publications
publications by categories in reversed chronological order. generated by jekyll-scholar.
2023
- Sniper Backdoor: Single Client Targeted Backdoor Attack in Federated LearningIn IEEE Conference on Secure and Trustworthy Machine Learning (accepted) 2023
- BlindHub: Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable AmountsIn IEEE Symposium on Security and Privacy (accepted) 2023
2022
- Poster: Backdoor Attacks on Spiking NNs and Neuromorphic DatasetsIn Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2022
- SyncPCN/PSyncPCN: Payment Channel Networks without Blockchain SynchronyIn ACM Advances in Financial Technologies (presented) 2022
- Get Me out of This Payment! Bailout: An HTLC Re-routing ProtocolCryptology ePrint Archive 2022
- A New Look at Blockchain Leader Election: Simple, Efficient, Sustainable and Post-QuantumCryptology ePrint Archive 2022
- Feverless: Fast and secure vertical federated learning based on xgboost for decentralized labelsIEEE Transactions on Big Data 2022
2021
- Generalized Channels from Limited Blockchain Scripts and Adaptor SignaturesIn ASIACRYPT (2) 2021
- Bitcoin-Compatible Virtual ChannelsIn IEEE Symposium on Security and Privacy 2021
- Practical Exchange for Unique Digital GoodsIn DAPPS 2021
2020
- How to Profit from Payments ChannelsIn Financial Cryptography 2020
- Post-Quantum Adaptor Signatures and Payment Channel NetworksIn ESORICS (2) 2020
- Homomorphic extensions of CRT-based secret sharingDiscrete Applied Mathematics 2020
2019
- MUSCLE: authenticated external data retrieval from multiple sources for smart contractsIn SAC 2019
- DECOUPLES: a decentralized, unlinkable and privacy-preserving traceability system for the supply chainIn SAC 2019
- Decentralized Incentive-Compatible and Sybil-Proof Transaction AdvertisementIn MARBLE 2019
- TULIP: A Fully Incentive Compatible Blockchain Framework Amortizing Redundant CommunicationIn EuroS&P Workshops 2019
- Multilevel Threshold Secret Sharing based on the Chinese Remainder TheoremInternational Journal of Information Security Science 2019
2018
- Transaction Propagation on Permissionless Blockchains: Incentive and Routing MechanismsIn CVCBT 2018
- TRADE: A transparent, decentralized traceability system for the supply chainIn Proceedings of 1st ERCIM Blockchain Workshop 2018
2017
2016
- Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption AlgorithmIn ASIACRYPT (1) 2016
- Impossible Differential Cryptanalysis of 16/18-Round KhudraIn LightSec 2016
- A CRT-based verifiable secret sharing scheme secure against unbounded adversariesSecurity and Communication Networks 2016