default search action
Peter Gazi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c34]Christian Badertscher, Peter Gazi, Aggelos Kiayias, Alexander Russell, Vassilis Zikas:
Consensus Redux: Distributed Ledgers in the Face of Adversarial Supremacy. CSF 2024: 143-158 - 2023
- [c33]Peter Gazi, Aggelos Kiayias, Alexander Russell:
Fait Accompli Committee Selection: Improving the Size-Security Tradeoff of Stake-Based Committees. CCS 2023: 845-858 - [c32]Peter Gazi, Ling Ren, Alexander Russell:
Practical Settlement Bounds for Longest-Chain Consensus. CRYPTO (1) 2023: 107-138 - [i36]Peter Gazi, Aggelos Kiayias, Alexander Russell:
Fait Accompli Committee Selection: Improving the Size-Security Tradeoff of Stake-Based Committees. IACR Cryptol. ePrint Arch. 2023: 1273 (2023) - 2022
- [c31]Hamza Abusalah, Georg Fuchsbauer, Peter Gazi, Karen Klein:
SNACKs: Leveraging Proofs of Sequential Work for Blockchain Light Clients. ASIACRYPT (1) 2022: 806-836 - [c30]Peter Gazi, Ling Ren, Alexander Russell:
Practical Settlement Bounds for Proof-of-Work Blockchains. CCS 2022: 1217-1230 - [c29]Christian Badertscher, Peter Gazi, Iñigo Querejeta-Azurmendi, Alexander Russell:
A Composable Security Treatment of ECVRF and Batch Verifications. ESORICS (3) 2022: 22-41 - [i35]Hamza Abusalah, Georg Fuchsbauer, Peter Gazi, Karen Klein:
SNACKs: Leveraging Proofs of Sequential Work for Blockchain Light Clients. IACR Cryptol. ePrint Arch. 2022: 240 (2022) - [i34]Christian Badertscher, Peter Gazi, Iñigo Querejeta-Azurmendi, Alexander Russell:
On UC-Secure Range Extension and Batch Verification for ECVRF. IACR Cryptol. ePrint Arch. 2022: 1045 (2022) - [i33]Peter Gazi, Ling Ren, Alexander Russell:
Practical Settlement Bounds for Longest-Chain Consensus. IACR Cryptol. ePrint Arch. 2022: 1571 (2022) - 2021
- [c28]Christian Badertscher, Peter Gazi, Aggelos Kiayias, Alexander Russell, Vassilis Zikas:
Dynamic Ad Hoc Clock Synchronization. EUROCRYPT (3) 2021: 399-428 - [c27]Manuel M. T. Chakravarty, Sandro Coretti, Matthias Fitzi, Peter Gazi, Philipp Kant, Aggelos Kiayias, Alexander Russell:
Fast Isomorphic State Channels. Financial Cryptography (2) 2021: 339-358 - [c26]Aljosha Judmayer, Nicholas Stifter, Alexei Zamyatin, Itay Tsabary, Ittay Eyal, Peter Gazi, Sarah Meiklejohn, Edgar R. Weippl:
SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies. Financial Cryptography Workshops 2021: 507-532 - [c25]Aljosha Judmayer, Nicholas Stifter, Alexei Zamyatin, Itay Tsabary, Ittay Eyal, Peter Gazi, Sarah Meiklejohn, Edgar R. Weippl:
Pay to Win: Cheap, Cross-Chain Bribing Attacks on PoW Cryptocurrencies. Financial Cryptography Workshops 2021: 533-549 - [i32]Peter Gazi, Ling Ren, Alexander Russell:
Practical Settlement Bounds for Proof-of-Work Blockchains. IACR Cryptol. ePrint Arch. 2021: 805 (2021) - 2020
- [c24]Peter Gazi, Aggelos Kiayias, Alexander Russell:
Tight Consistency Bounds for Bitcoin. CCS 2020: 819-838 - [c23]Rainer Stütz, Peter Gazi, Bernhard Haslhofer, Jacob Illum:
Stake Shift in Major Cryptocurrencies: An Empirical Study. Financial Cryptography 2020: 97-113 - [c22]Matthias Fitzi, Peter Gazi, Aggelos Kiayias, Alexander Russell:
Ledger Combiners for Fast Settlement. TCC (1) 2020: 322-352 - [i31]Rainer Stütz, Peter Gazi, Bernhard Haslhofer, Jacob Illum:
Stake Shift in Major Cryptocurrencies: An Empirical Study. CoRR abs/2001.04187 (2020) - [i30]Matthias Fitzi, Peter Gazi, Aggelos Kiayias, Alexander Russell:
Proof-of-Stake Blockchain Protocols with Near-Optimal Throughput. IACR Cryptol. ePrint Arch. 2020: 37 (2020) - [i29]Manuel M. T. Chakravarty, Sandro Coretti, Matthias Fitzi, Peter Gazi, Philipp Kant, Aggelos Kiayias, Alexander Russell:
Hydra: Fast Isomorphic State Channels. IACR Cryptol. ePrint Arch. 2020: 299 (2020) - [i28]Peter Gazi, Aggelos Kiayias, Alexander Russell:
Tight Consistency Bounds for Bitcoin. IACR Cryptol. ePrint Arch. 2020: 661 (2020) - [i27]Matthias Fitzi, Peter Gazi, Aggelos Kiayias, Alexander Russell:
Ledger Combiners for Fast Settlement. IACR Cryptol. ePrint Arch. 2020: 675 (2020) - [i26]Christian Badertscher, Peter Gazi, Aggelos Kiayias, Alexander Russell, Vassilis Zikas:
Consensus Redux: Distributed Ledgers in the Face of Adversarial Supremacy. IACR Cryptol. ePrint Arch. 2020: 1021 (2020) - [i25]Aljosha Judmayer, Nicholas Stifter, Alexei Zamyatin, Itay Tsabary, Ittay Eyal, Peter Gazi, Sarah Meiklejohn, Edgar R. Weippl:
SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies. IACR Cryptol. ePrint Arch. 2020: 1614 (2020)
2010 – 2019
- 2019
- [j2]Grégory Demay, Peter Gazi, Ueli Maurer, Björn Tackmann:
Per-session security: Password-based cryptography revisited. J. Comput. Secur. 27(1): 75-111 (2019) - [c21]Peter Gazi, Aggelos Kiayias, Dionysis Zindros:
Proof-of-Stake Sidechains. IEEE Symposium on Security and Privacy 2019: 139-156 - [i24]Aljosha Judmayer, Nicholas Stifter, Alexei Zamyatin, Itay Tsabary, Ittay Eyal, Peter Gazi, Sarah Meiklejohn, Edgar R. Weippl:
Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies. IACR Cryptol. ePrint Arch. 2019: 775 (2019) - [i23]Christian Badertscher, Peter Gazi, Aggelos Kiayias, Alexander Russell, Vassilis Zikas:
Ouroboros Chronos: Permissionless Clock Synchronization via Proof-of-Stake. IACR Cryptol. ePrint Arch. 2019: 838 (2019) - 2018
- [c20]Joël Alwen, Peter Gazi, Chethan Kamath, Karen Klein, Georg Osang, Krzysztof Pietrzak, Leonid Reyzin, Michal Rolínek, Michal Rybár:
On the Memory-Hardness of Data-Independent Password-Hashing Functions. AsiaCCS 2018: 51-65 - [c19]Christian Badertscher, Peter Gazi, Aggelos Kiayias, Alexander Russell, Vassilis Zikas:
Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability. CCS 2018: 913-930 - [c18]Peter Gazi, Aggelos Kiayias, Alexander Russell:
Stake-Bleeding Attacks on Proof-of-Stake Blockchains. CVCBT 2018: 85-92 - [c17]Bernardo David, Peter Gazi, Aggelos Kiayias, Alexander Russell:
Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain. EUROCRYPT (2) 2018: 66-98 - [c16]Sunoo Park, Albert Kwon, Georg Fuchsbauer, Peter Gazi, Joël Alwen, Krzysztof Pietrzak:
SpaceMint: A Cryptocurrency Based on Proofs of Space. Financial Cryptography 2018: 480-499 - [i22]Peter Gazi, Aggelos Kiayias, Alexander Russell:
Stake-Bleeding Attacks on Proof-of-Stake Blockchains. IACR Cryptol. ePrint Arch. 2018: 248 (2018) - [i21]Christian Badertscher, Peter Gazi, Aggelos Kiayias, Alexander Russell, Vassilis Zikas:
Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability. IACR Cryptol. ePrint Arch. 2018: 378 (2018) - [i20]Matthias Fitzi, Peter Gazi, Aggelos Kiayias, Alexander Russell:
Parallel Chains: Improving Throughput and Latency of Blockchain Protocols via Parallel Composition. IACR Cryptol. ePrint Arch. 2018: 1119 (2018) - [i19]Peter Gazi, Aggelos Kiayias, Dionysis Zindros:
Proof-of-Stake Sidechains. IACR Cryptol. ePrint Arch. 2018: 1239 (2018) - 2017
- [c15]Grégory Demay, Peter Gazi, Ueli Maurer, Björn Tackmann:
Per-Session Security: Password-Based Cryptography Revisited. ESORICS (1) 2017: 408-426 - [i18]Peter Gazi, Krzysztof Pietrzak, Michal Rybár:
The Exact Security of PMAC. IACR Cryptol. ePrint Arch. 2017: 69 (2017) - [i17]Bernardo Machado David, Peter Gazi, Aggelos Kiayias, Alexander Russell:
Ouroboros Praos: An adaptively-secure, semi-synchronous proof-of-stake protocol. IACR Cryptol. ePrint Arch. 2017: 573 (2017) - 2016
- [j1]Peter Gazi, Krzysztof Pietrzak, Michal Rybár:
The Exact Security of PMAC. IACR Trans. Symmetric Cryptol. 2016(2): 145-161 (2016) - [c14]Peter Gazi, Stefano Tessaro:
Provably Robust Sponge-Based PRNGs and KDFs. EUROCRYPT (1) 2016: 87-116 - [i16]Grégory Demay, Peter Gazi, Ueli Maurer, Björn Tackmann:
Per-Session Security: Password-Based Cryptography Revisited. IACR Cryptol. ePrint Arch. 2016: 166 (2016) - [i15]Peter Gazi, Stefano Tessaro:
Provably Robust Sponge-Based PRNGs and KDFs. IACR Cryptol. ePrint Arch. 2016: 169 (2016) - [i14]Joël Alwen, Peter Gazi, Chethan Kamath, Karen Klein, Georg Osang, Krzysztof Pietrzak, Leonid Reyzin, Michal Rolínek, Michal Rybár:
On the Memory-Hardness of Data-Independent Password-Hashing Functions. IACR Cryptol. ePrint Arch. 2016: 783 (2016) - 2015
- [c13]Peter Gazi, Krzysztof Pietrzak, Stefano Tessaro:
Generic Security of NMAC and HMAC with Input Whitening. ASIACRYPT (2) 2015: 85-109 - [c12]Peter Gazi, Krzysztof Pietrzak, Stefano Tessaro:
The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC. CRYPTO (1) 2015: 368-387 - [c11]Peter Gazi, Jooyoung Lee, Yannick Seurin, John P. Steinberger, Stefano Tessaro:
Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes. FSE 2015: 319-341 - [c10]Grégory Demay, Peter Gazi, Ueli Maurer, Björn Tackmann:
Query-Complexity Amplification for Random Oracles. ICITS 2015: 159-180 - [c9]Peter Gazi, Stefano Tessaro:
Secret-key cryptography from ideal primitives: A systematic overview. ITW 2015: 1-5 - [i13]Peter Gazi, Krzysztof Pietrzak, Stefano Tessaro:
Tight Bounds for Keyed Sponges and Truncated CBC. IACR Cryptol. ePrint Arch. 2015: 53 (2015) - [i12]Grégory Demay, Peter Gazi, Ueli Maurer, Björn Tackmann:
Query-Complexity Amplification for Random Oracles. IACR Cryptol. ePrint Arch. 2015: 315 (2015) - [i11]Peter Gazi, Jooyoung Lee, Yannick Seurin, John P. Steinberger, Stefano Tessaro:
Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes. IACR Cryptol. ePrint Arch. 2015: 397 (2015) - [i10]Sunoo Park, Krzysztof Pietrzak, Albert Kwon, Joël Alwen, Georg Fuchsbauer, Peter Gazi:
Spacemint: A Cryptocurrency Based on Proofs of Space. IACR Cryptol. ePrint Arch. 2015: 528 (2015) - [i9]Peter Gazi, Krzysztof Pietrzak, Stefano Tessaro:
Generic Security of NMAC and HMAC with Input Whitening. IACR Cryptol. ePrint Arch. 2015: 881 (2015) - 2014
- [c8]Peter Gazi, Krzysztof Pietrzak, Michal Rybár:
The Exact PRF-Security of NMAC and HMAC. CRYPTO (1) 2014: 113-130 - [c7]Grégory Demay, Peter Gazi, Ueli Maurer, Björn Tackmann:
Optimality of non-adaptive strategies: The case of parallel games. ISIT 2014: 1707-1711 - [i8]Grégory Demay, Peter Gazi, Ueli Maurer, Björn Tackmann:
Optimality of Non-Adaptive Strategies: The Case of Parallel Games. IACR Cryptol. ePrint Arch. 2014: 299 (2014) - [i7]Peter Gazi, Krzysztof Pietrzak, Michal Rybár:
The Exact PRF-Security of NMAC and HMAC. IACR Cryptol. ePrint Arch. 2014: 578 (2014) - 2013
- [c6]Peter Gazi:
Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers. CRYPTO (1) 2013: 551-570 - [c5]Grégory Demay, Peter Gazi, Martin Hirt, Ueli Maurer:
Resource-Restricted Indifferentiability. EUROCRYPT 2013: 664-683 - [i6]Peter Gazi:
On the Security of Plain and Randomized Cascades. IACR Cryptol. ePrint Arch. 2013: 19 (2013) - 2012
- [c4]Peter Gazi, Stefano Tessaro:
Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading. EUROCRYPT 2012: 63-80 - [i5]Peter Gazi, Stefano Tessaro:
Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading. IACR Cryptol. ePrint Arch. 2012: 158 (2012) - [i4]Grégory Demay, Peter Gazi, Martin Hirt, Ueli Maurer:
Resource-Restricted Indifferentiability. IACR Cryptol. ePrint Arch. 2012: 613 (2012)
2000 – 2009
- 2009
- [c3]Peter Gazi, Ueli M. Maurer:
Cascade Encryption Revisited. ASIACRYPT 2009: 37-51 - [c2]Peter Gazi, Ueli Maurer:
Free-Start Distinguishing: Combining Two Types of Indistinguishability Amplification. ICITS 2009: 28-44 - [i3]Peter Gazi, Ueli Maurer:
Cascade Encryption Revisited. IACR Cryptol. ePrint Arch. 2009: 93 (2009) - 2008
- [c1]Peter Gazi, Branislav Rovan:
Assisted Problem Solving and Decompositions of Finite Automata. SOFSEM 2008: 292-303 - 2007
- [i2]Peter Gazi, Branislav Rovan:
Assisted Problem Solving and Decompositions of Finite Automata. CoRR abs/0707.0430 (2007) - [i1]Peter Gazi, Martin Stanek:
On Ciphertext Undetectability. IACR Cryptol. ePrint Arch. 2007: 388 (2007)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-02 20:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint