What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Vassilis Zikas
Google Scholar
41
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ctrsa
Universal Adaptor Signatures from Blackbox Multi-party Computation.
Michele Ciampi
Xiangyu Liu
Ioannis Tzannetos
Vassilis Zikas
2024
journals/joc
Bitcoin as a Transaction Ledger: A Composable Treatment.
Christian Badertscher
Ueli Maurer
Daniel Tschudi
Vassilis Zikas
2024
conf/sp
Eureka: A General Framework for Black-box Differential Privacy Estimators.
Yun Lu
Malik Magdon-Ismail
Yu Wei
Vassilis Zikas
2024
conf/asiacrypt
Adaptor Signatures: New Security Definition and a Generic Construction for NP Relations.
Xiangyu Liu
Ioannis Tzannetos
Vassilis Zikas
2024
conf/tcc
Adaptive Security, Erasures, and Network Assumptions in Communication-Local MPC.
Nishanth Chandran
Juan A. Garay
Ankit Kumar Misra
Rafail Ostrovsky
Vassilis Zikas
2024
conf/tcc
General Adversary Structures in Byzantine Agreement and Multi-party Computation with Active and Omission Corruption.
Konstantinos Brazitikos
Vassilis Zikas
2024
conf/tcc
Information-Theoretic Multi-server Private Information Retrieval with Client Preprocessing.
Jaspal Singh
Yu Wei
Vassilis Zikas
2023
conf/ccs
COMBINE: COMpilation and Backend-INdependent vEctorization for Multi-Party Computation.
Benjamin Levy
Muhammad Ishaq
Benjamin Sherman
Lindsey Kennard
Ana L. Milanova
Vassilis Zikas
2023
conf/crypto
Completeness Theorems for Adaptively Secure Broadcast.
Ran Cohen
Juan A. Garay
Vassilis Zikas
2023
conf/tcc
Concurrent Asynchronous Byzantine Agreement in Expected-Constant Rounds, Revisited.
Ran Cohen
Pouyan Forghani
Juan A. Garay
Rutvik Patel
Vassilis Zikas
2022
conf/eurocrypt
Round-Optimal and Communication-Efficient Multiparty Computation.
Michele Ciampi
Rafail Ostrovsky
Hendrik Waldner
Vassilis Zikas
2021
journals/joc
Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols.
Ran Cohen
Sandro Coretti
Juan A. Garay
Vassilis Zikas
2021
conf/crypto
A Rational Protocol Treatment of 51% Attacks.
Christian Badertscher
Yun Lu
Vassilis Zikas
2021
conf/eurocrypt
Dynamic Ad Hoc Clock Synchronization.
Christian Badertscher
Peter Gazi
Aggelos Kiayias
Alexander Russell
Vassilis Zikas
2021
conf/tcc
On the (Ir)Replaceability of Global Setups, or How (Not) to Use a Global Ledger.
Christian Badertscher
Julia Hesse
Vassilis Zikas
2020
conf/acns
Timed Signatures and Zero-Knowledge Proofs - Timestamping in the Blockchain Era -.
Aydin Abadi
Michele Ciampi
Aggelos Kiayias
Vassilis Zikas
2020
conf/eurocrypt
Resource-Restricted Cryptography: Revisiting MPC Bounds in the Proof-of-Work Era.
Juan A. Garay
Aggelos Kiayias
Rafail M. Ostrovsky
Giorgos Panagiotakos
Vassilis Zikas
2020
conf/eurocrypt
Broadcast-Optimal Two-Round MPC.
Ran Cohen
Juan A. Garay
Vassilis Zikas
2020
conf/tcc
Universal Composition with Global Subroutines: Capturing Global Setup Within Plain UC.
Christian Badertscher
Ran Canetti
Julia Hesse
Björn Tackmann
Vassilis Zikas
2019
journals/joc
Probabilistic Termination and Composability of Cryptographic Protocols.
Ran Cohen
Sandro Coretti
Juan A. Garay
Vassilis Zikas
2019
conf/ccs
Efficient MPC via Program Analysis: A Framework for Efficient Optimal Mixing.
Muhammad Ishaq
Ana L. Milanova
Vassilis Zikas
2019
conf/sp
Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake.
Thomas Kerber
Aggelos Kiayias
Markulf Kohlweiss
Vassilis Zikas
2018
conf/ccs
Cryptographically Secure Detection of Injection Attacks.
Yun Lu
Konstantinos Mitropoulos
Rafail Ostrovsky
Avraham Weinstock
Vassilis Zikas
2018
conf/ccs
Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability.
Christian Badertscher
Peter Gazi
Aggelos Kiayias
Alexander Russell
Vassilis Zikas
2018
conf/eurocrypt
But Why Does It Work? A Rational Protocol Design Treatment of Bitcoin.
Christian Badertscher
Juan A. Garay
Ueli Maurer
Daniel Tschudi
Vassilis Zikas
2017
conf/crypto
Bitcoin as a Transaction Ledger: A Composable Treatment.
Christian Badertscher
Ueli Maurer
Daniel Tschudi
Vassilis Zikas
2017
conf/crypto
The Price of Low Communication in Secure Multi-party Computation.
Juan A. Garay
Yuval Ishai
Rafail Ostrovsky
Vassilis Zikas
2016
conf/crypto
Probabilistic Termination and Composability of Cryptographic Protocols.
Ran Cohen
Sandro Coretti
Juan A. Garay
Vassilis Zikas
2016
conf/crypto
Network-Hiding Communication and Applications to Multi-party Protocols.
Martin Hirt
Ueli Maurer
Daniel Tschudi
Vassilis Zikas
2016
conf/eurocrypt
Fair and Robust Multi-party Computation Using a Global Transaction Ledger.
Aggelos Kiayias
Hong-Sheng Zhou
Vassilis Zikas
2016
conf/asiacrypt
Constant-Round Asynchronous Multi-Party Computation Based on One-Way Functions.
Sandro Coretti
Juan A. Garay
Martin Hirt
Vassilis Zikas
2015
conf/crypto
Incoercible Multi-party Computation and Universally Composable Receipt-Free Voting.
Joël Alwen
Rafail Ostrovsky
Hong-Sheng Zhou
Vassilis Zikas
2014
conf/crypto
Efficient Three-Party Computation from Cut-and-Choose.
Seung Geol Choi
Jonathan Katz
Alex J. Malozemoff
Vassilis Zikas
2014
conf/crypto
Secure Multi-Party Computation with Identifiable Abort.
Yuval Ishai
Rafail Ostrovsky
Vassilis Zikas
2013
conf/tcc
Universally Composable Synchronous Computation.
Jonathan Katz
Ueli Maurer
Björn Tackmann
Vassilis Zikas
2013
conf/tcc
Feasibility and Completeness of Cryptographic Tasks in the Quantum World.
Serge Fehr
Jonathan Katz
Fang Song
Hong-Sheng Zhou
Vassilis Zikas
2012
conf/crypto
Collusion-Preserving Computation.
Joël Alwen
Jonathan Katz
Ueli Maurer
Vassilis Zikas
2010
conf/eurocrypt
Adaptively Secure Broadcast.
Martin Hirt
Vassilis Zikas
2009
conf/tcc
Realistic Failures in Secure Multi-party Computation.
Vassilis Zikas
Sarah Hauser
Ueli M. Maurer
2008
conf/asiacrypt
MPC vs. SFE : Unconditional and Computational Security.
Martin Hirt
Ueli M. Maurer
Vassilis Zikas
2008
conf/tcc
MPC vs. SFE: Perfect Security in a Unified Corruption Model.
Zuzana Beerliová-Trubíniová
Matthias Fitzi
Martin Hirt
Ueli M. Maurer
Vassilis Zikas
Coauthors
Aggelos Kiayias
(6)
Alex J. Malozemoff
(1)
Alexander Russell
(2)
Ana L. Milanova
(2)
Ankit Kumar Misra
(1)
Avraham Weinstock
(1)
Aydin Abadi
(1)
Benjamin Levy
(1)
Benjamin Sherman
(1)
Björn Tackmann
(2)
Christian Badertscher
(8)
Daniel Tschudi
(4)
Fang Song
(1)
Giorgos Panagiotakos
(1)
Hendrik Waldner
(1)
Hong-Sheng Zhou
(3)
Ioannis Tzannetos
(2)
Jaspal Singh
(1)
Joël Alwen
(2)
Jonathan Katz
(4)
Juan A. Garay
(11)
Julia Hesse
(2)
Konstantinos Brazitikos
(1)
Konstantinos Mitropoulos
(1)
Lindsey Kennard
(1)
Malik Magdon-Ismail
(1)
Markulf Kohlweiss
(1)
Martin Hirt
(5)
Matthias Fitzi
(1)
Michele Ciampi
(3)
Muhammad Ishaq
(2)
Nishanth Chandran
(1)
Peter Gazi
(2)
Pouyan Forghani
(1)
Rafail M. Ostrovsky
(1)
Rafail Ostrovsky
(6)
Ran Canetti
(1)
Ran Cohen
(6)
Rutvik Patel
(1)
Sandro Coretti
(4)
Sarah Hauser
(1)
Serge Fehr
(1)
Seung Geol Choi
(1)
Thomas Kerber
(1)
Ueli M. Maurer
(3)
Ueli Maurer
(6)
Vassilis Zikas
(41)
Xiangyu Liu
(2)
Yu Wei
(2)
Yun Lu
(3)
Yuval Ishai
(2)
Zuzana Beerliová-Trubíniová
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to