关注
Janno Siim
Janno Siim
Simula UiB
在 simula.no 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
On subversion-resistant SNARKs
B Abdolmaleki, H Lipmaa, J Siim, M Zając
Journal of Cryptology 34, 1-42, 2021
1152021
Another look at extraction and randomization of Groth’s zk-SNARK
K Baghery, M Kohlweiss, J Siim, M Volkhov
Financial Cryptography and Data Security: 25th International Conference, FC …, 2021
542021
On the security properties of e-voting bulletin boards
A Kiayias, A Kuldmaa, H Lipmaa, J Siim, T Zacharias
International Conference on Security and Cryptography for Networks, 505-523, 2018
442018
An efficient pairing-based shuffle argument
P Fauzi, H Lipmaa, J Siim, M Zając
Advances in Cryptology–ASIACRYPT 2017: 23rd International Conference on the …, 2017
432017
UC-secure CRS generation for SNARKs
B Abdolmaleki, K Baghery, H Lipmaa, J Siim, M Zając
Progress in Cryptology–AFRICACRYPT 2019: 11th International Conference on …, 2019
322019
On trade-offs of applying block chains for electronic voting bulletin boards
S Heiberg, I Kubjas, J Siim, J Willemson
Cryptology ePrint Archive, 2018
312018
On QA-NIZK in the BPK Model
B Abdolmaleki, H Lipmaa, J Siim, M Zając
312018
Snarky ceremonies
M Kohlweiss, M Maller, J Siim, M Volkhov
Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021
292021
Proof-of-stake
J Siim
Research seminar in cryptography, 2017
282017
Counting vampires: from univariate sumcheck to updatable ZK-SNARK
H Lipmaa, J Siim, M Zając
International Conference on the Theory and Application of Cryptology and …, 2022
212022
Impossibilities in succinct arguments: Black-box extraction and more
M Campanelli, C Ganesh, H Khoshakhlagh, J Siim
International Conference on Cryptology in Africa, 465-489, 2023
122023
DL-extractable UC-commitment schemes
B Abdolmaleki, K Baghery, H Lipmaa, J Siim, M Zając
Applied Cryptography and Network Security: 17th International Conference …, 2019
102019
Algebraic group model with oblivious sampling
H Lipmaa, R Parisella, J Siim
Theory of Cryptography Conference, 363-392, 2023
82023
Somewhere statistically binding commitment schemes with applications
P Fauzi, H Lipmaa, Z Pindado, J Siim
Financial Cryptography and Data Security: 25th International Conference, FC …, 2021
82021
A non-interactive shuffle argument with low trust assumptions
A Aggelakis, P Fauzi, G Korfiatis, P Louridas, F Mergoupis-Anagnou, ...
Topics in Cryptology–CT-RSA 2020: The Cryptographers’ Track at the RSA …, 2020
72020
Constant-size zk-SNARKs in ROM from falsifiable assumptions
H Lipmaa, R Parisella, J Siim
Annual International Conference on the Theory and Applications of …, 2024
42024
DAG-based distributed ledgers
J Siim
Research Seminar in Cryptology, 2018
42018
Verifiably-extractable owfs and their applications to subversion zero-knowledge
P Fauzi, H Lipmaa, J Siim, M Zając, AT Ødegaard
Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021
22021
Towards Secure E-Voting with Everlasting Privacy
A Gennaro, S Heiberg, H Lipmaa, J Siim, I Visconti
media. voog. com. https://media. voog. com/0000/0042/1115/files/Towards …, 0
1
Shuffle Arguments Based on Subset-Checking
B Abdolmaleki, P Fauzi, T Krips, J Siim
Cryptology ePrint Archive, 2024
2024
系统目前无法执行此操作,请稍后再试。
文章 1–20