Items where Author is "Kiayias, Aggelos"
Kiayias, Aggelos and Zacharias, Thomas and Zhang, Bingsheng (2017) An Efficient E2E Verifiable E-voting System without Setup Assumptions. IEEE Security and Privacy Magazine, 15 (3). pp. 14-23. ISSN 1540-7993
Kiayias, Aggelos and Zacharias, Thomas and Zhang, Bingsheng (2017) Ceremonies for end-to-end verifiable elections. In: PKC 2017: Public-Key Cryptography – PKC 2017 : 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II Editors (view affiliations). Lecture Notes in Computer Science . Springer, pp. 305-334. ISBN 9783662543870
Baldimtsi, Foteini and Kiayias, Aggelos and Zacharias, Thomas and Zhang, Bingsheng (2016) Indistinguishable proofs of work or knowledge. In: Advances in Cryptology – ASIACRYPT 2016 : 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II. Lecture Notes in Computer Science . Springer, Heidelberg, pp. 902-933. ISBN 9783662538890
Chondros, Nikos and Zhang, Bingsheng and Zacharias, Thomas and Diamantopoulos, Panos and Maneas, Stathis and Patsonakis, Christos and Delis, Alex and Kiayias, Aggelos and Roussopoulos, Mema (2016) D-DEMOS : a distributed, end-to-end verifiable, internet voting system. In: Proceedings of the 36th IEEE International Conference on Distributed Computing Systems (ICDCS 2016) :. 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS), . IEEE, pp. 711-720.
Kiayias, Aggelos and Zacharias, Thomas and Zhang, Bingsheng (2015) DEMOS-2 : scalable E2E verifiable elections without random oracles. In: CCS '15 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security :. ACM, USA, pp. 352-363. ISBN 9781450338325
Kiayias, Aggelos and Zacharias, Thomas and Zhang, Bingsheng (2015) End-to-end verifiable elections in the standard model. In: Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques :. Springer, pp. 468-498. ISBN 9783662468036