Blockchain mining games A Kiayias, E Koutsoupias, M Kyropoulou, Y Tselekounis Proceedings of the 2016 ACM Conference on Economics and Computation, 365-382, 2016 | 263 | 2016 |
Security analysis and improvements for the IETF MLS standard for group messaging J Alwen, S Coretti, Y Dodis, Y Tselekounis Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020 | 81 | 2020 |
Practical non-malleable codes from l-more extractable hash functions A Kiayias, FH Liu, Y Tselekounis Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 32 | 2016 |
Modular design of secure group messaging protocols and the security of MLS J Alwen, S Coretti, Y Dodis, Y Tselekounis Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 27 | 2021 |
Secure outsourcing of cryptographic circuits manufacturing G Ateniese, A Kiayias, B Magri, Y Tselekounis, D Venturi Provable Security: 12th International Conference, ProvSec 2018, Jeju, South …, 2018 | 18* | 2018 |
Tamper resilient circuits: The adversary at the gates A Kiayias, Y Tselekounis Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013 | 18 | 2013 |
Multi-Access Communications in Wireless Mesh Networks by Virtualization S Sargento, R Matos, KA Hummel, A Hess, S Toumpis, Y Tselekounis, ... Wireless Multi-Access Environments and Quality of Service Provisioning …, 2012 | 11* | 2012 |
Non-malleable codes for partial functions with manipulation detection A Kiayias, FH Liu, Y Tselekounis Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018 | 10 | 2018 |
Optimal single-server private information retrieval M Zhou, WK Lin, Y Tselekounis, E Shi Advances in Cryptology–EUROCRYPT 2023: 42nd Annual International Conference …, 2023 | 4 | 2023 |
Steel: Composable hardware-based stateful and randomised functional encryption P Bhatotia, M Kohlweiss, L Martinico, Y Tselekounis Public-Key Cryptography–PKC 2021: 24th IACR International Conference on …, 2021 | 4 | 2021 |
Cryptographic techniques for hardware security I Tselekounis, Y Tselekounis The University of Edinburgh, 2018 | 1 | 2018 |
Fork-Resilient Continuous Group Key Agreement J Alwen, M Mularczyk, Y Tselekounis Cryptology ePrint Archive, 2023 | | 2023 |
Leakage Resilient l-more Extractable Hash and Applications to Non-Malleable Cryptography A Kiayias, FH Liu, Y Tselekounis Cryptology ePrint Archive, 2022 | | 2022 |
PANORAMIX - Final System D Mitropoulos, G Tsoukalas, P Louridas, Y Tselekounis | | 2019 |
Tamper Resilient Circuits Y Tselekounis National and Kapodistrian University of Athens, 2014 | | 2014 |