On subversion-resistant SNARKs B Abdolmaleki, H Lipmaa, J Siim, M Zając Journal of Cryptology 34, 1-42, 2021 | 115 | 2021 |
Another look at extraction and randomization of Groth’s zk-SNARK K Baghery, M Kohlweiss, J Siim, M Volkhov Financial Cryptography and Data Security: 25th International Conference, FC …, 2021 | 54 | 2021 |
On the security properties of e-voting bulletin boards A Kiayias, A Kuldmaa, H Lipmaa, J Siim, T Zacharias International Conference on Security and Cryptography for Networks, 505-523, 2018 | 44 | 2018 |
An efficient pairing-based shuffle argument P Fauzi, H Lipmaa, J Siim, M Zając Advances in Cryptology–ASIACRYPT 2017: 23rd International Conference on the …, 2017 | 43 | 2017 |
UC-secure CRS generation for SNARKs B Abdolmaleki, K Baghery, H Lipmaa, J Siim, M Zając Progress in Cryptology–AFRICACRYPT 2019: 11th International Conference on …, 2019 | 32 | 2019 |
On trade-offs of applying block chains for electronic voting bulletin boards S Heiberg, I Kubjas, J Siim, J Willemson Cryptology ePrint Archive, 2018 | 31 | 2018 |
On QA-NIZK in the BPK Model B Abdolmaleki, H Lipmaa, J Siim, M Zając | 31 | 2018 |
Snarky ceremonies M Kohlweiss, M Maller, J Siim, M Volkhov Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021 | 29 | 2021 |
Proof-of-stake J Siim Research seminar in cryptography, 2017 | 28 | 2017 |
Counting vampires: from univariate sumcheck to updatable ZK-SNARK H Lipmaa, J Siim, M Zając International Conference on the Theory and Application of Cryptology and …, 2022 | 21 | 2022 |
Impossibilities in succinct arguments: Black-box extraction and more M Campanelli, C Ganesh, H Khoshakhlagh, J Siim International Conference on Cryptology in Africa, 465-489, 2023 | 12 | 2023 |
DL-extractable UC-commitment schemes B Abdolmaleki, K Baghery, H Lipmaa, J Siim, M Zając Applied Cryptography and Network Security: 17th International Conference …, 2019 | 10 | 2019 |
Algebraic group model with oblivious sampling H Lipmaa, R Parisella, J Siim Theory of Cryptography Conference, 363-392, 2023 | 8 | 2023 |
Somewhere statistically binding commitment schemes with applications P Fauzi, H Lipmaa, Z Pindado, J Siim Financial Cryptography and Data Security: 25th International Conference, FC …, 2021 | 8 | 2021 |
A non-interactive shuffle argument with low trust assumptions A Aggelakis, P Fauzi, G Korfiatis, P Louridas, F Mergoupis-Anagnou, ... Topics in Cryptology–CT-RSA 2020: The Cryptographers’ Track at the RSA …, 2020 | 7 | 2020 |
Constant-size zk-SNARKs in ROM from falsifiable assumptions H Lipmaa, R Parisella, J Siim Annual International Conference on the Theory and Applications of …, 2024 | 4 | 2024 |
DAG-based distributed ledgers J Siim Research Seminar in Cryptology, 2018 | 4 | 2018 |
Verifiably-extractable owfs and their applications to subversion zero-knowledge P Fauzi, H Lipmaa, J Siim, M Zając, AT Ødegaard Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021 | 2 | 2021 |
Towards Secure E-Voting with Everlasting Privacy A Gennaro, S Heiberg, H Lipmaa, J Siim, I Visconti media. voog. com. https://media. voog. com/0000/0042/1115/files/Towards …, 0 | 1 | |
Shuffle Arguments Based on Subset-Checking B Abdolmaleki, P Fauzi, T Krips, J Siim Cryptology ePrint Archive, 2024 | | 2024 |