2009 |
48 | EE | Jan Camenisch,
Aggelos Kiayias,
Moti Yung:
On the Portability of Generalized Schnorr Proofs.
EUROCRYPT 2009: 425-442 |
47 | EE | Aggelos Kiayias,
Hong-Sheng Zhou:
Zero-Knowledge Proofs with Witness Elimination.
Public Key Cryptography 2009: 124-138 |
46 | EE | Seda Davtyan,
Sotiris Kentros,
Aggelos Kiayias,
Laurent D. Michel,
Nicolas C. Nicolaou,
Alexander Russell,
Andrew See,
Narasimha Shashidhar,
Alexander A. Shvartsman:
Taking total control of voting systems: firmware manipulations on an optical scan voting terminal.
SAC 2009: 2049-2053 |
2008 |
45 | EE | Aggelos Kiayias,
Moti Yung:
Public-key traitor tracing from efficient decoding and unbounded enrollment: extended abstract.
Digital Rights Management Workshop 2008: 9-18 |
44 | EE | Seda Davtyan,
Sotiris Kentros,
Aggelos Kiayias,
Laurent Michel,
Nicolas C. Nicolaou,
Alexander Russell,
Andrew See,
Narasimha Shashidhar,
Alexander A. Shvartsman:
Pre-Election Testing and Post-Election Audit of Optical Scan Voting Terminal Memory Cards.
EVT 2008 |
43 | EE | Aggelos Kiayias,
Shouhuai Xu,
Moti Yung:
Privacy Preserving Data Mining within Anonymous Credential Systems.
SCN 2008: 57-76 |
42 | EE | Aggelos Kiayias,
Hong-Sheng Zhou:
Equivocal Blind Signatures and Adaptive UC-Security.
TCC 2008: 340-355 |
41 | EE | Aggelos Kiayias,
Moti Yung:
Cryptographic Hardness Based on the Decoding of Reed-Solomon Codes.
IEEE Transactions on Information Theory 54(6): 2752-2769 (2008) |
2007 |
40 | | Moti Yung,
Aggelos Kiayias,
Ahmad-Reza Sadeghi:
Proceedings of the Seventh ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 29, 2007
ACM 2007 |
39 | EE | Babak Azimi-Sadjadi,
Aggelos Kiayias,
Alejandra Mercado,
Bülent Yener:
Robust key generation from signal envelopes in wireless networks.
ACM Conference on Computer and Communications Security 2007: 401-410 |
38 | EE | Aggelos Kiayias,
Laurent Michel,
Alexander Russell,
Narasimha Shashidhar,
Andrew See,
Alexander A. Shvartsman,
Seda Davtyan:
Tampering with Special Purpose Trusted Computing Devices: A Case Study in Optical Scan E-Voting.
ACSAC 2007: 30-39 |
37 | EE | Aggelos Kiayias,
Yiannis Tsiounis,
Moti Yung:
Group Encryption.
ASIACRYPT 2007: 181-199 |
36 | EE | Aggelos Kiayias,
Serdar Pehlivanoglu:
Pirate Evolution: How to Make the Most of Your Traitor Keys.
CRYPTO 2007: 448-465 |
35 | EE | Aggelos Kiayias,
Hong-Sheng Zhou:
Hidden Identity-Based Signatures.
Financial Cryptography 2007: 134-147 |
34 | EE | Aggelos Kiayias,
Hong-Sheng Zhou:
Trading Static for Adaptive Security in Universally Composable Zero-Knowledge.
ICALP 2007: 316-327 |
33 | EE | Aggelos Kiayias,
Moti Yung:
Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice.
Des. Codes Cryptography 43(2-3): 61-78 (2007) |
32 | EE | Daniel Bleichenbacher,
Aggelos Kiayias,
Moti Yung:
Decoding interleaved Reed-Solomon codes over noisy channels.
Theor. Comput. Sci. 379(3): 348-360 (2007) |
2006 |
31 | | Moti Yung,
Yevgeniy Dodis,
Aggelos Kiayias,
Tal Malkin:
Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings
Springer 2006 |
30 | EE | Aggelos Kiayias,
Antonina Mitrofanova:
Syntax-Driven Private Evaluation of Quantified Membership Queries.
ACNS 2006: 470-485 |
29 | EE | Aggelos Kiayias,
Michael Korman,
David Walluck:
An Internet Voting System Supporting User Privacy.
ACSAC 2006: 165-174 |
28 | EE | Aggelos Kiayias,
Moti Yung:
Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination.
Financial Cryptography 2006: 311-325 |
27 | EE | Aggelos Kiayias,
Hong-Sheng Zhou:
Concurrent Blind Signatures Without Random Oracles.
SCN 2006: 49-62 |
26 | EE | Aggelos Kiayias,
Moti Yung:
Secure scalable group signature with dynamic joins and separable authorities.
IJSN 1(1/2): 24-45 (2006) |
2005 |
25 | EE | Aggelos Kiayias,
Moti Yung:
Group Signatures with Efficient Concurrent Join.
EUROCRYPT 2005: 198-214 |
24 | EE | Aggelos Kiayias,
Antonina Mitrofanova:
Testing Disjointness of Private Datasets.
Financial Cryptography 2005: 109-124 |
23 | EE | Giovanni Di Crescenzo,
Aggelos Kiayias:
Asynchronous Perfectly Secure Communication over One-Time Pads.
ICALP 2005: 216-227 |
22 | EE | Aggelos Kiayias,
Yona Raekow,
Alexander Russell:
Efficient Steganography with Provable Security Guarantees.
Information Hiding 2005: 118-130 |
21 | EE | Aggelos Kiayias,
Moti Yung:
Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers.
Mycrypt 2005: 151-170 |
20 | EE | Yevgeniy Dodis,
Nelly Fazio,
Aggelos Kiayias,
Moti Yung:
Scalable public-key tracing and revoking.
Distributed Computing 17(4): 323-347 (2005) |
2004 |
19 | | Aggelos Kiayias,
Moti Yung:
Proceedings of the 2004 ACM Workshop on Digital Rights Management 2004, Washington, DC, USA, October 25, 2004
ACM 2004 |
18 | EE | Aggelos Kiayias,
Moti Yung:
Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice.
ASIACRYPT 2004: 401-416 |
17 | EE | Aggelos Kiayias,
Yiannis Tsiounis,
Moti Yung:
Traceable Signatures.
EUROCRYPT 2004: 571-589 |
16 | EE | Yevgeniy Dodis,
Aggelos Kiayias,
Antonio Nicolosi,
Victor Shoup:
Anonymous Identification in Ad Hoc Groups.
EUROCRYPT 2004: 609-626 |
15 | EE | Aggelos Kiayias,
Moti Yung:
The Vector-Ballot e-Voting Approach.
Financial Cryptography 2004: 72-89 |
2003 |
14 | EE | Aggelos Kiayias,
Moti Yung:
Extracting Group Signatures from Traitor Tracing Schemes.
EUROCRYPT 2003: 630-648 |
13 | EE | Aggelos Kiayias,
Moti Yung:
Non-interactive Zero-Sharing with Applications to Private Distributed Decision Making.
Financial Cryptography 2003: 303-320 |
12 | EE | Daniel Bleichenbacher,
Aggelos Kiayias,
Moti Yung:
Decoding of Interleaved Reed Solomon Codes over Noisy Data.
ICALP 2003: 97-108 |
11 | EE | Yevgeniy Dodis,
Nelly Fazio,
Aggelos Kiayias,
Moti Yung:
Scalable public-key tracing and revoking.
PODC 2003: 190-199 |
2002 |
10 | EE | Aggelos Kiayias,
Moti Yung:
Breaking and Repairing Asymmetric Public-Key Traitor Tracing.
Digital Rights Management Workshop 2002: 32-50 |
9 | EE | Aggelos Kiayias,
Moti Yung:
Traitor Tracing with Constant Transmission Rate.
EUROCRYPT 2002: 450-465 |
8 | EE | Aggelos Kiayias,
Moti Yung:
Cryptographic Hardness Based on the Decoding of Reed-Solomon Codes.
ICALP 2002: 232-243 |
7 | EE | Aggelos Kiayias,
Moti Yung:
Self-tallying Elections and Perfect Ballot Secrecy.
Public Key Cryptography 2002: 141-158 |
6 | EE | Aggelos Kiayias,
Moti Yung:
Cryptographic Hardness based on the Decoding of Reed-Solomon Codes with Applications
Electronic Colloquium on Computational Complexity (ECCC)(017): (2002) |
2001 |
5 | EE | Aggelos Kiayias,
Moti Yung:
Self Protecting Pirates and Black-Box Traitor Tracing.
CRYPTO 2001: 63-79 |
4 | EE | Aggelos Kiayias,
Moti Yung:
On Crafty Pirates and Foxy Tracers.
Digital Rights Management Workshop 2001: 22-39 |
3 | EE | Aggelos Kiayias,
Moti Yung:
Secure Games with Polynomial Expressions.
ICALP 2001: 939-950 |
2 | EE | Aggelos Kiayias,
Aris Pagourtzis,
Kiron Sharma,
Stathis Zachos:
Acceptor-Definable Counting Classes.
Panhellenic Conference on Informatics 2001: 453-463 |
1 | EE | Aggelos Kiayias,
Moti Yung:
Polynomial Reconstruction Based Cryptography.
Selected Areas in Cryptography 2001: 129-133 |