Timelocked Bribing
|
2021 |
Nadahalli, Tejaswi |
Improving the Efficiency of AES Protocols in Multi-Party Computation
|
2021 |
Durak, F. Betül |
The Complex Shape of Anonymity in Cryptocurrencies: Case Studies from a Systematic Approach
|
2021 |
Amarasinghe, Niluka |
Rabbit: Efficient Comparison for Secure Multi-Party Computation
|
2021 |
Makri, Eleftheria |
Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Multiparty Computation
|
2021 |
Eriguchi, Reo |
Speculative Dereferencing: Reviving Foreshadow
|
2021 |
Schwarzl, Martin |
SoK: Securing Email—A Stakeholder-Based Analysis
|
2021 |
Clark, Jeremy |
Generic Plaintext Equality and Inequality Proofs
|
2021 |
Blazy, Olivier |
BooLigero: Improved Sublinear Zero Knowledge Proofs for Boolean Circuits
|
2021 |
Gvili, Yaron |
An Empirical Analysis of Privacy in the Lightning Network
|
2021 |
Kappos, George |
Specfuscator: Evaluating Branch Removal as a Spectre Mitigation
|
2021 |
Schwarzl, Martin |
Sigforgery: Breaking and Fixing Data Authenticity in Sigfox
|
2021 |
Ferreira, Loíc |
Short Paper: Terrorist Fraud in Distance Bounding: Getting Around the Models
|
2021 |
Gerault, David |
Somewhere Statistically Binding Commitment Schemes with Applications
|
2021 |
Fauzi, Prastudy |
Another Look at Extraction and Randomization of Groth’s zk-SNARK
|
2021 |
Baghery, Karim |
Mining for Privacy: How to Bootstrap a Snarky Blockchain
|
2021 |
Kerber, Thomas |
Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit
|
2021 |
Qin, Kaihua |
PERIMETER: A Network-Layer Attack on the Anonymity of Cryptocurrencies
|
2021 |
Apostolaki, Maria |
Zero-Knowledge Proofs for Set Membership: Efficient, Succinct, Modular
|
2021 |
Benarroch, Daniel |
The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts
|
2021 |
Torres, Christof Ferreira |