Search
Search Results
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Complexity-Approximation Trade-Offs in Exchange Mechanisms: AMMs vs. LOBs
This paper presents a general framework for the design and analysis of exchange mechanisms between two assets that unifies and enables comparisons... -
Eagle: Efficient Privacy Preserving Smart Contracts
The proliferation of Decentralised Finance (DeFi) and Decentralised Autonomous Organisations (DAO), which in current form are exposed to... -
Provably Avoiding Geographic Regions for Tor’s Onion Services
Tor, a peer-to-peer anonymous communication system, is one of the most effective tools in providing free and open communication online. Many of the... -
Smart Noise Detection for Statistical Disclosure Attacks
While anonymization systems like mix networks can provide privacy to their users by, e.g., hiding their communication relationships, several traffic... -
Synchronous Perfectly Secure Message Transmission with Optimal Asynchronous Fallback Guarantees
Secure message transmission (SMT) constitutes a fundamental network-layer building block for distributed protocols over incomplete networks. More... -
To Possess or Not to Possess - WhatsApp for Android Revisited with a Focus on Stickers
WhatsApp stickers are a popular hybrid of images and emoticons that can contain user-created content. Stickers are mostly sent for legitimate... -
On the Correlation Complexity of MPC with Cheater Identification
Composable protocols for Multi-Party Computation that provide security with Identifiable Abort against a dishonest majority require some form of...