Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Limits on revocable proof systems, with applications to stateless blockchains., and . IACR Cryptol. ePrint Arch., (2022)Proof of Necessary Work: Succinct State Verification with Fairness Guarantees., and . IACR Cryptology ePrint Archive, (2020)Transparency, Trust, and Security Needs for the Design of Digital News Authentication Tools., , , , , , , and . Proc. ACM Hum. Comput. Interact., 7 (CSCW1): 1-44 (April 2023)Blockchain Security at Scale (Dagstuhl Seminar 18461)., , and . Dagstuhl Reports, 8 (11): 21-34 (2018)VeRSA: Verifiable Registries with Efficient Client Audits from RSA Authenticated Dictionaries., , , , and . CCS, page 2793-2807. ACM, (2022)Powers-of-Tau to the People: Decentralizing Setup Ceremonies., , , and . IACR Cryptol. ePrint Arch., (2022)Zombie: Middleboxes that Don't Snoop., , , , , and . NSDI, USENIX Association, (2024)High Performance, Low Energy, and Trustworthy Blockchains Using Satellites., , , , , and . Found. Trends Netw., 13 (4): 252-325 (2023)Zero-Knowledge Middleboxes., , , , and . USENIX Security Symposium, page 4255-4272. USENIX Association, (2022)Short-lived Zero-Knowledge Proofs and Signatures., , and . ASIACRYPT (3), volume 13793 of Lecture Notes in Computer Science, page 487-516. Springer, (2022)