[C : Oakland] | Supporting Human Raters with the
Detection of Harmful Content Using Large Language Models
|
[C : IMC] | Give and Take: An
End-to-End Investigation of Giveaway Scam Conversion Rates
|
[C : USENIX Security] | Understanding
Help-Seeking and Help-Giving on Social Media for Image-Based Sexual
Abuse
|
[C : Crypto] | Bingo: Adaptivity and Asynchrony in
Verifiable Secret Sharing and Distributed Key Generation
(slides)
|
[C : USENIX Security] | ACORN: Input
Validation for Secure Aggregation
|
[C : USENIX Security] | One Server for the Price of Two:
Simple and Fast Single-Server Private Information Retrieval
|
[C : FC] | Forsage: Anatomy of a
Smart-Contract Pyramid Scheme
|
[C : USENIX Security] | How to Peel a
Million: Validating and Expanding Bitcoin Clusters
(slides)
|
[J : PETS] | SoK: SCT Auditing in Certificate Transparency
(slides)
|
[C : PODC] | Reaching
Consensus for Asynchronous Distributed Key Generation
|
[C : Eurocrypt] | Aggregatable Distributed Key
Generation
|
[C : DIS] | Problematising Transparency Through LARP And Deliberation
|
[C : Oakland] | SoK: Hate, Harassment, and the
Changing Landscape of Online Abuse
|
[W : WTSC] | Pay to Win: Cheap, Cross-Chain
Bribing Attacks on PoW Cryptocurrencies
|
[W : WTSC] | SoK: Algorithmic Incentive
Manipulation Attacks on Permissionless PoW Cryptocurrencies
|
[C : FC] | An Empirical Analysis of Privacy in the
Lightning Network
|
[M : Brookings] | Design Choices for Central Bank Digital Currency: Policy and Technical Considerations
|
[J : PETS] | Reputable List Curation from
Decentralized Voting (concurrent
version)
|
[C : Asiacrypt] | Quisquis: A New Design for
Anonymous Cryptocurrencies
|
[C : CCS] | Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updatable Structured Reference Strings |
[C : AFT] | SoK: Consensus in the Age of
Blockchains
|
[C : AFT] | PISA: Arbitration Outsourcing for
State Channels
|
[C : USENIX Security] | Tracing Transactions Across
Cryptocurrency Ledgers
|
[C : FC] | Why is a Ravencoin Like a
TokenDesk? An Exploration of Code Diversity in the Cryptocurrency
Landscape (short version) (slides)
|
[C : NDSS] | Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers |
[W : CBT] | Contour: A Practical System for Binary
Transparency
|
[C : Crypto] | Updatable and Universal Common
Reference Strings with Applications to zk-SNARKs
|
[C : USENIX Security] | An Empirical Analysis of Anonymity in Zcash |
[J : S&P] | Top Ten Obstacles along Distributed
Ledgers' Path to Adoption (slides)
|
[J : PETS] | Möbius: Trustless
Tumbling for Transaction Privacy
|
[W : BITCOIN] | Egalitarian Society or Benevolent Dictatorship? The State of
Cryptocurrency Governance
|
[W : BITCOIN] | Smart Contracts for Bribing Miners |
[W : CBT] | Who Am I? Secure Identity
Registration on Distributed Ledgers
|
[C : Asiacrypt] | Déjà Q
All Over Again: Tighter and Broader Reductions of q-Type Assumptions
|
[C : CCS] | Transparency Overlays and Applications
(slides)
|
[J : CACM] | A Fistful of Bitcoins: Characterizing
Payments Among Men with No Names
|
[C : NDSS] | Centrally Banked Cryptocurrencies
(slides)
|
[C : PKC] | A Profitable Sub-Prime Loan: Obtaining the
Advantages of Composite Order in Prime-Order Bilinear Groups
|
[W : BITCOIN] | Privacy-Enhancing Overlays in
Bitcoin (slides)
|
[C : CCS] | Algebraic MACs and Keyed-Verification Anonymous
Credentials
|
[J : TCAD] | Leveraging Gate-Level Properties to
Identify Hardware Timing Channels
|
[C : CSF] | Malleable Signatures: New Definitions and
Delegatable Anonymous Credentials
|
[C : Eurocrypt] | Key-Versatile Signatures and
Applications: RKA, KDM, and Joint Enc/Sig
|
[C : Eurocrypt] | Déjà Q: Using Dual Systems
to Revisit q-Type Assumptions
(slides)
|
[M : Thesis] | Flexible Models for Secure Systems (slides) |
[C : NDSS] | Botcoin: Monetizing Stolen Cycles
|
[C : CT-RSA] | Rethinking Verifiably Encrypted
Signatures: A Gap in Functionality and Potential Solutions
(slides)
|
[J : login] | A Fistful of Bitcoins: Characterizing
Payments Among Men with No Names
|
[C : IMC] | A Fistful of Bitcoins: Characterizing Payments
Among Men with No Names
(slides)
|
[C : DATE] | A Practical Testing Framework for
Isolating Hardware Timing Channels
|
[C : TCC] | Succinct Malleable NIZKs and an Application
to Compact Shuffles
(slides)
|
[C : PKC] | Verifiable Elections That Scale for Free
(slides)
|
[C : Eurocrypt] | Malleable Proof Systems and
Applications
(slides)
|
[C : USENIX Security] | The Phantom Tollbooth: Privacy-Preserving
Electronic Toll Collection in the Presence of Driver Collusion
(slides)
|
[W : WOOT] | Heat of the Moment: Characterizing the
Efficacy of Thermal Camera-Based Attacks
(slides)
|
[C : Asiacrypt] | Limitations on Transformations from
Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind
Signatures
(slides)
|
[C : USENIX Security] | ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash (slides) |
[M : Thesis] | An Extension of the Groth-Sahai Proof
System
|