Search

Your search keyword '"Kate, Aniket"' showing total 210 results

Search Constraints

Start Over You searched for: Author "Kate, Aniket" Remove constraint Author: "Kate, Aniket"
210 results on '"Kate, Aniket"'

Search Results

1. V3rified: Revelation vs Non-Revelation Mechanisms for Decentralized Verifiable Computation

2. Optimal Sharding for Scalable Blockchains with Deconstructed SMR

3. Delphi: Efficient Asynchronous Approximate Agreement for Distributed Oracles

4. Front-running Attack in Sharded Blockchains and Fair Cross-shard Consensus

5. DORA: Distributed Oracle Agreement with Simple Majority

6. EESMR: Energy Efficient BFT-SMR for the masses

7. Order but Not Execute in Order

8. Last Mile of Blockchains: RPC and Node-as-a-service

10. The Unique Chain Rule and Its Applications

11. The Danger of Small Anonymity Sets in Privacy-Preserving Payment Systems

12. More is Merrier: Relax the Non-Collusion Assumption in Multi-Server PIR

13. HACCLE: Metaprogramming for Secure Multi-Party Computation -- Extended Version

14. Empirical Understanding of Deletion Privacy: Experiences, Expectations, and Measures

15. Towards Overcoming the Undercutting Problem

16. Deceptive Deletions for Protecting Withdrawn Posts on Social Platforms

17. Reparo: Publicly Verifiable Layer to Repair Blockchains

18. Concurrency and Privacy with Payment-Channel Networks

19. A Tale of Two Trees: One Writes, and Other Reads. Optimized Oblivious Accesses to Large-Scale Blockchains

20. Brief Note: Asynchronous Verifiable Secret Sharing with Optimal Resilience and Linear Amortized Overhead

21. Towards Overcoming the Undercutting Problem

22. Finding Safety in Numbers with Secure Allegation Escrows

23. Forgetting the Forgotten with Letheia, Concealing Content Deletion from Persistent Observers

24. Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions

25. Mind Your Credit: Assessing the Health of the Ripple Credit Network

26. Reparo: Publicly Verifiable Layer to Repair Blockchains

28. DLSAG: Non-interactive Refund Transactions for Interoperable Payment Channels in Monero

29. Lime: Data Lineage in the Malicious Environment

30. Flexible Signatures: Making Authentication Suitable for Real-Time Environments

31. Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains Without Trusted Setup

32. Introducing Accountability to Anonymity Networks

33. Adding Query Privacy to Robust DHTs

35. EESMR

39. cMix: Mixing with Minimal Real-Time Asymmetric Cryptographic Operations

42. Anonymous RAM

45. Post-Quantum Forward-Secure Onion Routing : (Future Anonymity in Today’s Budget)

46. Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources

50. CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin

Catalog

Books, media, physical & digital resources