default search action
Aydin Abadi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i33]Aydin Abadi, Bradley Doyle, Francesco Gini, Kieron Guinamard, Sasi Kumar Murakonda, Jack Liddell, Paul Mellor, Steven J. Murdoch, Mohammad Naseri, Hector Page, George Theodorakopoulos, Suzanne Weller:
Starlit: Privacy-Preserving Federated Learning to Enhance Financial Fraud Detection. CoRR abs/2401.10765 (2024) - [i32]Yvo Desmedt, Aydin Abadi:
Delegated-Query Oblivious Transfer and its Practical Applications. CoRR abs/2406.15063 (2024) - [i31]Aydin Abadi:
Tempora-Fusion: Time-Lock Puzzle with Efficient Verifiable Homomorphic Linear Combination. CoRR abs/2406.15070 (2024) - [i30]Aydin Abadi, Yvo Desmedt:
Supersonic OT: Fast Unconditionally Secure Oblivious Transfer. CoRR abs/2406.15529 (2024) - [i29]Aydin Abadi, Vishnu Asutosh Dasu, Sumanta Sarkar:
Privacy-Preserving Data Deduplication for Enhancing Federated Learning of Language Models. CoRR abs/2407.08152 (2024) - [i28]Aydin Abadi:
Verifiable Homomorphic Linear Combinations in Multi-Instance Time-Lock Puzzles. CoRR abs/2408.12444 (2024) - [i27]Aydin Abadi, Bradley Doyle, Francesco Gini, Kieron Guinamard, Sasi Kumar Murakonda, Jack Liddell, Paul Mellor, Steven J. Murdoch, Mohammad Naseri, Hector Page, George Theodorakopoulos, Suzanne Weller:
Starlit: Privacy-Preserving Federated Learning to Enhance Financial Fraud Detection. IACR Cryptol. ePrint Arch. 2024: 90 (2024) - [i26]Yvo Desmedt, Aydin Abadi:
Delegated-Query Oblivious Transfer and its Practical Applications. IACR Cryptol. ePrint Arch. 2024: 1006 (2024) - [i25]Aydin Abadi, Yvo Desmedt:
Supersonic OT: Fast Unconditionally Secure Oblivious Transfer. IACR Cryptol. ePrint Arch. 2024: 1012 (2024) - [i24]Aydin Abadi:
Tempora-Fusion: Time-Lock Puzzle with Efficient Verifiable Homomorphic Linear Combination. IACR Cryptol. ePrint Arch. 2024: 1013 (2024) - [i23]Aydin Abadi, Vishnu Asutosh Dasu, Sumanta Sarkar:
Privacy-Preserving Data Deduplication for Enhancing Federated Learning of Language Models. IACR Cryptol. ePrint Arch. 2024: 1151 (2024) - [i22]Aydin Abadi:
Verifiable Homomorphic Linear Combinations in Multi-Instance Time-Lock Puzzles. IACR Cryptol. ePrint Arch. 2024: 1314 (2024) - 2023
- [c10]Aydin Abadi, Steven J. Murdoch:
Payment with Dispute Resolution: A Protocol for Reimbursing Frauds Victims. AsiaCCS 2023: 855-869 - [c9]Aydin Abadi, Steven J. Murdoch, Thomas Zacharias:
Recurring Contingent Service Payment. EuroS&P 2023: 724-756 - [c8]Marwan Zeggari, Renaud Lambiotte, Aydin Abadi, Mohamad Kassab:
An Efficient and Decentralized Blockchain-based Commercial Alternative. ICSA-C 2023: 231-238 - [i21]Aydin Abadi, Steven J. Murdoch:
Earn While You Reveal: Private Set Intersection that Rewards Participants. CoRR abs/2301.03889 (2023) - [i20]Marwan Zeggari, Aydin Abadi, Renaud Lambiotte, Mohamad Kassab:
Safeguarding Physical Sneaker Sale Through a Decentralized Medium. CoRR abs/2306.05359 (2023) - [i19]Aydin Abadi, Dan Ristea, Steven J. Murdoch:
Delegated Time-Lock Puzzle. CoRR abs/2308.01280 (2023) - [i18]Aydin Abadi, Steven J. Murdoch:
Earn While You Reveal: Private Set Intersection that Rewards Participants. IACR Cryptol. ePrint Arch. 2023: 30 (2023) - [i17]Marwan Zeggari, Aydin Abadi, Renaud Lambiotte, Mohamad Kassab:
Safeguarding Physical Sneaker Sale Through a Decentralized Medium. IACR Cryptol. ePrint Arch. 2023: 727 (2023) - [i16]Alireza Kavousi, Aydin Abadi, Philipp Jovanovic:
Timed Secret Sharing. IACR Cryptol. ePrint Arch. 2023: 1024 (2023) - [i15]Aydin Abadi, Dan Ristea, Steven J. Murdoch:
Delegated Time-Lock Puzzle. IACR Cryptol. ePrint Arch. 2023: 1183 (2023) - [i14]Aydin Abadi, Steven J. Murdoch:
Decentralised Repeated Modular Squaring Service Revisited: Attack and Mitigation. IACR Cryptol. ePrint Arch. 2023: 1347 (2023) - 2022
- [c7]Aydin Abadi, Changyu Dong, Steven J. Murdoch, Sotirios Terzis:
Multi-party Updatable Delegated Private Set Intersection. Financial Cryptography 2022: 100-119 - [i13]Aydin Abadi, Steven J. Murdoch, Thomas Zacharias:
Recurring Contingent Service Payment. CoRR abs/2208.00283 (2022) - [i12]Steven J. Murdoch, Aydin Abadi:
A Forward-secure Efficient Two-factor Authentication Protocol. CoRR abs/2208.02877 (2022) - [i11]Lorenzo Martinico, Aydin Abadi, Thomas Zacharias, Thomas Win:
Glass-Vault: A Generic Transparent Privacy-preserving Exposure Notification Analytics Platform. CoRR abs/2208.09525 (2022) - [i10]Marwan Zeggari, Renaud Lambiotte, Aydin Abadi:
An Efficient and Decentralized Blockchain-based Commercial Alternative (Full Version). CoRR abs/2210.08372 (2022) - [i9]Aydin Abadi, Steven J. Murdoch:
Payment with Dispute Resolution: A Protocol For Reimbursing Frauds' Victims. IACR Cryptol. ePrint Arch. 2022: 107 (2022) - [i8]Steven J. Murdoch, Aydin Abadi:
A Forward-secure Efficient Two-factor Authentication Protocol. IACR Cryptol. ePrint Arch. 2022: 1006 (2022) - [i7]Lorenzo Martinico, Aydin Abadi, Thomas Zacharias, Thomas Win:
Glass-Vault: A Generic Transparent Privacy-preserving Exposure Notification Analytics Platform. IACR Cryptol. ePrint Arch. 2022: 1084 (2022) - [i6]Marwan Zeggari, Renaud Lambiotte, Aydin Abadi, Louise Axon, Mohamad Kassab:
An Efficient and Decentralized Blockchain-based Commercial Alternative (Full Version). IACR Cryptol. ePrint Arch. 2022: 1440 (2022) - 2021
- [c6]Aydin Abadi, Steven J. Murdoch, Thomas Zacharias:
Polynomial Representation Is Tricky: Maliciously Secure Private Set Intersection Revisited. ESORICS (2) 2021: 721-742 - [c5]Aydin Abadi, Aggelos Kiayias:
Multi-instance Publicly Verifiable Time-Lock Puzzle and Its Applications. Financial Cryptography (2) 2021: 541-559 - [i5]Aydin Abadi, Steven J. Murdoch, Thomas Zacharias:
Polynomial Representation Is Tricky: Maliciously Secure Private Set Intersection Revisited. IACR Cryptol. ePrint Arch. 2021: 1009 (2021) - [i4]Aydin Abadi, Steven J. Murdoch, Thomas Zacharias:
Recurring Contingent Payment for Proofs of Retrievability. IACR Cryptol. ePrint Arch. 2021: 1145 (2021) - 2020
- [c4]Aydin Abadi, Michele Ciampi, Aggelos Kiayias, Vassilis Zikas:
Timed Signatures and Zero-Knowledge Proofs - Timestamping in the Blockchain Era -. ACNS (1) 2020: 335-354 - [c3]Ludwig Trotter, Mike Harding, Peter Shaw, Nigel Davies, Chris Elsden, Chris Speed, John Vines, Aydin Abadi, Josh Hallwright:
Smart Donations: Event-Driven Conditional Donations Using Smart Contracts On The Blockchain. OZCHI 2020: 546-557 - [i3]Aydin Abadi, Sotirios Terzis, Changyu Dong:
Feather: Lightweight Multi-party Updatable Delegated Private Set Intersection. IACR Cryptol. ePrint Arch. 2020: 407 (2020)
2010 – 2019
- 2019
- [j1]Aydin Abadi, Sotirios Terzis, Roberto Metere, Changyu Dong:
Efficient Delegated Private Set Intersection on Outsourced Private Datasets. IEEE Trans. Dependable Secur. Comput. 16(4): 608-624 (2019) - [i2]Aydin Abadi, Michele Ciampi, Aggelos Kiayias, Vassilis Zikas:
Timed Signatures and Zero-Knowledge Proofs -Timestamping in the Blockchain Era-. IACR Cryptol. ePrint Arch. 2019: 644 (2019) - 2018
- [i1]Aydin Abadi, Sotirios Terzis, Roberto Metere, Changyu Dong:
Efficient Delegated Private Set Intersection on Outsourced Private Datasets. IACR Cryptol. ePrint Arch. 2018: 496 (2018) - 2017
- [b1]Aydin Abadi:
Delegated private set intersection on outsourced private datasets. University of Strathclyde, Glasgow, UK, 2017 - 2016
- [c2]Aydin Abadi, Sotirios Terzis, Changyu Dong:
VD-PSI: Verifiable Delegated Private Set Intersection on Outsourced Private Datasets. Financial Cryptography 2016: 149-168 - 2015
- [c1]Aydin Abadi, Sotirios Terzis, Changyu Dong:
O-PSI: Delegated Private Set Intersection on Outsourced Datasets. SEC 2015: 3-17
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-30 00:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint