Michal Zajac

Affiliations:
  • Nethermind, UK
  • University of Tartu, Estonia (former)
  • University of Warsaw, Poland (former, PhD)


According to our database1, Michal Zajac authored at least 21 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
On amortization techniques for FRI-based SNARKs.
IACR Cryptol. ePrint Arch., 2024

2023
COMMON: Order Book with Privacy.
IACR Cryptol. ePrint Arch., 2023

From Polynomial IOP and Commitments to Non-malleable zkSNARKs.
IACR Cryptol. ePrint Arch., 2023

On Soundness Notions for Interactive Oracle Proofs.
IACR Cryptol. ePrint Arch., 2023

Fiat-Shamir Security of FRI and Related SNARKs.
IACR Cryptol. ePrint Arch., 2023

2022
Counting Vampires: From Univariate Sumcheck to Updatable ZK-SNARK.
IACR Cryptol. ePrint Arch., 2022

What Makes Fiat-Shamir zkSNARKs (Updatable SRS) Simulation Extractable?
Proceedings of the Security and Cryptography for Networks - 13th International Conference, 2022

2021
On Subversion-Resistant SNARKs.
J. Cryptol., 2021

On Simulation-Extractability of Universal zkSNARKs.
IACR Cryptol. ePrint Arch., 2021

Verifiably-Extractable OWFs and Their Applications to Subversion Zero-Knowledge.
IACR Cryptol. ePrint Arch., 2021

2019
A Non-Interactive Shuffle Argument With Low Trust Assumptions.
IACR Cryptol. ePrint Arch., 2019

UC-Secure CRS Generation for SNARKs.
IACR Cryptol. ePrint Arch., 2019

DL-Extractable UC-Commitment Schemes.
IACR Cryptol. ePrint Arch., 2019

ZETH: On Integrating Zerocash on Ethereum.
CoRR, 2019

2018
On QA-NIZK in the BPK Model.
IACR Cryptol. ePrint Arch., 2018

2017
An Efficient Pairing-Based Shuffle Argument.
IACR Cryptol. ePrint Arch., 2017

A Subversion-Resistant SNARK.
IACR Cryptol. ePrint Arch., 2017

2016
A Shuffle Argument Secure in the Generic Model.
IACR Cryptol. ePrint Arch., 2016

Bounded-Retrieval Model with Keys Derived from Private Data.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

2015
Leakage-Resilient Cryptography with Key Derived from Sensitive Data.
IACR Cryptol. ePrint Arch., 2015

One Time Programs with Limited Memory.
IACR Cryptol. ePrint Arch., 2015


  Loading...