Kartik Nayak
Orcid: 0000-0001-5675-263XAffiliations:
- Duke University, Durham, USA
According to our database1,
Kartik Nayak
authored at least 79 papers
between 2014 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
The Espresso Sequencing Network: HotShot Consensus, Tiramisu Data-Availability, and Builder-Exchange.
IACR Cryptol. ePrint Arch., 2024
IACR Commun. Cryptol., 2024
Proceedings of the 38th International Symposium on Distributed Computing, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 43rd ACM Symposium on Principles of Distributed Computing, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Distributed Comput., March, 2023
Proc. VLDB Endow., 2023
IACR Cryptol. ePrint Arch., 2023
Breaking the Chains of Rationality: Understanding the Limitations to and Obtaining Order Policy Enforcement.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Empirical Analysis of EIP-1559: Transaction Fees, Waiting Time, and Consensus Security.
CoRR, 2022
IncShrink: Architecting Efficient Outsourced Databases using Incremental MPC and Differential Privacy.
Proceedings of the SIGMOD '22: International Conference on Management of Data, Philadelphia, PA, USA, June 12, 2022
Communication-Efficient BFT Using Small Trusted Hardware to Tolerate Minority Corruption.
Proceedings of the 26th International Conference on Principles of Distributed Systems, 2022
Empirical Analysis of EIP-1559: Transaction Fees, Waiting Times, and Consensus Security.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2022
2021
Communication-Efficient BFT Protocols Using Small Trusted Hardware to Tolerate Minority Corruption.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Brief Announcement: Communication-Efficient BFT Using Small Trusted Hardware to Tolerate Minority Corruption.
Proceedings of the 35th International Symposium on Distributed Computing, 2021
DP-Sync: Hiding Update Patterns in Secure Outsourced Databases with Differential Privacy.
Proceedings of the SIGMOD '21: International Conference on Management of Data, 2021
Brief Announcement: Making Synchronous BFT Protocols Secure in the Presence of Mobile Sluggish Faults.
Proceedings of the PODC '21: ACM Symposium on Principles of Distributed Computing, 2021
Proceedings of the PODC '21: ACM Symposium on Principles of Distributed Computing, 2021
Proceedings of the PODC '21: ACM Symposium on Principles of Distributed Computing, 2021
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021
Proceedings of the 2nd Conference on Information-Theoretic Cryptography, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
Perfectly Secure Oblivious Parallel RAM with O(log<sup>3</sup> N/ log log N) Overhead.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
CoRR, 2020
Proceedings of the 34th International Symposium on Distributed Computing, 2020
Brief Announcement: Byzantine Agreement, Broadcast and State Machine Replication with Optimal Good-Case Latency.
Proceedings of the 34th International Symposium on Distributed Computing, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 3rd Symposium on Simplicity in Algorithms, 2020
Proceedings of the SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems, 2020
2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
IACR Cryptol. ePrint Arch., 2018
Synchronous Byzantine Agreement with Expected O(1) Rounds, Expected O(n<sup>2)</sup> Communication, and Optimal Resilience.
IACR Cryptol. ePrint Arch., 2018
2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 31st International Symposium on Distributed Computing, 2017
Proceedings of the Public-Key Cryptography - PKC 2017, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Solidus: An Incentive-compatible Cryptocurrency Based on Permissionless Byzantine Consensus.
CoRR, 2016
Proceedings of the IEEE Cybersecurity Development, 2016
Proceedings of the 2016 ACM International Symposium on New Ideas, 2016
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
2014
Some Vulnerabilities Are Different Than Others - Studying Vulnerabilities and Attack Surfaces in the Wild.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014