Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Applying Private Information Retrieval to Lightweight Bitcoin Clients., , , and . CoRR, (2020)Is Bitcoin a Decentralized Currency?, , , and . IACR Cryptology ePrint Archive, (2013)Quantifying Location Privacy Leakage from Transaction Prices., , , and . IACR Cryptology ePrint Archive, (2015)Securify: Practical Security Analysis of Smart Contracts., , , , , and . CoRR, (2018)Security of Decentralized Financial Technologies (Dagstuhl Seminar 22421)., and . Dagstuhl Reports, 12 (10): 129-142 (October 2022)zk-Bench: A Toolset for Comparative Evaluation and Performance Benchmarking of SNARKs., , , , , , , and . IACR Cryptol. ePrint Arch., (2023)Blockchain Large Language Models., , , , and . IACR Cryptol. ePrint Arch., (2023)Do you still need a manual smart contract audit?, , , , , and . CoRR, (2023)Blockchain Censorship., , , , , , , , , and 1 other author(s). CoRR, (2023)On the Security and Performance of Proof of Work Blockchains., , , , , and . ACM Conference on Computer and Communications Security, page 3-16. ACM, (2016)