Peer-reviewed journals and conference proceedings:

  1. Channels: Horizontal Scaling and Confidentiality on Permissioned Blockchains

    by Elli Androulaki, Christian Cachin, Angelo De Caro, Eleftherios Kokoris-Kogias.
    In proceedings part I of  23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, pages 111-131.
  2. Combining private set-intersection with secure two-party computation

    by Michele Ciampi and Claudio Orlandi.
    In proceedings of International Conference on Security and Cryptography for Networks, SCN 2018, Amalfi, Italy, September 5-7, 2018, pages 464-482. Available at
  3. Ouroboros genesis: Composable proof-of-stake blockchains with dynamic availability.

    by Christian Badertscher, Peter Gazi, Aggelos Kiayias, Alexander Russell, and Vassilis Zikas.
    In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, ON, Canada, October 15-19, 2018, pages 913–930, 2018. Available at
  4. On the Security Properties of e-Voting Bulletin Boards.

    by Aggelos Kiayias, Annabell Kuldmaa, Helger Lipmaa, Janno Siim, Thomas Zacharias.
    In Catalano D., De Prisco R. (eds) Security and Cryptography for Networks. SCN 2018. Lecture Notes in Computer Science, vol 11035. Springer, Cham. Available at
  5. On Trade-offs of Applying Block Chains for Electronic Voting Bulletin Boards

    by Sven Heiberg, Ivo Kubjas, Janno Siim and Jan Willemson.
    In proceedings of the Third International Joint Conference on Electronic Voting E-Vote-ID 2018, 2–5 October 2018, Lochau/Bregenz, Austria, TUT press, pp. 259-276. Available at
  6. Non-Interactive Secure Computation from One-Way Functions

    by Saikrishna Badrinarayanan, Abhishek Jain; Rafail Ostrovsky and Ivan Visconti.
    In proceedings of Asiacrypt 2018, 2-6 December 2018, Brisbane, Australia. In print.

Technical reports

  1. New Protocols for Secure Linear Algebra: Pivoting-Free Elimination and Fast Block Recursive Matrix Decomposition. By Niek J. Bouman and Niels de Vreede. Cryptology ePrint Archive, Report 2018/703. Available at
  2. A consensus taxonomy in the blockchain era. By Juan Garay and Aggelos Kiayias. Cryptology ePrint Archive, Report 2018/754, 2018. Available at
  3. Proof-of-work sidechains. By Aggelos Kiayias and Dionysis Zindros. Cryptology ePrint Archive, Report 2018/1048, 2018. Available at
  4. Ouroboros-BFT: A simple Byzantine fault tolerant consensus protocol. By Aggelos Kiayias and Alexander Russell. Cryptology ePrintArchive, Report 2018/1049, 2018. Available at
  5. Fast Secure Comparison for Medium-Sized Integers and Its Application in Binarized Neural Networks. By Mark Abspoel and Niek J. Bouman and Berry Schoenmakers and Niels de Vreede. Cryptology ePrint Archive, Report 2018/1236, 2018. Available at


MPyC for Secure Multiparty Computation in Python. Available at