Siim, Janno
18  results:
Search for persons X
?
1

Constant-Size zk-SNARKs in ROM from Falsifiable Assumptions:

, In: Lecture Notes in Computer Science; Advances in Cryptology – EUROCRYPT 2024,
 
?
2

Impossibilities in Succinct Arguments: Black-Box Extraction..:

, In: Progress in Cryptology - AFRICACRYPT 2023; Lecture Notes in Computer Science,
 
?
3

Algebraic Group Model with Oblivious Sampling:

, In: Theory of Cryptography; Lecture Notes in Computer Science,
 
?
4

Counting Vampires: From Univariate Sumcheck to Updatable ZK..:

, In: Advances in Cryptology – ASIACRYPT 2022; Lecture Notes in Computer Science,
Lipmaa, Helger ; Siim, Janno ; Zając, Michał - p. 249-278 , 2022
 
?
5

Verifiably-Extractable OWFs and Their Applications to Subve..:

, In: Lecture Notes in Computer Science; Advances in Cryptology – ASIACRYPT 2021,
Fauzi, Prastudy ; Lipmaa, Helger ; Siim, Janno.. - p. 618-649 , 2021
 
?
6

Snarky Ceremonies:

, In: Lecture Notes in Computer Science; Advances in Cryptology – ASIACRYPT 2021,
Kohlweiss, Markulf ; Maller, Mary ; Siim, Janno. - p. 98-127 , 2021
 
?
7

On Subversion-Resistant SNARKs:

Abdolmaleki, Behzad ; Lipmaa, Helger ; Siim, Janno.
Journal of Cryptology.  34 (2021)  3 - p. , 2021
 
?
8

Another Look at Extraction and Randomization of Groth's zk-..:

, In: Financial Cryptography and Data Security; Lecture Notes in Computer Science,
Baghery, Karim ; Kohlweiss, Markulf ; Siim, Janno. - p. 457-475 , 2021
 
?
9

Somewhere Statistically Binding Commitment Schemes with App..:

, In: Financial Cryptography and Data Security; Lecture Notes in Computer Science,
Fauzi, Prastudy ; Lipmaa, Helger ; Pindado, Zaira. - p. 436-456 , 2021
 
?
10

On QA-NIZK in the BPK Model:

, In: Lecture Notes in Computer Science; Public-Key Cryptography – PKC 2020,
 
?
11

A Non-interactive Shuffle Argument with Low Trust Assumptio..:

, In: Topics in Cryptology – CT-RSA 2020; Lecture Notes in Computer Science,
 
?
12

UC-Secure CRS Generation for SNARKs:

, In: Progress in Cryptology – AFRICACRYPT 2019; Lecture Notes in Computer Science,
 
?
13

DL-Extractable UC-Commitment Schemes:

, In: Applied Cryptography and Network Security; Lecture Notes in Computer Science,
 
?
14

On the Security Properties of e-Voting Bulletin Boards:

, In: Lecture Notes in Computer Science; Security and Cryptography for Networks,
 
?
15

Non-interactive shuffle arguments ; Mitte-interaktiivsed se..:

Siim, Janno
Dissertationes informaticae Universitatis Tartuensis;18.  , 2020
 
1-15