Sonic: Zero-knowledge SNARKs from linear-size universal and updatable structured reference strings M Maller, S Bowe, M Kohlweiss, S Meiklejohn Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 412 | 2019 |
Marlin: Preprocessing zkSNARKs with universal and updatable SRS A Chiesa, Y Hu, M Maller, P Mishra, N Vesely, N Ward Advances in Cryptology–EUROCRYPT 2020: 39th Annual International Conference …, 2020 | 410 | 2020 |
Snarky signatures: Minimal signatures of knowledge from simulation-extractable SNARKs J Groth, M Maller Annual International Cryptology Conference, 581-612, 2017 | 252 | 2017 |
An empirical analysis of anonymity in zcash G Kappos, H Yousaf, M Maller, S Meiklejohn 27th USENIX Security Symposium (USENIX Security 18), 463-477, 2018 | 216 | 2018 |
Updatable and universal common reference strings with applications to zk-SNARKs J Groth, M Kohlweiss, M Maller, S Meiklejohn, I Miers Annual International Cryptology Conference, 698-728, 2018 | 215 | 2018 |
Proofs for inner pairing products and applications B Bünz, M Maller, P Mishra, N Tyagi, P Vesely Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021 | 106 | 2021 |
Reaching consensus for asynchronous distributed key generation I Abraham, P Jovanovic, M Maller, S Meiklejohn, G Stern, A Tomescu Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing …, 2021 | 87 | 2021 |
Egalitarian society or benevolent dictatorship: The state of cryptocurrency governance S Azouvi, M Maller, S Meiklejohn Financial Cryptography and Data Security: FC 2018 International Workshops …, 2019 | 82 | 2019 |
Arya: Nearly linear-time zero-knowledge proofs for correct program execution J Bootle, A Cerulli, J Groth, S Jakobsen, M Maller International Conference on the Theory and Application of Cryptology and …, 2018 | 70 | 2018 |
Aggregatable distributed key generation K Gurkan, P Jovanovic, M Maller, S Meiklejohn, G Stern, A Tomescu Annual International Conference on the Theory and Applications of …, 2021 | 53 | 2021 |
Caulk: Lookup arguments in sublinear time A Zapico, V Buterin, D Khovratovich, M Maller, A Nitulescu, M Simkin Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 45 | 2022 |
Better than advertised security for non-interactive threshold signatures M Bellare, E Crites, C Komlo, M Maller, S Tessaro, C Zhu Annual International Cryptology Conference, 517-550, 2022 | 38 | 2022 |
How to prove schnorr assuming schnorr: Security of multi-and threshold signatures E Crites, C Komlo, M Maller Cryptology ePrint Archive, 2021 | 37 | 2021 |
Snarkpack: Practical snark aggregation N Gailly, M Maller, A Nitulescu International Conference on Financial Cryptography and Data Security, 203-229, 2022 | 36 | 2022 |
Fully adaptive schnorr threshold signatures E Crites, C Komlo, M Maller Annual International Cryptology Conference, 678-709, 2023 | 31 | 2023 |
Snarky Ceremonies M Kohlweiss, M Maller, J Siim, M Volkhov | 29 | 2021 |
Baloo: nearly optimal lookup arguments A Zapico, A Gabizon, D Khovratovich, M Maller, C Rafols Cryptology ePrint Archive, 2022 | 24 | 2022 |
Bingo: Adaptively Secure Packed Asynchronous Verifiable Secret Sharing and Asynchronous Distributed Key Generation. I Abraham, P Jovanovic, M Maller, S Meiklejohn, G Stern IACR Cryptol. ePrint Arch. 2022, 1759, 2022 | 22 | 2022 |
Déjà Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions M Chase, M Maller, S Meiklejohn International Conference on the Theory and Application of Cryptology and …, 2016 | 20 | 2016 |
MinRoot: Candidate sequential function for Ethereum VDF D Khovratovich, M Maller, PR Tiwari Cryptology ePrint Archive, 2022 | 18 | 2022 |