2018
-
Pyrros Chaidos, Olga Fourtounelli, Aggelos Kiayias, Thomas Zacharias “A Universally Composable Framework for the Privacy of Email Ecosystems” ASIACRYPT 2018.
-
Aggelos Kiayias, Annabell Kuldmaa, Helger Lipmaa, Janno Siim, and Thomas Zacharias “On the Security Properties of e-Voting Bulletin Boards” SCN, 2018.
-
Benjamin Weggenmann, Florian Kerschbaum. “SynTF: Synthetic and Differentially Private Term Frequency Vectors for Privacy-Preserving Text Mining” SIGIR, 2018.
-
Rafael Gálvez, Seda Gurses “The Odyssey: modeling privacy threats in a brave new world” EuroS&PW, 2018.
-
Seda Gurses, Rebekah Overdorf, and Ero Balsa, “POTs: The revolution will not be optimized?,” HotPETs, 2018.
-
Bernardo David, Peter Gazi, Aggelos Kiayias, Alexander Russell “Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain” EUROCRYPT 2018.
-
Juan A. Garay, Aggelos Kiayias, Nikos Leonardos, Giorgos Panagiotakos “Bootstrapping the Blockchain, with Applications to Consensus and Fast PKI Setup” PKC 2018.
-
Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi and Aniket Kate “Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency—Choose Two” IEEE Symposium on Security and Privacy (SP) 2018.
-
Vera Rimmer, Davy Preuveneers, Marc Juarez, Tom Van Goethem and Wouter Joosen “Automated Feature Extraction for Website Fingerprinting through Deep Learning” NDSS 2018.
-
Rob Jansen, Marc Juarez, Rafael Gálvez, Tariq Elahi and Claudia Diaz “Inside Job: Applying Traffic Analysis to Measure Tor from Within” NDSS 2018.
2017
-
Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Michał Zając “A Subversion-Resistant SNARK“ ASIACRYPT 2017.
-
Prastudy Fauzi, Helger Lipmaa, Janno Siim, Michał Zając “An Efficient Pairing-Based Shuffle Argument” ASIACRYPT 2017.
-
Rebekah Overdorf , Marc Juarez, Gunes Acar, Rachel Greenstadt and Claudia Diaz “How Unique is Your .onion? An Analysis of the Fingerprintability of Tor Onion Services” CCS 2017: 2021-2036.
-
Vasilios Mavroudis, Michael Veale “Eavesdropping Whilst You’re Shopping: Balancing Personalisation and Privacy in Connected Retail Spaces” Proceedings of Living in the Internet of Things: Cybersecurity of the IoT – 2018.
-
Vasilios Mavroudis, Andrea Cerulli, Petr Svenda, Dan Cvrcek, Dusan Klinec, George Danezis “A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components” CCS 2017: 1583-1600
-
Raphael R. Toledo, George Danezis, Isao Echizen “Mix-ORAM: Using delegate shuffles” WPES 2017.
-
Ania Piotrowska, Jamie Hayes, Nethanel Gelernter, George Danezis and Amir Herzberg “AnNotify: A Private Notification Service” WPES 2017.
-
The Bitcoin Backbone Protocol with Chains of Variable Difficulty” Crypto 2017.
-
Aggelos Kiayias, Alexander Russell, Bernardo David, Roman Oliynykov “Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol.” Crypto 2017.
-
Nikolaos Alexopoulos, Aggelos Kiayias, Riivo Talviste, Thomas Zacharias “MCMix: Anonymous Messaging via Secure Multiparty Computation.” USENIX Security Symposium 2017.
-
Ania Piotrowska, Jamie Hayes, Tariq Elahi, Sebastian Meiser, George Danezis “The Loopix Anonymity System.” USENIX Security Symposium 2017.
-
Jonas Böhler, Daniel Bernau, and Florian Kerschbaum. “Privacy-preserving outlier detection for data streams“. 31st Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec’17) 2017.
-
Helger Lipmaa and Kateryna Pavly. “A Simpler Rate-Optimal CPIR Protocol.” 21st International Conference on Financial Cryptography and Data Security 2017.
-
Helger Lipmaa. “Optimally Sound Sigma Protocols Under DCRA.” 21st International Conference on Financial Cryptography and Data Security 2017.
-
Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang: “Ceremonies for End-to-End Verifiable Elections.” Public-Key Cryptography – PKC 2017.
-
Florian Bourse, Fabrice Benhamouda and Helger Lipmaa. “CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions.” Public-Key Cryptography – PKC 2017.
2016
-
Prastudy Fauzi, Helger Lipmaa and Michał Zając. “A Shuffle Argument Secure in the Generic Model.” ASIACRYPT 2016.
-
Foteini Baldimtsi, Aggelos Kiayias, Thomas Zacharias and Bingsheng Zhang. “Indistinguishable Proofs of Work or Knowledge.” ASIACRYPT 2016.
-
Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis. “Practical Non-Malleable Codes from l-more Extractable Hash Functions.” CCS ’16 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security.
-
George Argyros, Ioannis Stais, Suman Jana, Angelos D. Keromytis, Aggelos Kiayias. “SFADiff: Automated Evasion Attacks and Fingerprinting Using Black-box Differential Automata Learning.” CCS ’16 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security.
-
Aggelos Kiayias, Ozgur Oksuz, Alexander Russell, Qiang Tang, Bing Wang. “Efficient Encrypted Keyword Search for Multi-user Data Sharing.” Computer Security – ESORICS 2016.
-
Marc Juarez, Mohsen Imani, Mike Perry, Claudia Diaz, Matthew Wright. “Toward an Efficient Website Fingerprinting Defense.” Computer Security – ESORICS 2016.
-
Jamie Hayes, George Danezis. “k-fingerprinting: A Robust Scalable Website Fingerprinting Technique.” USENIX Security Symposium 2016.
-
Aggelos Kiayias, Elias Koutsoupias, Maria Kyropoulou, and Yiannis Tselekounis. “Blockchain Mining Games.” ACM Conference on Economics and Computation 2016.
-
Rafael Gálvez, Marc Juarez, and Claudia Diaz. “Profiling Tor Users with Unsupervised Learning Techniques.” Infer 2016.
-
Helger Lipmaa. “Prover-Efficient Commit-And-Prove Zero-Knowledge SNARKs.” AFRICACRYPT 2016.
-
Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu. “Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online).” IEEE EURO S&P 2016.
-
Prastudy Fauzi and Helger Lipmaa. “Efficient Culpably Sound NIZK Shuffle Argument without Random Oracles.” CT-RSA 2016, San Franscisco, CA, USA 2016.
-
Luca Melis, George Danezis, Emiliano De Cristofaro. “Efficient Private Statistics with Succinct Sketches.” NDSS 2016.
-
George Danezis, Sarah Meiklejohn. “Centrally Banked Cryptocurrencies.” NDSS 2016.
-
Harry Halpin, Patrick J. Hayes, and Henry S. Thompson. “When owl:sameAs isn’t the Same Redux: Towards a Theory of Identity, Context, and Inference on the Semantic Web.” Modeling and Using Context: 9th International and Interdisciplinary Conference, CONTEXT 2015.
-
Fatemeh Shirazi, Milivoj Simeonovski, Muhammad Rizwan Asghar, Michael Backes, Claudia Díaz. “A Survey on Routing in Anonymous Communication Protocols“.
2015
-
Chen Chen, Daniele Enrico Asoni, David Barrera, George Danezis, Adrian Perrig. “HORNET: High-speed Onion Routing at the Network Layer.” ACM CCS 2015, Denver 2015.