Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis of Curl-P and Other Attacks on the IOTA Cryptocurrency., , , , , , and . IACR Cryptology ePrint Archive, (2019)Atomically Trading with Roger: Gambling on the Success of a Hardfork., , and . DPM/CBT@ESORICS, volume 10436 of Lecture Notes in Computer Science, page 334-353. Springer, (2017)Mirror worlds, eclipse attacks and the security of Bitcoin and the RPKI. Boston University, USA, (2022)OpenPubkey: Augmenting OpenID Connect with User held Signing Keys., , , , , , , , and . IACR Cryptol. ePrint Arch., (2023)Eclipse Attacks on Bitcoin's Peer-to-Peer Network., , , and . IACR Cryptology ePrint Archive, (2015)Technical perspective: The rewards of selfish mining., and . Commun. ACM, 61 (7): 94 (2018)Low-Resource Eclipse Attacks on Ethereum's Peer-to-Peer Network., , and . IACR Cryptology ePrint Archive, (2018)TumbleBit: An Untrusted Bitcoin-Compatible Anonymous Payment Hub., , , , and . NDSS, The Internet Society, (2017)TumbleBit: An Untrusted Tumbler for Bitcoin-Compatible Anonymous Payments., , , , and . IACR Cryptology ePrint Archive, (2016)One Weird Trick to Stop Selfish Miners: Fresh Bitcoins, A Solution for the Honest Miner.. IACR Cryptology ePrint Archive, (2014)