What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Steven Goldfeder
Google Scholar
15
publications in security and cryptology related venues
Year
Venue
Title
2021
conf/crypto
MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications.
Itai Dinur
Steven Goldfeder
Tzipora Halevi
Yuval Ishai
Mahimna Kelkar
Vivek Sharma
Greg Zaverucha
2020
conf/ccs
DECO: Liberating Web Data Using Decentralized Oracles for TLS.
Fan Zhang
Deepak Maram
Harjasleen Malvai
Steven Goldfeder
Ari Juels
2020
conf/ccs
UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts.
Ran Canetti
Rosario Gennaro
Steven Goldfeder
Nikolaos Makriyannis
Udi Peled
2020
conf/uss
BlockSci: Design and applications of a blockchain analysis platform.
Harry A. Kalodner
Malte Möser
Kevin Lee
Steven Goldfeder
Martin Plattner
Alishah Chator
Arvind Narayanan
2020
conf/crypto
Order-Fairness for Byzantine Consensus.
Mahimna Kelkar
Fan Zhang
Steven Goldfeder
Ari Juels
2020
conf/sp
Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability.
Philip Daian
Steven Goldfeder
Tyler Kell
Yunqi Li
Xueyuan Zhao
Iddo Bentov
Lorenz Breidenbach
Ari Juels
2018
journals/popets
When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies.
Steven Goldfeder
Harry A. Kalodner
Dillon Reisman
Arvind Narayanan
2018
conf/ccs
Fast Multiparty Threshold ECDSA with Fast Trustless Setup.
Rosario Gennaro
Steven Goldfeder
2018
conf/uss
Arbitrum: Scalable, private smart contracts.
Harry A. Kalodner
Steven Goldfeder
Xiaoqi Chen
S. Matthew Weinberg
Edward W. Felten
2018
conf/crypto
Threshold Cryptosystems from Threshold Fully Homomorphic Encryption.
Dan Boneh
Rosario Gennaro
Steven Goldfeder
Aayush Jain
Sam Kim
Peter M. R. Rasmussen
Amit Sahai
2017
conf/latincrypt
Using Level-1 Homomorphic Encryption to Improve Threshold DSA Signatures for Bitcoin Wallet Security.
Dan Boneh
Rosario Gennaro
Steven Goldfeder
2017
conf/ccs
Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services.
Matteo Campanelli
Rosario Gennaro
Steven Goldfeder
Luca Nizzardo
2017
conf/ccs
Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives.
Melissa Chase
David Derler
Steven Goldfeder
Claudio Orlandi
Sebastian Ramacher
Christian Rechberger
Daniel Slamanig
Greg Zaverucha
2017
conf/fc
Escrow Protocols for Cryptocurrencies: How to Buy Physical Goods Using Bitcoin.
Steven Goldfeder
Joseph Bonneau
Rosario Gennaro
Arvind Narayanan
2016
conf/acns
Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security.
Rosario Gennaro
Steven Goldfeder
Arvind Narayanan
Coauthors
Aayush Jain
(1)
Alishah Chator
(1)
Amit Sahai
(1)
Ari Juels
(3)
Arvind Narayanan
(4)
Christian Rechberger
(1)
Claudio Orlandi
(1)
Dan Boneh
(2)
Daniel Slamanig
(1)
David Derler
(1)
Deepak Maram
(1)
Dillon Reisman
(1)
Edward W. Felten
(1)
Fan Zhang
(2)
Greg Zaverucha
(2)
Harjasleen Malvai
(1)
Harry A. Kalodner
(3)
Iddo Bentov
(1)
Itai Dinur
(1)
Joseph Bonneau
(1)
Kevin Lee
(1)
Lorenz Breidenbach
(1)
Luca Nizzardo
(1)
Mahimna Kelkar
(2)
Malte Möser
(1)
Martin Plattner
(1)
Matteo Campanelli
(1)
Melissa Chase
(1)
Nikolaos Makriyannis
(1)
Peter M. R. Rasmussen
(1)
Philip Daian
(1)
Ran Canetti
(1)
Rosario Gennaro
(7)
S. Matthew Weinberg
(1)
Sam Kim
(1)
Sebastian Ramacher
(1)
Steven Goldfeder
(15)
Tyler Kell
(1)
Tzipora Halevi
(1)
Udi Peled
(1)
Vivek Sharma
(1)
Xiaoqi Chen
(1)
Xueyuan Zhao
(1)
Yunqi Li
(1)
Yuval Ishai
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to