What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Nikolaos Makriyannis
Google Scholar
8
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/ccs
Practical Key-Extraction Attacks in Leading MPC Wallets.
Nikolaos Makriyannis
Oren Yomtov
Arik Galansky
2022
journals/joc
On the Round Complexity of Randomized Byzantine Agreement.
Ran Cohen
Iftach Haitner
Nikolaos Makriyannis
Matan Orland
Alex Samorodnitsky
2022
conf/eurocrypt
Highly Efficient OT-Based Multiplication Protocols.
Iftach Haitner
Nikolaos Makriyannis
Samuel Ranellucci
Eliad Tsfadia
2020
conf/ccs
UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts.
Ran Canetti
Rosario Gennaro
Steven Goldfeder
Nikolaos Makriyannis
Udi Peled
2019
conf/tcc
On Fully Secure MPC with Solitary Output.
Shai Halevi
Yuval Ishai
Eyal Kushilevitz
Nikolaos Makriyannis
Tal Rabin
2018
conf/tcc
On the Complexity of Fair Coin Flipping.
Iftach Haitner
Nikolaos Makriyannis
Eran Omri
2017
conf/tcc
Designing Fully Secure Protocols for Secure Two-Party Computation of Constant-Domain Functions.
Vanesa Daza
Nikolaos Makriyannis
2015
conf/tcc
Complete Characterization of Fairness in Secure Two-Party Computation of Boolean Functions.
Gilad Asharov
Amos Beimel
Nikolaos Makriyannis
Eran Omri
Coauthors
Alex Samorodnitsky
(1)
Amos Beimel
(1)
Arik Galansky
(1)
Eliad Tsfadia
(1)
Eran Omri
(2)
Eyal Kushilevitz
(1)
Gilad Asharov
(1)
Iftach Haitner
(3)
Matan Orland
(1)
Nikolaos Makriyannis
(8)
Oren Yomtov
(1)
Ran Canetti
(1)
Ran Cohen
(1)
Rosario Gennaro
(1)
Samuel Ranellucci
(1)
Shai Halevi
(1)
Steven Goldfeder
(1)
Tal Rabin
(1)
Udi Peled
(1)
Vanesa Daza
(1)
Yuval Ishai
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to