The algebraic group model and its applications G Fuchsbauer, E Kiltz, J Loss Annual International Cryptology Conference, 33-62, 2018 | 326 | 2018 |
On the security of two-round multi-signatures M Drijvers, K Edalatnejad, B Ford, E Kiltz, J Loss, G Neven, I Stepanovs IEEE Symposium on Security and Privacy, 1084-1101, 2019 | 140 | 2019 |
On the (in) security of ROS F Benhamouda, T Lepoint, J Loss, M Orrù, M Raykova Annual International Conference on the Theory and Applications of …, 2021 | 108 | 2021 |
On the security of time-lock puzzles and timed commitments J Katz, J Loss, J Xu Theory of Cryptography: 18th International Conference, TCC 2020, Durham, NC …, 2020 | 64 | 2020 |
A modular treatment of blind signatures from identification schemes E Hauck, E Kiltz, J Loss Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019 | 62 | 2019 |
On the adaptive security of the threshold BLS signature scheme R Bacho, J Loss Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 58 | 2022 |
Lattice-based blind signatures, revisited E Hauck, E Kiltz, J Loss, NK Nguyen Annual International Cryptology Conference, 500-529, 2020 | 56 | 2020 |
Asynchronous byzantine agreement with subquadratic communication E Blum, J Katz, CD Liu-Zhang, J Loss Theory of Cryptography: 18th International Conference, TCC 2020, Durham, NC …, 2020 | 53 | 2020 |
A formal treatment of deterministic wallets P Das, S Faust, J Loss Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 50 | 2019 |
A classification of computational assumptions in the algebraic group model B Bauer, G Fuchsbauer, J Loss Annual International Cryptology Conference, 121-151, 2020 | 46 | 2020 |
Synchronous consensus with optimal asynchronous fallback guarantees E Blum, J Katz, J Loss Theory of Cryptography Conference, 131-150, 2019 | 46 | 2019 |
On pairing-free blind signature schemes in the algebraic group model J Kastner, J Loss, J Xu IACR International Conference on Public-Key Cryptography, 468-497, 2022 | 45 | 2022 |
Combining Asynchronous and Synchronous Byzantine Agreement: The Best of Both Worlds J Loss, T Moran | 39 | 2018 |
Efficient and universally composable protocols for oblivious transfer from the CDH assumption E Hauck, J Loss Cryptology ePrint Archive, 2017 | 34 | 2017 |
Tardigrade: An Atomic Broadcast Protocol for Arbitrary Network Conditions E Blum, J Katz, J Loss International Conference on the Theory and Application of Cryptology and …, 2021 | 32* | 2021 |
Always have a backup plan: fully secure synchronous MPC with asynchronous fallback E Blum, CD Liu-Zhang, J Loss Annual International Cryptology Conference, 707-731, 2020 | 32 | 2020 |
Boosting the Security of Blind Signature Schemes J Katz, J Loss, M Rosenberg International Conference on the Theory and Application of Cryptology and …, 2021 | 31 | 2021 |
Gossiping for communication-efficient broadcast G Tsimos, J Loss, C Papamanthou Annual International Cryptology Conference, 439-469, 2022 | 28* | 2022 |
Token meets wallet: Formalizing privacy and revocation for FIDO2 L Hanzlik, J Loss, B Wagner 2023 IEEE Symposium on Security and Privacy (SP), 1491-1508, 2023 | 25 | 2023 |
PI-Cut-Choo and Friends: Compact Blind Signatures via Parallel Instance Cut-and-Choose and More R Chairattana-Apirom, L Hanzlik, J Loss, A Lysyanskaya, B Wagner Annual International Cryptology Conference, 3-31, 2022 | 23 | 2022 |