Christian Cachin
#152,535
Most Influential Person Now
Christian Cachin's AcademicInfluence.com Rankings
Christian Cachincomputer-science Degrees
Computer Science
#8127
World Rank
#8549
Historical Rank
Database
#5158
World Rank
#5358
Historical Rank

Download Badge
Computer Science
Christian Cachin's Degrees
- PhD Computer Science ETH Zurich
Similar Degrees You Can Earn
Why Is Christian Cachin Influential?
(Suggest an Edit or Addition)Christian Cachin's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Hyperledger fabric: a distributed operating system for permissioned blockchains (2018) (2609)
- An information-theoretic model for steganography (1998) (1057)
- Architecture of the Hyperledger Blockchain Fabric (2016) (852)
- Computationally Private Information Retrieval with Polylogarithmic Communication (1999) (659)
- Blockchain Consensus Protocols in the Wild (2017) (463)
- Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement Using Cryptography (2000) (427)
- Secure and Efficient Asynchronous Broadcast Protocols (2001) (362)
- Introduction to Reliable and Secure Distributed Programming (2011) (318)
- Efficient private bidding and auctions with an oblivious third party (1999) (309)
- Entropy measures and unconditional security in cryptography (1997) (294)
- Trusting the cloud (2009) (280)
- CheapBFT: resource-efficient byzantine fault tolerance (2012) (209)
- Asynchronous verifiable secret sharing and proactive cryptosystems (2002) (202)
- Unconditional Security Against Memory-Bounded Adversaries (1997) (184)
- Secure INtrusion-Tolerant Replication on the Internet (2002) (167)
- One-Round Secure Computation and Secure Autonomous Mobile Agents (2000) (151)
- XFT: Practical Fault Tolerance beyond Crashes (2015) (150)
- Cryptographic security for mobile code (2001) (146)
- Venus: verification for untrusted cloud storage (2010) (139)
- Linking information reconciliation and privacy amplification (1997) (122)
- Introduction to Reliable and Secure Distributed Programming (2. ed.) (2011) (121)
- Optimal Resilience for Erasure-Coded Byzantine Distributed Storage (2005) (120)
- Asynchronous verifiable information dispersal (2005) (118)
- Random oracles in constantipole: practical asynchronous Byzantine agreement using cryptography (extended abstract) (2000) (117)
- Oblivious transfer with a memory-bounded receiver (1998) (111)
- Optimistic Fair Secure Computation (2000) (102)
- Public-Key Steganography with Active Attacks (2005) (96)
- Intrusion-tolerant middleware: the road to automatic security (2006) (94)
- Resource-Efficient Byzantine Fault Tolerance (2016) (89)
- Blockchain and Trusted Computing: Problems, Pitfalls, and a Solution for Hyperledger Fabric (2018) (89)
- Conceptual Model and Architecture of MAFTIA (2003) (87)
- Parsimonious Asynchronous Byzantine-Fault-Tolerant Atomic Broadcast (2005) (78)
- Blockchain Consensus Protocols in the Wild (Keynote Talk) (2017) (77)
- PD recognition with knowledge-based preprocessing and neural networks (1995) (71)
- Non-determinism in Byzantine Fault-Tolerant Replication (2016) (70)
- Distributing trust on the Internet (2001) (70)
- Channels: Horizontal Scaling and Confidentiality on Permissioned Blockchains (2018) (68)
- Secure Key-Updating for Lazy Revocation (2006) (68)
- Pedagogical pattern selection strategies (1994) (67)
- On the Foundations of Oblivious Transfer (1998) (62)
- Robust data sharing with key-value stores (2011) (60)
- Secure and efficient asynchronous broadcast protocols : (Extended abstract) (2001) (59)
- Fail-Aware Untrusted Storage (2009) (57)
- A cloud you can trust (2011) (57)
- Efficient fork-linearizable access to untrusted shared memory (2007) (57)
- Smooth Entropy and Rényi Entropy (1997) (54)
- Policy-based secure deletion (2013) (54)
- Reliable broadcast in a computational hybrid model with Byzantine faults, crashes, and recoveries (2003) (53)
- Rollback and Forking Detection for Trusted Execution Environments Using Lightweight Collective Memory (2017) (52)
- On-Line Secret Sharing (1995) (49)
- Advances in cryptology - EUROCRYPT 2004 : International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004 : proceedings (2004) (46)
- Secure distributed DNS (2004) (43)
- Yet Another Visit to Paxos (2010) (38)
- A Secure Cryptographic Token Interface (2009) (37)
- MAFTIA (Malicious− and Accidental− Fault Tolerance for Internet Applications (2001) (35)
- Lazy revocation in cryptographic file systems (2005) (35)
- Cryptographic Security for a High-Performance Distributed File System (2007) (35)
- Proceedings of the 3rd ACM workshop on Cloud computing security workshop (2011) (34)
- A Comparison of Secure Multi-Tenancy Architectures for Filesystem Storage Clouds (2011) (30)
- Asynchronous group key exchange with failures (2004) (29)
- Asymmetric Distributed Trust (2019) (27)
- Design of an Intrusion-Tolerant Intrusion Detection System (2002) (27)
- Blockchains and Consensus Protocols: Snake Oil Warning (2017) (27)
- Storyboard: Optimistic Deterministic Multithreading (2010) (26)
- Trusted Computing Meets Blockchain: Rollback Attacks and a Solution for Hyperledger Fabric (2019) (23)
- State Machine Replication with Byzantine Faults (2010) (22)
- Integrity and Consistency for Untrusted Services - (Extended Abstract) (2011) (21)
- Proactive secure message transmission in asynchronous networks (2003) (21)
- Integrity Protection for Revision Control (2009) (21)
- Erasure-Coded Byzantine Storage with Separate Metadata (2014) (19)
- Fork sequential consistency is blocking (2008) (18)
- Threshold Signatures for Blockchain Systems (2017) (18)
- Design and Implementation of a Key-Lifecycle Management System (2010) (18)
- The Transaction Graph for Modeling Blockchain Semantics (2020) (18)
- Diffie-Hellman Key Exchange (2011) (17)
- First Specification of APIs and Protocols for the MAFTIA Middleware (2001) (16)
- Don't trust the cloud, verify: integrity and consistency for cloud object stores (2015) (16)
- Permissioned Blockchains and Hyperledger Fabric (2017) (15)
- Reference Model and Use Cases (2000) (15)
- Locating the Primary Attention Focus of the User (1993) (14)
- An asynchronous protocol for distributed computation of RSA inverses and its applications (2003) (13)
- Smoothing probability distributions and smooth entropy (1997) (13)
- Separating Data and Control: Asynchronous BFT Storage with 2t + 1 Data Replicas (2013) (13)
- Encrypting Keys Securely (2010) (13)
- On limitations of using cloud storage for data replication (2012) (13)
- Quick Order Fairness (2021) (12)
- ReSIST: Resilience for Survivability in IST (2007) (11)
- Conceptual Model and Architecture (2001) (11)
- Challenges for Combining Smart Contracts with Trusted Computing (2018) (10)
- Specification of Dependable Trusted Third Parties (2003) (10)
- Don’t Trust the Cloud, Verify (2017) (10)
- Service and Protocol Architecture for the MAFTIA Middleware (2001) (10)
- Security Analysis of Ripple Consensus (2020) (9)
- Verifying the Consistency of Remote Untrusted Services with Commutative Operations (2013) (9)
- MAFTIA Conceptual Model and Architecture (2001) (8)
- Modeling Complexity in Secure Distributed Computing (2003) (7)
- MAFTIA: Reference Model and Use Cases (2000) (7)
- From Symmetric to Asymmetric Asynchronous Byzantine Consensus (2020) (7)
- Blockchain - From the Anarchy of Cryptocurrencies to the Enterprise (Keynote Abstract) (2016) (7)
- Blockchain, Cryptography, and Consensus: Invited Presentation at the 10th Interaction and Concurrency Experience (2017) (7)
- Updatable Tokenization: Formal Definitions and Provably Secure Constructions (2017) (6)
- Anonymity Preserving Byzantine Vector Consensus (2019) (6)
- Chainlink Off-chain Reporting Protocol (2021) (5)
- Digital Steganography (2005) (5)
- Smoothing Probability Distributions andSmooth Entropy ( Extended Abstract ) (1996) (5)
- Optimistic Fair Secure Computation (Extended Abstract) (2000) (5)
- Information-Theoretic Interactive Hashing and Oblivious Transfer to a Storage-Bounded Receiver (2015) (5)
- TZ4Fabric: Executing Smart Contracts with ARM TrustZone : (Practical Experience Report) (2020) (4)
- Asymmetric Byzantine Consensus (2020) (4)
- Byzantine Fault Tolerant Vector Consensus with Anonymous Proposals (2019) (4)
- Asymmetric Asynchronous Byzantine Consensus (2021) (4)
- Perception, Cognition, Action (2006) (4)
- Fork-consistent constructions from registers (2011) (4)
- How to Trust Strangers: Composition of Byzantine Quorum Systems (2021) (4)
- Full Design of Dependable Third Party Services (2002) (4)
- TZ4Fabric: Executing Smart Contracts with ARM TrustZone (2020) (3)
- Verifying the consistency of remote untrusted services with conflict-free operations (2018) (3)
- Cloud , Trust , Privacy Trustworthy cloud computing whitepaper (3)
- Scalable Key Management for Distributed Cloud Storage (2018) (3)
- Linking Information Reconciliation and Privacy Amplification (Extended Abstract) (1994) (3)
- Intrusion-Tolerant Middleware: the MAFTIA approach (2004) (3)
- Stateful Multi-Client Verifiable Computation (2018) (3)
- Consensus Beyond Thresholds: Generalized Byzantine Quorums Made Live (2020) (2)
- On the Synchronization Power of Token Smart Contracts (2021) (2)
- Proceedings of the 34th international colloquium on Automata, Languages and Programming (2007) (2)
- Quorum Systems in Permissionless Network (2022) (2)
- Summary Report on Secure Computation Protocols (2008) (2)
- Decentralized Trust Management (2011) (2)
- Asynchronous Veri.able Information Dispersal (2005) (2)
- On Verifying the Consistency of Remote Untrusted Services (2013) (1)
- Modeling Resources in Permissionless Longest-chain Total-order Broadcast (2022) (1)
- Updating the IACR Publication Infrastructure by a Preprint Server (1999) (1)
- Fair transaction order in Hedera Hashgraph (2022) (1)
- Malicious- and Accidental-Fault Tolerance for Internet Applications Specification of Dependable Trusted Third Parties (2001) (1)
- Hashing a source with an unknown probability distribution (1998) (1)
- Integrity, Consistency, and Verification of Remote Computation (2014) (1)
- Secure Causal Atomic Broadcast Bachelor Thesis (2021) (1)
- Second Summary Report on Multiparty Protocols (2006) (1)
- Resilient Computing Curriculum (2009) (1)
- The Parsimonious Approach to Constructing Fault-Tolerant Protocols (2006) (1)
- Generalizing weighted trees: a bridge from Bitcoin to GHOST (2021) (1)
- Security and Fault-tolerance in Distributed Systems ETHZ , Winter 2006 / 07 (1)
- Brief Announcement: Revisiting Signature-Free Asynchronous Byzantine Consensus (2021) (1)
- Principles of untrusted storage: a new look at consistency conditions (2008) (1)
- Security and Fault-tolerance in Distributed Systems ETHZ , Spring 2012 (2012) (1)
- Resilient Computing Curriculum Draft -- ReSIST NoE Deliverable D16 (2007) (0)
- Preface (2009) (0)
- When Output meets Input.. (2006) (0)
- Session details: Regular papers (2010) (0)
- A method for dividing a secret testable in potentially asynchronous networks (2002) (0)
- Rational Protocols (2009) (0)
- Session details: HotDep 2013: The 9th workshop on hot topics in dependable systems (2014) (0)
- Dagstuhl Seminar 06371 “ From Security to Dependability ” (2006) (0)
- Distributed Cryptography 5 . 1 Motivation (0)
- Building Dependable Trusted Services (2003) (0)
- The Library of Distributed Protocols (2021) (0)
- Front Matter, Table of Contents, Preface, Committees, List of Authors (2015) (0)
- Strict Access Control in a Key-Management Server (2009) (0)
- Proceedings of the 9th Workshop on Hot Topics in Dependable Systems (2013) (0)
- Automata, Languages and Programming, 34th International Colloquium, ICALP 2007, Wroclaw, Poland, July 9-13, 2007, Proceedings (2007) (0)
- Distributing Trust on the Internet — Position Paper for S.O.S. Workshop 2004 — (2004) (0)
- Security against memory-bounded adversaries (1999) (0)
- Categoral views on computations on trees ( Extended abstract ) (2007) (0)
- Quorum Systems in Permissionless Networks (2022) (0)
- From Security to Dependability, 10.09. - 15.09.2006 (2007) (0)
- 19th International Conference on Principles of Distributed Systems, OPODIS 2015, December 14-17, 2015, Rennes, France (2016) (0)
- On commutativity based edge lean search (2007) (0)
- Session details: Brief announcements (2010) (0)
- A concurrent DEX on Cardano How to write scalable apps on a UTXO blockchain Bachelor Thesis (2022) (0)
- 06371 Abstracts Collection -- From Security to Dependability (2006) (0)
- Implementation of a Threshold Post-Quantum Signature Scheme Master Thesis (2022) (0)
- 1 Introduction Digital Steganography ∗ (2005) (0)
- Brief Announcement: Asymmetric Distributed Trust (2019) (0)
- When is Spring coming? A Security Analysis of Avalanche Consensus (2022) (0)
- Byzantine faults (2019) (0)
- Mailicious- and Accidental- Fault Tolerance for Internet Applications (MAFTIA) : Reference Model and Use Cases (2000) (0)
- Summary Report on Unconditionally Secure Protocols (2006) (0)
- Malicious- and Accidental-Fault Tolerance for Internet Applications Full design of Dependable Third Party Services (2002) (0)
- Smooth Entropy and R h y i Entropy (2002) (0)
- 06371 Abstracts Collection From Security to Dependability Dagstuhl Seminar (2007) (0)
- 06371 Executive Summary -- From Security to Dependability (2006) (0)
- Single-domain cloud Cloud computing layer Focal goals Scalability High availability Dependability Confidentiality Integrity Reliability Consistency (2010) (0)
- PoET: an eco-friendly alternative to PoW (2021) (0)
- Do Not Trust in Numbers: Practical Distributed Cryptography With General Trust (2022) (0)
- Session details: Session 8A -- Secure Outsourced Computations (2014) (0)
- DSKE: Digital Signature with Key Extraction (2022) (0)
- 2021 Principles of Distributed Computing Doctoral Dissertation Award (2021) (0)
- Announcement : Robust Data Sharing with Key-Value Stores (2011) (0)
- Workshop Report: HotDep 2013 - The 9th workshop on hot topics in dependable systems (2014) (0)
- Resilient Computing Courseware (2009) (0)
- Hashing a Source With an Unknown ProbabilityDistributionChristian (1998) (0)
- Proceedings of the 34th international conference on Automata, Languages and Programming (2007) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Christian Cachin?
Christian Cachin is affiliated with the following schools: