Lyu H, Xie S, Niu J and Feng C.
(2025). Byzantine Protocols with Asymptotically Optimal Communication Complexity. Security and Privacy in Communication Networks. 10.1007/978-3-031-64948-6_13. (247-264).
Kavousi A, Wang Z and Jovanovic P.
(2024). SoK: Public Randomness 2024 IEEE 9th European Symposium on Security and Privacy (EuroS&P). 10.1109/EuroSP60621.2024.00020. 979-8-3503-5425-6. (216-234).
Du Z, Zhang W, Liu L and Fu Y.
(2024). Cross shard leader accountability protocol based on two phase atomic commit. Scientific Reports. 10.1038/s41598-024-64945-1. 14:1.
Doidge I, Ramesh R, Shrestha N and Tobkin J.
(2024). Moonshot: Optimizing Block Period and Commit Latency in Chain-Based Rotating Leader BFT 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). 10.1109/DSN58291.2024.00052. 979-8-3503-4105-8. (470-482).
Amiri M, Agrawal D, El Abbadi A and Loo B. Distributed Transaction Processing in Untrusted Environments. Companion of the 2024 International Conference on Management of Data. (570-579).
Bravo M, Chockler G and Gotsman A.
(2024). Liveness and latency of Byzantine state-machine replication. Distributed Computing. 37:2. (177-205). Online publication date: 1-Jun-2024.
Luo Z, Bhat A, Nayak K and Kate A.
(2024). Attacking and Improving the Tor Directory Protocol 2024 IEEE Symposium on Security and Privacy (SP). 10.1109/SP54263.2024.00083. 979-8-3503-3130-1. (3221-3237).
Zhang H, Xie T, Chan W, Guo H and Gai K.
(2023). Time-Aware Relay Chain-Based Committee Consensus for Decentralized Identity 2023 International Conference on High Performance Big Data and Intelligent Systems (HDIS). 10.1109/HDIS60872.2023.10499570. 979-8-3503-9416-0. (8-15).
Blum E, Katz J, Loss J, Nayak K and Ochsenreither S. Abraxas: Throughput-Efficient Hybrid Asynchronous Consensus. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. (519-533).
Malkhi D, Momose A and Ren L. Towards Practical Sleepy BFT. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. (490-503).
Tonkikh A, Ponomarev P, Kuznetsov P and Pignolet Y. CryptoConcurrency: (Almost) Consensusless Asset Transfer with Shared Accounts. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. (1556-1570).
Hu K, Zhang Z, Guo K, Jiang W, Li X and Han J.
(2023). An optimisation for a two‐round good‐case latency protocol. IET Information Security. 17:4. (664-680). Online publication date: 24-Jul-2023.
Tennenhouse I and Raviv N.
(2023). Transaction Confirmation in Coded Blockchain 2023 IEEE International Symposium on Information Theory (ISIT). 10.1109/ISIT54713.2023.10206728. 978-1-6654-7554-9. (1735-1740).
Hou R and Yu H.
(2023). Optimistic Fast Confirmation While Tolerating Malicious Majority in Blockchains 2023 IEEE Symposium on Security and Privacy (SP). 10.1109/SP46215.2023.10179323. 978-1-6654-9336-9. (2481-2498).
Zarbafian P and Gramoli V.
(2023). Lyra: Fast and Scalable Resilience to Reordering Attacks in Blockchains 2023 IEEE International Parallel and Distributed Processing Symposium (IPDPS). 10.1109/IPDPS54959.2023.00097. 979-8-3503-3766-2. (929-939).
Huang M, Han R, Du Z, Fu Y and Liu L.
(2022). Reputation-based state machine replication 2022 IEEE 21st International Symposium on Network Computing and Applications (NCA). 10.1109/NCA57778.2022.10013518. 979-8-3503-9730-7. (225-234).
Hu K, Guo K, Tang Q, Zhang Z, Cheng H and Zhao Z.
(2022). Leopard: Towards High Throughput-Preserving BFT for Large-scale Systems 2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS). 10.1109/ICDCS54860.2022.00024. 978-1-6654-7177-0. (157-167).
Bhat A, Shrestha N, Luo Z, Kate A and Nayak K. RandPiper – Reconfiguration-Friendly Random Beacons with Quadratic Communication. Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. (3502-3524).