| Constant-size commitments to polynomials and their applications A Kate, G Zaverucha, I Goldberg Advances in Cryptology-ASIACRYPT 2010, 177-194, 2010 | 1082 | 2010 |
| CoinShuffle: Practical decentralized coin mixing for Bitcoin T Ruffing, P Moreno-Sanchez, A Kate European Symposium on Research in Computer Security (ESORICS) 2014, 2014 | 644 | 2014 |
| Anonymous multi-hop locks for blockchain scalability and interoperability G Malavolta, P Moreno-Sanchez, C Schneidewind, A Kate, M Maffei Cryptology ePrint Archive, 2018 | 437 | 2018 |
| Concurrency and privacy with payment-channel networks G Malavolta, P Moreno-Sanchez, A Kate, M Maffei, S Ravi Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017 | 397 | 2017 |
| Blockchain access privacy: Challenges and directions R Henry, A Herzberg, A Kate IEEE Security & Privacy 16 (4), 38-45, 2018 | 383 | 2018 |
| Settling payments fast and private: Efficient decentralized routing for path-based transactions S Roos, P Moreno-Sanchez, A Kate, I Goldberg NDSS, 2018 | 304 | 2018 |
| SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks G Malavolta, P Moreno-Sanchez, A Kate, M Maffei NDSS, 2017 | 231 | 2017 |
| Anonymity and security in delay tolerant networks A Kate, GM Zaverucha, U Hengartner SecureComm 2007. Third International Conference on Security and Privacy in …, 2007 | 216 | 2007 |
| Distributed Key Generation in the Wild A Kate, Y Huang, I Goldberg IACR Cryptology ePrint Archive, 2012: 377, 2012, 2012 | 209* | 2012 |
| Obliviad: Provably secure and practical online behavioral advertising M Backes, A Kate, M Maffei, K Pecina 2012 IEEE Symposium on Security and Privacy, 257-271, 2012 | 197 | 2012 |
| P2P mixing and unlinkable Bitcoin transactions T Ruffing, P Moreno-Sanchez, A Kate NDSS 17, 2017 | 190 | 2017 |
| Data lineage in malicious environments M Backes, N Grimm, A Kate IEEE Transactions on Dependable and Secure Computing 13 (2), 178-191, 2015 | 182 | 2015 |
| AnoA: A Framework for Analyzing Anonymous Communication Protocols M Backes, A Kate, P Manoharan, S Meiser, E Mohammadi Journal of Privacy and Confidentiality 7 (2), 79-125, 2016 | 148 | 2016 |
| Distributed private-key generators for identity-based cryptography A Kate, I Goldberg Security and Cryptography for Networks, 436-453, 2010 | 148* | 2010 |
| Honeybadgermpc and asynchromix: Practical asynchronous mpc and its application to anonymous communication D Lu, T Yurek, S Kulshreshtha, R Govind, A Kate, A Miller Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 146 | 2019 |
| cMix: Mixing with minimal real-time asymmetric cryptographic operations D Chaum, D Das, F Javani, A Kate, A Krasnova, J De Ruiter, AT Sherman International conference on applied cryptography and network security, 557-578, 2017 | 144* | 2017 |
| Anonymity trilemma: Strong anonymity, low bandwidth overhead, low latency-choose two D Das, S Meiser, E Mohammadi, A Kate 2018 IEEE Symposium on Security and Privacy (SP), 108-126, 2018 | 136 | 2018 |
| Computational verifiable secret sharing revisited M Backes, A Kate, A Patra International Conference on the Theory and Application of Cryptology and …, 2011 | 121 | 2011 |
| Pairing-based onion routing A Kate, G Zaverucha, I Goldberg International Workshop on Privacy Enhancing Technologies, 95-112, 2007 | 117 | 2007 |
| Liar, liar, coins on fire! Penalizing equivocation by loss of bitcoins T Ruffing, A Kate, D Schröder Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 112 | 2015 |