Author of the publication

Measuring Illicit Activity in DeFi: The Case of Ethereum.

, , , , , , , and . Financial Cryptography Workshops, volume 12676 of Lecture Notes in Computer Science, page 197-203. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Noninteractive Certification of RSA Moduli and Beyond., , , and . ASIACRYPT (3), volume 11923 of Lecture Notes in Computer Science, page 700-727. Springer, (2019)Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols., , , and . ICETE (Selected Papers), volume 23 of Communications in Computer and Information Science, page 227-238. Springer, (2007)Anonymous Transferable E-Cash., , , and . Public Key Cryptography, volume 9020 of Lecture Notes in Computer Science, page 101-124. Springer, (2015)Advancing Open Science with Version Control and Blockchains., , , and . SE4Science@ICSE, page 13-14. IEEE, (2017)Universally Composable Accumulators., , and . IACR Cryptology ePrint Archive, (2018)Truncator: Time-space Tradeoff of Cryptographic Primitives., , , and . IACR Cryptol. ePrint Arch., (2022)TumbleBit: An Untrusted Bitcoin-Compatible Anonymous Payment Hub., , , , and . NDSS, The Internet Society, (2017)Watermarkable Public Key Encryption with Efficient Extraction Under Standard Assumptions., , and . SCN, volume 13409 of Lecture Notes in Computer Science, page 244-267. Springer, (2022)Non-interactive Blind Signatures from Lattices., , , and . IACR Cryptol. ePrint Arch., (2024)Secure Computation in Online Social Networks., , , , and . IACR Cryptol. ePrint Arch., (2016)