What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Mary Maller
Google Scholar
23
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/cic
Baloo: Algebraic Lookup Arguments.
Arantxa Zapico
Ariel Gabizon
Dmitry Khovratovich
Mary Maller
Carla Ràfols
2025
journals/cic
Beyond the Circuit: How to minimize foreign arithmetic in ZKP circuits.
Michele Orrù
George Kadianakis
Mary Maller
Greg Zaverucha
2024
conf/eurocrypt
Threshold Raccoon: Practical Threshold Signatures from Standard Lattice Assumptions.
Rafaël Del Pino
Shuichi Katsumata
Mary Maller
Fabrice Mouhartem
Thomas Prest
Markku-Juhani O. Saarinen
2023
conf/crypto
Bingo: Adaptivity and Asynchrony in Verifiable Secret Sharing and Distributed Key Generation.
Ittai Abraham
Philipp Jovanovic
Mary Maller
Sarah Meiklejohn
Gilad Stern
2023
conf/crypto
Snowblind: A Threshold Blind Signature in Pairing-Free Groups.
Elizabeth C. Crites
Chelsea Komlo
Mary Maller
Stefano Tessaro
Chenzhi Zhu
2023
conf/crypto
Fully Adaptive Schnorr Threshold Signatures.
Elizabeth C. Crites
Chelsea Komlo
Mary Maller
2023
conf/pkc
Zero-Knowledge Arguments for Subverted RSA Groups.
Dimitris Kolonelos
Mary Maller
Mikhail Volkhov
2022
conf/ccs
Caulk: Lookup Arguments in Sublinear Time.
Arantxa Zapico
Vitalik Buterin
Dmitry Khovratovich
Mary Maller
Anca Nitulescu
Mark Simkin
2022
conf/crypto
Better than Advertised Security for Non-interactive Threshold Signatures.
Mihir Bellare
Elizabeth C. Crites
Chelsea Komlo
Mary Maller
Stefano Tessaro
Chenzhi Zhu
2022
conf/fc
SnarkPack: Practical SNARK Aggregation.
Nicolas Gailly
Mary Maller
Anca Nitulescu
2022
conf/sp
SNARKBlock: Federated Anonymous Blocklisting from Hidden Common Input Aggregate Proofs.
Michael Rosenberg
Mary Maller
Ian Miers
2021
conf/eurocrypt
Aggregatable Distributed Key Generation.
Kobi Gurkan
Philipp Jovanovic
Mary Maller
Sarah Meiklejohn
Gilad Stern
Alin Tomescu
2021
conf/asiacrypt
Snarky Ceremonies.
Markulf Kohlweiss
Mary Maller
Janno Siim
Mikhail Volkhov
2021
conf/asiacrypt
Proofs for Inner Pairing Products and Applications.
Benedikt Bünz
Mary Maller
Pratyush Mishra
Nirvan Tyagi
Psi Vesely
2020
journals/popets
Reputable List Curation from Decentralized Voting.
Elizabeth C. Crites
Mary Maller
Sarah Meiklejohn
Rebekah Mercer
2020
conf/eurocrypt
Marlin: Preprocessing zkSNARKs with Universal and Updatable SRS.
Alessandro Chiesa
Yuncong Hu
Mary Maller
Pratyush Mishra
Psi Vesely
Nicholas P. Ward
2019
conf/ccs
Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updatable Structured Reference Strings.
Mary Maller
Sean Bowe
Markulf Kohlweiss
Sarah Meiklejohn
2018
conf/uss
An Empirical Analysis of Anonymity in Zcash.
George Kappos
Haaroon Yousaf
Mary Maller
Sarah Meiklejohn
2018
conf/crypto
Updatable and Universal Common Reference Strings with Applications to zk-SNARKs.
Jens Groth
Markulf Kohlweiss
Mary Maller
Sarah Meiklejohn
Ian Miers
2018
conf/fc
Egalitarian Society or Benevolent Dictatorship: The State of Cryptocurrency Governance.
Sarah Azouvi
Mary Maller
Sarah Meiklejohn
2018
conf/asiacrypt
Arya: Nearly Linear-Time Zero-Knowledge Proofs for Correct Program Execution.
Jonathan Bootle
Andrea Cerulli
Jens Groth
Sune K. Jakobsen
Mary Maller
2017
conf/crypto
Snarky Signatures: Minimal Signatures of Knowledge from Simulation-Extractable SNARKs.
Jens Groth
Mary Maller
2016
conf/asiacrypt
Déjà Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions.
Melissa Chase
Mary Maller
Sarah Meiklejohn
Coauthors
Alessandro Chiesa
(1)
Alin Tomescu
(1)
Anca Nitulescu
(2)
Andrea Cerulli
(1)
Arantxa Zapico
(2)
Ariel Gabizon
(1)
Benedikt Bünz
(1)
Carla Ràfols
(1)
Chelsea Komlo
(3)
Chenzhi Zhu
(2)
Dimitris Kolonelos
(1)
Dmitry Khovratovich
(2)
Elizabeth C. Crites
(4)
Fabrice Mouhartem
(1)
George Kadianakis
(1)
George Kappos
(1)
Gilad Stern
(2)
Greg Zaverucha
(1)
Haaroon Yousaf
(1)
Ian Miers
(2)
Ittai Abraham
(1)
Janno Siim
(1)
Jens Groth
(3)
Jonathan Bootle
(1)
Kobi Gurkan
(1)
Mark Simkin
(1)
Markku-Juhani O. Saarinen
(1)
Markulf Kohlweiss
(3)
Mary Maller
(23)
Melissa Chase
(1)
Michael Rosenberg
(1)
Michele Orrù
(1)
Mihir Bellare
(1)
Mikhail Volkhov
(2)
Nicholas P. Ward
(1)
Nicolas Gailly
(1)
Nirvan Tyagi
(1)
Philipp Jovanovic
(2)
Pratyush Mishra
(2)
Psi Vesely
(2)
Rafaël del Pino
(1)
Rebekah Mercer
(1)
Sarah Azouvi
(1)
Sarah Meiklejohn
(8)
Sean Bowe
(1)
Shuichi Katsumata
(1)
Stefano Tessaro
(2)
Sune K. Jakobsen
(1)
Thomas Prest
(1)
Vitalik Buterin
(1)
Yuncong Hu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to