_id,doi,title
15007,10.4230/LIPIcs.OPODIS.2023.12,Eating sandwiches: Modular and lightweight elimination of transaction reordering attacks
14428,10.1007/978-3-031-38545-2_17,"Random oracle combiners: Breaking the concatenation barrier for collision-resistance"
14457,10.1007/978-3-031-44469-2_11,"Stronger lower bounds for leakage-resilient secret sharing"
14490,10.1109/ICDCS57875.2023.00037,Lightning creation games
14506,10.15479/14506,Advances in efficiency and privacy in payment channel network analysis
14691,10.1007/978-3-031-48621-0_10,"On the cost of post-compromise security in concurrent Continuous Group-Key Agreement"
14692,10.1007/978-3-031-48621-0_11,Generic-group lower bounds via reductions between geometric-search problems: With and without preprocessing
14693,10.1007/978-3-031-48624-1_13,(Verifiable) delay functions from Lucas sequences
14736,10.1007/978-3-031-47754-6_18,"R2: Boosting liquidity in payment channel networks with online admission control"
13143,10.1007/978-3-031-31368-4_19,Certifying giant nonprimes
13238,10.1007/978-3-031-32733-9_26,"Weighted packet selection for rechargeable links in cryptocurrency networks: Complexity and approximation"
12164,10.1007/s00446-022-00439-5,Long-lived counters with polylogarithmic amortized step complexity
11476,10.1007/978-3-031-07085-3_28,CoCoA: Concurrent continuous group key agreement
12167,10.1007/978-3-031-18283-9_17,"Hide & Seek: Privacy-preserving rebalancing on payment channel networks"
12176,10.1007/978-3-031-15979-4_13,"Practical statistically-sound proofs of exponentiation in any group"
12516,10.1007/978-3-031-22365-5_20,"Public-Key Encryption from Homogeneous CLWE"
9466,10.1007/978-3-030-75245-3_3,The convergence of slide-type reductions
10035,10.15479/at:ista:10035,On the adaptive security of graph-based games
10041,10.1007/978-3-030-84245-1_17,"Limits on the Adaptive Security of Yao’s Garbling"
10044,,"On treewidth, separators and Yao's garbling"
