1. Communication Complexity of Byzantine Agreement, Revisited
2. Maria Apostolaki , Aviv Zohar , and Laurent Vanbever . 2017 . Hijacking Bitcoin: Routing Attacks on Cryptocurrencies. In 2017 IEEE Symposium on Security and Privacy, SP 2017 , San Jose, CA, USA, May 22--26 , 2017. IEEE Computer Society, 375--392. https://doi.org/10.1109/SP.2017.29 10.1109/SP.2017.29 Maria Apostolaki, Aviv Zohar, and Laurent Vanbever. 2017. Hijacking Bitcoin: Routing Attacks on Cryptocurrencies. In 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22--26, 2017. IEEE Computer Society, 375--392. https://doi.org/10.1109/SP.2017.29
3. Lars Brü njes, Aggelos Kiayias , Elias Koutsoupias , and Aikaterini-Panagiota Stouka . 2020 . Reward Sharing Schemes for Stake Pools. In IEEE European Symposium on Security and Privacy, EuroS&P 2020 , Genoa, Italy, September 7--11 , 2020. IEEE, 256--275. https://doi.org/10.1109/EuroSP48549.2020.00024 10.1109/EuroSP48549.2020.00024 Lars Brü njes, Aggelos Kiayias, Elias Koutsoupias, and Aikaterini-Panagiota Stouka. 2020. Reward Sharing Schemes for Stake Pools. In IEEE European Symposium on Security and Privacy, EuroS&P 2020, Genoa, Italy, September 7--11, 2020. IEEE, 256--275. https://doi.org/10.1109/EuroSP48549.2020.00024
4. Universally composable security: a new paradigm for cryptographic protocols
5. The Hidden Graph Model