Per-session security: Password-based cryptography revisited
Demay, Grégory, Gaži, Peter, Maurer, Ueli, Tackmann, Björn
Published in Journal of computer security (01.01.2019)
Published in Journal of computer security (01.01.2019)
Get full text
Journal Article
SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies
Judmayer, Aljosha, Stifter, Nicholas, Zamyatin, Alexei, Tsabary, Itay, Eyal, Ittay, Gaži, Peter, Meiklejohn, Sarah, Weippl, Edgar
Published in Financial Cryptography and Data Security. FC 2021 International Workshops
Published in Financial Cryptography and Data Security. FC 2021 International Workshops
Get full text
Book Chapter
Ledger Combiners for Fast Settlement
Fitzi, Matthias, Gaži, Peter, Kiayias, Aggelos, Russell, Alexander
Published in Theory of Cryptography (2020)
Published in Theory of Cryptography (2020)
Get full text
Book Chapter
Pay to Win: Cheap, Cross-Chain Bribing Attacks on PoW Cryptocurrencies
Judmayer, Aljosha, Stifter, Nicholas, Zamyatin, Alexei, Tsabary, Itay, Eyal, Ittay, Gaži, Peter, Meiklejohn, Sarah, Weippl, Edgar
Published in Financial Cryptography and Data Security. FC 2021 International Workshops
Published in Financial Cryptography and Data Security. FC 2021 International Workshops
Get full text
Book Chapter
The Exact Security of PMAC
Peter Gaži, Krzysztof Pietrzak, Michal Rybár
Published in IACR Transactions on Symmetric Cryptology (01.02.2017)
Published in IACR Transactions on Symmetric Cryptology (01.02.2017)
Get full text
Journal Article
Proof-of-Stake Sidechains
Gazi, Peter, Kiayias, Aggelos, Zindros, Dionysis
Published in 2019 IEEE Symposium on Security and Privacy (SP) (01.05.2019)
Published in 2019 IEEE Symposium on Security and Privacy (SP) (01.05.2019)
Get full text
Conference Proceeding
The Exact Security of PMAC
Gaži, Peter, Pietrzak, Krzysztof, Rybár, Michal
Published in IACR Transactions on Symmetric Cryptology (03.02.2017)
Published in IACR Transactions on Symmetric Cryptology (03.02.2017)
Get full text
Journal Article
Secret-key cryptography from ideal primitives: A systematic overview
Get full text
Conference Proceeding
Optimality of non-adaptive strategies: The case of parallel games
Demay, Gregory, Gazi, Peter, Maurer, Ueli, Tackmann, Bjorn
Published in 2014 IEEE International Symposium on Information Theory (01.06.2014)
Published in 2014 IEEE International Symposium on Information Theory (01.06.2014)
Get full text
Conference Proceeding
Stake-Bleeding Attacks on Proof-of-Stake Blockchains
Gazi, Peter, Kiayias, Aggelos, Russell, Alexander
Published in 2018 Crypto Valley Conference on Blockchain Technology (CVCBT) (01.06.2018)
Published in 2018 Crypto Valley Conference on Blockchain Technology (CVCBT) (01.06.2018)
Get full text
Conference Proceeding