| Anonymous multi-hop locks for blockchain scalability and interoperability G Malavolta, P Moreno-Sanchez, C Schneidewind, A Kate, M Maffei Cryptology ePrint Archive, 2018 | 437 | 2018 |
| Concurrency and privacy with payment-channel networks G Malavolta, P Moreno-Sanchez, A Kate, M Maffei, S Ravi Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017 | 397 | 2017 |
| Silentwhispers: Enforcing security and privacy in decentralized credit networks G Malavolta, P Moreno-Sanchez, A Kate, M Maffei Cryptology ePrint Archive, 2016 | 231 | 2016 |
| Homomorphic time-lock puzzles and applications G Malavolta, SAK Thyagarajan Annual International Cryptology Conference, 620-649, 2019 | 173 | 2019 |
| Universal atomic swaps: Secure exchange of coins across all blockchains SAK Thyagarajan, G Malavolta, P Moreno-Sanchez 2022 IEEE symposium on security and privacy (SP), 1299-1316, 2022 | 171 | 2022 |
| Trapdoor hash functions and their applications N Döttling, S Garg, Y Ishai, G Malavolta, T Mour, R Ostrovsky Annual International Cryptology Conference, 3-32, 2019 | 166 | 2019 |
| Subvector commitments with application to succinct arguments RWF Lai, G Malavolta Annual International Cryptology Conference, 530-560, 2019 | 152 | 2019 |
| Leveraging linear decryption: Rate-1 fully-homomorphic encryption and time-lock puzzles Z Brakerski, N Döttling, S Garg, G Malavolta Theory of Cryptography Conference, 407-437, 2019 | 141 | 2019 |
| Lattice-based SNARKs: publicly verifiable, preprocessing, and recursively composable MR Albrecht, V Cini, RWF Lai, G Malavolta, SAK Thyagarajan Annual International Cryptology Conference, 102-132, 2022 | 115 | 2022 |
| Factoring and pairings are not necessary for io: Circular-secure lwe suffices Z Brakerski, N Döttling, S Garg, G Malavolta Cryptology ePrint Archive, 2020 | 109 | 2020 |
| Candidate iO from homomorphic encryption schemes Z Brakerski, N Döttling, S Garg, G Malavolta Journal of Cryptology 36 (3), 27, 2023 | 106 | 2023 |
| Privacy and access control for outsourced personal records M Maffei, G Malavolta, M Reinert, D Schröder 2015 IEEE Symposium on Security and Privacy, 341-358, 2015 | 104 | 2015 |
| Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys N Fleischhacker, J Krupp, G Malavolta, J Schneider, D Schröder, ... Public-Key Cryptography–PKC 2016: 19th IACR International Conference on …, 2016 | 102 | 2016 |
| Verifiable timed signatures made practical SAK Thyagarajan, A Bhat, G Malavolta, N Döttling, A Kate, D Schröder Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020 | 94 | 2020 |
| Multi-key fully-homomorphic encryption in the plain model P Ananth, A Jain, Z Jin, G Malavolta Theory of Cryptography Conference, 28-57, 2020 | 73 | 2020 |
| Verifiable timed linkable ring signatures for scalable payments for monero SAK Thyagarajan, G Malavolta, F Schmid, D Schröder European Symposium on Research in Computer Security, 467-486, 2022 | 61* | 2022 |
| Efficient registration-based encryption N Glaeser, D Kolonelos, G Malavolta, A Rahimi Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 58 | 2023 |
| Statistical zaps and new oblivious transfer protocols V Goyal, A Jain, Z Jin, G Malavolta Annual International Conference on the Theory and Applications of …, 2020 | 58 | 2020 |
| Succinct arguments for bilinear group arithmetic: Practical structure-preserving cryptography RWF Lai, G Malavolta, V Ronge proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 58 | 2019 |
| Efficient laconic cryptography from learning with errors N Döttling, D Kolonelos, RWF Lai, C Lin, G Malavolta, A Rahimi Annual International Conference on the Theory and Applications of …, 2023 | 55 | 2023 |