default search action
Vassilis Zikas
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Christian Badertscher, Ueli Maurer, Daniel Tschudi, Vassilis Zikas:
Bitcoin as a Transaction Ledger: A Composable Treatment. J. Cryptol. 37(2): 18 (2024) - [c52]Christian Badertscher, Peter Gazi, Aggelos Kiayias, Alexander Russell, Vassilis Zikas:
Consensus Redux: Distributed Ledgers in the Face of Adversarial Supremacy. CSF 2024: 143-158 - [c51]Yun Lu, Malik Magdon-Ismail, Yu Wei, Vassilis Zikas:
Eureka: A General Framework for Black-box Differential Privacy Estimators. SP 2024: 913-931 - [c50]Timothé Albouy, Davide Frey, Ran Gelles, Carmit Hazay, Michel Raynal, Elad Michael Schiller, François Taïani, Vassilis Zikas:
Brief Announcement: Towards Optimal Communication Byzantine Reliable Broadcast Under a Message Adversary. DISC 2024: 41:1-41:7 - [i57]Konstantinos Brazitikos, Vassilis Zikas:
General Adversary Structures in Byzantine Agreement and Multi-Party Computation with Active and Omission Corruption. IACR Cryptol. ePrint Arch. 2024: 209 (2024) - [i56]Jaspal Singh, Yu Wei, Vassilis Zikas:
Information-theoretic Multi-server Private Information Retrieval with Client Preprocessing. IACR Cryptol. ePrint Arch. 2024: 780 (2024) - [i55]Xiangyu Liu, Tzannetos Ioannis, Vassilis Zikas:
Adaptor Signatures: New Security Definition and A Generic Construction for NP Relations. IACR Cryptol. ePrint Arch. 2024: 1051 (2024) - [i54]Nishanth Chandran, Juan A. Garay, Ankit Kumar Misra, Rafail Ostrovsky, Vassilis Zikas:
Adaptive Security, Erasures, and Network Assumptions in Communication-Local MPC. IACR Cryptol. ePrint Arch. 2024: 1489 (2024) - [i53]Michele Ciampi, Xiangyu Liu, Ioannis Tzannetos, Vassilis Zikas:
Universal Adaptor Signatures from Blackbox Multi-Party Computation. IACR Cryptol. ePrint Arch. 2024: 1773 (2024) - 2023
- [j4]John Andrews, Michele Ciampi, Vassilis Zikas:
Etherless Ethereum tokens: Simulating native tokens in Ethereum. J. Comput. Syst. Sci. 135: 55-72 (2023) - [c49]Benjamin Levy, Muhammad Ishaq, Benjamin Sherman, Lindsey Kennard, Ana L. Milanova, Vassilis Zikas:
COMBINE: COMpilation and Backend-INdependent vEctorization for Multi-Party Computation. CCS 2023: 2531-2545 - [c48]Ran Cohen, Juan A. Garay, Vassilis Zikas:
Completeness Theorems for Adaptively Secure Broadcast. CRYPTO (1) 2023: 3-38 - [c47]Ran Cohen, Pouyan Forghani, Juan A. Garay, Rutvik Patel, Vassilis Zikas:
Concurrent Asynchronous Byzantine Agreement in Expected-Constant Rounds, Revisited. TCC (4) 2023: 422-451 - [i52]Eli Gafni, Vasileios Zikas:
Synchrony/Asynchrony vs. Stationary/Mobile? The Latter is Superior...in Theory. CoRR abs/2302.05520 (2023) - [i51]Yun Lu, Malik Magdon-Ismail, Yu Wei, Vassilis Zikas:
Privacy-Utility Tradeoff of OLS with Random Projections. CoRR abs/2309.01243 (2023) - [i50]Ran Cohen, Pouyan Forghani, Juan A. Garay, Rutvik Patel, Vassilis Zikas:
Concurrent Asynchronous Byzantine Agreement in Expected-Constant Rounds, Revisited. CoRR abs/2312.14506 (2023) - [i49]Timothé Albouy, Davide Frey, Ran Gelles, Carmit Hazay, Michel Raynal, Elad Michael Schiller, François Taïani, Vassilis Zikas:
Towards Optimal Communication Byzantine Reliable Broadcast under a Message Adversary. CoRR abs/2312.16253 (2023) - [i48]Benjamin Levy, Benjamin Sherman, Muhammad Ishaq, Lindsey Kennard, Ana L. Milanova, Vassilis Zikas:
Compilation and Backend-Independent Vectorization for Multi-Party Computation. IACR Cryptol. ePrint Arch. 2023: 89 (2023) - [i47]Ran Cohen, Pouyan Forghani, Juan A. Garay, Rutvik Patel, Vassilis Zikas:
Concurrent Asynchronous Byzantine Agreement in Expected-Constant Rounds, Revisited. IACR Cryptol. ePrint Arch. 2023: 1003 (2023) - [i46]Wonseok Choi, Minki Hhan, Yu Wei, Vassilis Zikas:
Fine-Tuning Ideal Worlds for the Xor of Two Permutation Outputs. IACR Cryptol. ePrint Arch. 2023: 1704 (2023) - [i45]Wonseok Choi, Xiangyu Liu, Vassilis Zikas:
Blockchain Governance via Sharp Anonymous Multisignatures. IACR Cryptol. ePrint Arch. 2023: 1881 (2023) - 2022
- [c46]Nishanth Chandran, Pouyan Forghani, Juan A. Garay, Rafail Ostrovsky, Rutvik Patel, Vassilis Zikas:
Universally Composable Almost-Everywhere Secure Computation. ITC 2022: 14:1-14:25 - [c45]John Andrews, Michele Ciampi, Vassilis Zikas:
Etherless Ethereum Tokens: Simulating Native Tokens in Ethereum. CSCML 2022: 388-407 - [c44]Michele Ciampi, Muhammad Ishaq, Malik Magdon-Ismail, Rafail Ostrovsky, Vassilis Zikas:
FairMM: A Fast and Frontrunning-Resistant Crypto Market-Maker. CSCML 2022: 428-446 - [c43]Michele Ciampi, Yun Lu, Vassilis Zikas:
Collusion-Preserving Computation without a Mediator. CSF 2022: 211-226 - [c42]Michele Ciampi, Rafail Ostrovsky, Hendrik Waldner, Vassilis Zikas:
Round-Optimal and Communication-Efficient Multiparty Computation. EUROCRYPT (1) 2022: 65-95 - [i44]Yun Lu, Yu Wei, Malik Magdon-Ismail, Vassilis Zikas:
Eureka: A General Framework for Black-box Differential Privacy Estimators. IACR Cryptol. ePrint Arch. 2022: 1250 (2022) - 2021
- [j3]Ran Cohen, Sandro Coretti, Juan A. Garay, Vassilis Zikas:
Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols. J. Cryptol. 34(2): 12 (2021) - [c41]Christian Badertscher, Yun Lu, Vassilis Zikas:
A Rational Protocol Treatment of 51% Attacks. CRYPTO (3) 2021: 3-32 - [c40]Christian Badertscher, Peter Gazi, Aggelos Kiayias, Alexander Russell, Vassilis Zikas:
Dynamic Ad Hoc Clock Synchronization. EUROCRYPT (3) 2021: 399-428 - [c39]Christian Badertscher, Julia Hesse, Vassilis Zikas:
On the (Ir)Replaceability of Global Setups, or How (Not) to Use a Global Ledger. TCC (2) 2021: 626-657 - [i43]Ao Liu, Yun Lu, Lirong Xia, Vassilis Zikas:
How Private Are Commonly-Used Voting Rules? IACR Cryptol. ePrint Arch. 2021: 392 (2021) - [i42]Michele Ciampi, Muhammad Ishaq, Malik Magdon-Ismail, Rafail Ostrovsky, Vassilis Zikas:
FairMM: A Fast and Frontrunning-Resistant Crypto Market-Maker. IACR Cryptol. ePrint Arch. 2021: 609 (2021) - [i41]John Andrews, Michele Ciampi, Vassilis Zikas:
Etherless Ethereum Tokens: Simulating Native Tokens in Ethereum. IACR Cryptol. ePrint Arch. 2021: 766 (2021) - [i40]Ran Cohen, Juan A. Garay, Vassilis Zikas:
Adaptively Secure Broadcast in Resource-Restricted Cryptography. IACR Cryptol. ePrint Arch. 2021: 775 (2021) - [i39]Christian Badertscher, Yun Lu, Vassilis Zikas:
A Rational Protocol Treatment of 51% Attacks. IACR Cryptol. ePrint Arch. 2021: 897 (2021) - [i38]Nishanth Chandran, Pouyan Forghani, Juan A. Garay, Rafail Ostrovsky, Rutvik Patel, Vassilis Zikas:
Universally Composable Almost-Everywhere Secure Computation. IACR Cryptol. ePrint Arch. 2021: 1398 (2021) - 2020
- [c38]Aydin Abadi, Michele Ciampi, Aggelos Kiayias, Vassilis Zikas:
Timed Signatures and Zero-Knowledge Proofs - Timestamping in the Blockchain Era -. ACNS (1) 2020: 335-354 - [c37]Juan A. Garay, Aggelos Kiayias, Rafail M. Ostrovsky, Giorgos Panagiotakos, Vassilis Zikas:
Resource-Restricted Cryptography: Revisiting MPC Bounds in the Proof-of-Work Era. EUROCRYPT (2) 2020: 129-158 - [c36]Ran Cohen, Juan A. Garay, Vassilis Zikas:
Broadcast-Optimal Two-Round MPC. EUROCRYPT (2) 2020: 828-858 - [c35]Leonard Kleinrock, Rafail Ostrovsky, Vassilis Zikas:
Proof-of-Reputation Blockchain with Nakamoto Fallback. INDOCRYPT 2020: 16-38 - [c34]Christian Badertscher, Ran Canetti, Julia Hesse, Björn Tackmann, Vassilis Zikas:
Universal Composition with Global Subroutines: Capturing Global Setup Within Plain UC. TCC (3) 2020: 1-30 - [c33]Ao Liu, Yun Lu, Lirong Xia, Vassilis Zikas:
How Private Are Commonly-Used Voting Rules? UAI 2020: 629-638 - [e3]Aggelos Kiayias, Markulf Kohlweiss, Petros Wallden, Vassilis Zikas:
Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part I. Lecture Notes in Computer Science 12110, Springer 2020, ISBN 978-3-030-45373-2 [contents] - [e2]Aggelos Kiayias, Markulf Kohlweiss, Petros Wallden, Vassilis Zikas:
Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part II. Lecture Notes in Computer Science 12111, Springer 2020, ISBN 978-3-030-45387-9 [contents] - [i37]Leonard Kleinrock, Rafail Ostrovsky, Vassilis Zikas:
A PoR/PoS-Hybrid Blockchain: Proof of Reputation with Nakamoto Fallback. IACR Cryptol. ePrint Arch. 2020: 381 (2020) - [i36]Michele Ciampi, Yun Lu, Vassilis Zikas:
Collusion-Preserving Computation without a Mediator. IACR Cryptol. ePrint Arch. 2020: 497 (2020) - [i35]Christian Badertscher, Peter Gazi, Aggelos Kiayias, Alexander Russell, Vassilis Zikas:
Consensus Redux: Distributed Ledgers in the Face of Adversarial Supremacy. IACR Cryptol. ePrint Arch. 2020: 1021 (2020) - [i34]Christian Badertscher, Ran Canetti, Julia Hesse, Björn Tackmann, Vassilis Zikas:
Universal Composition with Global Subroutines: Capturing Global Setup within plain UC. IACR Cryptol. ePrint Arch. 2020: 1209 (2020) - [i33]Michele Ciampi, Rafail Ostrovsky, Hendrik Waldner, Vassilis Zikas:
Round-Optimal and Communication-Efficient Multiparty Computation. IACR Cryptol. ePrint Arch. 2020: 1437 (2020) - [i32]Christian Badertscher, Julia Hesse, Vassilis Zikas:
On the (Ir)Replaceability of Global Setups, or How (Not) to Use a Global Ledger. IACR Cryptol. ePrint Arch. 2020: 1489 (2020)
2010 – 2019
- 2019
- [j2]Kai-Min Chung, Marios Georgiou, Ching-Yi Lai, Vassilis Zikas:
Cryptography with Disposable Backdoors. Cryptogr. 3(3): 22 (2019) - [j1]Ran Cohen, Sandro Coretti, Juan A. Garay, Vassilis Zikas:
Probabilistic Termination and Composability of Cryptographic Protocols. J. Cryptol. 32(3): 690-741 (2019) - [c32]Muhammad Ishaq, Ana L. Milanova, Vassilis Zikas:
Efficient MPC via Program Analysis: A Framework for Efficient Optimal Mixing. CCS 2019: 1539-1556 - [c31]Maksim Tsikhanovich, Malik Magdon-Ismail, Muhammad Ishaq, Vassilis Zikas:
PD-ML-Lite: Private Distributed Machine Learning from Lightweight Cryptography. ISC 2019: 149-167 - [c30]Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss, Vassilis Zikas:
Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake. IEEE Symposium on Security and Privacy 2019: 157-174 - [i31]Maksim Tsikhanovich, Malik Magdon-Ismail, Muhammad Ishaq, Vassilis Zikas:
PD-ML-Lite: Private Distributed Machine Learning from Lighweight Cryptography. CoRR abs/1901.07986 (2019) - [i30]Aydin Abadi, Michele Ciampi, Aggelos Kiayias, Vassilis Zikas:
Timed Signatures and Zero-Knowledge Proofs -Timestamping in the Blockchain Era-. IACR Cryptol. ePrint Arch. 2019: 644 (2019) - [i29]Muhammad Ishaq, Ana L. Milanova, Vassilis Zikas:
Efficient MPC via Program Analysis: A Framework for Efficient Optimal Mixing. IACR Cryptol. ePrint Arch. 2019: 651 (2019) - [i28]Christian Badertscher, Peter Gazi, Aggelos Kiayias, Alexander Russell, Vassilis Zikas:
Ouroboros Chronos: Permissionless Clock Synchronization via Proof-of-Stake. IACR Cryptol. ePrint Arch. 2019: 838 (2019) - [i27]Ran Cohen, Juan A. Garay, Vassilis Zikas:
Broadcast-Optimal Two-Round MPC. IACR Cryptol. ePrint Arch. 2019: 1183 (2019) - [i26]Juan A. Garay, Aggelos Kiayias, Rafail Ostrovsky, Giorgos Panagiotakos, Vassilis Zikas:
Resource-Restricted Cryptography: Honest-Majority MPC from a CRS (and No Broadcast). IACR Cryptol. ePrint Arch. 2019: 1264 (2019) - 2018
- [c29]Christian Badertscher, Peter Gazi, Aggelos Kiayias, Alexander Russell, Vassilis Zikas:
Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability. CCS 2018: 913-930 - [c28]Yun Lu, Konstantinos Mitropoulos, Rafail Ostrovsky, Avraham Weinstock, Vassilis Zikas:
Cryptographically Secure Detection of Injection Attacks. CCS 2018: 2240-2242 - [c27]Christian Badertscher, Juan A. Garay, Ueli Maurer, Daniel Tschudi, Vassilis Zikas:
But Why Does It Work? A Rational Protocol Design Treatment of Bitcoin. EUROCRYPT (2) 2018: 34-65 - [c26]Ran Gelles, Anat Paskin-Cherniavsky, Vassilis Zikas:
Secure Two-Party Computation over Unreliable Channels. SCN 2018: 445-463 - [i25]Ao Liu, Yun Lu, Lirong Xia, Vassilis Zikas:
How Private Is Your Voting? A Framework for Comparing the Privacy of Voting Mechanisms. CoRR abs/1805.05750 (2018) - [i24]Christian Badertscher, Juan A. Garay, Ueli Maurer, Daniel Tschudi, Vassilis Zikas:
But Why does it Work? A Rational Protocol Design Treatment of Bitcoin. IACR Cryptol. ePrint Arch. 2018: 138 (2018) - [i23]Kai-Min Chung, Marios Georgiou, Ching-Yi Lai, Vassilis Zikas:
Cryptography with Dispensable Backdoors. IACR Cryptol. ePrint Arch. 2018: 352 (2018) - [i22]Christian Badertscher, Peter Gazi, Aggelos Kiayias, Alexander Russell, Vassilis Zikas:
Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability. IACR Cryptol. ePrint Arch. 2018: 378 (2018) - [i21]Ran Gelles, Anat Paskin-Cherniavsky, Vassilis Zikas:
Secure Two-Party Computation over Unreliable Channels. IACR Cryptol. ePrint Arch. 2018: 506 (2018) - [i20]Thomas Kerber, Markulf Kohlweiss, Aggelos Kiayias, Vassilis Zikas:
Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake. IACR Cryptol. ePrint Arch. 2018: 1132 (2018) - 2017
- [c25]Christian Badertscher, Ueli Maurer, Daniel Tschudi, Vassilis Zikas:
Bitcoin as a Transaction Ledger: A Composable Treatment. CRYPTO (1) 2017: 324-356 - [c24]Juan A. Garay, Yuval Ishai, Rafail Ostrovsky, Vassilis Zikas:
The Price of Low Communication in Secure Multi-party Computation. CRYPTO (1) 2017: 420-446 - [c23]Ran Cohen, Sandro Coretti, Juan A. Garay, Vassilis Zikas:
Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols. ICALP 2017: 37:1-37:15 - [i19]Christian Badertscher, Ueli Maurer, Daniel Tschudi, Vassilis Zikas:
Bitcoin as a Transaction Ledger: A Composable Treatment. IACR Cryptol. ePrint Arch. 2017: 149 (2017) - [i18]Ran Cohen, Sandro Coretti, Juan A. Garay, Vassilis Zikas:
Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols. IACR Cryptol. ePrint Arch. 2017: 364 (2017) - [i17]Juan A. Garay, Yuval Ishai, Rafail Ostrovsky, Vassilis Zikas:
The Price of Low Communication in Secure Multi-Party Computation. IACR Cryptol. ePrint Arch. 2017: 520 (2017) - 2016
- [c22]Sandro Coretti, Juan A. Garay, Martin Hirt, Vassilis Zikas:
Constant-Round Asynchronous Multi-Party Computation Based on One-Way Functions. ASIACRYPT (2) 2016: 998-1021 - [c21]Ran Cohen, Sandro Coretti, Juan A. Garay, Vassilis Zikas:
Probabilistic Termination and Composability of Cryptographic Protocols. CRYPTO (3) 2016: 240-269 - [c20]Martin Hirt, Ueli Maurer, Daniel Tschudi, Vassilis Zikas:
Network-Hiding Communication and Applications to Multi-party Protocols. CRYPTO (2) 2016: 335-365 - [c19]Aggelos Kiayias, Hong-Sheng Zhou, Vassilis Zikas:
Fair and Robust Multi-party Computation Using a Global Transaction Ledger. EUROCRYPT (2) 2016: 705-734 - [c18]Richard J. Lipton, Rafail Ostrovsky, Vassilis Zikas:
Provably Secure Virus Detection: Using The Observer Effect Against Malware. ICALP 2016: 32:1-32:14 - [e1]Vassilis Zikas, Roberto De Prisco:
Security and Cryptography for Networks - 10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings. Lecture Notes in Computer Science 9841, Springer 2016, ISBN 978-3-319-44617-2 [contents] - [i16]Sandro Coretti, Juan A. Garay, Martin Hirt, Vassilis Zikas:
Constant-Round Asynchronous Multi-Party Computation. IACR Cryptol. ePrint Arch. 2016: 208 (2016) - [i15]Ran Cohen, Sandro Coretti, Juan A. Garay, Vassilis Zikas:
Probabilistic Termination and Composability of Cryptographic Protocols. IACR Cryptol. ePrint Arch. 2016: 350 (2016) - [i14]Martin Hirt, Ueli Maurer, Daniel Tschudi, Vassilis Zikas:
Network-Hiding Communication and Applications to Multi-Party Protocols. IACR Cryptol. ePrint Arch. 2016: 556 (2016) - 2015
- [c17]Joël Alwen, Rafail Ostrovsky, Hong-Sheng Zhou, Vassilis Zikas:
Incoercible Multi-party Computation and Universally Composable Receipt-Free Voting. CRYPTO (2) 2015: 763-780 - [c16]Nishanth Chandran, Wutichai Chongchitmate, Juan A. Garay, Shafi Goldwasser, Rafail Ostrovsky, Vassilis Zikas:
The Hidden Graph Model: Communication Locality and Optimal Resiliency with Adaptive Faults. ITCS 2015: 153-162 - [c15]Juan A. Garay, Jonathan Katz, Björn Tackmann, Vassilis Zikas:
How Fair is Your Protocol?: A Utility-based Approach to Protocol Optimality. PODC 2015: 281-290 - [c14]Juan A. Garay, Björn Tackmann, Vassilis Zikas:
Fair Distributed Computation of Reactive Functions. DISC 2015: 497-512 - [i13]Juan A. Garay, Jonathan Katz, Björn Tackmann, Vassilis Zikas:
How Fair is Your Protocol? A Utility-based Approach to Protocol Optimality. IACR Cryptol. ePrint Arch. 2015: 187 (2015) - [i12]Yuval Ishai, Rafail Ostrovsky, Vassilis Zikas:
Secure Multi-Party Computation with Identifiable Abort. IACR Cryptol. ePrint Arch. 2015: 325 (2015) - [i11]Serge Fehr, Jonathan Katz, Fang Song, Hong-Sheng Zhou, Vassilis Zikas:
Feasibility and Completeness of Cryptographic Tasks in the Quantum World. IACR Cryptol. ePrint Arch. 2015: 385 (2015) - [i10]Aggelos Kiayias, Hong-Sheng Zhou, Vassilis Zikas:
Fair and Robust Multi-Party Computation using a Global Transaction Ledger. IACR Cryptol. ePrint Arch. 2015: 574 (2015) - [i9]Richard J. Lipton, Rafail Ostrovsky, Vassilis Zikas:
Provable Virus Detection: Using the Uncertainty Principle to Protect Against Malware. IACR Cryptol. ePrint Arch. 2015: 728 (2015) - [i8]Juan A. Garay, Björn Tackmann, Vassilis Zikas:
Fair Distributed Computation of Reactive Functions. IACR Cryptol. ePrint Arch. 2015: 807 (2015) - 2014
- [c13]Yuval Ishai, Rafail Ostrovsky, Vassilis Zikas:
Secure Multi-Party Computation with Identifiable Abort. CRYPTO (2) 2014: 369-386 - [c12]Seung Geol Choi, Jonathan Katz, Alex J. Malozemoff, Vassilis Zikas:
Efficient Three-Party Computation from Cut-and-Choose. CRYPTO (2) 2014: 513-530 - [c11]Jonathan Katz, Aggelos Kiayias, Hong-Sheng Zhou, Vassilis Zikas:
Distributing the setup in universally composable multi-party computation. PODC 2014: 20-29 - [i7]Seung Geol Choi, Jonathan Katz, Alex J. Malozemoff, Vassilis Zikas:
Efficient Three-Party Computation from Cut-and-Choose. IACR Cryptol. ePrint Arch. 2014: 128 (2014) - [i6]Nishanth Chandran, Wutichai Chongchitmate, Juan A. Garay, Shafi Goldwasser, Rafail Ostrovsky, Vassilis Zikas:
Optimally Resilient and Adaptively Secure Multi-Party Computation with Low Communication Locality. IACR Cryptol. ePrint Arch. 2014: 615 (2014) - 2013
- [c10]Juan A. Garay, Jonathan Katz, Ueli Maurer, Björn Tackmann, Vassilis Zikas:
Rational Protocol Design: Cryptography against Incentive-Driven Adversaries. FOCS 2013: 648-657 - [c9]Serge Fehr, Jonathan Katz, Fang Song, Hong-Sheng Zhou, Vassilis Zikas:
Feasibility and Completeness of Cryptographic Tasks in the Quantum World. TCC 2013: 281-296 - [c8]Jonathan Katz, Ueli Maurer, Björn Tackmann, Vassilis Zikas:
Universally Composable Synchronous Computation. TCC 2013: 477-498 - [p1]Ueli Maurer, Vassilis Zikas:
Information-Theoretic Secure Multiparty Computation. Secure Multi-Party Computation 2013: 168-200 - [i5]Juan A. Garay, Jonathan Katz, Ueli Maurer, Björn Tackmann, Vassilis Zikas:
Rational Protocol Design: Cryptography Against Incentive-driven Adversaries. IACR Cryptol. ePrint Arch. 2013: 496 (2013) - 2012
- [c7]Joël Alwen, Jonathan Katz, Ueli Maurer, Vassilis Zikas:
Collusion-Preserving Computation. CRYPTO 2012: 124-143 - [c6]Adam Groce, Jonathan Katz, Aishwarya Thiruvengadam, Vassilis Zikas:
Byzantine Agreement with a Rational Adversary. ICALP (2) 2012: 561-572 - 2011
- [c5]Martin Hirt, Vassilis Zikas:
Player-Centric Byzantine Agreement. ICALP (1) 2011: 281-292 - [i4]Jonathan Katz, Ueli Maurer, Björn Tackmann, Vassilis Zikas:
Universally Composable Synchronous Computation. IACR Cryptol. ePrint Arch. 2011: 310 (2011) - [i3]Joël Alwen, Jonathan Katz, Ueli Maurer, Vassilis Zikas:
Collusion-Preserving Computation. IACR Cryptol. ePrint Arch. 2011: 433 (2011) - 2010
- [b1]Vassilis Zikas:
Generalized corruption models in secure multi-party computation. ETH Zurich, 2010, ISBN 978-3-86628-338-1, pp. 1-180 - [c4]Martin Hirt, Vassilis Zikas:
Adaptively Secure Broadcast. EUROCRYPT 2010: 466-485
2000 – 2009
- 2009
- [c3]Vassilis Zikas, Sarah Hauser, Ueli M. Maurer:
Realistic Failures in Secure Multi-party Computation. TCC 2009: 274-293 - [i2]Martin Hirt, Vassilis Zikas:
Adaptively Secure Broadcast. IACR Cryptol. ePrint Arch. 2009: 230 (2009) - 2008
- [c2]Martin Hirt, Ueli M. Maurer, Vassilis Zikas:
MPC vs. SFE : Unconditional and Computational Security. ASIACRYPT 2008: 1-18 - [c1]Zuzana Beerliová-Trubíniová, Matthias Fitzi, Martin Hirt, Ueli M. Maurer, Vassilis Zikas:
MPC vs. SFE: Perfect Security in a Unified Corruption Model. TCC 2008: 231-250 - 2007
- [i1]Zuzana Beerliová-Trubíniová, Matthias Fitzi, Martin Hirt, Ueli Maurer, Vassilis Zikas:
MPC vs. SFE: Perfect Security in a Unified Corruption Model. IACR Cryptol. ePrint Arch. 2007: 78 (2007)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 21:57 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint