What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Kartik Nayak
Google Scholar
34
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Decentralization of Ethereum's Builder Market.
Sen Yang
Kartik Nayak
Fan Zhang
2025
conf/sp
Sailfish: Towards Improving the Latency of DAG-Based BFT.
Nibesh Shrestha
Rohan Shrothrium
Aniket Kate
Kartik Nayak
2025
conf/crypto
Leader Election with Poly-Logarithmic Communication Per Party.
Amey Bhangale
Chen-Da Liu-Zhang
Julian Loss
Kartik Nayak
Sravya Yandamuri
2025
conf/uss
Recover from Excessive Faults in Partially-Synchronous BFT SMR.
Tiantian Gong
Gustavo Franco Camilo
Kartik Nayak
Andrew Lewis-Pye
Aniket Kate
2024
journals/cic
Synchronous Distributed Key Generation without Broadcasts.
Nibesh Shrestha
Adithya Bhat
Aniket Kate
Kartik Nayak
2024
conf/ccs
Data Independent Order Policy Enforcement: Limitations and Solutions.
Sarisht Wadhwa
Luca Zanolini
Aditya Asgaonkar
Francesco D'Amato
Chengrui Fang
Fan Zhang
Kartik Nayak
2024
conf/sp
Attacking and Improving the Tor Directory Protocol.
Zhongtang Luo
Adithya Bhat
Kartik Nayak
Aniket Kate
2023
conf/ccs
TrustBoost: Boosting Trust among Interoperable Blockchains.
Peiyao Sheng
Xuechao Wang
Sreeram Kannan
Kartik Nayak
Pramod Viswanath
2023
conf/ccs
Abraxas: Throughput-Efficient Hybrid Asynchronous Consensus.
Erica Blum
Jonathan Katz
Julian Loss
Kartik Nayak
Simon Ochsenreither
2023
conf/uss
Private Proof-of-Stake Blockchains using Differentially-Private Stake Distortion.
Chenghong Wang
David Pujol
Kartik Nayak
Ashwin Machanavajjhala
2023
conf/fc
Player-Replaceability and Forensic Support Are Two Sides of the Same (Crypto) Coin.
Peiyao Sheng
Gerui Wang
Kartik Nayak
Sreeram Kannan
Pramod Viswanath
2023
conf/ndss
OptRand: Optimistically Responsive Reconfigurable Distributed Randomness.
Adithya Bhat
Nibesh Shrestha
Aniket Kate
Kartik Nayak
2023
conf/ndss
He-HTLC: Revisiting Incentives in HTLC.
Sarisht Wadhwa
Jannis Stoeter
Fan Zhang
Kartik Nayak
2023
conf/pkc
Transparent Batchable Time-lock Puzzles and Applications to Byzantine Consensus.
Shravan Srinivasan
Julian Loss
Giulio Malavolta
Kartik Nayak
Charalampos Papamanthou
Sri Aravinda Krishnan Thyagarajan
2022
journals/joc
Locality-Preserving Oblivious RAM.
Gilad Asharov
T.-H. Hubert Chan
Kartik Nayak
Rafael Pass
Ling Ren
Elaine Shi
2022
conf/ccs
Empirical Analysis of EIP-1559: Transaction Fees, Waiting Times, and Consensus Security.
Yulin Liu
Yuxuan Lu
Kartik Nayak
Fan Zhang
Luyao Zhang
Yinhong Zhao
2022
conf/asiacrypt
Efficient Adaptively-Secure Byzantine Agreement for Long Messages.
Amey Bhangale
Chen-Da Liu-Zhang
Julian Loss
Kartik Nayak
2021
conf/ccs
BFT Protocol Forensics.
Peiyao Sheng
Gerui Wang
Kartik Nayak
Sreeram Kannan
Pramod Viswanath
2021
conf/ccs
RandPiper - Reconfiguration-Friendly Random Beacons with Quadratic Communication.
Adithya Bhat
Nibesh Shrestha
Zhongtang Luo
Aniket Kate
Kartik Nayak
2021
conf/sp
On the Anonymity Guarantees of Anonymous Proof-of-Stake Protocols.
Markulf Kohlweiss
Varun Madathil
Kartik Nayak
Alessandra Scafuro
2020
conf/ccs
On the Optimality of Optimistic Responsiveness.
Nibesh Shrestha
Ittai Abraham
Ling Ren
Kartik Nayak
2020
conf/sp
Sync HotStuff: Simple and Practical Synchronous State Machine Replication.
Ittai Abraham
Dahlia Malkhi
Kartik Nayak
Ling Ren
Maofan Yin
2020
conf/eurocrypt
OptORAMa: Optimal Oblivious RAM.
Gilad Asharov
Ilan Komargodski
Wei-Kai Lin
Kartik Nayak
Enoch Peserico
Elaine Shi
2019
conf/ccs
Flexible Byzantine Fault Tolerance.
Dahlia Malkhi
Kartik Nayak
Ling Ren
2019
conf/fc
Synchronous Byzantine Agreement with Expected O(1) Rounds, Expected O(n<sup>2</sup>) Communication, and Optimal Resilience.
Ittai Abraham
Srinivas Devadas
Danny Dolev
Kartik Nayak
Ling Ren
2019
conf/eurocrypt
Locality-Preserving Oblivious RAM.
Gilad Asharov
T.-H. Hubert Chan
Kartik Nayak
Rafael Pass
Ling Ren
Elaine Shi
2018
conf/asiacrypt
More is Less: Perfectly Secure Oblivious Algorithms in the Multi-server Setting.
T.-H. Hubert Chan
Jonathan Katz
Kartik Nayak
Antigoni Polychroniadou
Elaine Shi
2018
conf/tcc
Perfectly Secure Oblivious Parallel RAM.
T.-H. Hubert Chan
Kartik Nayak
Elaine Shi
2017
conf/ndss
HOP: Hardware makes Obfuscation Practical.
Kartik Nayak
Christopher W. Fletcher
Ling Ren
Nishanth Chandran
Satya V. Lokam
Elaine Shi
Vipul Goyal
2017
conf/pkc
Asymptotically Tight Bounds for Composing ORAM with PIR.
Ittai Abraham
Christopher W. Fletcher
Kartik Nayak
Benny Pinkas
Ling Ren
2016
conf/eurosp
Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack.
Kartik Nayak
Srijan Kumar
Andrew Miller
Elaine Shi
2015
conf/sp
GraphSC: Parallel Secure Computation Made Easy.
Kartik Nayak
Xiao Shaun Wang
Stratis Ioannidis
Udi Weinsberg
Nina Taft
Elaine Shi
2015
conf/sp
ObliVM: A Programming Framework for Secure Computation.
Chang Liu
Xiao Shaun Wang
Kartik Nayak
Yan Huang
Elaine Shi
2014
conf/ccs
Oblivious Data Structures.
Xiao Shaun Wang
Kartik Nayak
Chang Liu
T.-H. Hubert Chan
Elaine Shi
Emil Stefanov
Yan Huang
Coauthors
Adithya Bhat
(4)
Aditya Asgaonkar
(1)
Alessandra Scafuro
(1)
Amey Bhangale
(2)
Andrew Lewis-Pye
(1)
Andrew Miller
(1)
Aniket Kate
(6)
Antigoni Polychroniadou
(1)
Ashwin Machanavajjhala
(1)
Benny Pinkas
(1)
Chang Liu
(2)
Charalampos Papamanthou
(1)
Chen-Da Liu-Zhang
(2)
Chenghong Wang
(1)
Chengrui Fang
(1)
Christopher W. Fletcher
(2)
Dahlia Malkhi
(2)
Danny Dolev
(1)
David Pujol
(1)
Elaine Shi
(10)
Emil Stefanov
(1)
Enoch Peserico
(1)
Erica Blum
(1)
Fan Zhang
(4)
Francesco D'Amato
(1)
Gerui Wang
(2)
Gilad Asharov
(3)
Giulio Malavolta
(1)
Gustavo Franco Camilo
(1)
Ilan Komargodski
(1)
Ittai Abraham
(4)
Jannis Stoeter
(1)
Jonathan Katz
(2)
Julian Loss
(4)
Kartik Nayak
(34)
Ling Ren
(8)
Luca Zanolini
(1)
Luyao Zhang
(1)
Maofan Yin
(1)
Markulf Kohlweiss
(1)
Nibesh Shrestha
(5)
Nina Taft
(1)
Nishanth Chandran
(1)
Peiyao Sheng
(3)
Pramod Viswanath
(3)
Rafael Pass
(2)
Rohan Shrothrium
(1)
Sarisht Wadhwa
(2)
Satya V. Lokam
(1)
Sen Yang
(1)
Shravan Srinivasan
(1)
Simon Ochsenreither
(1)
Sravya Yandamuri
(1)
Sreeram Kannan
(3)
Sri Aravinda Krishnan Thyagarajan
(1)
Srijan Kumar
(1)
Srinivas Devadas
(1)
Stratis Ioannidis
(1)
T.-H. Hubert Chan
(5)
Tiantian Gong
(1)
Udi Weinsberg
(1)
Varun Madathil
(1)
Vipul Goyal
(1)
Wei-Kai Lin
(1)
Xiao Shaun Wang
(3)
Xuechao Wang
(1)
Yan Huang
(2)
Yinhong Zhao
(1)
Yulin Liu
(1)
Yuxuan Lu
(1)
Zhongtang Luo
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to