Aggelos Kiayias
Aggelos Kiayias
School of Informatics, University of Edinburgh, University of Athens & IOHK
在 ed.ac.uk 的电子邮件经过验证
标题引用次数年份
The bitcoin backbone protocol: Analysis and applications
J Garay, A Kiayias, N Leonardos
Annual International Conference on the Theory and Applications of …, 2015
5892015
Ouroboros: A provably secure proof-of-stake blockchain protocol
A Kiayias, A Russell, B David, R Oliynykov
Annual International Cryptology Conference, 357-388, 2017
3642017
Robust key generation from signal envelopes in wireless networks
B Azimi-Sadjadi, A Kiayias, A Mercado, B Yener
Proceedings of the 14th ACM conference on Computer and communications …, 2007
3452007
Traceable signatures
A Kiayias, Y Tsiounis, M Yung
International Conference on the Theory and Applications of Cryptographic …, 2004
2802004
Anonymous Identification in Ad Hoc Groups
Y Dodis, A Kiayias, A Nicolosi, V Shoup
International Conference on the Theory and Applications of Cryptographic …, 2004
2452004
Delegatable pseudorandom functions and applications
A Kiayias, S Papadopoulos, N Triandopoulos, T Zacharias
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
2012013
Self-tallying elections and perfect ballot secrecy
A Kiayias, M Yung
International Workshop on Public Key Cryptography, 141-158, 2002
1432002
Traitor tracing with constant transmission rate
A Kiayias, M Yung
International Conference on the Theory and Applications of Cryptographic …, 2002
1252002
Scalability, fidelity and stealth in the DRAKVUF dynamic malware analysis system
TK Lengyel, S Maresca, BD Payne, GD Webster, S Vogl, A Kiayias
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
1192014
Group signatures with efficient concurrent join
A Kiayias, M Yung
Annual International Conference on the Theory and Applications of …, 2005
1162005
On the portability of generalized schnorr proofs
J Camenisch, A Kiayias, M Yung
Annual International Conference on the Theory and Applications of …, 2009
1032009
Breaking and repairing asymmetric public-key traitor tracing
A Kiayias, M Yung
ACM Workshop on Digital Rights Management, 32-50, 2002
962002
Blockchain mining games
A Kiayias, E Koutsoupias, M Kyropoulou, Y Tselekounis
Proceedings of the 2016 ACM Conference on Economics and Computation, 365-382, 2016
922016
Decoding of interleaved Reed Solomon codes over noisy data
D Bleichenbacher, A Kiayias, M Yung
International Colloquium on Automata, Languages, and Programming, 97-108, 2003
872003
Speed-Security Tradeoffs in Blockchain Protocols.
A Kiayias, G Panagiotakos
IACR Cryptology ePrint Archive 2015, 1019, 2015
812015
An internet voting system supporting user privacy
A Kiayias, M Korman, D Walluck
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 165-174, 2006
792006
Group Signatures: Provable Security, Efficient Constructions and Anonymity from Trapdoor-Holders.
A Kiayias, M Yung
IACR Cryptology ePrint Archive 2004, 76, 2004
792004
Cryptographic hardness based on the decoding of Reed-Solomon codes
A Kiayias, M Yung
International Colloquium on Automata, Languages, and Programming, 232-243, 2002
78*2002
Ouroboros praos: An adaptively-secure, semi-synchronous proof-of-stake blockchain
B David, P Gaži, A Kiayias, A Russell
Annual International Conference on the Theory and Applications of …, 2018
752018
Secure scalable group signature with dynamic joins and separable authorities
A Kiayias, M Yung
International Journal of Security and Networks 1 (1/2), 24-45, 2006
752006
系统目前无法执行此操作,请稍后再试。
文章 1–20