default search action
Konstantinos Chalkias
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c30]Miranda Christ, Foteini Baldimtsi, Konstantinos Kryptos Chalkias, Deepak Maram, Arnab Roy, Joy Wang:
SoK: Zero-Knowledge Range Proofs. AFT 2024: 14:1-14:25 - [c29]Foteini Baldimtsi, Konstantinos Kryptos Chalkias, Yan Ji, Jonas Lindstrøm, Deepak Maram, Ben Riva, Arnab Roy, Mahdi Sedaghat, Joy Wang:
zkLogin: Privacy-Preserving Blockchain Authentication with Existing Credentials. CCS 2024: 3182-3196 - [i25]Foteini Baldimtsi, Konstantinos Kryptos Chalkias, Yan Ji, Jonas Lindstrøm, Deepak Maram, Ben Riva, Arnab Roy, Mahdi Sedaghat, Joy Wang:
zkLogin: Privacy-Preserving Blockchain Authentication with Existing Credentials. CoRR abs/2401.11735 (2024) - [i24]Konstantinos Kryptos Chalkias, Jonas Lindstrøm, Arnab Roy:
An Efficient Hash Function for Imaginary Class Groups. IACR Cryptol. ePrint Arch. 2024: 295 (2024) - [i23]Miranda Christ, Foteini Baldimtsi, Konstantinos Kryptos Chalkias, Deepak Maram, Arnab Roy, Joy Wang:
SoK: Zero-Knowledge Range Proofs. IACR Cryptol. ePrint Arch. 2024: 430 (2024) - [i22]Konstantinos Kryptos Chalkias, Jonas Lindstrøm, Deepak Maram, Ben Riva, Arnab Roy, Alberto Sonnino, Joy Wang:
Fastcrypto: Pioneering Cryptography Via Continuous Benchmarking. IACR Cryptol. ePrint Arch. 2024: 442 (2024) - 2023
- [c28]Donald Beaver, Konstantinos Chalkias, Mahimna Kelkar, Lefteris Kokoris-Kogias, Kevin Lewi, Ladi de Naurois, Valeria Nikolaenko, Arnab Roy, Alberto Sonnino:
STROBE: Streaming Threshold Random Beacons. AFT 2023: 7:1-7:16 - [c27]Sam Grierson, Konstantinos Chalkias, William J. Buchanan, Leandros Maglaras:
Double Public Key Signing Function Oracle Attack on EdDSA Software Implementations. CAMAD 2023: 194-199 - [i21]Sam Grierson, Konstantinos Chalkias, William J. Buchanan:
Double Public Key Signing Function Oracle Attack on EdDSA Software Implementations. CoRR abs/2308.15009 (2023) - [i20]Eason Chen, Justa Liang, Ray Huang, Pierce Hung, Damien Chen, Ashley Hsu, Konstantinos Chalkias, Stefanos Pleros:
Building Random, Fair, and Verifiable Games on Blockchain. Raffle smart contract designs on Sui Network. CoRR abs/2310.12305 (2023) - [i19]Foteini Baldimtsi, Konstantinos Kryptos Chalkias, François Garillot, Jonas Lindstrøm, Ben Riva, Arnab Roy, Alberto Sonnino, Pun Waiwitlikhit, Joy Wang:
Subset-optimized BLS Multi-signature with Key Aggregation. IACR Cryptol. ePrint Arch. 2023: 498 (2023) - [i18]Panagiotis Chatzigiannis, Konstantinos Chalkias, Aniket Kate, Easwar Vivek Mangipudi, Mohsen Minaei, Mainack Mondal:
SoK: Web3 Recovery Mechanisms. IACR Cryptol. ePrint Arch. 2023: 1575 (2023) - 2022
- [c26]Irakliy Khaburzaniya, Konstantinos Chalkias, Kevin Lewi, Harjasleen Malvai:
Aggregating and Thresholdizing Hash-based Signatures using STARKs. AsiaCCS 2022: 393-407 - [c25]Konstantinos Chalkias, Panagiotis Chatzigiannis:
Base64 Malleability in Practice. AsiaCCS 2022: 1219-1221 - [c24]Konstantinos Chalkias, Panagiotis Chatzigiannis, Yan Ji:
Broken Proofs of Solvency in Blockchain Custodial Wallets and Exchanges. Financial Cryptography Workshops 2022: 106-117 - [c23]Panagiotis Chatzigiannis, Foteini Baldimtsi, Konstantinos Chalkias:
SoK: Blockchain Light Clients. Financial Cryptography 2022: 615-641 - [i17]Konstantinos Chalkias, Panagiotis Chatzigiannis, Yan Ji:
Broken Proofs of Solvency in Blockchain Custodial Wallets and Exchanges. IACR Cryptol. ePrint Arch. 2022: 43 (2022) - [i16]Panagiotis Chatzigiannis, Konstantinos Chalkias:
Base64 Malleability in Practice. IACR Cryptol. ePrint Arch. 2022: 361 (2022) - [i15]Foteini Baldimtsi, Konstantinos Chalkias, Panagiotis Chatzigiannis, Mahimna Kelkar:
Truncator: Time-space Tradeoff of Cryptographic Primitives. IACR Cryptol. ePrint Arch. 2022: 1581 (2022) - 2021
- [j1]Konstantinos Chalkias, Shir Cohen, Kevin Lewi, Fredric Moezinia, Yolan Romailler:
HashWires: Hyperefficient Credential-Based Range Proofs. Proc. Priv. Enhancing Technol. 2021(4): 76-95 (2021) - [c22]Panagiotis Chatzigiannis, Konstantinos Chalkias:
Proof of Assets in the Diem Blockchain. ACNS Workshops 2021: 27-41 - [c21]Panagiotis Chatzigiannis, Foteini Baldimtsi, Konstantinos Chalkias:
SoK: Auditability and Accountability in Distributed Payment Systems. ACNS (2) 2021: 311-337 - [c20]Yan Ji, Konstantinos Chalkias:
Generalized Proof of Liabilities. CCS 2021: 3465-3486 - [c19]Konstantinos Chalkias, François Garillot, Yashvanth Kondi, Valeria Nikolaenko:
Non-interactive Half-Aggregation of EdDSA and Variants of Schnorr Signatures. CT-RSA 2021: 577-608 - [c18]Panagiotis Chatzigiannis, Konstantinos Chalkias, Valeria Nikolaenko:
Homomorphic Decryption in Blockchains via Compressed Discrete-Log Lookup Tables. DPM/CBT@ESORICS 2021: 328-339 - [c17]Sam Blackshear, Konstantinos Chalkias, Panagiotis Chatzigiannis, Riyaz Faizullabhoy, Irakliy Khaburzaniya, Eleftherios Kokoris-Kogias, Joshua Lind, David Wong, Tim Zakian:
Reactive Key-Loss Protection in Blockchains. Financial Cryptography Workshops 2021: 431-450 - [i14]Panagiotis Chatzigiannis, Foteini Baldimtsi, Konstantinos Chalkias:
SoK: Auditability and Accountability in Distributed Payment Systems. IACR Cryptol. ePrint Arch. 2021: 239 (2021) - [i13]Sam Blackshear, Konstantinos Chalkias, Panagiotis Chatzigiannis, Riyaz Faizullabhoy, Irakliy Khaburzaniya, Eleftherios Kokoris-Kogias, Joshua Lind, David Wong, Tim Zakian:
Reactive Key-Loss Protection in Blockchains. IACR Cryptol. ePrint Arch. 2021: 289 (2021) - [i12]Konstantinos Chalkias, Shir Cohen, Kevin Lewi, Fredric Moezinia, Yolan Romailler:
HashWires: Hyperefficient Credential-Based Range Proofs. IACR Cryptol. ePrint Arch. 2021: 297 (2021) - [i11]Konstantinos Chalkias, François Garillot, Yashvanth Kondi, Valeria Nikolaenko:
Non-interactive half-aggregation of EdDSA and variants of Schnorr signatures. IACR Cryptol. ePrint Arch. 2021: 350 (2021) - [i10]Panagiotis Chatzigiannis, Konstantinos Chalkias:
Proof of Assets in the Diem Blockchain. IACR Cryptol. ePrint Arch. 2021: 598 (2021) - [i9]Panagiotis Chatzigiannis, Konstantinos Chalkias, Valeria Nikolaenko:
Homomorphic decryption in blockchains via compressed discrete-log lookup tables. IACR Cryptol. ePrint Arch. 2021: 899 (2021) - [i8]Irakliy Khaburzaniya, Konstantinos Chalkias, Kevin Lewi, Harjasleen Malvai:
Aggregating hash-based signatures using STARKs. IACR Cryptol. ePrint Arch. 2021: 1048 (2021) - [i7]Yan Ji, Konstantinos Chalkias:
Generalized Proof of Liabilities. IACR Cryptol. ePrint Arch. 2021: 1350 (2021) - [i6]Donald Beaver, Konstantinos Chalkias, Mahimna Kelkar, Lefteris Kokoris-Kogias, Kevin Lewi, Ladi de Naurois, Valeria Nicolaenko, Arnab Roy, Alberto Sonnino:
STROBE: Stake-based Threshold Random Beacons. IACR Cryptol. ePrint Arch. 2021: 1643 (2021) - [i5]Panagiotis Chatzigiannis, Foteini Baldimtsi, Konstantinos Chalkias:
SoK: Blockchain Light Clients. IACR Cryptol. ePrint Arch. 2021: 1657 (2021) - 2020
- [c16]Konstantinos Chalkias, François Garillot, Valeria Nikolaenko:
Taming the Many EdDSAs. SSR 2020: 67-90 - [i4]Konstantinos Chalkias, Kevin Lewi, Payman Mohassel, Valeria Nikolaenko:
Distributed Auditing Proofs of Liabilities. IACR Cryptol. ePrint Arch. 2020: 468 (2020) - [i3]Konstantinos Chalkias, François Garillot, Valeria Nikolaenko:
Taming the many EdDSAs. IACR Cryptol. ePrint Arch. 2020: 1244 (2020)
2010 – 2019
- 2018
- [c15]Konstantinos Chalkias, James Brown, Mike Hearn, Tommy Lillehagen, Igor Nitto, Thomas Schroeter:
Blockchained Post-Quantum Signatures. iThings/GreenCom/CPSCom/SmartData 2018: 1196-1203 - [i2]Konstantinos Chalkias, James Brown, Mike Hearn, Tommy Lillehagen, Igor Nitto, Thomas Schroeter:
Blockchained Post-Quantum Signatures. IACR Cryptol. ePrint Arch. 2018: 658 (2018) - 2016
- [c14]K. Harald Gjermundrød, Konstantinos Chalkias, Ioanna Dionysiou:
Going Beyond the Coinbase Transaction Fee: Alternative Reward Schemes for Miners in Blockchain Systems. PCI 2016: 35 - 2012
- [c13]Antigoni Polychroniadou, Konstantinos Chalkias, George Stephanides:
The Concept of Compatibility between Identity-based and Certificateless Encryption Schemes. SECRYPT 2012: 403-407 - [c12]Antigoni Polychroniadou, Konstantinos Chalkias, George Stephanides:
A Compatible Implementation between Identity-based and Certificateless Encryption Schemes. WEBIST 2012: 225-230 - 2010
- [b1]Konstantinos Chalkias:
Secure cryptographic protocols and applications based on bilinear pairings. University of Macedonia Economic and Social Sciences, Greece, 2010 - [c11]Kyriacos Talattinis, Aikaterini Sidiropoulou, Konstantinos Chalkias, George Stephanides:
Parallel Collection of Live Data Using Hadoop. Panhellenic Conference on Informatics 2010: 66-71 - [c10]Anastasios Kihidis, Konstantinos Chalkias, George Stephanides:
Practical Implementation of Identity Based Encryption for Secure E-mail Communication. Panhellenic Conference on Informatics 2010: 101-106 - [i1]Konstantinos Chalkias, Foteini Baldimtsi, Dimitrios Hristu-Varsakelis, Spyros T. Halkidis, George Stephanides:
Attacks on the AKACP Protocol. IACR Cryptol. ePrint Arch. 2010: 500 (2010)
2000 – 2009
- 2008
- [c9]Konstantinos Chalkias, Foteini Baldimtsi, Dimitrios Hristu-Varsakelis, George Stephanides:
An Implementation Infrastructure for Server-Passive Timed-Release Cryptography. IAS 2008: 89-94 - [c8]George E. Violettas, Tryfon Theodorou, Konstantinos Chalkias, George Stephanides:
Surveying Wi-Fi Security - Presentation of Wi-Fi Security Measures, Varius Wi-Fi Attacks and a Classification Survey of Wi-Fi Networks in Thessaloniki. WINSYS 2008: 96-101 - 2007
- [c7]Dimitrios Hristu-Varsakelis, Konstantinos Chalkias, George Stephanides:
Low-cost Anonymous Timed-Release Encryption. IAS 2007: 77-82 - [c6]Konstantinos Chalkias, Spyros T. Halkidis, Dimitrios Hristu-Varsakelis, George Stephanides, Anastasios Alexiadis:
A Provably Secure One-Pass Two-Party Key Establishment Protocol. Inscrypt 2007: 108-122 - [c5]Konstantinos Chalkias, Dimitrios Hristu-Varsakelis, George Stephanides:
Improved Anonymous Timed-Release Encryption. ESORICS 2007: 311-326 - [c4]Konstantinos Chalkias, Foteini Baldimtsi, Dimitris Hristu-Varsakelis, George Stephanides:
Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols. ICETE (Selected Papers) 2007: 227-238 - [c3]Konstantinos Chalkias, F. Mpaldimtsi, Dimitris Hristu-Varsakelis, George Stephanides:
On the Key-Compromise Impersonation Vulnerability of One-Pass Key Establishment Protocols. SECRYPT 2007: 222-228 - 2006
- [c2]Konstantinos Chalkias, George Stephanides:
Timed Release Cryptography from Bilinear Pairings Using Hash Chains. Communications and Multimedia Security 2006: 130-140 - 2005
- [c1]Konstantinos Chalkias, George Filiadis, George Stephanides:
Implementing Authentication Protocol for Exchanging Encrypted Messages via an Authentication Server based on Elliptic Curve Cryptography with the ElGamal's Algorithm. IEC (Prague) 2005: 137-142
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 19:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint