[go: up one dir, main page]

Follow
Aniket Kate
Title
Cited by
Cited by
Year
Constant-size commitments to polynomials and their applications
A Kate, G Zaverucha, I Goldberg
Advances in Cryptology-ASIACRYPT 2010, 177-194, 2010
10822010
CoinShuffle: Practical decentralized coin mixing for Bitcoin
T Ruffing, P Moreno-Sanchez, A Kate
European Symposium on Research in Computer Security (ESORICS) 2014, 2014
6442014
Anonymous multi-hop locks for blockchain scalability and interoperability
G Malavolta, P Moreno-Sanchez, C Schneidewind, A Kate, M Maffei
Cryptology ePrint Archive, 2018
4372018
Concurrency and privacy with payment-channel networks
G Malavolta, P Moreno-Sanchez, A Kate, M Maffei, S Ravi
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
3972017
Blockchain access privacy: Challenges and directions
R Henry, A Herzberg, A Kate
IEEE Security & Privacy 16 (4), 38-45, 2018
3832018
Settling payments fast and private: Efficient decentralized routing for path-based transactions
S Roos, P Moreno-Sanchez, A Kate, I Goldberg
NDSS, 2018
3042018
SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks
G Malavolta, P Moreno-Sanchez, A Kate, M Maffei
NDSS, 2017
2312017
Anonymity and security in delay tolerant networks
A Kate, GM Zaverucha, U Hengartner
SecureComm 2007. Third International Conference on Security and Privacy in …, 2007
2162007
Distributed Key Generation in the Wild
A Kate, Y Huang, I Goldberg
IACR Cryptology ePrint Archive, 2012: 377, 2012, 2012
209*2012
Obliviad: Provably secure and practical online behavioral advertising
M Backes, A Kate, M Maffei, K Pecina
2012 IEEE Symposium on Security and Privacy, 257-271, 2012
1972012
P2P mixing and unlinkable Bitcoin transactions
T Ruffing, P Moreno-Sanchez, A Kate
NDSS 17, 2017
1902017
Data lineage in malicious environments
M Backes, N Grimm, A Kate
IEEE Transactions on Dependable and Secure Computing 13 (2), 178-191, 2015
1822015
AnoA: A Framework for Analyzing Anonymous Communication Protocols
M Backes, A Kate, P Manoharan, S Meiser, E Mohammadi
Journal of Privacy and Confidentiality 7 (2), 79-125, 2016
1482016
Distributed private-key generators for identity-based cryptography
A Kate, I Goldberg
Security and Cryptography for Networks, 436-453, 2010
148*2010
Honeybadgermpc and asynchromix: Practical asynchronous mpc and its application to anonymous communication
D Lu, T Yurek, S Kulshreshtha, R Govind, A Kate, A Miller
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
1462019
cMix: Mixing with minimal real-time asymmetric cryptographic operations
D Chaum, D Das, F Javani, A Kate, A Krasnova, J De Ruiter, AT Sherman
International conference on applied cryptography and network security, 557-578, 2017
144*2017
Anonymity trilemma: Strong anonymity, low bandwidth overhead, low latency-choose two
D Das, S Meiser, E Mohammadi, A Kate
2018 IEEE Symposium on Security and Privacy (SP), 108-126, 2018
1362018
Computational verifiable secret sharing revisited
M Backes, A Kate, A Patra
International Conference on the Theory and Application of Cryptology and …, 2011
1212011
Pairing-based onion routing
A Kate, G Zaverucha, I Goldberg
International Workshop on Privacy Enhancing Technologies, 95-112, 2007
1172007
Liar, liar, coins on fire! Penalizing equivocation by loss of bitcoins
T Ruffing, A Kate, D Schröder
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1122015
The system can't perform the operation now. Try again later.
Articles 1–20