Common Prefix

Our Research

Our team specializes in the areas of proof-of-stake, proof-of-work, auctions, Layer-2s, sharding, channels, bootstrapping, light clients, wallets, smart contracts, interoperability, zero-knowledge, and multiparty computation. Here are some of our team's research highlights.

Filters

Author
Conference
Tag
Year

On-Chain Timestamps Are Accurate

Apostolos Tzinas , Srivatsan Sridhar, Dionysis Zindros

Financial Cryptography and Data Security 2024

Proofs of Proof-of-Stake with Sublinear Complexity

Shresth Agrawal , Joachim Neu, Ertem Nusret Tas, Dionysis Zindros

ACM Advances in Financial Technologies 2023

The Principal–Agent Problem in Liquid Staking

Apostolos Tzinas , Dionysis Zindros

Financial Cryptography and Data Security, Workshop in Trusted Smart Contracts 2023

Non-Interactive Proofs of Proof-of-Work

Aggelos Kiayias, Andrew Miller, Dionysis Zindros

Financial Cryptography and Data Security 2020

Ouroboros: A provably secure proof-of-stake blockchain protocol

Aggelos Kiayias, Alexander Russell, Bernardo David , Roman Oliynykov

Advances in Cryptology–CRYPTO 2017

A formal treatment of hardware wallets

Myrto Arapinis, Andriana Gkaniatsou, Dimitris Karakostas , Aggelos Kiayias

Financial Cryptography and Data Security 2019

Brick: Asynchronous Incentive-Compatible Payment Channels

Zeta Avarikioti , Eleftherios Kokoris-Kogias, Roger Wattenhofer, Dionysis Zindros

Financial Cryptography and Data Security 2021

Efficient Zero-Knowledge Arguments for Arithmetic Circuits in the Discrete Log Setting

Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos , Jens Groth, Christophe Petit

Advances in Cryptology–EUROCRYPT 2016

Foundations of Fully Dynamic Group Signatures

Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos , Essam Ghadafi, Jens Groth

International Conference on Applied Cryptography and Network Security 2016

A Composable Security Treatment of the Lightning Network

Aggelos Kiayias, Orfeas Stefanos Thyfronitis Litos

IEEE Computer Security Foundations Symposium 2020

Ouroboros Praos: An adaptively-secure, semi-synchronous proof-of-stake blockchain

Bernardo David , Peter Gaži, Aggelos Kiayias, Alexander Russell

Advances in Cryptology–EUROCRYPT 2018

SCRAPE: Scalable randomness attested by public entities

Ignacio Cascudo, Bernardo David

Applied Cryptography and Network Security–ACNS 2017

Constant-size structure-preserving signatures: Generic constructions and simple assumptions

Masayuki Abe, Melissa Chase, Bernardo David , Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo

Theory and Application of Cryptology and Information Security–ASIACRYPT 2012

Tagged one-time signatures: Tight security and optimal tag size

Masayuki Abe, Bernardo David , Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo

Public-Key Cryptography–PKC 2013

A Formal Classification of Internet Banking Attacks and Vulnerabilities

Laerte Peotta, Marcelo Holtz, Bernardo David , Flavio Deus, RT de Sousa

International Journal of Computer Science & Information Technology–IJCSIT 2011

ALBATROSS: Publicly AttestabLe BATched Randomness Based On Secret Sharing

Ignacio Cascudo, Bernardo David

Theory and Application of Cryptology and Information Security–ASIACRYPT 2020

P2DEX: privacy-preserving decentralized cryptocurrency exchange

Carsten Baum, Bernardo David , Tore Kasper Frederiksen

Applied Cryptography and Network Security–ACNS 2021

TARDIS: a foundation of time-lock puzzles in UC

Carsten Baum, Bernardo David , Rafael Dowsley, Jesper Buus Nielsen, Sabine Oechsner

Advances in Cryptology–EUROCRYPT 2021

Rate-1, linear time and additively homomorphic UC commitments

Ignacio Cascudo, Ivan Damgård, Bernardo David , Nico Döttling, Jesper Buus Nielsen

Annual International Cryptology Conference–CRYPTO 2016

Insured MPC: Efficient secure computation with financial penalties

Carsten Baum, Bernardo David , Rafael Dowsley

Financial Cryptography and Data Security 2020

Building Scalable Distributed Intrusion Detection Systems Based on the MapReduce Framework

Marcelo D Holtz, Bernardo David , Rafael Timóteo de Sousa Júnior

Revista Telecommun 2011

Compact VSS and efficient homomorphic UC commitments

Ivan Damgård, Bernardo David , Irene Giacomelli, Jesper Buus Nielsen

Advances in Cryptology–ASIACRYPT 2014

Universally composable oblivious transfer based on a variant of LPN

Bernardo David , Rafael Dowsley, Anderson CA Nascimento

Cryptology and Network Security–CANS 2014

A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM

Paulo SLM Barreto, Bernardo David , Rafael Dowsley, Kirill Morozov, Anderson CA Nascimento

Cryptology ePrint Archive 2017

Efficient unconditionally secure comparison and privacy preserving machine learning classification protocols

Bernardo David , Rafael Dowsley, Raj Katti, Anderson CA Nascimento

Provable Security–PROVSEC 2015

Additively Homomorphic UC commitments with Optimal Amortized Overhead

Ignacio Cascudo Pueyo, Ivan Bjerre Damgård, Bernardo Machado David, Irene Giacomelli, Jesper Buus Nielsen, Roberto Trifiletti

Practice and Theory in Public-Key Cryptography–PKC 2015

CRAFT: Composable Randomness Beacons and Output-Independent Abort MPC From Time

Carsten Baum, Bernardo David , Rafael Dowsley, Ravi Kishore, Jesper Buus Nielsen, Sabine Oechsner

Practice and Theory in Public-Key Cryptography–PKC 2023

SoK: Mitigation of front-running in decentralized finance

Carsten Baum, James Hsin-yu Chiang, Bernardo David , Tore Kasper Frederiksen, Lorenzo Gentile

Financial Cryptography and Data Security 2022

Encryption to the future: a paradigm for sending secret messages to future (anonymous) committees

Matteo Campanelli, Bernardo David , Hamidreza Khoshakhlagh, Anders Konring, Jesper Buus Nielsen

Theory and Application of Cryptology and Information Security–ASIACRYPT 2022

GearBox: An Efficient UC Sharded Ledger Leveraging the Safety-Liveness Dichotomy.

Bernardo David , Bernardo Magri, Christian Matt, Jesper Buus Nielsen, Daniel Tschudi

International Association for Cryptologic Research 2021–ACM CCS 2022

Kaleidoscope: An efficient poker protocol with payment distribution and penalty enforcement

Bernardo David , Rafael Dowsley, Mario Larangeira

Financial Cryptography and Data Security 2018

Unconditionally secure, universally composable privacy preserving linear algebra

Bernardo David , Rafael Dowsley, Jeroen van de Graaf, Davidson Marques, Anderson CA Nascimento, Adriana CB Pinto

IEEE Transactions on Information Forensics and Security 2015

YOLO YOSO: Fast and simple encryption and secret sharing in the YOSO model

Ignacio Cascudo, Bernardo David , Lydia Garms, Anders Konring

Theory and Application of Cryptology and Information Security–ASIACRYPT 2022

Universally composable oblivious transfer from lossy encryption and the McEliece assumptions

Bernardo Machado David, Anderson CA Nascimento, Jörn Müller-Quade

Information Theoretic Security–ICITS 2012

Blind automatic malicious activity detection in honeypot data

Bernardo Machado David, JPCL da Costa, Anderson CA Nascimento, Dino Amaral, MD Holtz, RT de Sousa Jr

International Conference on Forensic Computer Science–ICoFCS 2011

Eagle: Efficient privacy preserving smart contracts

Carsten Baum, James Hsin-yu Chiang, Bernardo David , Tore Kasper Frederiksen

Financial Cryptography and Data Security 2023

Efficient UC Commitment Extension with Homomorphism for Free (and Applications)

Ignacio Cascudo, Ivan Damgård, Bernardo David , Nico Döttling, Rafael Dowsley, Irene Giacomelli

Theory and Application of Cryptology and Information Security–ASIACRYPT 2019

ROYALE: a framework for universally composable card games with financial rewards and penalties enforcement

Bernardo David , Rafael Dowsley, Mario Larangeira

Financial Cryptography and Data Security 2019

MARS: Monetized Ad-hoc Routing System (A Position Paper)

Bernardo David , Rafael Dowsley, Mario Larangeira

Workshop on Cryptocurrencies and Blockchains for Distributed Systems–CryBlock 2018

Improved blind automatic malicious activity detection in honeypot data

JPCL da Costa, Edison Pignaton de Freitas, Bernardo Machado David, AM Rubio Serrano, Dino Amaral, RT Sousa Júnior

Forensic Computer Science–ICoFCS 2012

FAST: Fair Auctions via Secret Transactions

Bernardo David , Lorenzo Gentile, Mohsen Pourpouneh

Applied Cryptography and Network Security–ACNS 2022

Universally composable private proximity testing

Rafael Tonicelli, Bernardo Machado David, Vinícius de Morais Alves

Provable Security–PROVSEC 2011

A framework for secure single sign-on

Bernardo Machado David, Anderson CA Nascimento, Rafael Tonicelli

Cryptology ePrint Archive 2011

Mt. Random: Multi-tiered randomness beacons

Ignacio Cascudo, Bernardo David , Omer Shlomovits, Denis Varlakov

Applied Cryptography and Network Security–ACNS 2023

Efficient fully simulatable oblivious transfer from the McEliece assumptions

Bernardo Machado David, Anderson CA Nascimento, Rafael T de Sousa

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 2012

PAPR: Publicly auditable privacy revocation for anonymous credentials

Joakim Brorsson, Bernardo David , Lorenzo Gentile, Elena Pagnin, Paul Stankovski Wagner

Cryptographers' Track at the RSA Conference 2023

Generalizing efficient multiparty computation

Bernardo M David, Ryo Nishimaki, Samuel Ranellucci, Alain Tapp

Information Theoretic Security–ICITS 2015

A Parallel Approach to PCA Based Malicious Activity Detection in Distributed Honeypot Data

Bernardo Machado David, João Paulo Carvalho Lustosa da Costa, Anderson Clayton Alves Nascimento, Marcelo Dias Holtz, Dino Macedo Amaral, Rafael Timóteo de Sousa Júnior

Brazilian Association of High Technology Experts–ABEAT 2011

(Public) Verifiability for Composable Protocols Without Adaptivity or Zero-Knowledge

Carsten Baum, Bernardo David , Rafael Dowsley

Provable Security–PROVSEC 2022

21-bringing down the complexity: fast composable protocols for card games without secret state

Bernardo David , Rafael Dowsley, Mario Larangeira

Information Security and Privacy–ACISP 2018

A Bayesian Trust Model for the MAC Layer in IEEE 802.15.4 Networks

Bernardo Machado David, Rafael Timoteo de Sousa Jr

International Information and Telecommunication Technologies Symposium–I2TS 2010

SoK: Privacy-Enhancing Technologies in Finance

Carsten Baum, James Hsin-yu Chiang, Bernardo David , Tore Kasper Frederiksen

Advances in Financial Technologies–AFT 2023

A Context-Dependent Trust Model for the MAC Layer in LR-WPANs

Bernardo M David, Beatriz Santana, Laerte Peotta, Marcelo D Holtz, Rafael Timóteo de Sousa Jr

International Journal of Computer Science and Engineering–IJCSE 2010

Perfect MPC over Layered Graphs

Bernardo David , Giovanni Deligios, Aarushi Goel, Yuval Ishai, Anders Konring, Eyal Kushilevitz, Chen-Da Liu-Zhang, Varun Narayanan

Annual International Cryptology Conference–CRYPTO 2023

Efficient Composable Oblivious Transfer from CDH in the Global Random Oracle Model

Bernardo David , Rafael Dowsley

Cryptology and Network Security–CANS 2020

An architecture for distributed Network Intrusion Detection Based on the Map-Reduce Framework

Marcelo D Holtz, Bernardo M David, Laerte Peotta, RT de Sousa Jr

Proceedings of the International Workshop on Telecommunications–IWT 2011

A Decentralized Information Marketplace Preserving Input and Output Privacy

Steven Golob, Sikha Pentyala, Rafael Dowsley, Bernardo David , Mario Larangeira, Martine De Cock, Anderson Nascimento

Proceedings of the Second ACM Data Economy Workshop 2023

FairPoS: Input Fairness in Permissionless Consensus

James Hsin-yu Chiang, Bernardo David , Ittay Eyal, Tiantian Gong

5th Conference on Advances in Financial Technologies–AFT 2023

Correlated-Output Differential Privacy and Applications to Dark Pools

James Hsin-yu Chiang, Bernardo David , Mariana Gama, Christian Janos Lebeda

Cryptology ePrint Archive 2023

Local Differential Privacy in Voting

Rosario Giustolisi, Bernardo David , Victor Mortensen, Morten Pedersen

The Italian Conference on CyberSecurity–ITASEC 2023

Updatable Privacy-Preserving Blueprints

Bernardo David , Felix Engelmann, Tore Frederiksen, Markulf Kohlweiss, Elena Pagnin, Mikhail Volkhov

Cryptology ePrint Archive 2023

Publicly Verifiable Secret Sharing over Class Groups and Applications to DKG and YOSO

Ignacio Cascudo, Bernardo David

Cryptology ePrint Archive 2023

CaSCaDE: (Time-Based) Cryptography from Space Communications DElay

Carsten Baum, Bernardo David , Elena Pagnin, Akira Takahashi

Cryptology ePrint Archive 2023

A Framework For Efficient Homomorphic Universally Composable Commitments

Bernardo Machado David

Dissertation 2016, Department of Computer Science, University of Aarhus 2016

Universally Composable Committed Oblivious Transfer With A Trusted Initializer

Adriana CB Pinto, Bernardo Machado David, Jeroen van de Graaf, Anderson CA Nascimento

Anais do XII Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais 2012

Obtaining Efficient Fully Simulatable Oblivious Transfer from General Assumptions

Bernardo M David, Anderson CA Nascimento, Rafael Tonicelli

Anais do XI Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais 2011

Cerberus Channels: Incentivizing Watchtowers for Bitcoin

Zeta Avarikioti , Orfeas Stefanos Thyfronitis Litos , Roger Wattenhofer

Financial Cryptography and Data Security 2020

Divide & Scale: Formalization and Roadmap to Robust Sharding

Zeta Avarikioti , Antoine Desjardins, Lefteris Kokoris-Kogias, Roger Wattenhofer

International Colloquium on Structural Information and Communication Complexity 2023

Towards secure and efficient payment channels

Zeta Avarikioti , Felix Laufenberg, Jakub Sliwinski, Yuyi Wang, Roger Wattenhofer

ArXiv 2018

Ride the lightning: The game theory of payment channels

Zeta Avarikioti , Lioba Heimbach, Yuyi Wang, Roger Wattenhofer

Financial Cryptography and Data Security 2020

Payment network design with fees

Zeta Avarikioti , Gerrit Janssen, Yuyi Wang, Roger Wattenhofer

Data Privacy Management, Cryptocurrencies and Blockchain Technology–ESORICS 2018

Structure and content of the visible Darknet

Zeta Avarikioti , Roman Brunner, Aggelos Kiayias, Roger Wattenhofer, Dionysis Zindros

ArXiv 2018

FnF-BFT: A BFT Protocol with Provable Performance Under Attack

Zeta Avarikioti , Lioba Heimbach, Roland Schmid, Laurent Vanbever, Roger Wattenhofer, Patrick Wintermeyer

International Colloquium on Structural Information and Communication Complexity–SIROCCO 2023

Bitcoin Security under Temporary Dishonest Majority

Zeta Avarikioti , Lukas Käppeli, Yuyi Wang, Roger Wattenhofer

Financial Cryptography and Data Security 2019

Hide & Seek: Privacy-Preserving Rebalancing on Payment Channel Networks

Zeta Avarikioti , Krzysztof Pietrzak, Iosif Salem, Stefan Schmid, Samarth Tiwari, Michelle Yeo

Financial Cryptography and Data Security 2022

TxChain: Efficient Cryptocurrency Light Clients via Contingent Transaction Aggregation

Alexei Zamyatin, Zeta Avarikioti , Daniel Perez, William J. Knottenbelt

DPM 2020, CBT 2020: Data Privacy Management, Cryptocurrencies and Blockchain Technology

Payment Networks as Creation Games

Zeta Avarikioti , Rolf Scheuner, Roger Wattenhofer

DPM 2019, CBT 2019: Data Privacy Management, Cryptocurrencies and Blockchain Technology

Algorithmic channel design

Zeta Avarikioti , Yuyi Wang, Roger Wattenhofer

International Symposium on Algorithms and Computation–ISAAC 2018

High-dimensional approximate r-nets

Zeta Avarikioti , Ioannis Z Emiris, Loukas Kavouras, Ioannis Psarros

Algorithmica 2020

Practical linear-space Approximate Near Neighbors in high dimension

Zeta Avarikioti , Ioannis Z Emiris, Ioannis Psarros, Georgios Samaras

ArXiv 2016

Towards a game-theoretic security analysis of off-chain protocols

Sophie Rain, Zeta Avarikioti , Laura Kovács, Matteo Maffei

Computer Security Foundations Symposium–CSF 2023

Suborn Channels: Incentives Against Timelock Bribes

Zeta Avarikioti , Orfeas Stefanos Thyfronitis Litos

Financial Cryptography and Data Security 2022

Wiser: Increasing Throughput in Payment Channel Networks with Transaction Aggregation

Samarth Tiwari, Michelle Yeo, Zeta Avarikioti , Iosif Salem, Krzysztof Pietrzak, Stefan Schmid

Conference on Advances in Financial Technologies–AFT 2022

Lightning Creation Games

Zeta Avarikioti , Tomasz Lizurej, Tomasz Michalak, Michelle Yeo

International Conference on Distributed Computing Systems–ICDCS 2023

Proof-of-Stake Sidechains

Peter Gaži, Aggelos Kiayias, Dionysis Zindros

Symposium on Security and Privacy–S&P 2019

SoK: Communication across distributed ledgers

Alexei Zamyatin, Mustafa Al-Bassam, Dionysis Zindros , Eleftherios Kokoris-Kogias, Pedro Moreno-Sanchez, Aggelos Kiayias, William J Knottenbelt

Financial Cryptography and Data Security 2021

Proof-of-Burn

Kostis Karantias, Aggelos Kiayias, Dionysis Zindros

Financial Cryptography and Data Security 2020

Proof-of-Work Sidechains

Aggelos Kiayias, Dionysis Zindros

Financial Cryptography and Data Security 2019

Trust is Risk: A Decentralized Financial Trust Platform

Orfeas Stefanos Thyfronitis Litos , Dionysis Zindros

Financial Cryptography and Data Security 2017

Updatable Blockchains

Michele Ciampi, Nikos Karayannidis, Aggelos Kiayias, Dionysis Zindros

European Symposium on Research in Computer Security–ESORICS 2020

Cryptocurrency Egalitarianism: A Quantitative Approach

Dimitris Karakostas , Aggelos Kiayias, Christos Nasikas, Dionysis Zindros

International Conference on Blockchain Economics, Security and Protocols–Tokenomics 2019

Compact storage of superblocks for NiPoPoW applications

Kostis Karantias, Aggelos Kiayias, Dionysis Zindros

Mathematical Research for Blockchain Economy–MARBLE 2019

A Gas-Efficient Superlight Bitcoin Client in Solidity

Stelios Daveas, Kostis Karantias, Aggelos Kiayias, Dionysis Zindros

Conference on Advances in Financial Technologies–ACM AFT 2020

Mining in Logarithmic Space

Aggelos Kiayias, Nikos Leonardos, Dionysis Zindros

Conference on Computer and Communications Security–ACM SIGSAC 2021

Short Accountable Ring Signatures Based on DDH

Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos , Essam Ghadafi, Jens Groth, Christophe Petit

European Symposium on Research in Computer Security–ESORICS 2015

BeleniosRF: A Non-Interactive Receipt-Free Electronic Voting Scheme

Pyrros Chaidos , Véronique Cortier, Georg Fuchsbauer, David Galindo

Conference on Computer and Communications Security–ACM SIGSAC 2016

New Design Techniques for Efficient Arithmetization-Oriented Hash Functions:Anemoi Permutations and Jive Compression Mode

Clémence Bouvier1, Pierre Briaud, Pyrros Chaidos , Léo Perrin, Robin Salen, Vesselin Velichkov, Danny Willems

Annual International Cryptology Conference 2023

Efficient Designated-Verifier Non-interactive Zero-Knowledge Proofs of Knowledge

Pyrros Chaidos , Geoffroy Couteau

Advances in Cryptology–EUROCRYPT 2018

Making Sigma-protocols Non-interactive without Random Oracles

Pyrros Chaidos , Jens Groth

IACR International Workshop on Public Key Cryptography 2015

Efficient Zero-Knowledge Proof Systems

Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos , Jens Groth

International School on Foundations of Security Analysis and Design 2015

Mithril: Stake-based Threshold Multisignatures

Pyrros Chaidos , Aggelos Kiayias

Cryptology ePrint Archive 2021

Foundations of Fully Dynamic Group Signatures

Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos , Essam Ghadafi, Jens Groth

Applied Cryptography and Network Security 2016

Applying Divertibility to Blind Ballot Copying in the Helios Internet Voting System

Yvo Desmedt, Pyrros Chaidos

European Symposium on Research in Computer Security–ESORICS 2012

Securing Proof-of-Work Ledgers via Checkpointing

Dimitris Karakostas , Aggelos Kiayias

IEEE International Conference on Blockchain and Cryptocurrency 2021

SoK: A Stratified Approach to Blockchain Decentralization

Dimitris Karakostas , Aggelos Kiayias, Christina Ovezik

Cryptology ePrint Archive 2022

Account Management in Proof of Stake Ledgers

Dimitris Karakostas , Aggelos Kiayias, Mario Larangeira

Security and Cryptography for Networks–SCN 2020

A Puff of Steem: Security Analysis of Decentralized Content Curation

Aggelos Kiayias, Benjamin Livshits, Andrés Monteoliva Mosteiro, Orfeas Stefanos Thyfronitis Litos

International Conference on Blockchain Economics, Security and Protocols–Tokenomics 2019

How to Trust Strangers: Composition of Byzantine Quorum Systems

Orestis Alpos , Christian Cachin, Luca Zanolini

International Symposium on Reliable Distributed Systems 2021

Eating sandwiches: Modular and lightweight elimination of transaction reordering attacks

Orestis Alpos , Ignacio Amores-Sesar, Christian Cachin, Michelle Yeo

ArXiv 2023

On the Synchronization Power of Token Smart Contracts

Orestis Alpos , Christian Cachin, Giorgia Azzurra Marson, Luca Zanolini

International Conference on Distributed Computing Systems 2021

Consensus Beyond Thresholds: Generalized Byzantine Quorums Made Live

Orestis Alpos , Christian Cachin

International Symposium on Reliable Distributed Systems 2020

Practical Large-Scale Proof-of-Stake Asynchronous Total-Order Broadcast

Orestis Alpos , Christian Cachin, Simon Holmgaard Kamp, Jesper Buus Nielsen

Cryptology ePrint Archive 2023

DSKE: Digital Signatures with Key Extraction

Orestis Alpos , Christian Cachin, Simon Holmgaard Kamp, Jesper Buus Nielsen

Cryptology ePrint Archive 2022

Thetacrypt: A Distributed Service for Threshold Cryptography On-Demand

Orestis Alpos , Mariarosaria Barbaraci, Christian Cachin, Noah Schmid, Michael Senn

International Middleware Conference 2023

Do Not Trust in Numbers: Practical Distributed Cryptography With General Trust

Orestis Alpos , Christian Cachin

International Symposium on Stabilizing, Safety, and Security of Distributed Systems 2023

Light Clients for Lazy Blockchains

Ertem Nusret Tas, Dionysis Zindros , Lei Yang, David Tse

Financial Cryptography and Data Security 2024

Hours of Horus: Keyless Cryptocurrency Wallets

Dionysis Zindros

Financial Cryptography and Data Security 2022

Better Safe than Sorry: Recovering after Adversarial Majority

Srivatsan Sridhar, Dionysis Zindros , David Tse

arXiv 2023

Rollerblade: Replicated Distributed Protocol Emulation on Top of Ledgers

Dionysis Zindros , Apostolos Tzinas , David Tse

Cryptology ePrint Archive 2024

Cassiopeia: Practical On-Chain Witness Encryption

Schwinn Saereesitthipitak, Dionysis Zindros

Financial Cryptography and Data Security 2023

A Better Proof-of-Work Fork Choice Rule

Karl Kreder, Shreekara Shastry, Apostolos Tzinas , Sriram Vishwanath, Dionysis Zindros

Cryptology ePrint Archive 2024

Smart Contract Derivatives

Kostis Karantias, Aggelos Kiayias, Dionysis Zindros

Mathematical Research for Blockchain Economy 2020

The Velvet Path to Superlight Blockchain Clients

Aggelos Kiayias, Andrianna Polydouri, Dionysis Zindros

ACM Advances in Financial Technologies 2021

Soft Power: Upgrading Chain Macroeconomic Policy Through Soft Forks

Dionysis Zindros

Financial Cryptography Workshop on Trusted Smart Contracts 2021

Route Discovery in Private Payment Channel Networks

Zeta Avarikioti , Mahsa Bastankhah, Mohammad Ali Maddah-Ali, Krzysztof Pietrzak, Jakub Svoboda, Michelle Yeo

Cryptology ePrint Archive 2021

High Dimensional Clustering with r-nets

Zeta Avarikioti , Alain Ryser, Yuyi Wang, Roger Wattenhofer

AAAI Conference on Artificial Intelligence 2019

Online Payment Network Design

Zeta Avarikioti , Kenan Besic, Yuyi Wang, Roger Wattenhofer

Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2019

Bribe & Fork: Cheap Bribing Attacks via Forking Threat

Zeta Avarikioti , Paweł Kędzior, Tomasz Lizurej, Tomasz Michalak

arXiv 2024

Musketeer: Incentive-Compatible Rebalancing for Payment Channel Networks

Zeta Avarikioti , Stefan Schmid, Samarth Tiwari

Cryptology ePrint Archive 2023

Glimpse: On-Demand PoW Light Client with Constant-Size Storage for DeFi

Giulia Scaffino , Lukas Aumayr, Zeta Avarikioti , Matteo Maffei

USENIX Security Symposium 2023