Peter Gaži
Peter Gaži
IOHK Research
Verified email at iohk.io
Title
Cited by
Cited by
Year
Ouroboros Praos: An adaptively-secure, semi-synchronous proof-of-stake blockchain
B David, P Gaži, A Kiayias, A Russell
Annual International Conference on the Theory and Applications of …, 2018
235*2018
Spacemint: A cryptocurrency based on proofs of space
S Park, A Kwon, G Fuchsbauer, P Gaži, J Alwen, K Pietrzak
International Conference on Financial Cryptography and Data Security, 480-499, 2018
150*2018
Ouroboros genesis: Composable proof-of-stake blockchains with dynamic availability
C Badertscher, P Gaži, A Kiayias, A Russell, V Zikas
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1072018
Stake-bleeding attacks on proof-of-stake blockchains
P Gaži, A Kiayias, A Russell
2018 Crypto Valley Conference on Blockchain Technology (CVCBT), 85-92, 2018
612018
Resource-restricted indifferentiability
G Demay, P Gaži, M Hirt, U Maurer
Advances in Cryptology–EUROCRYPT 2013, 664-683, 2013
432013
Cascade encryption revisited
P Gaži, U Maurer
Advances in Cryptology–ASIACRYPT 2009, 37-51, 2009
402009
Proof-of-Stake Sidechains.
P Gazi, A Kiayias, D Zindros
IACR Cryptology ePrint Archive 2018, 1239, 2018
38*2018
The exact PRF security of truncation: Tight bounds for keyed sponges and truncated CBC
P Gaži, K Pietrzak, S Tessaro
Advances in Cryptology--CRYPTO 2015, 368-387, 2015
372015
The Exact PRF-Security of NMAC and HMAC
P Gaži, K Pietrzak, M Rybár
Advances in Cryptology–CRYPTO 2014, 113-130, 2014
352014
Plain versus randomized cascading-based key-length extension for block ciphers
P Gaži
Annual Cryptology Conference, 551-570, 2013
252013
Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading
P Gaži, S Tessaro
Advances in Cryptology–EUROCRYPT 2012, 63-80, 2012
252012
Provably Robust Sponge-Based PRNGs and KDFs
P Gaži, S Tessaro
EUROCRYPT 2016, 0
23*
Pay-To-Win: Cheap, Crowdfundable, Cross-chain Incentive Manipulation Attacks on Cryptocurrencies
A Judmayer, N Stifter, A Zamyatin, I Tsabary, I Eyal, P Gaži, S Meiklejohn, ...
19*
Parallel Chains: Improving Throughput and Latency of Blockchain Protocols via Parallel Composition.
M Fitzi, P Gazi, A Kiayias, A Russell
IACR Cryptol. ePrint Arch. 2018, 1119, 2018
142018
On the memory-hardness of data-independent password-hashing functions
J Alwen, P Gaži, C Kamath, K Klein, G Osang, K Pietrzak, L Reyzin, ...
Cryptology ePrint Archive, Report 2016/783, 2016. http://eprint. iacr. org …, 0
14*
Secret-key cryptography from ideal primitives: A systematic overview
P Gaži, S Tessaro
Information Theory Workshop (ITW), 2015 IEEE, 1-5, 2015
122015
Free-start distinguishing: Combining two types of indistinguishability amplification
P Gaži, U Maurer
International Conference on Information Theoretic Security, 28-44, 2009
122009
The exact security of PMAC
P Gazi, KZ Pietrzak, M Rybár
IACR Transactions on Symmetric Cryptology 2016 (2), 2017
102017
Ouroboros Chronos: Permissionless Clock Synchronization via Proof-of-Stake.
C Badertscher, P Gazi, A Kiayias, A Russell, V Zikas
IACR Cryptol. ePrint Arch. 2019, 838, 2019
82019
Relaxing full-codebook security: a refined analysis of key-length extension schemes
P Gaži, J Lee, Y Seurin, J Steinberger, S Tessaro
Fast Software Encryption, 319-341, 2015
72015
The system can't perform the operation now. Try again later.
Articles 1–20