dblp.uni-trier.dewww.uni-trier.de

Aggelos Kiayias

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
48EEJan Camenisch, Aggelos Kiayias, Moti Yung: On the Portability of Generalized Schnorr Proofs. EUROCRYPT 2009: 425-442
47EEAggelos Kiayias, Hong-Sheng Zhou: Zero-Knowledge Proofs with Witness Elimination. Public Key Cryptography 2009: 124-138
46EESeda Davtyan, Sotiris Kentros, Aggelos Kiayias, Laurent D. Michel, Nicolas C. Nicolaou, Alexander Russell, Andrew See, Narasimha Shashidhar, Alexander A. Shvartsman: Taking total control of voting systems: firmware manipulations on an optical scan voting terminal. SAC 2009: 2049-2053
2008
45EEAggelos Kiayias, Moti Yung: Public-key traitor tracing from efficient decoding and unbounded enrollment: extended abstract. Digital Rights Management Workshop 2008: 9-18
44EESeda Davtyan, Sotiris Kentros, Aggelos Kiayias, Laurent Michel, Nicolas C. Nicolaou, Alexander Russell, Andrew See, Narasimha Shashidhar, Alexander A. Shvartsman: Pre-Election Testing and Post-Election Audit of Optical Scan Voting Terminal Memory Cards. EVT 2008
43EEAggelos Kiayias, Shouhuai Xu, Moti Yung: Privacy Preserving Data Mining within Anonymous Credential Systems. SCN 2008: 57-76
42EEAggelos Kiayias, Hong-Sheng Zhou: Equivocal Blind Signatures and Adaptive UC-Security. TCC 2008: 340-355
41EEAggelos Kiayias, Moti Yung: Cryptographic Hardness Based on the Decoding of Reed-Solomon Codes. IEEE Transactions on Information Theory 54(6): 2752-2769 (2008)
2007
40 Moti Yung, Aggelos Kiayias, Ahmad-Reza Sadeghi: Proceedings of the Seventh ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 29, 2007 ACM 2007
39EEBabak Azimi-Sadjadi, Aggelos Kiayias, Alejandra Mercado, Bülent Yener: Robust key generation from signal envelopes in wireless networks. ACM Conference on Computer and Communications Security 2007: 401-410
38EEAggelos Kiayias, Laurent Michel, Alexander Russell, Narasimha Shashidhar, Andrew See, Alexander A. Shvartsman, Seda Davtyan: Tampering with Special Purpose Trusted Computing Devices: A Case Study in Optical Scan E-Voting. ACSAC 2007: 30-39
37EEAggelos Kiayias, Yiannis Tsiounis, Moti Yung: Group Encryption. ASIACRYPT 2007: 181-199
36EEAggelos Kiayias, Serdar Pehlivanoglu: Pirate Evolution: How to Make the Most of Your Traitor Keys. CRYPTO 2007: 448-465
35EEAggelos Kiayias, Hong-Sheng Zhou: Hidden Identity-Based Signatures. Financial Cryptography 2007: 134-147
34EEAggelos Kiayias, Hong-Sheng Zhou: Trading Static for Adaptive Security in Universally Composable Zero-Knowledge. ICALP 2007: 316-327
33EEAggelos Kiayias, Moti Yung: Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice. Des. Codes Cryptography 43(2-3): 61-78 (2007)
32EEDaniel Bleichenbacher, Aggelos Kiayias, Moti Yung: Decoding interleaved Reed-Solomon codes over noisy channels. Theor. Comput. Sci. 379(3): 348-360 (2007)
2006
31 Moti Yung, Yevgeniy Dodis, Aggelos Kiayias, Tal Malkin: Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings Springer 2006
30EEAggelos Kiayias, Antonina Mitrofanova: Syntax-Driven Private Evaluation of Quantified Membership Queries. ACNS 2006: 470-485
29EEAggelos Kiayias, Michael Korman, David Walluck: An Internet Voting System Supporting User Privacy. ACSAC 2006: 165-174
28EEAggelos Kiayias, Moti Yung: Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination. Financial Cryptography 2006: 311-325
27EEAggelos Kiayias, Hong-Sheng Zhou: Concurrent Blind Signatures Without Random Oracles. SCN 2006: 49-62
26EEAggelos Kiayias, Moti Yung: Secure scalable group signature with dynamic joins and separable authorities. IJSN 1(1/2): 24-45 (2006)
2005
25EEAggelos Kiayias, Moti Yung: Group Signatures with Efficient Concurrent Join. EUROCRYPT 2005: 198-214
24EEAggelos Kiayias, Antonina Mitrofanova: Testing Disjointness of Private Datasets. Financial Cryptography 2005: 109-124
23EEGiovanni Di Crescenzo, Aggelos Kiayias: Asynchronous Perfectly Secure Communication over One-Time Pads. ICALP 2005: 216-227
22EEAggelos Kiayias, Yona Raekow, Alexander Russell: Efficient Steganography with Provable Security Guarantees. Information Hiding 2005: 118-130
21EEAggelos Kiayias, Moti Yung: Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers. Mycrypt 2005: 151-170
20EEYevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung: Scalable public-key tracing and revoking. Distributed Computing 17(4): 323-347 (2005)
2004
19 Aggelos Kiayias, Moti Yung: Proceedings of the 2004 ACM Workshop on Digital Rights Management 2004, Washington, DC, USA, October 25, 2004 ACM 2004
18EEAggelos Kiayias, Moti Yung: Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice. ASIACRYPT 2004: 401-416
17EEAggelos Kiayias, Yiannis Tsiounis, Moti Yung: Traceable Signatures. EUROCRYPT 2004: 571-589
16EEYevgeniy Dodis, Aggelos Kiayias, Antonio Nicolosi, Victor Shoup: Anonymous Identification in Ad Hoc Groups. EUROCRYPT 2004: 609-626
15EEAggelos Kiayias, Moti Yung: The Vector-Ballot e-Voting Approach. Financial Cryptography 2004: 72-89
2003
14EEAggelos Kiayias, Moti Yung: Extracting Group Signatures from Traitor Tracing Schemes. EUROCRYPT 2003: 630-648
13EEAggelos Kiayias, Moti Yung: Non-interactive Zero-Sharing with Applications to Private Distributed Decision Making. Financial Cryptography 2003: 303-320
12EEDaniel Bleichenbacher, Aggelos Kiayias, Moti Yung: Decoding of Interleaved Reed Solomon Codes over Noisy Data. ICALP 2003: 97-108
11EEYevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung: Scalable public-key tracing and revoking. PODC 2003: 190-199
2002
10EEAggelos Kiayias, Moti Yung: Breaking and Repairing Asymmetric Public-Key Traitor Tracing. Digital Rights Management Workshop 2002: 32-50
9EEAggelos Kiayias, Moti Yung: Traitor Tracing with Constant Transmission Rate. EUROCRYPT 2002: 450-465
8EEAggelos Kiayias, Moti Yung: Cryptographic Hardness Based on the Decoding of Reed-Solomon Codes. ICALP 2002: 232-243
7EEAggelos Kiayias, Moti Yung: Self-tallying Elections and Perfect Ballot Secrecy. Public Key Cryptography 2002: 141-158
6EEAggelos Kiayias, Moti Yung: Cryptographic Hardness based on the Decoding of Reed-Solomon Codes with Applications Electronic Colloquium on Computational Complexity (ECCC)(017): (2002)
2001
5EEAggelos Kiayias, Moti Yung: Self Protecting Pirates and Black-Box Traitor Tracing. CRYPTO 2001: 63-79
4EEAggelos Kiayias, Moti Yung: On Crafty Pirates and Foxy Tracers. Digital Rights Management Workshop 2001: 22-39
3EEAggelos Kiayias, Moti Yung: Secure Games with Polynomial Expressions. ICALP 2001: 939-950
2EEAggelos Kiayias, Aris Pagourtzis, Kiron Sharma, Stathis Zachos: Acceptor-Definable Counting Classes. Panhellenic Conference on Informatics 2001: 453-463
1EEAggelos Kiayias, Moti Yung: Polynomial Reconstruction Based Cryptography. Selected Areas in Cryptography 2001: 129-133

Coauthor Index

1Babak Azimi-Sadjadi [39]
2Daniel Bleichenbacher [12] [32]
3Jan Camenisch [48]
4Giovanni Di Crescenzo [23]
5Seda Davtyan [38] [44] [46]
6Yevgeniy Dodis [11] [16] [20] [31]
7Nelly Fazio [11] [20]
8Sotiris Kentros [44] [46]
9Michael Korman [29]
10Tal Malkin [31]
11Alejandra Mercado [39]
12Laurent D. Michel (Laurent Michel) [38] [44] [46]
13Antonina Mitrofanova [24] [30]
14Nicolas C. Nicolaou [44] [46]
15Antonio Nicolosi [16]
16Aris Pagourtzis [2]
17Serdar Pehlivanoglu [36]
18Yona Raekow [22]
19Alexander Russell [22] [38] [44] [46]
20Ahmad-Reza Sadeghi [40]
21Andrew See [38] [44] [46]
22Kiron Sharma [2]
23Narasimha Shashidhar [38] [44] [46]
24Victor Shoup [16]
25Alexander A. Shvartsman [38] [44] [46]
26Yiannis Tsiounis [17] [37]
27David Walluck [29]
28Shouhuai Xu [43]
29Bülent Yener [39]
30Moti Yung (Mordechai M. Yung) [1] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [17] [18] [19] [20] [21] [25] [26] [28] [31] [32] [33] [37] [40] [41] [43] [45] [48]
31Stathis Zachos [2]
32Hong-Sheng Zhou [27] [34] [35] [42] [47]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)