Executing and Proving Over Dirty Ledgers
|
2024 |
Stefo, Christos |
On the Correlation Complexity of MPC with Cheater Identification
|
2024 |
Brandt, Nicholas |
Fair Delivery of Decentralised Randomness Beacon
|
2024 |
Han, Runchao |
Complexity-Approximation Trade-Offs in Exchange Mechanisms: AMMs vs. LOBs
|
2024 |
Milionis, Jason |
Eagle: Efficient Privacy Preserving Smart Contracts
|
2024 |
Baum, Carsten |
Optimally-Fair Exchange of Secrets via Delay Encryption and Commutative Blinding
|
2024 |
Maffei, Ivo |
Practical Construction for Secure Trick-Taking Games Even with Cards Set Aside
|
2024 |
Bella, Rohann |
McFly: Verifiable Encryption to the Future Made Practical
|
2024 |
Döttling, Nico |
Provably Avoiding Geographic Regions for Tor’s Onion Services
|
2024 |
Arora, Arushi |
Mitigating Decentralized Finance Liquidations with Reversible Call Options
|
2024 |
Qin, Kaihua |
Short Paper: DeFi Deception—Uncovering the Prevalence of Rugpulls in Cryptocurrency Projects
|
2024 |
Agarwal, Sharad |
Player-Replaceability and Forensic Support Are Two Sides of the Same (Crypto) Coin
|
2024 |
Sheng, Peiyao |
Synchronous Perfectly Secure Message Transmission with Optimal Asynchronous Fallback Guarantees
|
2024 |
Deligios, Giovanni |
TALUS: Reinforcing TEE Confidentiality with Cryptographic Coprocessors
|
2024 |
Chakraborty, Dhiman |
R2: Boosting Liquidity in Payment Channel Networks with Online Admission Control
|
2024 |
Bastankhah, Mahsa |
Byzantine Generals in the Permissionless Setting
|
2024 |
Lewis-Pye, Andrew |
The Unique Chain Rule and Its Applications
|
2024 |
Bhat, Adithya |
Witness-Authenticated Key Exchange, Revisited: Extensions to Groups, Improved Models, Simpler Constructions
|
2024 |
Campanelli, Matteo |
Signature for Objects: Formalizing How to Authenticate Physical Data and More
|
2024 |
Hayashi, Ryuya |
The Superlinearity Problem in Post-quantum Blockchains
|
2024 |
Park, Sunoo |