Aggelos Kiayias
#52,129
Most Influential Person Now
Greek cryptographer and computer scientist
Aggelos Kiayias's AcademicInfluence.com Rankings
Aggelos Kiayiascriminal-justice Degrees
Criminal Justice
#148
World Rank
#170
Historical Rank
Cyber Security
#13
World Rank
#14
Historical Rank
Aggelos Kiayiascomputer-science Degrees
Computer Science
#2553
World Rank
#2666
Historical Rank
Cybersecurity
#14
World Rank
#15
Historical Rank
Database
#1445
World Rank
#1520
Historical Rank
Download Badge
Criminal Justice Computer Science
Why Is Aggelos Kiayias Influential?
(Suggest an Edit or Addition)According to Wikipedia, Aggelos Kiayias FRSE is a Greek cryptographer and computer scientist, currently a professor at the University of Edinburgh and the Chief Science Officer at Input Output Global , the company behind Cardano.
Aggelos Kiayias's Published Works
Published Works
- Polynomial Reconstruction Based Cryptography (2001) (1345)
- The Bitcoin Backbone Protocol: Analysis and Applications (2015) (1288)
- Advances in Cryptology - EUROCRYPT 2004 (2004) (1238)
- Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol (2017) (1214)
- Self Protecting Pirates and Black-Box Traitor Tracing (2001) (1139)
- Traitor Tracing with Constant Transmission Rate (2002) (674)
- BiTR: Built-in Tamper Resilience (2011) (586)
- Robust key generation from signal envelopes in wireless networks (2007) (366)
- Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain (2018) (355)
- Delegatable pseudorandom functions and applications (2013) (303)
- Anonymous Identification in Ad Hoc Groups (2004) (293)
- Public Key Cryptography - PKC 2006 (2006) (257)
- The Bitcoin Backbone Protocol with Chains of Variable Difficulty (2017) (234)
- Blockchain Mining Games (2016) (226)
- Traceable Signatures (2004) (220)
- Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability (2018) (217)
- Multi-query Computationally-Private Information Retrieval with Constant Communication Rate (2010) (216)
- Self-tallying Elections and Perfect Ballot Secrecy (2002) (187)
- Scalability, fidelity and stealth in the DRAKVUF dynamic malware analysis system (2014) (165)
- Speed-Security Tradeoffs in Blockchain Protocols (2015) (136)
- Fair and Robust Multi-party Computation Using a Global Transaction Ledger (2016) (125)
- On the Portability of Generalized Schnorr Proofs (2009) (123)
- Topics in Cryptology - CT-RSA 2011 - The Cryptographers' Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings (2011) (112)
- Group Signatures with Efficient Concurrent Join (2005) (111)
- SoK: A Consensus Taxonomy in the Blockchain Era (2020) (107)
- Non-Interactive Proofs of Proof-of-Work (2020) (106)
- Decoding of Interleaved Reed Solomon Codes over Noisy Data (2003) (105)
- Proof-of-Burn (2020) (104)
- Proof-of-Stake Sidechains (2019) (103)
- Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers (2005) (98)
- Secure scalable group signature with dynamic joins and separable authorities (2006) (96)
- Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model (2014) (93)
- End-to-End Verifiable Elections in the Standard Model (2015) (91)
- On Trees, Chains and Fast Transactions in the Blockchain (2017) (91)
- On Crafty Pirates and Foxy Tracers (2001) (90)
- Stake-Bleeding Attacks on Proof-of-Stake Blockchains (2018) (90)
- SoK: Communication Across Distributed Ledgers (2019) (84)
- The Vector-Ballot e-Voting Approach (2004) (80)
- Group Signatures: Provable Security, Efficient Constructions and Anonymity from Trapdoor-Holders (2004) (79)
- Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online) (2016) (71)
- Proof-of-Work Sidechains (2019) (71)
- Efficient Encrypted Keyword Search for Multi-user Data Sharing (2016) (69)
- An Internet Voting System Supporting User Privacy (2006) (67)
- Ouroboros Praos: An adaptively-secure, semi-synchronous proof-of-stake protocol (2017) (67)
- On passive inference attacks against physical-layer key extraction? (2011) (65)
- Breaking and Repairing Asymmetric Public-Key Traitor Tracing (2002) (59)
- Scalable public-key tracing and revoking (2003) (59)
- Cryptographic Hardness Based on the Decoding of Reed–Solomon Codes (2002) (58)
- Proofs of Proofs of Work with Sublinear Complexity (2016) (56)
- Virtual Machine Introspection in a Hybrid Honeypot Architecture (2012) (56)
- Exact In-Network Aggregation with Integrity and Confidentiality (2012) (55)
- SFADiff: Automated Evasion Attacks and Fingerprinting Using Black-box Differential Automata Learning (2016) (53)
- Group Encryption (2007) (51)
- Secure Games with Polynomial Expressions (2001) (49)
- MCMix: Anonymous Messaging via Secure Multiparty Computation (2017) (46)
- Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake (2019) (46)
- Testing Disjointness of Private Datasets (2005) (46)
- Extracting Group Signatures from Traitor Tracing Schemes (2003) (46)
- Reward Sharing Schemes for Stake Pools (2018) (45)
- One-shot signatures and applications to hybrid quantum/classical authentication (2020) (44)
- Tight Consistency Bounds for Bitcoin (2020) (42)
- Back in Black: Towards Formal, Black Box Analysis of Sanitizers and Filters (2016) (42)
- Bootstrapping the Blockchain, with Applications to Consensus and Fast PKI Setup (2018) (41)
- Concurrent Blind Signatures Without Random Oracles (2006) (41)
- Parallel Chains: Improving Throughput and Latency of Blockchain Protocols via Parallel Composition (2018) (40)
- Optimal Rate Private Information Retrieval from Homomorphic Encryption (2015) (38)
- Theory of Cryptography: 12th Theory of Cryptography Conference (2015) (37)
- TOPPSS: Cost-Minimal Password-Protected Secret Sharing Based on Threshold OPRF (2017) (37)
- Practical Non-Malleable Codes from l-more Extractable Hash Functions (2016) (36)
- Lower Bounds for Private Broadcast Encryption (2012) (35)
- D-DEMOS: A Distributed, End-to-End Verifiable, Internet Voting System (2015) (34)
- DEMOS-2: Scalable E2E Verifiable Elections without Random Oracles (2015) (33)
- On the Security of Key Extraction From Measuring Physical Quantities (2013) (32)
- Equivocal Blind Signatures and Adaptive UC-Security (2008) (30)
- Non-interactive Zero-Sharing with Applications to Private Distributed Decision Making (2003) (29)
- Pirate Evolution: How to Make the Most of Your Traitor Keys (2007) (29)
- Secure and efficient in-network processing of exact SUM queries (2011) (29)
- Ouroboros-BFT: A Simple Byzantine Fault Tolerant Consensus Protocol (2018) (29)
- State-Wide Elections, Optical Scan Voting Systems, and the Pursuit of Integrity (2009) (28)
- Decoding interleaved Reed-Solomon codes over noisy channels (2007) (26)
- Efficient Proofs of Secure Erasure (2014) (24)
- Traitor Deterring Schemes: Using Bitcoin as Collateral for Digital Content (2015) (24)
- A Formal Treatment of Hardware Wallets (2019) (24)
- Hydra: Fast Isomorphic State Channels (2020) (23)
- Towards a Smart Contract-based, Decentralized, Public-Key Infrastructure (2017) (23)
- I Forgot Your Password: Randomness Attacks Against PHP Applications (2012) (23)
- Full Analysis of Nakamoto Consensus in Bounded-Delay Networks (2020) (23)
- The Promise of Blockchain Technology for Global Securities and Derivatives Markets: The New Financial Ecosystem and the ‘Holy Grail’ of Systemic Risk Containment (2019) (23)
- A Composable Security Treatment of the Lightning Network (2020) (23)
- KACHINA – Foundations of Private Smart Contracts (2021) (22)
- An Efficient E2E Verifiable E-voting System without Setup Assumptions (2017) (22)
- Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning (2013) (21)
- How to keep a secret: leakage deterring public-key cryptosystems (2013) (20)
- Watermarking Public-Key Cryptographic Functionalities and Implementations (2017) (20)
- On the Security Properties of e-Voting Bulletin Boards (2018) (18)
- Hidden identity-based signatures (2007) (18)
- Encryption for Digital Content (2010) (18)
- Speed-Security Tradeo s in Blockchain Protocols (2015) (18)
- Resource-Restricted Cryptography: Revisiting MPC Bounds in the Proof-of-Work Era (2020) (17)
- Tampering with Special Purpose Trusted Computing Devices: A Case Study in Optical Scan E-Voting (2007) (17)
- Security Assessment of the Diebold Optical Scan Voting Terminal (2006) (17)
- An Authentication and Ballot Layout Attack Against an Optical Scan Voting Terminal (2007) (17)
- Ceremonies for End-to-End Verifiable Elections (2017) (16)
- Tracing and Revoking Pirate Rebroadcasts (2009) (16)
- Two-round concurrent blind signatures without random oracles (2005) (16)
- Low-Level Attacks in Bitcoin Wallets (2017) (15)
- Securing Proof-of-Work Ledgers via Checkpointing (2021) (15)
- Tamper Resilient Circuits: The Adversary at the Gates (2013) (15)
- Implementing a Smart Contract PKI (2020) (15)
- Ouroboros Chronos: Permissionless Clock Synchronization via Proof-of-Stake (2019) (15)
- Indistinguishable Proofs of Work or Knowledge (2016) (15)
- Robust fingerprinting codes: a near optimal construction (2010) (15)
- Directions in Polynomial Reconstruction Based Cryptography (2004) (15)
- Resource-based corruptions and the combinatorics of hidden diversity (2013) (15)
- Malicious takeover of voting systems: arbitrary code execution on optical scan voting terminals (2013) (15)
- Proofs of Work for Blockchain Protocols (2017) (15)
- At-most-once semantics in asynchronous shared memory (2009) (14)
- Taking total control of voting systems: firmware manipulations on an optical scan voting terminal (2009) (14)
- Efficient Steganography with Provable Security Guarantees (2005) (14)
- Making Any Identity-Based Encryption Accountable, Efficiently (2015) (13)
- The Combinatorics of the Longest-Chain Rule: Linear Consistency for Proof-of-Stake Blockchains (2020) (13)
- A Puff of Steem: Security Analysis of Decentralized Content Curation (2018) (13)
- Secure Outsourcing of Cryptographic Circuits Manufacturing (2018) (13)
- On the Practicality of a Smart Contract PKI (2019) (13)
- Cryptocurrency Egalitarianism: A Quantitative Approach (2019) (12)
- Compact Storage of Superblocks for NIPoPoW Applications (2019) (12)
- Bootstrapping the Blockchain - Directly (2016) (12)
- Security and Privacy in Digital Rights Management (2002) (11)
- Non-Malleable Codes for Partial Functions with Manipulation Detection (2018) (11)
- Consensus Redux: Distributed Ledgers in the Face of Adversarial Supremacy (2020) (11)
- Tree-Homomorphic Encryption and Scalable Hierarchical Secret-Ballot Elections (2010) (11)
- Pressing the button for European elections: verifiable e-voting and public attitudes toward internet voting in Greece (2014) (11)
- Secure Outsourcing of Circuit Manufacturing (2016) (10)
- The Nym Network The Next Generation of Privacy Infrastructure (2021) (10)
- Structure and Content of the Visible Darknet (2018) (10)
- Proof-of-Stake Blockchain Protocols with Near-Optimal Throughput (2020) (10)
- Pre-Election Testing and Post-Election Audit of Optical Scan Voting Terminal Memory Cards (2008) (10)
- Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice (2004) (10)
- Integrity Vulnerabilities in the Diebold TSX Voting Terminal (2007) (10)
- Proceedings of the 4th ACM workshop on Digital rights management (2004) (10)
- The velvet path to superlight blockchain clients (2021) (10)
- Automating Voting Terminal Event Log Analysis (2009) (10)
- Public Key Cryptography - PKC 2006: 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. ... (Lecture Notes in Computer Science) (2006) (9)
- Acceptor-Definable Counting Classes (2001) (9)
- Timed Signatures and Zero-Knowledge Proofs -Timestamping in the Blockchain Era- (2020) (9)
- Consistency of Proof-of-Stake Blockchains with Concurrent Honest Slot Leaders (2020) (9)
- Encrypting wireless network traces to protect user privacy: A case study for smart campus (2016) (9)
- Privacy-Preserving Information Markets for Computing Statistical Data (2009) (9)
- SoK: Blockchain Governance (2022) (9)
- Improving the Round Complexity of Traitor Tracing Schemes (2010) (8)
- A Solution for Wireless Privacy and Payments based on E-cash (2005) (8)
- Ledger Combiners for Fast Settlement (2020) (8)
- Financial Cryptography and Data Security (2008) (8)
- Distributed, End-to-end Verifiable, and Privacy-Preserving Internet Voting Systems (2016) (8)
- The Generals' Scuttlebutt: Byzantine-Resilient Gossip Protocols (2022) (8)
- Asynchronous Perfectly Secure Communication over One-Time Pads (2005) (8)
- E-Voting and Identity (2011) (7)
- Consensus from Signatures of Work (2020) (7)
- Multi-instance Publicly Verifiable Time-Lock Puzzle and Its Applications (2021) (7)
- The Bitcoin Backbone Protocol Against Quantum Adversaries (2019) (7)
- The Strong At-Most-Once Problem (2012) (7)
- A Gas-Efficient Superlight Bitcoin Client in Solidity (2020) (7)
- Public key cryptography - PKC 2006 : 9th International Conference on Theory and Practice in Public Key Cryptography, New York, NY, USA, April 24-26, 2006 : proceedings (2006) (7)
- Syntax-Driven Private Evaluation of Quantified Membership Queries (2006) (7)
- On the Necessity of Auditing for Election Privacy in e-Voting Systems (2015) (7)
- On the security of a public-key traitor tracing scheme with sublinear ciphertext size (2009) (7)
- Crowd Verifiable Zero-Knowledge and End-to-end Verifiable Multiparty Computation (2020) (6)
- Communication Optimal Tardos-Based Asymmetric Fingerprinting (2015) (6)
- Fully scalable public-key traitor tracing (2003) (6)
- Updatable Blockchains (2020) (6)
- Coalition-safe equilibria with virtual payoffs (2019) (6)
- The Vector-Ballot Approach for Online Voting Procedures (2010) (6)
- Polynomial Reconstruction Based Cryptography (A Short Survey) (2001) (6)
- Account Management in Proof of Stake Ledgers (2020) (6)
- Forkable Strings are Rare (2017) (6)
- Solving the at-most-once problem with nearly optimal effectiveness (2011) (6)
- The Architecture of Decentralised Finance Platforms: A New Open Finance Paradigm (2020) (5)
- Composition with Knowledge Assumptions (2021) (5)
- Mining in Logarithmic Space (2021) (5)
- Linear Consistency for Proof-of-Stake Blockchains (2019) (5)
- Smart Contract Derivatives (2020) (5)
- A Little Honesty Goes a Long Way - The Two-Tier Model for Secure Multiparty Computation (2015) (5)
- Electronic Voting Systems - From Theory to Implementation (2013) (5)
- 5th Workshop on Cyber Security Experimentation and Test, CSET '12, Bellevue, WA, USA, August 6, 2012 (2012) (5)
- Blockchain and Consensus from Proofs of Work without Random Oracles (2018) (5)
- Privacy Preserving Data Mining within Anonymous Credential Systems (2008) (5)
- Integrity of electronic voting systems: fallacious use of cryptography (2012) (4)
- A One-Time Stegosystem and Applications to Efficient Covert Communication (2012) (4)
- Consistency for Functional Encryption (2021) (4)
- A Combined Fusion and Data Mining Framework for the Detection of Botnets (2009) (4)
- Iterated Search Problems and Blockchain Security under Falsifiable Assumptions (2019) (4)
- Key-Efficient Steganography (2012) (4)
- Proceedings of the 2007 ACM workshop on Digital Rights Management (2007) (4)
- Graded Encryption, or How to Play "Who Wants To Be A Millionaire?" Distributively (2014) (4)
- Distributing the setup in universally composable multi-party computation (2014) (4)
- Mithril: Stake-based Threshold Multisignatures (2021) (4)
- Copyrighting Public-key Functions and Applications to Black-box Traitor Tracing (2006) (4)
- Cryptanalysis of the the Polynomial Reconstruction Based Public-Key Cryptosystem of Eurocrypt’03 in the Optimal Parameter Setting (2003) (4)
- Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination (2006) (3)
- Robust Verifiable non-Interactive Zero-Sharing - A Plug-in Utility for Enhanced Voters' Privacy (2003) (3)
- The Promise of Blockchain Technology for Global Securities and Derivatives Markets: The New Financial Ecosystem and the ‘Holy Grail’ of Systemic Risk Containment (2018) (3)
- Zero-Knowledge Proofs with Witness Elimination (2009) (3)
- Sound and Fine-Grain Specification of Cryptographic Tasks (2009) (3)
- Post-Quantum Security of the Bitcoin Backbone and Quantum Multi-Solution Bernoulli Search (2020) (3)
- Efficient State Management in Distributed Ledgers (2021) (3)
- Dynamic Ad Hoc Clock Synchronization (2021) (3)
- Mining for Privacy: How to Bootstrap a Snarky Blockchain (2020) (3)
- A Framework for the Sound Specification of Cryptographic Tasks (2010) (3)
- Cryptography and decoding Reed-Solomon codes as a hard problem (2005) (3)
- Post-Quantum Blockchain Proofs of Work (2021) (3)
- Elmo: Recursive Virtual Payment Channels for Bitcoin (2021) (3)
- Proceedings of the 14th international conference on Financial cryptograpy and data security (2010) (2)
- Proceedings of the 11th international conference on Topics in cryptology: CT-RSA 2011 (2011) (2)
- Minotaur: Multi-Resource Blockchain Consensus (2022) (2)
- Fast Isomorphic State Channels (2021) (2)
- Secret Communication over Fading Channels (2009) (2)
- Near Optimal Rate Homomorphic Encryption for Branching Programs (2014) (2)
- Asynchronous Adaptive Task Allocation (2015) (2)
- Generic Construction of Trace and Revoke Schemes (2012) (2)
- Distributed Parameter Generation for Bilinear Diffie Hellman Exponentiation and Applications (2015) (2)
- Trading Static for Adaptive Security in Universally Composable Zero-Knowledge (2007) (2)
- Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface (2007) (2)
- A Universally Composable Framework for the Privacy of Email Ecosystems (2018) (2)
- An Efficient E2E Crowd Verifiable E-Voting System (2021) (2)
- On the Effects of Pirate Evolution on the Design of Digital Content Distribution Systems (2011) (2)
- Proceedings of the Third international conference on E-Voting and Identity (2011) (1)
- Attacking Traitor Tracing Schemes Using History Recording and Abrupt Decoders (2011) (1)
- Graded Signatures (2015) (1)
- Password : Randomness Attacks Against PHP Applications (2012) (1)
- Explorer Indistinguishable Proofs of Work or Knowledge (2016) (1)
- PEReDi: Privacy-Enhanced, Regulated and Distributed Central Bank Digital Currencies (2022) (1)
- Blockchain Nash Dynamics and the Pursuit of Compliance (2022) (1)
- Efficient Random Beacons with Adaptive Security for Ungrindable Blockchains (2021) (1)
- Secure Function Collection with Sublinear Storage (2009) (1)
- Ofelimos: Combinatorial Optimization via Proof-of-Useful-Work \\ A Provably Secure Blockchain Protocol (2021) (1)
- Incentives Against Power Grabs or How to Engineer the Revolution in a Pooled Proof of Stake System (2021) (1)
- Optimal bootstrapping of PoW blockchains (2022) (1)
- Resource Access Control in the Facebook Model (2013) (1)
- Auditing for privacy in threshold PKE e-voting (2017) (1)
- Blockchains from Non-idealized Hash Functions (2020) (1)
- Conclave: A Collective Stake Pool Protocol (2021) (1)
- Decentralizing Information Technology: The Advent of Resource Based Systems (2021) (1)
- Public-Key Cryptography – PKC 2020: 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4–7, 2020, Proceedings, Part I (2020) (1)
- Program Twenty-Second Annual Computer Security Applications Conference ( ACSAC ) Practical Solutions (0)
- Key Generation Using Physical Properties of Wireless Communication (2011) (0)
- Scaling Privacy Guarantees in Code-Verification Elections (2013) (0)
- Randomness Efficient Steganography (2009) (0)
- The Right to Robot Identification: Using Cryptographic Hashes to Manage AI Black-Boxes (2020) (0)
- Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography (2006) (0)
- Share-Deterring Public Key Cryptography ? (2016) (0)
- Agile Cryptography: A Composable Approach (2022) (0)
- Asynchronously and Perfectly Secure Communication over One-time Pads (2005) (0)
- TREES : Traceable , Revocation-Efficient , and Exculpable Signatures for Vehicular Ad-Hoc Networks (2015) (0)
- PEReDi (2022) (0)
- Permissionless Clock Synchronization with Public Setup (2022) (0)
- Electronic Voting (2010) (0)
- Generic Trace and Revoke Scheme (2012) (0)
- RLCPS Preface (2010) (0)
- How to Keep a Secret: Leakage Deterring Public-key Cryptography (2013) (0)
- Robust fingerprinting codes and applications (2009) (0)
- Proceedings of the 13th International Conference on Cryptology and Network Security - Volume 8813 (2014) (0)
- Edinburgh Research Explorer Updatable Blockchains (2020) (0)
- Theoretical Foundations of Practical Information Security (2009) (0)
- Generic Trace and Revoke Schemes from Fingerprinting Codes (2012) (0)
- The combinatorics of hidden diversity (2020) (0)
- Explorer Low-Level Attacks in BitcoinWallets (2017) (0)
- Securely outsourcing cookies to the cloud via private information retrieval (2016) (0)
- Explorer Proof-of-Burn (2020) (0)
- Leakage Resilient `-more Extractable Hash and Applications to Non-Malleable Cryptography (2022) (0)
- Explorer Blockchain Mining Games (2017) (0)
- SoK: A Stratified Approach to Blockchain Decentralization (2022) (0)
- Minotaur (2022) (0)
- Security and Cryptography for Networks (2014) (0)
- Reward Sharing for Mixnets (2022) (0)
- Resource-Restricted Cryptography: Honest-Majority MPC from a CRS (and No Broadcast) (2019) (0)
- Sound and Fine-grain Specification of Ideal Functionalities (2008) (0)
- Public-Key Cryptography – PKC 2020: 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4–7, 2020, Proceedings, Part II (2020) (0)
- Watermarking public-key cryptographic functionalities and implementations: The case of encryption and signatures (2021) (0)
- Randomness-optimal Steganography (2009) (0)
- CSE 364 Cryptography : Primitives and Protocols Lecture Notes (2005) (0)
- Trace and Revoke Schemes (2010) (0)
- Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's Post-Quantum Security (2020) (0)
- Cryptology and Network Security (2014) (0)
- Efficient and adaptively secure cryptographic primitives---designing for composability (2010) (0)
- Public-key traitor tracing from efficient decoding and unbounded enrollment: extended abstract (2008) (0)
- EVT/WOTE'09 Proceedings of the 2009 conference on Electronic voting technology/workshop on trustworthy elections (2009) (0)
- Proceedings of the 2004 ACM Workshop on Digital Rights Management 2004, Washington, DC, USA, October 25, 2004 (2004) (0)
- Tiered Mechanisms for Blockchain Transaction Fees (2023) (0)
- Developing digital contact tracing tailored to haulage in East Africa to support COVID-19 surveillance: a protocol (2022) (0)
- Leakage Resilient l-more Extractable Hash and Applications to Non-Malleable Cryptography (2022) (0)
- Structuring Security Proofs as Sequences of Games and IND-CCA 2 security (2005) (0)
- Filling the Tax Gap via Programmable Money (2021) (0)
- Babel Fees via Limited Liabilities (2021) (0)
- Decentralization Analysis of Pooling Behavior in Cardano Proof of Stake (2022) (0)
- Privacy Preserving Opinion Aggregation (2022) (0)
- Improvised Version: Fully Homomorphic Encryption (2017) (0)
- 6th International Conference on Electronic Voting: Verifying the Vote, EVOTE 2014, Lochau / Bregenz, Austria, October 29-31, 2014 (2014) (0)
- Watermarkable Public Key Encryption with Efficient Extraction Under Standard Assumptions (2022) (0)
- The 26th USENIX Security Symposium 2017 (2017) (0)
- Space Efficient Computational Multi-Secret Sharing and Its Applications (2018) (0)
- Encryption mechanisms for digital content distribution (2009) (0)
This paper list is powered by the following services:
Other Resources About Aggelos Kiayias
What Schools Are Affiliated With Aggelos Kiayias?
Aggelos Kiayias is affiliated with the following schools: