Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blockchain Technologies: Probability of Double-Spend Attack on a Proof-of-Stake Consensus., , , , , and . Sensors, 21 (19): 6408 (2021)A Game-Theoretic Analysis of Delegation Incentives in Blockchain Governance., , and . DPM/CBT@ESORICS, volume 13619 of Lecture Notes in Computer Science, page 275-293. Springer, (2022)Influence of addition modulo 2 n on algebraic attacks., , and . Cryptogr. Commun., 8 (2): 277-289 (2016)A Provably Secure Proof-of-Stake Blockchain Protocol., , , , and . IACR Cryptology ePrint Archive, (2016)A New Standard of Ukraine: The Kupyna Hash Function., , , , , , , , , and . IACR Cryptology ePrint Archive, (2015)A Scalable Coercion-resistant Blockchain Decision-making Scheme., , , , and . IACR Cryptol. ePrint Arch., (2023)Privacy-Preserving Decision-Making Over Blockchain., , , , and . IEEE Trans. Dependable Secur. Comput., 20 (6): 4648-4663 (November 2023)Improvement for distinguisher efficiency of the 3-round Feistel network and a random permutation., , , and . IDAACS (2), page 743-746. IEEE, (2011)978-1-4577-1426-9.A Method For Generation Of High-Nonlinear S-Boxes Based On Gradient Descent., , and . IACR Cryptology ePrint Archive, (2013)Trustless Cross-chain Communication for Zendoo Sidechains., , and . IACR Cryptol. ePrint Arch., (2022)