The bitcoin backbone protocol: Analysis and applications J Garay, A Kiayias, N Leonardos Annual international conference on the theory and applications of …, 2015 | 1094 | 2015 |
Ouroboros: A provably secure proof-of-stake blockchain protocol A Kiayias, A Russell, B David, R Oliynykov Annual International Cryptology Conference, 357-388, 2017 | 940 | 2017 |
Robust key generation from signal envelopes in wireless networks B Azimi-Sadjadi, A Kiayias, A Mercado, B Yener Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 381 | 2007 |
Traceable signatures A Kiayias, Y Tsiounis, M Yung International Conference on the Theory and Applications of Cryptographic …, 2004 | 307 | 2004 |
Anonymous Identification in Ad Hoc Groups Y Dodis, A Kiayias, A Nicolosi, V Shoup International Conference on the Theory and Applications of Cryptographic …, 2004 | 289 | 2004 |
Delegatable pseudorandom functions and applications A Kiayias, S Papadopoulos, N Triandopoulos, T Zacharias Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 262 | 2013 |
Ouroboros praos: An adaptively-secure, semi-synchronous proof-of-stake blockchain B David, P Gaži, A Kiayias, A Russell Annual International Conference on the Theory and Applications of …, 2018 | 226 | 2018 |
Self-tallying elections and perfect ballot secrecy A Kiayias, M Yung International Workshop on Public Key Cryptography, 141-158, 2002 | 190 | 2002 |
Blockchain mining games A Kiayias, E Koutsoupias, M Kyropoulou, Y Tselekounis Proceedings of the 2016 ACM Conference on Economics and Computation, 365-382, 2016 | 189 | 2016 |
Scalability, fidelity and stealth in the drakvuf dynamic malware analysis system TK Lengyel, S Maresca, BD Payne, GD Webster, S Vogl, A Kiayias Proceedings of the 30th Annual Computer Security Applications Conference …, 2014 | 172 | 2014 |
The bitcoin backbone protocol with chains of variable difficulty J Garay, A Kiayias, N Leonardos Annual International Cryptology Conference, 291-323, 2017 | 171 | 2017 |
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ... Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006 | 153 | 2006 |
Speed-Security Tradeoffs in Blockchain Protocols. A Kiayias, G Panagiotakos IACR Cryptol. ePrint Arch. 2015, 1019, 2015 | 146 | 2015 |
Traitor tracing with constant transmission rate A Kiayias, M Yung International Conference on the Theory and Applications of Cryptographic …, 2002 | 136 | 2002 |
Ouroboros genesis: Composable proof-of-stake blockchains with dynamic availability C Badertscher, P Gaži, A Kiayias, A Russell, V Zikas Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 133 | 2018 |
Group signatures with efficient concurrent join A Kiayias, M Yung Annual International Conference on the Theory and Applications of …, 2005 | 123 | 2005 |
On the portability of generalized schnorr proofs J Camenisch, A Kiayias, M Yung Annual International Conference on the Theory and Applications of …, 2009 | 121 | 2009 |
Fair and robust multi-party computation using a global transaction ledger A Kiayias, HS Zhou, V Zikas Annual International Conference on the Theory and Applications of …, 2016 | 119 | 2016 |
Decoding of interleaved Reed Solomon codes over noisy data D Bleichenbacher, A Kiayias, M Yung International Colloquium on Automata, Languages, and Programming, 97-108, 2003 | 102 | 2003 |
Breaking and repairing asymmetric public-key traitor tracing A Kiayias, M Yung ACM Workshop on Digital Rights Management, 32-50, 2002 | 100 | 2002 |