Follow
Yiannis Tselekounis
Yiannis Tselekounis
Carnegie Mellon University, School of Computer Science
Verified email at cs.cmu.edu - Homepage
Title
Cited by
Cited by
Year
Blockchain mining games
A Kiayias, E Koutsoupias, M Kyropoulou, Y Tselekounis
Proceedings of the 2016 ACM Conference on Economics and Computation, 365-382, 2016
2282016
Security analysis and improvements for the IETF MLS standard for group messaging
J Alwen, S Coretti, Y Dodis, Y Tselekounis
Annual International Cryptology Conference, 248-277, 2020
442020
Practical non-malleable codes from l-more extractable hash functions
A Kiayias, FH Liu, Y Tselekounis
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
292016
Tamper resilient circuits: The adversary at the gates
A Kiayias, Y Tselekounis
International Conference on the Theory and Application of Cryptology and …, 2013
152013
Secure outsourcing of cryptographic circuits manufacturing
G Ateniese, A Kiayias, B Magri, Y Tselekounis, D Venturi
International Conference on Provable Security, 75-93, 2018
12*2018
Multi-Access Communications in Wireless Mesh Networks by Virtualization
S Sargento, R Matos, KA Hummel, A Hess, S Toumpis, Y Tselekounis, ...
Wireless Multi-Access Environments and Quality of Service Provisioning …, 2012
11*2012
Non-malleable codes for partial functions with manipulation detection
A Kiayias, FH Liu, Y Tselekounis
Annual International Cryptology Conference, 577-607, 2018
92018
Modular design of secure group messaging protocols and the security of MLS
J Alwen, S Coretti, Y Dodis, Y Tselekounis
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
82021
Steel: composable hardware-based stateful and randomised functional encryption
P Bhatotia, M Kohlweiss, L Martinico, Y Tselekounis
IACR International Conference on Public-Key Cryptography, 709-736, 2021
12021
Cryptographic techniques for hardware security
I Tselekounis, Y Tselekounis
The University of Edinburgh, 2018
12018
Optimal Single-Server Private Information Retrieval
M Zhou, WK Lin, Y Tselekounis, E Shi
Cryptology ePrint Archive, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–11