6 Publications

Mark all

[6]
2019 | Conference Paper | IST-REx-ID: 7411   OA
Abusalah, H. M., Kamath Hosdurg, C., Klein, K., Pietrzak, K. Z., & Walter, M. (2019). Reversible proofs of sequential work. In Advances in Cryptology – EUROCRYPT 2019 (Vol. 11477, pp. 277–291). Darmstadt, Germany: Springer International Publishing. https://doi.org/10.1007/978-3-030-17656-3_10
View | DOI | Download (ext.)
 
[5]
2018 | Thesis | IST-REx-ID: 83   OA
Abusalah, H. M. (2018). Proof systems for sustainable decentralized cryptocurrencies. IST Austria. https://doi.org/10.15479/AT:ISTA:TH_1046
View | Files available | DOI
 
[4]
2017 | Conference Paper | IST-REx-ID: 559
Abusalah, H. M., Alwen, J. F., Cohen, B., Khilko, D., Pietrzak, K. Z., & Reyzin, L. (2017). Beyond Hellman’s time-memory trade-offs with applications to proofs of space (Vol. 10625, pp. 357–379). Presented at the ASIACRYPT: Theory and Applications of Cryptology and Information Security, Hong Kong, China: Springer. https://doi.org/10.1007/978-3-319-70697-9_13
View | Files available | DOI | Download (ext.)
 
[3]
2016 | Conference Paper | IST-REx-ID: 1229
Abusalah, H. M., Fuchsbauer, G., & Pietrzak, K. Z. (2016). Offline witness encryption (Vol. 9696, pp. 285–303). Presented at the ACNS: Applied Cryptography and Network Security, Guildford, UK: Springer. https://doi.org/10.1007/978-3-319-39555-5_16
View | Files available | DOI
 
[2]
2016 | Conference Paper | IST-REx-ID: 1236
Abusalah, H. M., Fuchsbauer, G., & Pietrzak, K. Z. (2016). Constrained PRFs for unbounded inputs (Vol. 9610, pp. 413–428). Presented at the CT-RSA: Topics in Cryptology, San Francisco, CA, USA: Springer. https://doi.org/10.1007/978-3-319-29485-8_24
View | Files available | DOI
 
[1]
2016 | Conference Paper | IST-REx-ID: 1235
Abusalah, H. M., & Fuchsbauer, G. (2016). Constrained PRFs for unbounded inputs with short keys (Vol. 9696, pp. 445–463). Presented at the ACNS: Applied Cryptography and Network Security, Guildford, UK: Springer. https://doi.org/10.1007/978-3-319-39555-5_24
View | Files available | DOI | Download (ext.)
 

Search

Filter Publications

Display / Sort

Citation Style: APA

Export / Embed

6 Publications

Mark all

[6]
2019 | Conference Paper | IST-REx-ID: 7411   OA
Abusalah, H. M., Kamath Hosdurg, C., Klein, K., Pietrzak, K. Z., & Walter, M. (2019). Reversible proofs of sequential work. In Advances in Cryptology – EUROCRYPT 2019 (Vol. 11477, pp. 277–291). Darmstadt, Germany: Springer International Publishing. https://doi.org/10.1007/978-3-030-17656-3_10
View | DOI | Download (ext.)
 
[5]
2018 | Thesis | IST-REx-ID: 83   OA
Abusalah, H. M. (2018). Proof systems for sustainable decentralized cryptocurrencies. IST Austria. https://doi.org/10.15479/AT:ISTA:TH_1046
View | Files available | DOI
 
[4]
2017 | Conference Paper | IST-REx-ID: 559
Abusalah, H. M., Alwen, J. F., Cohen, B., Khilko, D., Pietrzak, K. Z., & Reyzin, L. (2017). Beyond Hellman’s time-memory trade-offs with applications to proofs of space (Vol. 10625, pp. 357–379). Presented at the ASIACRYPT: Theory and Applications of Cryptology and Information Security, Hong Kong, China: Springer. https://doi.org/10.1007/978-3-319-70697-9_13
View | Files available | DOI | Download (ext.)
 
[3]
2016 | Conference Paper | IST-REx-ID: 1229
Abusalah, H. M., Fuchsbauer, G., & Pietrzak, K. Z. (2016). Offline witness encryption (Vol. 9696, pp. 285–303). Presented at the ACNS: Applied Cryptography and Network Security, Guildford, UK: Springer. https://doi.org/10.1007/978-3-319-39555-5_16
View | Files available | DOI
 
[2]
2016 | Conference Paper | IST-REx-ID: 1236
Abusalah, H. M., Fuchsbauer, G., & Pietrzak, K. Z. (2016). Constrained PRFs for unbounded inputs (Vol. 9610, pp. 413–428). Presented at the CT-RSA: Topics in Cryptology, San Francisco, CA, USA: Springer. https://doi.org/10.1007/978-3-319-29485-8_24
View | Files available | DOI
 
[1]
2016 | Conference Paper | IST-REx-ID: 1235
Abusalah, H. M., & Fuchsbauer, G. (2016). Constrained PRFs for unbounded inputs with short keys (Vol. 9696, pp. 445–463). Presented at the ACNS: Applied Cryptography and Network Security, Guildford, UK: Springer. https://doi.org/10.1007/978-3-319-39555-5_24
View | Files available | DOI | Download (ext.)
 

Search

Filter Publications

Display / Sort

Citation Style: APA

Export / Embed