Per-session security: Password-based cryptography revisited
Demay, Grégory, Gaži, Peter, Maurer, Ueli, Tackmann, Björn
Published in Journal of computer security (01.01.2019)
Published in Journal of computer security (01.01.2019)
Get full text
Journal Article
SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies
Judmayer, Aljosha, Stifter, Nicholas, Zamyatin, Alexei, Tsabary, Itay, Eyal, Ittay, Gaži, Peter, Meiklejohn, Sarah, Weippl, Edgar
Published in Financial Cryptography and Data Security. FC 2021 International Workshops (2021)
Published in Financial Cryptography and Data Security. FC 2021 International Workshops (2021)
Get full text
Book Chapter
Ledger Combiners for Fast Settlement
Fitzi, Matthias, Gaži, Peter, Kiayias, Aggelos, Russell, Alexander
Published in Theory of Cryptography (2020)
Published in Theory of Cryptography (2020)
Get full text
Book Chapter
Pay to Win: Cheap, Cross-Chain Bribing Attacks on PoW Cryptocurrencies
Judmayer, Aljosha, Stifter, Nicholas, Zamyatin, Alexei, Tsabary, Itay, Eyal, Ittay, Gaži, Peter, Meiklejohn, Sarah, Weippl, Edgar
Published in Financial Cryptography and Data Security. FC 2021 International Workshops (2021)
Published in Financial Cryptography and Data Security. FC 2021 International Workshops (2021)
Get full text
Book Chapter
The Exact Security of PMAC
Peter Gaži, Krzysztof Pietrzak, Michal Rybár
Published in IACR Transactions on Symmetric Cryptology (01.02.2017)
Published in IACR Transactions on Symmetric Cryptology (01.02.2017)
Get full text
Journal Article
Proof-of-Stake Sidechains
Gazi, Peter, Kiayias, Aggelos, Zindros, Dionysis
Published in 2019 IEEE Symposium on Security and Privacy (SP) (01.05.2019)
Published in 2019 IEEE Symposium on Security and Privacy (SP) (01.05.2019)
Get full text
Conference Proceeding
Resource-Restricted Indifferentiability
Demay, Grégory, Gaži, Peter, Hirt, Martin, Maurer, Ueli
Published in Advances in Cryptology - EUROCRYPT 2013 (2013)
Published in Advances in Cryptology - EUROCRYPT 2013 (2013)
Get full text
Book Chapter
Generic Security of NMAC and HMAC with Input Whitening
Gaži, Peter, Pietrzak, Krzysztof, Tessaro, Stefano
Published in Advances in Cryptology – ASIACRYPT 2015 (2015)
Published in Advances in Cryptology – ASIACRYPT 2015 (2015)
Get full text
Book Chapter
Query-Complexity Amplification for Random Oracles
Demay, Grégory, Gaži, Peter, Maurer, Ueli, Tackmann, Björn
Published in Information Theoretic Security (2015)
Published in Information Theoretic Security (2015)
Get full text
Book Chapter
Secret-key cryptography from ideal primitives: A systematic overview
Get full text
Conference Proceeding
Consensus Redux: Distributed Ledgers in the Face of Adversarial Supremacy
Badertscher, Christian, Gazi, Peter, Kiayias, Aggelos, Russell, Alexander, Zikas, Vassilis
Published in 2024 IEEE 37th Computer Security Foundations Symposium (CSF) (08.07.2024)
Published in 2024 IEEE 37th Computer Security Foundations Symposium (CSF) (08.07.2024)
Get full text
Conference Proceeding
Optimality of non-adaptive strategies: The case of parallel games
Demay, Gregory, Gazi, Peter, Maurer, Ueli, Tackmann, Bjorn
Published in 2014 IEEE International Symposium on Information Theory (01.06.2014)
Published in 2014 IEEE International Symposium on Information Theory (01.06.2014)
Get full text
Conference Proceeding
Stake-Bleeding Attacks on Proof-of-Stake Blockchains
Gazi, Peter, Kiayias, Aggelos, Russell, Alexander
Published in 2018 Crypto Valley Conference on Blockchain Technology (CVCBT) (01.06.2018)
Published in 2018 Crypto Valley Conference on Blockchain Technology (CVCBT) (01.06.2018)
Get full text
Conference Proceeding