default search action
20th Financial Cryptography 2016: Christ Church, Barbados - Workshops
- Jeremy Clark, Sarah Meiklejohn, Peter Y. A. Ryan, Dan S. Wallach, Michael Brenner, Kurt Rohloff:
Financial Cryptography and Data Security - FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers. Lecture Notes in Computer Science 9604, Springer 2016, ISBN 978-3-662-53356-7
Third Workshop on Bitcoin and Blockchain Research, BITCOIN 2016
- Khaled Baqer, Danny Yuxing Huang, Damon McCoy, Nicholas Weaver:
Stressing Out: Bitcoin "Stress Testing". 3-18 - Joseph Bonneau:
Why Buy When You Can Rent? - Bribery Attacks on Bitcoin-Style Consensus. 19-26 - Mathieu Turuani, Thomas Voegtlin, Michaël Rusinowitch:
Automated Verification of Electrum Wallet. 27-42 - Ethan Heilman, Foteini Baldimtsi, Sharon Goldberg:
Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain Bitcoin Transactions. 43-60 - Aggelos Kiayias, Nikolaos Lamprou, Aikaterini-Panagiota Stouka:
Proofs of Proofs of Work with Sublinear Complexity. 61-78 - Kevin Delmolino, Mitchell Arnett, Ahmed E. Kosba, Andrew Miller, Elaine Shi:
Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab. 79-94 - Joseph Bonneau:
EthIKS: Using Ethereum to Audit a CONIKS Key Transparency Log. 95-105 - Kyle Croman, Christian Decker, Ittay Eyal, Adem Efe Gencer, Ari Juels, Ahmed E. Kosba, Andrew Miller, Prateek Saxena, Elaine Shi, Emin Gün Sirer, Dawn Song, Roger Wattenhofer:
On Scaling Decentralized Blockchains - (A Position Paper). 106-125 - Malte Möser, Ittay Eyal, Emin Gün Sirer:
Bitcoin Covenants. 126-141 - Iddo Bentov, Ariel Gabizon, Alex Mizrahi:
Cryptocurrencies Without Proof of Work. 142-157
First Workshop on Secure Voting Systems, VOTING 2016
- Philipp Locher, Rolf Haenni, Reto E. Koenig:
Coercion-Resistant Internet Voting with Everlasting Privacy. 161-175 - Peter Y. A. Ryan, Peter B. Rønne, Vincenzo Iovino:
Selene: Voting with Transparent Verifiability and Coercion-Mitigation. 176-192 - Rosario Giustolisi, Vincenzo Iovino, Peter B. Rønne:
On the Possibility of Non-interactive E-Voting in the Public-Key Setting. 193-208 - Oksana Kulyk, Melanie Volkamer:
Efficiency Comparison of Various Approaches in E-Voting Protocols. 209-223 - Roberto Araújo, Amira Barki, Solenn Brunet, Jacques Traoré:
Remote Electronic Voting Can Be Efficient, Verifiable and Coercion-Resistant. 224-232 - Alex Escala, Sandra Guasch, Javier Herranz, Paz Morillo:
Universal Cast-as-Intended Verifiability. 233-250
4th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, WAHC 2016
- Gamze Tillem, Ömer Mert Candan, Erkay Savas, Kamer Kaya:
Hiding Access Patterns in Range Queries Using Private Information Retrieval and ORAM. 253-270 - Liisi Kerik, Peeter Laud, Jaak Randmets:
Optimizing MPC for Robust and Scalable Integer and Floating-Point Arithmetic. 271-287 - Yarkin Doröz, Gizem S. Çetin, Berk Sunar:
On-the-fly Homomorphic Batching/Unbatching. 288-301 - Debayan Gupta, Benjamin Mood, Joan Feigenbaum, Kevin R. B. Butler, Patrick Traynor:
Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation. 302-318 - Mamadou H. Diallo, Michael August, Roger Hallman, Megan Kline, Henry Au, Vic Beach:
CallForFire: A Mission-Critical Cloud-Based Application Built Using the Nomad Framework. 319-327 - Erman Ayday:
Cryptographic Solutions for Genomic Privacy. 328-341
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.