Search for persons
X
?
Proceedings of the 43rd ACM Symposium on Principles of Distributed Computing ,
2
Lumiere: Making Optimal BFT for Partial Synchrony Practical:
, In:
?
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security ,
3
Abraxas: Throughput-Efficient Hybrid Asynchronous Consensus:
, In:
?
Financial Cryptography and Data Security; Lecture Notes in Computer Science ,
4
Player-Replaceability and Forensic Support Are Two Sides of..:
, In:
?
Lecture Notes in Computer Science; Public-Key Cryptography – PKC 2023 ,
5
Transparent Batchable Time-lock Puzzles and Applications to..:
, In:
?
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security ,
6
TrustBoost: Boosting Trust among Interoperable Blockchains:
, In:
?
2022 Asian Hardware Oriented Security and Trust Symposium (AsianHOST) ,
8
On the Limitations of Logic Locking the Approximate Circuit:
, In:
?
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security ,
10
Empirical Analysis of EIP-1559 : Transaction Fees, Waiti..:
, In:
?
Proceedings of the 2022 International Conference on Management of Data ,
11
IncShrink: Architecting Efficient Outsourced Databases usin..:
, In:
?
Advances in Cryptology – ASIACRYPT 2022; Lecture Notes in Computer Science ,
13
Efficient Adaptively-Secure Byzantine Agreement for Long Me..:
, In:
?
2021 IEEE Symposium on Security and Privacy (SP) ,
15