Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improvement for distinguisher efficiency of the 3-round Feistel network and a random permutation., , , and . IDAACS (2), page 743-746. IEEE, (2011)978-1-4577-1426-9.Snarktor: A Decentralized Protocol for Scaling SNARKs Verification in Blockchains., , and . IACR Cryptol. ePrint Arch., (2024)Latus Incentive Scheme: Enabling Decentralization in Blockchains based on Recursive SNARKs., , and . IACR Cryptol. ePrint Arch., (2021)Djed: A Formally Verified Crypto-Backed Autonomous Stablecoin Protocol., , , and . ICBC, page 1-9. IEEE, (2023)Zendoo: a zk-SNARK Verifiable Cross-Chain Transfer Protocol Enabling Decoupled and Decentralized Sidechains., , and . ICDCS, page 1257-1262. IEEE, (2020)Decreasing Security Threshold Against Double Spend Attack in Networks with Slow Synchronization., , , , , and . INFOCOM Workshops, page 216-221. IEEE, (2019)Trustless Cross-chain Communication for Zendoo Sidechains., , and . IACR Cryptol. ePrint Arch., (2022)Analysis of splitting attacks on Bitcoin and GHOST consensus protocols., , , , , and . IDAACS, page 978-982. IEEE, (2017)Number of confirmation blocks for Bitcoin and GHOST consensus protocols on networks with delayed message delivery: Extended abstract., , , , , and . CRYBLOCK@MobiSys, page 42-47. ACM, (2018)