Zobrazeno 1 - 10
of 24
pro vyhledávání: '"Peter Gaži"'
Publikováno v:
IACR Transactions on Symmetric Cryptology, Pp 145-161 (2017)
PMAC is a simple and parallel block-cipher mode of operation, which was introduced by Black and Rogaway at Eurocrypt 2002. If instantiated with a (pseudo)random permutation over n-bit strings, PMAC constitutes a provably secure variable input-length
Externí odkaz:
https://doaj.org/article/0857fbf6ca614089ad2ad7ac5ec95f06
Publikováno v:
Advances in Cryptology – ASIACRYPT 2022
Advances in Cryptology – ASIACRYPT 2022 ISBN: 9783031229626
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – ASIACRYPT 2022
Advances in Cryptology – ASIACRYPT 2022 ISBN: 9783031229626
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – ASIACRYPT 2022
Publikováno v:
Computer Security – ESORICS 2022 ISBN: 9783031171420
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0c015d075e01893a96368a05dc80c399
https://doi.org/10.1007/978-3-031-17143-7_2
https://doi.org/10.1007/978-3-031-17143-7_2
Autor:
Nicholas Stifter, Edgar Weippl, Ittay Eyal, Itay Tsabary, Alexei Zamyatin, Peter Gaži, Sarah Meiklejohn, Aljosha Judmayer
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783662639573
Financial Cryptography Workshops
Financial Cryptography Workshops
A long standing question in the context of cryptocurrencies based on Nakamoto consensus is whether such constructions are incentive compatible, i.e., the intended properties of the system emerge from the appropriate utility model for participants. Br
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::199cd0541ef641ae78d18b7eed27f005
https://doi.org/10.1007/978-3-662-63958-0_38
https://doi.org/10.1007/978-3-662-63958-0_38
Autor:
Ittay Eyal, Edgar Weippl, Sarah Meiklejohn, Alexei Zamyatin, Nicholas Stifter, Itay Tsabary, Aljosha Judmayer, Peter Gaži
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783662639573
Financial Cryptography Workshops
Financial Cryptography Workshops
In this paper we extend the attack landscape of bribing attacks on cryptocurrencies by presenting a new method, which we call Pay-To-Win (P2W). To the best of our knowledge, it is the first approach capable of facilitating double-spend collusion acro
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ff495b4a0efba42724efc17c532eb987
https://doi.org/10.1007/978-3-662-63958-0_39
https://doi.org/10.1007/978-3-662-63958-0_39
Autor:
Alexander Russell, Matthias Fitzi, Aggelos Kiayias, Sandro Coretti, Manuel M. T. Chakravarty, Philipp Kant, Peter Gaži
Publikováno v:
Financial Cryptography and Data Security ISBN: 9783662643303
Financial Cryptography (2)
Financial Cryptography (2)
State channels are an attractive layer-two solution for improving the throughput and latency of blockchains. They offer optimistic offchain settlement of payments and expedient offchain evolution of smart contracts between multiple parties without an
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a10bf338940cc5e281d70072a7ae474f
https://doi.org/10.1007/978-3-662-64331-0_18
https://doi.org/10.1007/978-3-662-64331-0_18
Publikováno v:
CCS
We establish the optimal security threshold for the Bitcoin protocol in terms of adversarial hashing power, honest hashing power, and network delays. Specifically, we prove that the protocol is secure if [ra
Publikováno v:
Theory of Cryptography ISBN: 9783030643744
TCC (1)
TCC (1)
Blockchain protocols based on variations of the longest-chain rule—whether following the proof-of-work paradigm or one of its alternatives—suffer from a fundamental latency barrier. This arises from the need to collect a sufficient number of bloc
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4327ddc16ce3458686408783f031c61d
https://doi.org/10.1007/978-3-030-64375-1_12
https://doi.org/10.1007/978-3-030-64375-1_12
Publikováno v:
Financial Cryptography and Data Security ISBN: 9783030512798
Financial Cryptography
Financial Cryptography
In the proof-of-stake (PoS) paradigm for maintaining decentralized, permissionless cryptocurrencies, Sybil attacks are prevented by basing the distribution of roles in the protocol execution on the stake distribution recorded in the ledger itself. Ho
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d07ba14cd194cb0c8ade725e2302e052
https://doi.org/10.1007/978-3-030-51280-4_7
https://doi.org/10.1007/978-3-030-51280-4_7
Publikováno v:
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security -CCS '18
CCS
Badertscher, C, Gazi, P, Kiayias, A, Russell, A & Zikas, V 2018, Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability . in Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security . CCS '18, New York, NY, USA, pp. 913-930, 25th ACM Conference on Computer and Communications Security, Toronto, Canada, 15/10/18 . https://doi.org/10.1145/3243734.3243848
CCS
Badertscher, C, Gazi, P, Kiayias, A, Russell, A & Zikas, V 2018, Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability . in Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security . CCS '18, New York, NY, USA, pp. 913-930, 25th ACM Conference on Computer and Communications Security, Toronto, Canada, 15/10/18 . https://doi.org/10.1145/3243734.3243848
We present a novel Proof-of-Stake (PoS) protocol, Ouroboros Genesis,, that enables parties to safely join (or rejoin) the protocol execution using only the genesis block information. Prior to our work, PoS protocols either required parties to obtain