Proofs of space S Dziembowski, S Faust, V Kolmogorov, K Pietrzak Annual Cryptology Conference, 585-605, 2015 | 503 | 2015 |
Perun: Virtual payment hubs over cryptographic currencies S Dziembowski, L Eckey, S Faust, D Malinowski IACR Cryptology ePrint Archive 2017, Tech. Rep., 2017 | 318* | 2017 |
General state channel networks S Dziembowski, S Faust, K Hostáková Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 298 | 2018 |
Unifying leakage models: from probing attacks to noisy leakage. A Duc, S Dziembowski, S Faust Advances in Cryptology–EUROCRYPT 2014: 33rd Annual International Conference …, 2014 | 297* | 2014 |
Making masking security proofs concrete A Duc, S Faust, FX Standaert Advances in Cryptology--EUROCRYPT 2015, 401-429, 2015 | 281* | 2015 |
Fairswap: How to fairly exchange digital goods S Dziembowski, L Eckey, S Faust Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 255 | 2018 |
Protecting circuits from leakage: the computationally-bounded and noisy cases S Faust, T Rabin, L Reyzin, E Tromer, V Vaikuntanathan Advances in Cryptology–EUROCRYPT 2010: 29th Annual International Conference …, 2010 | 206* | 2010 |
Composable masking schemes in the presence of physical defaults & the robust probing model S Faust, V Grosso, SM Del Pozo, C Paglialonga, FX Standaert IACR Transactions on Cryptographic Hardware and Embedded Systems, 89-120, 2018 | 182 | 2018 |
On the non-malleability of the Fiat-Shamir transform S Faust, M Kohlweiss, GA Marson, D Venturi Progress in Cryptology-INDOCRYPT 2012: 13th International Conference on …, 2012 | 182 | 2012 |
Leakage-resilient signatures S Faust, E Kiltz, K Pietrzak, GN Rothblum Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010 …, 2010 | 180 | 2010 |
Parallel implementations of masking schemes and the bounded moment leakage model G Barthe, F Dupressoir, S Faust, B Grégoire, FX Standaert, PY Strub Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017 | 172 | 2017 |
Secure two-party computation with low communication I Damgård, S Faust, C Hazay Theory of Cryptography Conference, 54-74, 2012 | 151 | 2012 |
{FastKitten}: Practical smart contracts on bitcoin P Das, L Eckey, T Frassetto, D Gens, K Hostáková, P Jauernig, S Faust, ... 28th USENIX security symposium (USENIX security 19), 801-818, 2019 | 132 | 2019 |
Continuous non-malleable codes S Faust, P Mukherjee, JB Nielsen, D Venturi Theory of Cryptography: 11th Theory of Cryptography Conference, TCC 2014 …, 2014 | 127 | 2014 |
Generalized channels from limited blockchain scripts and adaptor signatures L Aumayr, O Ersoy, A Erwig, S Faust, K Hostáková, M Maffei, ... Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021 | 125* | 2021 |
Efficient non-malleable codes and key derivation for poly-size tampering circuits S Faust, P Mukherjee, D Venturi, D Wichs IEEE Transactions on Information Theory 62 (12), 7179-7194, 2016 | 122 | 2016 |
Multi-party virtual state channels S Dziembowski, L Eckey, S Faust, J Hesse, K Hostáková Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019 | 112 | 2019 |
Leakage-resilient cryptography from the inner-product extractor S Dziembowski, S Faust International Conference on the Theory and Application of Cryptology and …, 2011 | 100 | 2011 |
Practical leakage-resilient symmetric cryptography S Faust, K Pietrzak, J Schipper Cryptographic Hardware and Embedded Systems–CHES 2012: 14th International …, 2012 | 93 | 2012 |
Theory and practice of a leakage resilient masking scheme J Balasch, S Faust, B Gierlichs, I Verbauwhede Advances in Cryptology–ASIACRYPT 2012: 18th International Conference on the …, 2012 | 77 | 2012 |