Fast Secure Comparison for Medium-Sized Integers and Its Application in Binarized Neural Networks by Mark Abspoel, Niek J. Bouman, Berry Schoenmakers and Niels de Vreede}. In Fast Secure Comparison for Medium-Sized Integers and Its Application in Binarized Neural Networks. In: Matsui M. (eds) Topics in Cryptology – CT-RSA 2019. CT-RSA 2019. Lecture Notes in Computer Science, vol 11405. Springer, Cham. https://doi.org/10.1007/978-3-030-12612-4_23
Proof-of-Stake Sidechains by Peter Gaži, Aggelos Kiayias and Dionysis Zindros. In IEEE Symposium on Security and Privacy (SP), 19-23 May 2019, pp. 139-156. doi: 10.1109/SP.2019.00040
UC-Secure CRS Generation for SNARKs by Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Janno Siim and Michal Zajac. In Johannes Buchmann, Abderrahmane Nitaj and Tajjeeddine Rachidi, editors, Africacrypt 2019, Notes in Computer Science, Rabat, Morocco, July 9-11, 2019. Springer, Cham. https://doi.org/10.1007/978-3-030-23696-0_6
Proof-of-Burn by Kostis Karantias, Aggelos Kiayias and Dionysis Zindros. In: Bonneau J., Heninger N. (eds) Financial Cryptography and Data Security, July 18, 2020. Lecture Notes in Computer Science, vol 12059. Springer, Cham. https://doi.org/10.1007/978-3-030-51280-4_28
Updatable blockchainsby Michele Ciampi, Nikos Karayannidis, Aggelos Kiayias, and Dionysis Zindros. In Liqun Chen, Ninghui Li, Kaitai Liang, and Steve A. Schneider, editors, ESORICS 2020: 25th European Symposium on Research in Computer Security, Part II, volume 12309, Lecture Notes in Computer Science, pages 590–609, Guildford, UK, September 14–18, 2020. Springer, Heidelberg, Germany. https://doi.org/10.1007/978-3-030-59013-0_29
Towards Defeating Mass Surveillance and SARS-CoV-2: The Pronto-C2 Fully Decentralized Automatic Contact Tracing System by Gennaro Avitabile, Vincenzo Botta, Vincenzo Iovino, Ivan Visconti. In the proceedings of the Network and Distributed System Security Symposium (NDSS) 2021 CoronaDef Workshop, 21-25 February 2021, Volume to appear, pre-print here: https://eprint.iacr.org/2020/493.pdf
Shielded Computations in Smart Contracts Overcoming Forks by Vincenzo Botta, Daniele Friolo, Daniele Venturi, Ivan Visconti. In the proceedings of the Financial Cryptography and Data Security - 25th International Conference, FC 2021, March 1-5, 2021, Volume to appear, pre-print here: https://eprint.iacr.org/2019/891.pdf
Another Look at Extraction and Randomization of Groth's zk-SNARK by Karim Baghery, Markulf Kohlweiss, Janno Siim, Mikhail Volkhov. In the proceedings of the 25th Financial Cryptography Conference (FC2021), 1-5 March 2021, Volume to appear, pre-print version here: https://fc21.ifca.ai/papers/262.pdf
Mining for Privacy: How to Bootstrap a Snarky Blockchain by Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss. In the proceedings of the 25th Financial Cryptography Conference (FC2021), 1-5 March 2021, Volume to appear, pre-print version here: https://eprint.iacr.org/2020/401.pdf
Multi-Client Functional Encryption for Separable Functions by Michele Ciampi, Luisa Siniscalchi, Hendrik Waldner. In a book Public-Key Cryptography – PKC 2021, 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, https://doi.org/10.1007/978-3-030-75245-3_26
Dynamic Ad Hoc Clock Synchronization by Christian Badertscher, Peter Gazi, Aggelos Kiayias, Alexander Russell, Vassilis Zikas. In: Canteaut A., Standaert FX. (eds) Advances in Cryptology – EUROCRYPT 2021, June 16, 2021. Lecture Notes in Computer Science, vol 12698. Springer, Cham. https://doi.org/10.1007/978-3-030-77883-5_14
Kachina - Foundations of Private Smart Contracts by Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss. In the proceedings of the IEEE 34th Computer Security Foundations Symposium (CSF), June 21-24 2021, Volume 1: 47-62. https://doi.ieeecomputersociety.org/10.1109/CSF51468.2021.00002
Efficient Secure Ridge Regression from Randomized Gaussian Elimination* by Frank Blom, Niek J. Bouman, Berry Schoenmakers and Niels de Vreede. In the proceeding Cyber Security Cryptography and Machine Learning, 5th International Symposium, CSCML 2021, Be'er Sheva, Israel, July 8–9, 2021. Volume 12716 of Lecture Notes in Computer Science, Springer. Volume to appear, pre-print here: https://eprint.iacr.org/2019/773
Composition with Knowledge Assumptions* by Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss. In proceedings of the CRYPTO 2021, August 2021, Volume to appear, pre-print here: https://eprint.iacr.org/2021/165.pdf
Threshold Garbled Circuits and Ad Hoc Secure Computation* by Michele Ciampi, Vipul Goyal, Rafail Ostrovsky. In the proceedings of the Eurocrypt 2021, October 2021, pre-print here: https://eprint.iacr.org/2021/308.pdf
Technical reports
New Protocols for Secure Linear Algebra: Pivoting-Free Elimination and Fast Block Recursive Matrix Decomposition by Niek J. Bouman and Niels de Vreede. Cryptology ePrint Archive, Report 2018/703. Available at https://eprint.iacr.org/2018/703
On QA-NIZK in the BPK Model by Behzad Abdolmaleki and Helger Lipmaa and Janno Siim and Michał Zając.
Cryptology ePrint Archive, Report 2018/877, 2018. Available at https://eprint.iacr.org/2018/877
Proof-of-work sidechains by Aggelos Kiayias and Dionysis Zindros. Cryptology ePrint Archive, Report 2018/1048, 2018. Available at https://eprint.iacr.org/2018/1048
Ouroboros-BFT: A simple Byzantine fault tolerant consensus protocol by Aggelos Kiayias and Alexander Russell. Cryptology ePrintArchive, Report 2018/1049, 2018. Available at https://eprint.iacr.org/2018/1049
Parallel Chains: Improving Throughput and Latency of Blockchain Protocols via Parallel Composition by Matthias Fitzi, Peter Gaži, Aggelos Kiayias, and Alexander Russell. Cryptology ePrint Archive, Report 2018/1119. Available at https://eprint.iacr.org/2018/1119
Multi-Protocol UC and its Use for Building Modular and Efficient Protocolsby
Jan Camenisch and Manu Drijvers and Björn Tackmann. Cryptology ePrint Archive, Report 2019/065, 2019. Available at https://eprint.iacr.org/2019/065
Key-and-argument-updatable QA-NIZKs by Helger Lipmaa. Cryptology ePrintAarchive, Report 2019/333, 2019. Available at https://eprint.iacr.org/2019/333
Simple yet efficient knowledge-sound and non-black-box any-simulation extractable ZK-SNARKsby Helger Lipmaa. Cryptology ePrint Archive, Report 2019/612, 2019. Available at https://eprint.iacr.org/2019/612
Ouroboros Chronos: Permissionless Clock Synchronization via Proof-of-Stake by Christian Badertscher, Peter Gaži, Aggelos Kiayias, Alexander Russell, and Vassilis Zikas. Cryptology ePrint Archive, Report 2019/838. Available at https://eprint.iacr.org/2019/838
Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric by Dmytro Bogatov, Angelo De Caro, Kaoutar Elkhiyaoui and Björn Tackmann. Cryptology ePrint Archive: Report 2019/1097. Available at https://eprint.iacr.org/2019/1097/20190929:183553
Hydra: Fast Isomorphic State Channel by Manuel M. T. Chakravarty, Sandro Coretti, Matthias Fitzi, Peter Gaži, Philipp Kant, Aggelos Kiayias, and Alexander Russell. Cryptology ePrint Archive, Report 2020/299. Available at https://eprint.iacr.org/2020/299
Consensus Redux: Distributed Ledgers in the Face of Adversarial Supremacy by Christian Badertscher, Peter Gaži, Aggelos Kiayias, Alexander Russell, and Vassilis Zikas. Cryptology ePrint Archive, Report 2020/1021. Available at https://eprint.iacr.org/2020/1021
Secure Quantum Two-Party Computation: Impossibility and Constructionsby Michele Ciampi and Alexandru Cojocaru and Elham Kashefi and Atul Mantri. Cryptology ePrint Archive, Report 2020/1286, 2020. Available at https://eprint.iacr.org/2020/1286
Collusion-Preserving Computation without a Mediator by Michele Ciampi and Yun Lu and Vassilis Zikas. Cryptology ePrint Archive, Report 2020/497, 2020. Available at https://eprint.iacr.org/2020/497.
Mir-BFT: High-Throughput Robust BFT for Decentralized Networks by Chrysoula Stathakopoulou, Tudor David, Matej Pavlovic and Marko Vukolić. Last revised January 2021. Available at https://arxiv.org/abs/1906.05552.
Elmo: Recursive Virtual Payment Channels for Bitcoin by Aggelos Kiayias and Orfeas Stefanos Thyfronitis Litos. Cryptology ePrint Archive, Report 2021/747. Available at https://eprint.iacr.org/2021/747