2024
A Tight Analysis of GHOST Consistency.
IACR Cryptol. ePrint Arch., 2024
2023
Fait Accompli Committee Selection: Improving the Size-Security Tradeoff of Stake-Based Committees.
IACR Cryptol. ePrint Arch., 2023
2022
Practical Settlement Bounds for Longest-Chain Consensus.
IACR Cryptol. ePrint Arch., 2022
On UC-Secure Range Extension and Batch Verification for ECVRF.
IACR Cryptol. ePrint Arch., 2022
SNACKs: Leveraging Proofs of Sequential Work for Blockchain Light Clients.
IACR Cryptol. ePrint Arch., 2022
A Composable Security Treatment of ECVRF and Batch Verifications.
Proceedings of the Computer Security - ESORICS 2022, 2022
2021
Practical Settlement Bounds for Proof-of-Work Blockchains.
IACR Cryptol. ePrint Arch., 2021
Pay to Win: Cheap, Cross-Chain Bribing Attacks on PoW Cryptocurrencies.
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021
Fast Isomorphic State Channels.
Proceedings of the Financial Cryptography and Data Security, 2021
Dynamic Ad Hoc Clock Synchronization.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
2020
SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies.
IACR Cryptol. ePrint Arch., 2020
Tight Consistency Bounds for Bitcoin.
IACR Cryptol. ePrint Arch., 2020
Ledger Combiners for Fast Settlement.
IACR Cryptol. ePrint Arch., 2020
Proof-of-Stake Blockchain Protocols with Near-Optimal Throughput.
IACR Cryptol. ePrint Arch., 2020
Hydra: Fast Isomorphic State Channels.
IACR Cryptol. ePrint Arch., 2020
Consensus Redux: Distributed Ledgers in the Face of Adversarial Supremacy.
IACR Cryptol. ePrint Arch., 2020
Stake Shift in Major Cryptocurrencies: An Empirical Study.
Proceedings of the Financial Cryptography and Data Security, 2020
2019
Per-session security: Password-based cryptography revisited.
J. Comput. Secur., 2019
Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies.
IACR Cryptol. ePrint Arch., 2019
Ouroboros Chronos: Permissionless Clock Synchronization via Proof-of-Stake.
IACR Cryptol. ePrint Arch., 2019
2018
Proof-of-Stake Sidechains.
IACR Cryptol. ePrint Arch., 2018
Stake-Bleeding Attacks on Proof-of-Stake Blockchains.
IACR Cryptol. ePrint Arch., 2018
Parallel Chains: Improving Throughput and Latency of Blockchain Protocols via Parallel Composition.
IACR Cryptol. ePrint Arch., 2018
Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability.
IACR Cryptol. ePrint Arch., 2018
Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018
2017
Ouroboros Praos: An adaptively-secure, semi-synchronous proof-of-stake protocol.
IACR Cryptol. ePrint Arch., 2017
2016
The Exact Security of PMAC.
IACR Trans. Symmetric Cryptol., 2016
Provably Robust Sponge-Based PRNGs and KDFs.
IACR Cryptol. ePrint Arch., 2016
On the Memory-Hardness of Data-Independent Password-Hashing Functions.
IACR Cryptol. ePrint Arch., 2016
2015
Spacemint: A Cryptocurrency Based on Proofs of Space.
IACR Cryptol. ePrint Arch., 2015
Generic Security of NMAC and HMAC with Input Whitening.
IACR Cryptol. ePrint Arch., 2015
Tight Bounds for Keyed Sponges and Truncated CBC.
IACR Cryptol. ePrint Arch., 2015
Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes.
IACR Cryptol. ePrint Arch., 2015
Query-Complexity Amplification for Random Oracles.
IACR Cryptol. ePrint Arch., 2015
Secret-key cryptography from ideal primitives: A systematic overview.
Proceedings of the 2015 IEEE Information Theory Workshop, 2015
The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
2014
The Exact PRF-Security of NMAC and HMAC.
IACR Cryptol. ePrint Arch., 2014
Optimality of Non-Adaptive Strategies: The Case of Parallel Games.
IACR Cryptol. ePrint Arch., 2014
2013
On the Security of Plain and Randomized Cascades.
IACR Cryptol. ePrint Arch., 2013
Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013
2012
Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading.
IACR Cryptol. ePrint Arch., 2012
Resource-Restricted Indifferentiability.
IACR Cryptol. ePrint Arch., 2012
2009
Cascade Encryption Revisited.
IACR Cryptol. ePrint Arch., 2009
Free-Start Distinguishing: Combining Two Types of Indistinguishability Amplification.
Proceedings of the Information Theoretic Security, 4th International Conference, 2009
2008
Assisted Problem Solving and Decompositions of Finite Automata.
Proceedings of the SOFSEM 2008: Theory and Practice of Computer Science, 2008
2007
On Ciphertext Undetectability.
IACR Cryptol. ePrint Arch., 2007