Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Aggelos Kiayias
2010 – today
- 2013
[j9]Sotiris Kentros, Aggelos Kiayias: Solving the at-most-once problem with nearly optimal effectiveness. Theor. Comput. Sci. 496: 69-88 (2013)
[c67]Juan A. Garay, David S. Johnson, Aggelos Kiayias, Moti Yung: Resource-based corruptions and the combinatorics of hidden diversity. ITCS 2013: 415-428
[c66]Russell J. Jancewicz, Aggelos Kiayias, Laurent D. Michel, Alexander Russell, Alexander A. Shvartsman: Malicious takeover of voting systems: arbitrary code execution on optical scan voting terminals. SAC 2013: 1816-1823
[c65]Aggelos Kiayias, Anthi Orfanou: Scaling Privacy Guarantees in Code-Verification Elections. VOTE-ID 2013: 1-24
[i21]Aggelos Kiayias, Stavros Papadopoulos, Nikos Triandopoulos, Thomas Zacharias: Delegatable Pseudorandom Functions and Applications. IACR Cryptology ePrint Archive 2013: 379 (2013)- 2012
[j8]Stavros Papadopoulos, Aggelos Kiayias, Dimitris Papadias: Exact In-Network Aggregation with Integrity and Confidentiality. IEEE Trans. Knowl. Data Eng. 24(10): 1760-1773 (2012)
[c64]Sotiris Kentros, Aggelos Kiayias: Solving the At-Most-Once Problem with Nearly Optimal Effectiveness. ICDCN 2012: 122-137
[c63]Aggelos Kiayias, Alexander Russell, Narasimha Shashidhar: Key-Efficient Steganography. Information Hiding 2012: 142-159
[c62]Aggelos Kiayias, Katerina Samari: Lower Bounds for Private Broadcast Encryption. Information Hiding 2012: 176-190
[c61]Seda Davtyan, Aggelos Kiayias, Laurent Michel, Alexander Russell, Alexander A. Shvartsman: Integrity of electronic voting systems: fallacious use of cryptography. SAC 2012: 1486-1493
[c60]
[e6]Aggelos Kiayias, Helger Lipmaa (Eds.): E-Voting and Identity - Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7187, Springer 2012, ISBN 978-3-642-32746-9
[i20]Murat Ak, Aggelos Kiayias, Serdar Pehlivanoglu, Ali Aydin Selçuk: Generic Construction of Trace and Revoke Schemes. IACR Cryptology ePrint Archive 2012: 531 (2012)
[i19]Juan A. Garay, David S. Johnson, Aggelos Kiayias, Moti Yung: Resource-based Corruptions and the Combinatorics of Hidden Diversity. IACR Cryptology ePrint Archive 2012: 556 (2012)- 2011
[c59]Seung Geol Choi, Aggelos Kiayias, Tal Malkin: BiTR: Built-in Tamper Resilience. ASIACRYPT 2011: 740-758
[c58]Aggelos Kiayias: On the Effects of Pirate Evolution on the Design of Digital Content Distribution Systems. IWCC 2011: 223-237
[c57]Stavros Papadopoulos, Aggelos Kiayias, Dimitris Papadias: Secure and efficient in-network processing of exact SUM queries. ICDE 2011: 517-528
[c56]Aggelos Kiayias, Serdar Pehlivanoglu: Attacking Traitor Tracing Schemes Using History Recording and Abrupt Decoders. ISC 2011: 17-31
[c55]Sotiris Kentros, Aggelos Kiayias: Solving the at-most-once problem with nearly optimal effectiveness. PODC 2011: 229-230
[e5]Aggelos Kiayias (Ed.): Topics in Cryptology - CT-RSA 2011 - The Cryptographers' Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings. Lecture Notes in Computer Science 6558, Springer 2011, ISBN 978-3-642-19073-5
[r1]Aggelos Kiayias, Bülent Yener: Key Generation Using Physical Properties of Wireless Communication. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 682-683
[i18]Sotiris Kentros, Aggelos Kiayias: Solving the At-Most-Once Problem with Nearly Optimal Effectiveness. CoRR abs/1107.2990 (2011)- 2010
[b1]Aggelos Kiayias, Serdar Pehlivanoglu: Encryption for Digital Content. Advances in Information Security 52, Springer 2010, ISBN 978-1-4419-0043-2, pp. 1-197
[c54]Aggelos Kiayias, Serdar Pehlivanoglu: Improving the Round Complexity of Traitor Tracing Schemes. ACNS 2010: 273-290
[c53]Juan A. Garay, Aggelos Kiayias, Hong-Sheng Zhou: A Framework for the Sound Specification of Cryptographic Tasks. CSF 2010: 277-289
[c52]Dan Boneh, Aggelos Kiayias, Hart William Montgomery: Robust fingerprinting codes: a near optimal construction. Digital Rights Management Workshop 2010: 3-12
[c51]
[c50]Aggelos Kiayias, Moti Yung: Tree-Homomorphic Encryption and Scalable Hierarchical Secret-Ballot Elections. Financial Cryptography 2010: 257-271
[c49]Jens Groth, Aggelos Kiayias, Helger Lipmaa: Multi-query Computationally-Private Information Retrieval with Constant Communication Rate. Public Key Cryptography 2010: 107-123
[c48]Aggelos Kiayias, Moti Yung: The Vector-Ballot Approach for Online Voting Procedures. Towards Trustworthy Elections 2010: 155-174
[e4]Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M. Miret, Kazue Sako, Francesc Sebé (Eds.): Financial Cryptography and Data Security, FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6054, Springer 2010, ISBN 978-3-642-14991-7
[i17]Seung Geol Choi, Aggelos Kiayias, Tal Malkin: BiTR: Built-in Tamper Resilience. IACR Cryptology ePrint Archive 2010: 503 (2010)
2000 – 2009
- 2009
[j7]Aggelos Kiayias, Hong-Sheng Zhou: Hidden identity-based signatures. IET Information Security 3(3): 119-127 (2009)
[j6]Tigran Antonyan, Seda Davtyan, Sotiris Kentros, Aggelos Kiayias, Laurent Michel, Nicolas C. Nicolaou, Alexander Russell, Alexander A. Shvartsman: State-wide elections, optical scan voting systems, and the pursuit of integrity. IEEE Transactions on Information Forensics and Security 4(4): 597-610 (2009)
[c47]
[c46]Aggelos Kiayias, Serdar Pehlivanoglu: On the security of a public-key traitor tracing scheme with sublinear ciphertext size. Digital Rights Management Workshop 2009: 1-10
[c45]Jan Camenisch, Aggelos Kiayias, Moti Yung: On the Portability of Generalized Schnorr Proofs. EUROCRYPT 2009: 425-442
[c44]Aggelos Kiayias, Bülent Yener, Moti Yung: Privacy-Preserving Information Markets for Computing Statistical Data. Financial Cryptography 2009: 32-50
[c43]Maged H. Ibrahim, Aggelos Kiayias, Moti Yung, Hong-Sheng Zhou: Secure Function Collection with Sublinear Storage. ICALP (2) 2009: 534-545
[c42]Aggelos Kiayias: Robust fingerprinting codes and applications. Media Forensics and Security 2009: 72540
[c41]Aggelos Kiayias, Hong-Sheng Zhou: Zero-Knowledge Proofs with Witness Elimination. Public Key Cryptography 2009: 124-138
[c40]Seda Davtyan, Sotiris Kentros, Aggelos Kiayias, Laurent D. Michel, Nicolas C. Nicolaou, Alexander Russell, Andrew See, Narasimha Shashidhar, Alexander A. Shvartsman: Taking total control of voting systems: firmware manipulations on an optical scan voting terminal. SAC 2009: 2049-2053
[c39]Sotiris Kentros, Aggelos Kiayias, Nicolas C. Nicolaou, Alexander A. Shvartsman: At-most-once semantics in asynchronous shared memory. SPAA 2009: 43-44
[c38]Sotiris Kentros, Aggelos Kiayias, Nicolas C. Nicolaou, Alexander A. Shvartsman: At-Most-Once Semantics in Asynchronous Shared Memory. DISC 2009: 258-273
[i16]Aggelos Kiayias, Yona Raekow, Alexander Russell, Narasimha Shashidhar: Efficient Steganography with Provable Security Guarantees. CoRR abs/0909.3658 (2009)
[i15]Aggelos Kiayias, Alexander Russell, Narasimha Shashidhar: Randomness-optimal Steganography. CoRR abs/0909.4575 (2009)
[i14]Jan Camenisch, Aggelos Kiayias, Moti Yung: On the Portability of Generalized Schnorr Proofs. IACR Cryptology ePrint Archive 2009: 50 (2009)- 2008
[j5]Aggelos Kiayias, Moti Yung: Cryptographic Hardness Based on the Decoding of Reed-Solomon Codes. IEEE Transactions on Information Theory 54(6): 2752-2769 (2008)
[c37]Aggelos Kiayias, Moti Yung: Public-key traitor tracing from efficient decoding and unbounded enrollment: extended abstract. Digital Rights Management Workshop 2008: 9-18
[c36]Aggelos Kiayias, Shouhuai Xu, Moti Yung: Privacy Preserving Data Mining within Anonymous Credential Systems. SCN 2008: 57-76
[c35]Aggelos Kiayias, Hong-Sheng Zhou: Equivocal Blind Signatures and Adaptive UC-Security. TCC 2008: 340-355
[c34]Seda Davtyan, Sotiris Kentros, Aggelos Kiayias, Laurent Michel, Nicolas C. Nicolaou, Alexander Russell, Andrew See, Narasimha Shashidhar, Alexander A. Shvartsman: Pre-Election Testing and Post-Election Audit of Optical Scan Voting Terminal Memory Cards. EVT 2008
[i13]Juan A. Garay, Aggelos Kiayias, Hong-Sheng Zhou: A Framework for the Sound Specification of Cryptographic Tasks. IACR Cryptology ePrint Archive 2008: 132 (2008)- 2007
[j4]Aggelos Kiayias, Moti Yung: Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice. Des. Codes Cryptography 43(2-3): 61-78 (2007)
[j3]Daniel Bleichenbacher, Aggelos Kiayias, Moti Yung: Decoding interleaved Reed-Solomon codes over noisy channels. Theor. Comput. Sci. 379(3): 348-360 (2007)
[c33]Aggelos Kiayias, Laurent Michel, Alexander Russell, Narasimha Shashidhar, Andrew See, Alexander A. Shvartsman, Seda Davtyan: Tampering with Special Purpose Trusted Computing Devices: A Case Study in Optical Scan E-Voting. ACSAC 2007: 30-39
[c32]
[c31]Babak Azimi-Sadjadi, Aggelos Kiayias, Alejandra Mercado, Bülent Yener: Robust key generation from signal envelopes in wireless networks. ACM Conference on Computer and Communications Security 2007: 401-410
[c30]Aggelos Kiayias, Serdar Pehlivanoglu: Pirate Evolution: How to Make the Most of Your Traitor Keys. CRYPTO 2007: 448-465
[c29]Aggelos Kiayias, Hong-Sheng Zhou: Hidden Identity-Based Signatures. Financial Cryptography 2007: 134-147
[c28]Aggelos Kiayias, Hong-Sheng Zhou: Trading Static for Adaptive Security in Universally Composable Zero-Knowledge. ICALP 2007: 316-327
[e3]Moti Yung, Aggelos Kiayias, Ahmad-Reza Sadeghi (Eds.): Proceedings of the Seventh ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 29, 2007. ACM 2007, ISBN 978-1-59593-884-8
[i12]Aggelos Kiayias, Yiannis Tsiounis, Moti Yung: Group Encryption. IACR Cryptology ePrint Archive 2007: 15 (2007)
[i11]Aggelos Kiayias, Hong-Sheng Zhou: Equivocal Blind Signatures and Adaptive UC-Security. IACR Cryptology ePrint Archive 2007: 132 (2007)
[i10]Aggelos Kiayias, Hong-Sheng Zhou: Hidden Identity-Based Signatures. IACR Cryptology ePrint Archive 2007: 140 (2007)
[i9]Aggelos Kiayias, Moti Yung: Cryptographic Hardness based on the Decoding of Reed-Solomon Codes. IACR Cryptology ePrint Archive 2007: 153 (2007)- 2006
[j2]
[c27]Aggelos Kiayias, Antonina Mitrofanova: Syntax-Driven Private Evaluation of Quantified Membership Queries. ACNS 2006: 470-485
[c26]Aggelos Kiayias, Michael Korman, David Walluck: An Internet Voting System Supporting User Privacy. ACSAC 2006: 165-174
[c25]Aggelos Kiayias, Moti Yung: Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination. Financial Cryptography 2006: 311-325
[c24]Aggelos Kiayias, Hong-Sheng Zhou: Concurrent Blind Signatures Without Random Oracles. SCN 2006: 49-62
[e2]Moti Yung, Yevgeniy Dodis, Aggelos Kiayias, Tal Malkin (Eds.): Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings. Lecture Notes in Computer Science 3958, Springer 2006, ISBN 3-540-33851-9
[i8]Aggelos Kiayias, Moti Yung: Copyrighting Public-key Functions and Applications to Black-box Traitor Tracing. IACR Cryptology ePrint Archive 2006: 458 (2006)- 2005
[j1]Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung: Scalable public-key tracing and revoking. Distributed Computing 17(4): 323-347 (2005)
[c23]Aggelos Kiayias, Moti Yung: Group Signatures with Efficient Concurrent Join. EUROCRYPT 2005: 198-214
[c22]Aggelos Kiayias, Antonina Mitrofanova: Testing Disjointness of Private Datasets. Financial Cryptography 2005: 109-124
[c21]Giovanni Di Crescenzo, Aggelos Kiayias: Asynchronous Perfectly Secure Communication over One-Time Pads. ICALP 2005: 216-227
[c20]Aggelos Kiayias, Yona Raekow, Alexander Russell: Efficient Steganography with Provable Security Guarantees. Information Hiding 2005: 118-130
[c19]Aggelos Kiayias, Moti Yung: Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers. Mycrypt 2005: 151-170
[c18]A. Karygiannis, Aggelos Kiayias, Yiannis Tsiounis: A Solution for Wireless Privacy and Payments based on E-cash. SecureComm 2005: 206-218
[i7]Aggelos Kiayias, Moti Yung: Group Signatures with Efficient Concurrent Join. IACR Cryptology ePrint Archive 2005: 345 (2005)
[i6]Aggelos Kiayias, Hong-Sheng Zhou: Concurrent Blind Signatures without Random Oracles. IACR Cryptology ePrint Archive 2005: 435 (2005)- 2004
[c17]Aggelos Kiayias, Moti Yung: Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice. ASIACRYPT 2004: 401-416
[c16]
[c15]Yevgeniy Dodis, Aggelos Kiayias, Antonio Nicolosi, Victor Shoup: Anonymous Identification in Ad Hoc Groups. EUROCRYPT 2004: 609-626
[c14]
[e1]
[i5]Aggelos Kiayias, Yiannis Tsiounis, Moti Yung: Traceable Signatures. IACR Cryptology ePrint Archive 2004: 7 (2004)
[i4]Aggelos Kiayias, Moti Yung: Group Signatures: Provable Security, Efficient Constructions and Anonymity from Trapdoor-Holders. IACR Cryptology ePrint Archive 2004: 76 (2004)
[i3]Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung: Scalable Public-Key Tracing and Revoking. IACR Cryptology ePrint Archive 2004: 160 (2004)
[i2]Aggelos Kiayias, Moti Yung: Cryptanalyzing the Polynomial-Reconstruction based Public-Key System Under Optimal Parameter Choice. IACR Cryptology ePrint Archive 2004: 217 (2004)- 2003
[c13]Aggelos Kiayias, Moti Yung: Extracting Group Signatures from Traitor Tracing Schemes. EUROCRYPT 2003: 630-648
[c12]Aggelos Kiayias, Moti Yung: Non-interactive Zero-Sharing with Applications to Private Distributed Decision Making. Financial Cryptography 2003: 303-320
[c11]Daniel Bleichenbacher, Aggelos Kiayias, Moti Yung: Decoding of Interleaved Reed Solomon Codes over Noisy Data. ICALP 2003: 97-108
[c10]Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung: Scalable public-key tracing and revoking. PODC 2003: 190-199
[p1]Aggelos Kiayias, Moti Yung: Robust Verifiable non-Interactive Zero-Sharing - A Plug-in Utility for Enhanced Voters' Privacy. Secure Electronic Voting 2003: 139-151- 2002
[c9]Aggelos Kiayias, Moti Yung: Breaking and Repairing Asymmetric Public-Key Traitor Tracing. Digital Rights Management Workshop 2002: 32-50
[c8]Aggelos Kiayias, Moti Yung: Traitor Tracing with Constant Transmission Rate. EUROCRYPT 2002: 450-465
[c7]Aggelos Kiayias, Moti Yung: Cryptographic Hardness Based on the Decoding of Reed-Solomon Codes. ICALP 2002: 232-243
[c6]Aggelos Kiayias, Moti Yung: Self-tallying Elections and Perfect Ballot Secrecy. Public Key Cryptography 2002: 141-158
[i1]Aggelos Kiayias, Moti Yung: Cryptographic Hardness based on the Decoding of Reed-Solomon Codes with Applications. Electronic Colloquium on Computational Complexity (ECCC)(017) (2002)- 2001
[c5]Aggelos Kiayias, Moti Yung: On Crafty Pirates and Foxy Tracers. Digital Rights Management Workshop 2001: 22-39
[c4]Aggelos Kiayias, Moti Yung: Self Protecting Pirates and Black-Box Traitor Tracing. CRYPTO 2001: 63-79
[c3]
[c2]Aggelos Kiayias, Aris Pagourtzis, Kiron Sharma, Stathis Zachos: Acceptor-Definable Counting Classes. Panhellenic Conference on Informatics 2001: 453-463
[c1]Aggelos Kiayias, Moti Yung: Polynomial Reconstruction Based Cryptography. Selected Areas in Cryptography 2001: 129-133
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:24 CEST by the dblp team



