}Sheng Zhou and
                  Vassilis Zikas},
  title        = {Fair and Robust Multi-Party Computation using a Global Transaction
                  Ledger},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {574},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/574},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasZZ15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiptonOZ15,
  author       = {Richard J. Lipton and
                  Rafail Ostrovsky and
                  Vassilis Zikas},
  title        = {Provable Virus Detection: Using the Uncertainty Principle to Protect
                  Against Malware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {728},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/728},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiptonOZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarayTZ15,
  author       = {Juan A. Garay and
                  Bj{\"{o}}rn Tackmann and
                  Vassilis Zikas},
  title        = {Fair Distributed Computation of Reactive Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {807},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/807},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarayTZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/IshaiOZ14,
  author       = {Yuval Ishai and
                  Rafail Ostrovsky and
                  Vassilis Zikas},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Secure Multi-Party Computation with Identifiable Abort},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {369--386},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_21},
  doi          = {10.1007/978-3-662-44381-1\_21},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/IshaiOZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChoiKMZ14,
  author       = {Seung Geol Choi and
                  Jonathan Katz and
                  Alex J. Malozemoff and
                  Vassilis Zikas},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Efficient Three-Party Computation from Cut-and-Choose},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {513--530},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_29},
  doi          = {10.1007/978-3-662-44381-1\_29},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChoiKMZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/KatzKZZ14,
  author       = {Jonathan Katz and
                  Aggelos Kiayias and
                  Hong{-}Sheng Zhou and
                  Vassilis Zikas},
  editor       = {Magn{\'{u}}s M. Halld{\'{o}}rsson and
                  Shlomi Dolev},
  title        = {Distributing the setup in universally composable multi-party computation},
  booktitle    = {{ACM} Symposium on Principles of Distributed Computing, {PODC} '14,
                  Paris, France, July 15-18, 2014},
  pages        = {20--29},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611462.2611480},
  doi          = {10.1145/2611462.2611480},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/podc/KatzKZZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoiKMZ14,
  author       = {Seung Geol Choi and
                  Jonathan Katz and
                  Alex J. Malozemoff and
                  Vassilis Zikas},
  title        = {Efficient Three-Party Computation from Cut-and-Choose},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {128},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/128},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoiKMZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChandranCGGOZ14,
  author       = {Nishanth Chandran and
                  Wutichai Chongchitmate and
                  Juan A. Garay and
                  Shafi Goldwasser and
                  Rafail Ostrovsky and
                  Vassilis Zikas},
  title        = {Optimally Resilient and Adaptively Secure Multi-Party Computation
                  with Low Communication Locality},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {615},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/615},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChandranCGGOZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/GarayKMTZ13,
  author       = {Juan A. Garay and
                  Jonathan Katz and
                  Ueli Maurer and
                  Bj{\"{o}}rn Tackmann and
                  Vassilis Zikas},
  title        = {Rational Protocol Design: Cryptography against Incentive-Driven Adversaries},
  booktitle    = {54th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
                  2013, 26-29 October, 2013, Berkeley, CA, {USA}},
  pages        = {648--657},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/FOCS.2013.75},
  doi          = {10.1109/FOCS.2013.75},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/GarayKMTZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/FehrKSZZ13,
  author       = {Serge Fehr and
                  Jonathan Katz and
                  Fang Song and
                  Hong{-}Sheng Zhou and
                  Vassilis Zikas},
  editor       = {Amit Sahai},
  title        = {Feasibility and Completeness of Cryptographic Tasks in the Quantum
                  World},
  booktitle    = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC}
                  2013, Tokyo, Japan, March 3-6, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7785},
  pages        = {281--296},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36594-2\_16},
  doi          = {10.1007/978-3-642-36594-2\_16},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/FehrKSZZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/KatzMTZ13,
  author       = {Jonathan Katz and
                  Ueli Maurer and
                  Bj{\"{o}}rn Tackmann and
                  Vassilis Zikas},
  editor       = {Amit Sahai},
  title        = {Universally Composable Synchronous Computation},
  booktitle    = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC}
                  2013, Tokyo, Japan, March 3-6, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7785},
  pages        = {477--498},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36594-2\_27},
  doi          = {10.1007/978-3-642-36594-2\_27},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/KatzMTZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ciss/MaurerZ13,
  author       = {Ueli Maurer and
                  Vassilis Zikas},
  editor       = {Manoj Prabhakaran and
                  Amit Sahai},
  title        = {Information-Theoretic Secure Multiparty Computation},
  booktitle    = {Secure Multi-Party Computation},
  series       = {Cryptology and Information Security Series},
  volume       = {10},
  pages        = {168--200},
  publisher    = {{IOS} Press},
  year         = {2013},
  url          = {https://doi.org/10.3233/978-1-61499-169-4-168},
  doi          = {10.3233/978-1-61499-169-4-168},
  timestamp    = {Wed, 17 Apr 2024 21:39:22 +0200},
  biburl       = {https://dblp.org/rec/series/ciss/MaurerZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarayKMTZ13,
  author       = {Juan A. Garay and
                  Jonathan Katz and
                  Ueli Maurer and
                  Bj{\"{o}}rn Tackmann and
                  Vassilis Zikas},
  title        = {Rational Protocol Design: Cryptography Against Incentive-driven Adversaries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {496},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/496},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarayKMTZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AlwenKMZ12,
  author       = {Jo{\"{e}}l Alwen and
                  Jonathan Katz and
                  Ueli Maurer and
                  Vassilis Zikas},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Collusion-Preserving Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {124--143},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_9},
  doi          = {10.1007/978-3-642-32009-5\_9},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AlwenKMZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/GroceKTZ12,
  author       = {Adam Groce and
                  Jonathan Katz and
                  Aishwarya Thiruvengadam and
                  Vassilis Zikas},
  editor       = {Artur Czumaj and
                  Kurt Mehlhorn and
                  Andrew M. Pitts and
                  Roger Wattenhofer},
  title        = {Byzantine Agreement with a Rational Adversary},
  booktitle    = {Automata, Languages, and Programming - 39th International Colloquium,
                  {ICALP} 2012, Warwick, UK, July 9-13, 2012, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7392},
  pages        = {561--572},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31585-5\_50},
  doi          = {10.1007/978-3-642-31585-5\_50},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/GroceKTZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/HirtZ11,
  author       = {Martin Hirt and
                  Vassilis Zikas},
  editor       = {Luca Aceto and
                  Monika Henzinger and
                  Jir{\'{\i}} Sgall},
  title        = {Player-Centric Byzantine Agreement},
  booktitle    = {Automata, Languages and Programming - 38th International Colloquium,
                  {ICALP} 2011, Zurich, Switzerland, July 4-8, 2011, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6755},
  pages        = {281--292},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22006-7\_24},
  doi          = {10.1007/978-3-642-22006-7\_24},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/HirtZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KatzMTZ11,
  author       = {Jonathan Katz and
                  Ueli Maurer and
                  Bj{\"{o}}rn Tackmann and
                  Vassilis Zikas},
  title        = {Universally Composable Synchronous Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {310},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/310},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KatzMTZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlwenKMZ11,
  author       = {Jo{\"{e}}l Alwen and
                  Jonathan Katz and
                  Ueli Maurer and
                  Vassilis Zikas},
  title        = {Collusion-Preserving Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {433},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/433},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlwenKMZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ch/Zikas2010,
  author       = {Vassilis Zikas},
  title        = {Generalized corruption models in secure multi-party computation},
  school       = {{ETH} Zurich},
  year         = {2010},
  url          = {https://d-nb.info/1005005729},
  isbn         = {978-3-86628-338-1},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ch/Zikas2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/HirtZ10,
  author       = {Martin Hirt and
                  Vassilis Zikas},
  editor       = {Henri Gilbert},
  title        = {Adaptively Secure Broadcast},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Monaco / French Riviera, May 30 - June 3, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6110},
  pages        = {466--485},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13190-5\_24},
  doi          = {10.1007/978-3-642-13190-5\_24},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/HirtZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/ZikasHM09,
  author       = {Vassilis Zikas and
                  Sarah Hauser and
                  Ueli M. Maurer},
  editor       = {Omer Reingold},
  title        = {Realistic Failures in Secure Multi-party Computation},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {274--293},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_17},
  doi          = {10.1007/978-3-642-00457-5\_17},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/ZikasHM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HirtZ09,
  author       = {Martin Hirt and
                  Vassilis Zikas},
  title        = {Adaptively Secure Broadcast},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {230},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/230},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HirtZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/HirtMZ08,
  author       = {Martin Hirt and
                  Ueli M. Maurer and
                  Vassilis Zikas},
  editor       = {Josef Pieprzyk},
  title        = {{MPC} vs. {SFE} : Unconditional and Computational Security},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Melbourne, Australia, December 7-11, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5350},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89255-7\_1},
  doi          = {10.1007/978-3-540-89255-7\_1},
  timestamp    = {Sun, 02 Jun 2019 21:16:53 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/HirtMZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Beerliova-TrubiniovaFHMZ08,
  author       = {Zuzana Beerliov{\'{a}}{-}Trub{\'{\i}}niov{\'{a}} and
                  Matthias Fitzi and
                  Martin Hirt and
                  Ueli M. Maurer and
                  Vassilis Zikas},
  editor       = {Ran Canetti},
  title        = {{MPC} vs. {SFE:} Perfect Security in a Unified Corruption Model},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {231--250},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_14},
  doi          = {10.1007/978-3-540-78524-8\_14},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Beerliova-TrubiniovaFHMZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Beerliova-TrubiniovaFHMZ07,
  author       = {Zuzana Beerliov{\'{a}}{-}Trub{\'{\i}}niov{\'{a}} and
                  Matthias Fitzi and
                  Martin Hirt and
                  Ueli Maurer and
                  Vassilis Zikas},
  title        = {{MPC} vs. {SFE:} Perfect Security in a Unified Corruption Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {78},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/078},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Beerliova-TrubiniovaFHMZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics