Segui
Janno Siim
Janno Siim
Simula UiB
Email verificata su simula.no - Home page
Titolo
Citata da
Citata da
Anno
On subversion-resistant SNARKs
B Abdolmaleki, H Lipmaa, J Siim, M Zając
Journal of Cryptology 34, 1-42, 2021
1112021
Another look at extraction and randomization of Groth’s zk-SNARK
K Baghery, M Kohlweiss, J Siim, M Volkhov
Financial Cryptography and Data Security: 25th International Conference, FC …, 2021
482021
On the security properties of e-voting bulletin boards
A Kiayias, A Kuldmaa, H Lipmaa, J Siim, T Zacharias
International Conference on Security and Cryptography for Networks, 505-523, 2018
432018
An efficient pairing-based shuffle argument
P Fauzi, H Lipmaa, J Siim, M Zając
Advances in Cryptology–ASIACRYPT 2017: 23rd International Conference on the …, 2017
412017
UC-secure CRS generation for SNARKs
B Abdolmaleki, K Baghery, H Lipmaa, J Siim, M Zając
Progress in Cryptology–AFRICACRYPT 2019: 11th International Conference on …, 2019
322019
On trade-offs of applying block chains for electronic voting bulletin boards
S Heiberg, I Kubjas, J Siim, J Willemson
Cryptology ePrint Archive, 2018
302018
On QA-NIZK in the BPK Model
B Abdolmaleki, H Lipmaa, J Siim, M Zając
302018
Proof-of-stake
J Siim
Research seminar in cryptography, 2017
262017
Snarky ceremonies
M Kohlweiss, M Maller, J Siim, M Volkhov
Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021
252021
Counting vampires: from univariate sumcheck to updatable ZK-SNARK
H Lipmaa, J Siim, M Zając
International Conference on the Theory and Application of Cryptology and …, 2022
142022
Impossibilities in succinct arguments: Black-box extraction and more
M Campanelli, C Ganesh, H Khoshakhlagh, J Siim
International Conference on Cryptology in Africa, 465-489, 2023
112023
DL-extractable UC-commitment schemes
B Abdolmaleki, K Baghery, H Lipmaa, J Siim, M Zając
Applied Cryptography and Network Security: 17th International Conference …, 2019
102019
Somewhere statistically binding commitment schemes with applications
P Fauzi, H Lipmaa, Z Pindado, J Siim
Financial Cryptography and Data Security: 25th International Conference, FC …, 2021
72021
A non-interactive shuffle argument with low trust assumptions
A Aggelakis, P Fauzi, G Korfiatis, P Louridas, F Mergoupis-Anagnou, ...
Topics in Cryptology–CT-RSA 2020: The Cryptographers’ Track at the RSA …, 2020
52020
DAG-based distributed ledgers
J Siim
Research Seminar in Cryptology, 2018
42018
Algebraic group model with oblivious sampling
H Lipmaa, R Parisella, J Siim
Theory of Cryptography Conference, 363-392, 2023
32023
Verifiably-extractable owfs and their applications to subversion zero-knowledge
P Fauzi, H Lipmaa, J Siim, M Zając, AT Ødegaard
Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021
22021
Constant-Size zk-SNARKs in ROM from Falsifiable Assumptions
H Lipmaa, R Parisella, J Siim
Cryptology ePrint Archive, 2024
12024
Towards Secure E-Voting with Everlasting Privacy
A Gennaro, S Heiberg, H Lipmaa, J Siim, I Visconti
media. voog. com. https://media. voog. com/0000/0042/1115/files/Towards …, 0
1
Validation Criteria
N Karagiannidis, S Heiberg, S Kutenko, A Truu, P Louridas, D Nadales, ...
2020
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20