עקוב אחר
Janno Siim
Janno Siim
Simula UiB
כתובת אימייל מאומתת בדומיין simula.no - דף הבית
כותרת
צוטט על ידי
צוטט על ידי
שנה
On subversion-resistant SNARKs
B Abdolmaleki, H Lipmaa, J Siim, M Zając
Journal of Cryptology 34, 1-42, 2021
1182021
Another look at extraction and randomization of Groth’s zk-SNARK
K Baghery, M Kohlweiss, J Siim, M Volkhov
Financial Cryptography and Data Security: 25th International Conference, FC …, 2021
622021
An efficient pairing-based shuffle argument
P Fauzi, H Lipmaa, J Siim, M Zając
Advances in Cryptology–ASIACRYPT 2017: 23rd International Conference on the …, 2017
462017
On the security properties of e-voting bulletin boards
A Kiayias, A Kuldmaa, H Lipmaa, J Siim, T Zacharias
International Conference on Security and Cryptography for Networks, 505-523, 2018
452018
Snarky ceremonies
M Kohlweiss, M Maller, J Siim, M Volkhov
Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021
362021
UC-secure CRS generation for SNARKs
B Abdolmaleki, K Baghery, H Lipmaa, J Siim, M Zając
Progress in Cryptology–AFRICACRYPT 2019: 11th International Conference on …, 2019
332019
Proof-of-stake
J Siim
Research seminar in cryptography, 2017
332017
On trade-offs of applying block chains for electronic voting bulletin boards
S Heiberg, I Kubjas, J Siim, J Willemson
Cryptology ePrint Archive, 2018
312018
On QA-NIZK in the BPK Model
B Abdolmaleki, H Lipmaa, J Siim, M Zając
312018
Counting vampires: from univariate sumcheck to updatable ZK-SNARK
H Lipmaa, J Siim, M Zając
International Conference on the Theory and Application of Cryptology and …, 2022
232022
Impossibilities in succinct arguments: Black-box extraction and more
M Campanelli, C Ganesh, H Khoshakhlagh, J Siim
International Conference on Cryptology in Africa, 465-489, 2023
182023
Algebraic group model with oblivious sampling
H Lipmaa, R Parisella, J Siim
Theory of Cryptography Conference, 363-392, 2023
122023
DL-extractable UC-commitment schemes
B Abdolmaleki, K Baghery, H Lipmaa, J Siim, M Zając
Applied Cryptography and Network Security: 17th International Conference …, 2019
112019
Somewhere statistically binding commitment schemes with applications
P Fauzi, H Lipmaa, Z Pindado, J Siim
Financial Cryptography and Data Security: 25th International Conference, FC …, 2021
82021
A non-interactive shuffle argument with low trust assumptions
A Aggelakis, P Fauzi, G Korfiatis, P Louridas, F Mergoupis-Anagnou, ...
Topics in Cryptology–CT-RSA 2020: The Cryptographers’ Track at the RSA …, 2020
82020
Constant-size zk-SNARKs in ROM from falsifiable assumptions
H Lipmaa, R Parisella, J Siim
Annual International Conference on the Theory and Applications of …, 2024
52024
DAG-based distributed ledgers
J Siim
Research Seminar in Cryptology, 2018
42018
On Knowledge-Soundness of Plonk in ROM from Falsifiable Assumptions
H Lipmaa, R Parisella, J Siim
Cryptology ePrint Archive, 2024
22024
Verifiably-extractable owfs and their applications to subversion zero-knowledge
P Fauzi, H Lipmaa, J Siim, M Zając, AT Ødegaard
Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021
22021
Towards Secure E-Voting with Everlasting Privacy
A Gennaro, S Heiberg, H Lipmaa, J Siim, I Visconti
media. voog. com. https://media. voog. com/0000/0042/1115/files/Towards …, 0
1
המערכת אינה יכולה לבצע את הפעולה כעת. נסה שוב מאוחר יותר.
מאמרים 1–20