default search action
Philipp Jovanovic
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c31]Nicolas Mohnblatt, Alberto Sonnino, Kobi Gurkan, Philipp Jovanovic:
Arke: Scalable and Byzantine Fault Tolerant Privacy-Preserving Contact Discovery. CCS 2024: 3212-3226 - [c30]Alireza Kavousi, Zhipeng Wang, Philipp Jovanovic:
SoK: Public Randomness. EuroS&P 2024: 216-234 - [c29]Yujin Potter, Kornrapat Pongmala, Kaihua Qin, Ariah Klages-Mundt, Philipp Jovanovic, Christine A. Parlour, Arthur Gervais, Dawn Song:
What Drives the (In)stability of a Stablecoin? ICBC 2024: 316-324 - [c28]Jens Ernstberger, Stefanos Chaliasos, George Kadianakis, Sebastian Steinhorst, Philipp Jovanovic, Arthur Gervais, Benjamin Livshits, Michele Orrù:
zk-Bench: A Toolset for Comparative Evaluation and Performance Benchmarking of SNARKs. SCN (1) 2024: 46-72 - [i41]Jens Ernstberger, Chengru Zhang, Luca Ciprian, Philipp Jovanovic, Sebastian Steinhorst:
Zero-Knowledge Location Privacy via Accurate Floating Point SNARKs. CoRR abs/2404.14983 (2024) - [i40]Philipp Jovanovic, Lefteris Kokoris-Kogias, Bryan Kumara, Alberto Sonnino, Pasindu Tennage, Igor Zablotchi:
Mahi-Mahi: Low-Latency Asynchronous BFT DAG-Based Consensus. CoRR abs/2410.08670 (2024) - [i39]Jens Ernstberger, Stefanos Chaliasos, Liyi Zhou, Philipp Jovanovic, Arthur Gervais:
Do You Need a Zero Knowledge Proof? IACR Cryptol. ePrint Arch. 2024: 50 (2024) - [i38]Andrija Novakovic, Alireza Kavousi, Kobi Gurkan, Philipp Jovanovic:
Cryptobazaar: Private Sealed-bid Auctions at Scale. IACR Cryptol. ePrint Arch. 2024: 1410 (2024) - [i37]Chengru Zhang, Xiao Yang, David Oswald, Mark Ryan, Philipp Jovanovic:
Eva: Efficient IVC-Based Authentication of Lossy-Encoded Videos. IACR Cryptol. ePrint Arch. 2024: 1436 (2024) - [i36]Jens Ernstberger, Chengru Zhang, Luca Ciprian, Philipp Jovanovic, Sebastian Steinhorst:
Zero-Knowledge Location Privacy via Accurate Floating-Point SNARKs. IACR Cryptol. ePrint Arch. 2024: 1842 (2024) - 2023
- [j4]Ittai Abraham, Philipp Jovanovic, Mary Maller, Sarah Meiklejohn, Gilad Stern, Alin Tomescu:
Reaching consensus for asynchronous distributed key generation. Distributed Comput. 36(3): 219-252 (2023) - [c27]Zhuolun Li, Alberto Sonnino, Philipp Jovanovic:
Performance of EdDSA and BLS Signatures in Committee-Based Consensus. ApPLIED@PODC 2023: 13:1-13:5 - [c26]Ittai Abraham, Philipp Jovanovic, Mary Maller, Sarah Meiklejohn, Gilad Stern:
Bingo: Adaptivity and Asynchrony in Verifiable Secret Sharing and Distributed Key Generation. CRYPTO (1) 2023: 39-70 - [c25]Kaihua Qin, Jens Ernstberger, Liyi Zhou, Philipp Jovanovic, Arthur Gervais:
Mitigating Decentralized Finance Liquidations with Reversible Call Options. FC (1) 2023: 344-362 - [c24]Matteo Campanelli, Nicolas Gailly, Rosario Gennaro, Philipp Jovanovic, Mara Mihali, Justin Thaler:
sfTestudo: Linear Time Prover SNARKs with Constant Size Proofs and Square Root Size Universal Setup. LATINCRYPT 2023: 331-351 - [c23]Pasindu Tennage, Cristina Basescu, Lefteris Kokoris-Kogias, Ewa Syta, Philipp Jovanovic, Vero Estrada-Galiñanes, Bryan Ford:
QuePaxa: Escaping the tyranny of timeouts in consensus. SOSP 2023: 281-297 - [i35]Zhuolun Li, Alberto Sonnino, Philipp Jovanovic:
Performance of EdDSA and BLS Signatures in Committee-Based Consensus. CoRR abs/2302.00418 (2023) - [i34]Kaihua Qin, Jens Ernstberger, Liyi Zhou, Philipp Jovanovic, Arthur Gervais:
Mitigating Decentralized Finance Liquidations with Reversible Call Options. CoRR abs/2303.15162 (2023) - [i33]Yujin Kwon, Kornrapat Pongmala, Kaihua Qin, Ariah Klages-Mundt, Philipp Jovanovic, Christine A. Parlour, Arthur Gervais, Dawn Song:
What Drives the (In)stability of a Stablecoin? CoRR abs/2307.11754 (2023) - [i32]Kostantinos Papadamou, Jay Patel, Jeremy Blackburn, Philipp Jovanovic, Emiliano De Cristofaro:
From HODL to MOON: Understanding Community Evolution, Emotional Dynamics, and Price Interplay in the Cryptocurrency Ecosystem. CoRR abs/2312.08394 (2023) - [i31]Kaihua Qin, Jens Ernstberger, Liyi Zhou, Philipp Jovanovic, Arthur Gervais:
Mitigating Decentralized Finance Liquidations with Reversible Call Options. IACR Cryptol. ePrint Arch. 2023: 254 (2023) - [i30]Matteo Campanelli, Nicolas Gailly, Rosario Gennaro, Philipp Jovanovic, Mara Mihali, Justin Thaler:
Testudo: Linear Time Prover SNARKs with Constant Size Proofs and Square Root Size Universal Setup. IACR Cryptol. ePrint Arch. 2023: 961 (2023) - [i29]Alireza Kavousi, Aydin Abadi, Philipp Jovanovic:
Timed Secret Sharing. IACR Cryptol. ePrint Arch. 2023: 1024 (2023) - [i28]Alireza Kavousi, Duc Viet Le, Philipp Jovanovic, George Danezis:
BlindPerm: Efficient MEV Mitigation with an Encrypted Mempool and Permutation. IACR Cryptol. ePrint Arch. 2023: 1061 (2023) - [i27]Alireza Kavousi, Zhipeng Wang, Philipp Jovanovic:
SoK: Public Randomness. IACR Cryptol. ePrint Arch. 2023: 1121 (2023) - [i26]Nicolas Mohnblatt, Alberto Sonnino, Kobi Gurkan, Philipp Jovanovic:
Arke: Scalable and Byzantine Fault Tolerant Privacy-Preserving Contact Discovery. IACR Cryptol. ePrint Arch. 2023: 1218 (2023) - [i25]Jens Ernstberger, Stefanos Chaliasos, George Kadianakis, Sebastian Steinhorst, Philipp Jovanovic, Arthur Gervais, Benjamin Livshits, Michele Orrù:
zk-Bench: A Toolset for Comparative Evaluation and Performance Benchmarking of SNARKs. IACR Cryptol. ePrint Arch. 2023: 1503 (2023) - 2022
- [c22]Psi Vesely, Kobi Gurkan, Michael Straka, Ariel Gabizon, Philipp Jovanovic, Georgios Konstantopoulos, Asa Oines, Marek Olszewski, Eran Tromer:
Plumo: An Ultralight Blockchain Client. Financial Cryptography 2022: 597-614 - [i24]Pasindu Tennage, Cristina Basescu, Eleftherios Kokoris-Kogias, Ewa Syta, Philipp Jovanovic, Bryan Ford:
Baxos: Backing off for Robust and Efficient Consensus. CoRR abs/2204.10934 (2022) - [i23]Akash Madhusudan, Mahdi Sedaghat, Philipp Jovanovic, Bart Preneel:
Nirvana: Instant and Anonymous Payment-Guarantees. IACR Cryptol. ePrint Arch. 2022: 872 (2022) - [i22]Ittai Abraham, Philipp Jovanovic, Mary Maller, Sarah Meiklejohn, Gilad Stern:
Bingo: Adaptively Secure Packed Asynchronous Verifiable Secret Sharing and Asynchronous Distributed Key Generation. IACR Cryptol. ePrint Arch. 2022: 1759 (2022) - 2021
- [c21]Kobi Gurkan, Philipp Jovanovic, Mary Maller, Sarah Meiklejohn, Gilad Stern, Alin Tomescu:
Aggregatable Distributed Key Generation. EUROCRYPT (1) 2021: 147-176 - [c20]Kaihua Qin, Liyi Zhou, Pablo Gamito, Philipp Jovanovic, Arthur Gervais:
An empirical study of DeFi liquidations: incentives, risks, and instabilities. Internet Measurement Conference 2021: 336-350 - [c19]Ittai Abraham, Philipp Jovanovic, Mary Maller, Sarah Meiklejohn, Gilad Stern, Alin Tomescu:
Reaching Consensus for Asynchronous Distributed Key Generation. PODC 2021: 363-373 - [e1]Dawn Song, Roger Wattenhofer, Arthur Gervais, Philipp Jovanovic:
DeFi '21: Proceedings of the 2021 ACM CCS Workshop on Decentralized Finance and Security, Virtual Event, Republic of Korea, 19 November 2021. ACM 2021, ISBN 978-1-4503-8540-4 [contents] - [i21]Ittai Abraham, Philipp Jovanovic, Mary Maller, Sarah Meiklejohn, Gilad Stern, Alin Tomescu:
Reaching Consensus for Asynchronous Distributed Key Generation. CoRR abs/2102.09041 (2021) - [i20]Kaihua Qin, Liyi Zhou, Pablo Gamito, Philipp Jovanovic, Arthur Gervais:
An Empirical Study of DeFi Liquidations: Incentives, Risks, and Instabilities. CoRR abs/2106.06389 (2021) - [i19]Kobi Gurkan, Philipp Jovanovic, Mary Maller, Sarah Meiklejohn, Gilad Stern, Alin Tomescu:
Aggregatable Distributed Key Generation. IACR Cryptol. ePrint Arch. 2021: 5 (2021) - [i18]Psi Vesely, Kobi Gurkan, Michael Straka, Ariel Gabizon, Philipp Jovanovic, Georgios Konstantopoulos, Asa Oines, Marek Olszewski, Eran Tromer:
Plumo: An Ultralight Blockchain Client. IACR Cryptol. ePrint Arch. 2021: 1361 (2021) - 2020
- [j3]Eleftherios Kokoris-Kogias, Enis Ceyhun Alp, Linus Gasser, Philipp Jovanovic, Ewa Syta, Bryan Ford:
CALYPSO: Private Data Management for Decentralized Ledgers. Proc. VLDB Endow. 14(4): 586-599 (2020) - [i17]Bryan Ford, Philipp Jovanovic, Ewa Syta:
Que Sera Consensus: Simple Asynchronous Agreement with Private Coins and Threshold Logical Clocks. CoRR abs/2003.02291 (2020)
2010 – 2019
- 2019
- [j2]Philipp Jovanovic, Atul Luykx, Bart Mennink, Yu Sasaki, Kan Yasuda:
Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes. J. Cryptol. 32(3): 895-940 (2019) - 2018
- [c18]Stevens Le Blond, Alejandro Cuevas, Juan Ramón Troncoso-Pastoriza, Philipp Jovanovic, Bryan Ford, Jean-Pierre Hubaux:
On Enforcing the Digital Immunity of a Large Humanitarian Organization. IEEE Symposium on Security and Privacy 2018: 424-440 - [c17]Eleftherios Kokoris-Kogias, Philipp Jovanovic, Linus Gasser, Nicolas Gailly, Ewa Syta, Bryan Ford:
OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding. IEEE Symposium on Security and Privacy 2018: 583-598 - [i16]Eleftherios Kokoris-Kogias, Enis Ceyhun Alp, Sandra Deepthy Siby, Nicolas Gailly, Philipp Jovanovic, Linus Gasser, Bryan Ford:
Hidden in Plain Sight: Storing and Managing Secrets on a Public Ledger. IACR Cryptol. ePrint Arch. 2018: 209 (2018) - 2017
- [c16]Maria Borge, Eleftherios Kokoris-Kogias, Philipp Jovanovic, Linus Gasser, Nicolas Gailly, Bryan Ford:
Proof-of-Personhood: Redemocratizing Permissionless Cryptocurrencies. EuroS&P Workshops 2017: 23-26 - [c15]Ewa Syta, Philipp Jovanovic, Eleftherios Kokoris-Kogias, Nicolas Gailly, Linus Gasser, Ismail Khoffi, Michael J. Fischer, Bryan Ford:
Scalable Bias-Resistant Distributed Randomness. IEEE Symposium on Security and Privacy 2017: 444-460 - [c14]Kirill Nikitin, Eleftherios Kokoris-Kogias, Philipp Jovanovic, Nicolas Gailly, Linus Gasser, Ismail Khoffi, Justin Cappos, Bryan Ford:
CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds. USENIX Security Symposium 2017: 1271-1287 - [i15]Eleftherios Kokoris-Kogias, Philipp Jovanovic, Linus Gasser, Nicolas Gailly, Bryan Ford:
OmniLedger: A Secure, Scale-Out, Decentralized Ledger. IACR Cryptol. ePrint Arch. 2017: 406 (2017) - [i14]Kirill Nikitin, Eleftherios Kokoris-Kogias, Philipp Jovanovic, Linus Gasser, Nicolas Gailly, Ismail Khoffi, Justin Cappos, Bryan Ford:
CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds. IACR Cryptol. ePrint Arch. 2017: 648 (2017) - 2016
- [c13]Robert Granger, Philipp Jovanovic, Bart Mennink, Samuel Neves:
Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption. EUROCRYPT (1) 2016: 263-293 - [c12]Ewa Syta, Iulia Tamas, Dylan Visher, David Isaac Wolinsky, Philipp Jovanovic, Linus Gasser, Nicolas Gailly, Ismail Khoffi, Bryan Ford:
Keeping Authorities "Honest or Bust" with Decentralized Witness Cosigning. IEEE Symposium on Security and Privacy 2016: 526-545 - [c11]Eleftherios Kokoris-Kogias, Philipp Jovanovic, Nicolas Gailly, Ismail Khoffi, Linus Gasser, Bryan Ford:
Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing. USENIX Security Symposium 2016: 279-296 - [c10]Hanno Böck, Aaron Zauner, Sean Devlin, Juraj Somorovsky, Philipp Jovanovic:
Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS. WOOT 2016 - [i13]Eleftherios Kokoris-Kogias, Philipp Jovanovic, Nicolas Gailly, Ismail Khoffi, Linus Gasser, Bryan Ford:
Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing. CoRR abs/1602.06997 (2016) - [i12]Hanno Böck, Aaron Zauner, Sean Devlin, Juraj Somorovsky, Philipp Jovanovic:
Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS. IACR Cryptol. ePrint Arch. 2016: 475 (2016) - [i11]Ewa Syta, Philipp Jovanovic, Eleftherios Kokoris-Kogias, Nicolas Gailly, Linus Gasser, Ismail Khoffi, Michael J. Fischer, Bryan Ford:
Scalable Bias-Resistant Distributed Randomness. IACR Cryptol. ePrint Arch. 2016: 1067 (2016) - 2015
- [b1]Philipp Jovanovic:
Analysis and Design of Symmetric Cryptographic Algorithms. University of Passau, 2015 - [c9]Christof Beierle, Philipp Jovanovic, Martin M. Lauridsen, Gregor Leander, Christian Rechberger:
Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows. CT-RSA 2015: 37-58 - [c8]Philipp Jovanovic, Ilia Polian:
Fault-based attacks on the Bel-T block cipher family. DATE 2015: 601-604 - [c7]Philipp Jovanovic, Samuel Neves:
Practical Cryptanalysis of the Open Smart Grid Protocol. FSE 2015: 297-316 - [i10]Christof Beierle, Philipp Jovanovic, Martin M. Lauridsen, Gregor Leander, Christian Rechberger:
Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows. IACR Cryptol. ePrint Arch. 2015: 212 (2015) - [i9]Philipp Jovanovic, Samuel Neves:
Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol. IACR Cryptol. ePrint Arch. 2015: 428 (2015) - [i8]Robert Granger, Philipp Jovanovic, Bart Mennink, Samuel Neves:
Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption. IACR Cryptol. ePrint Arch. 2015: 999 (2015) - [i7]Jean-Philippe Aumasson, Philipp Jovanovic, Samuel Neves:
NORX8 and NORX16: Authenticated Encryption for Low-End Systems. IACR Cryptol. ePrint Arch. 2015: 1154 (2015) - 2014
- [c6]Philipp Jovanovic, Atul Luykx, Bart Mennink:
Beyond 2 c/2 Security in Sponge-Based Authenticated Encryption Modes. ASIACRYPT (1) 2014: 85-104 - [c5]Jean-Philippe Aumasson, Philipp Jovanovic, Samuel Neves:
NORX: Parallel and Scalable AEAD. ESORICS (2) 2014: 19-36 - [c4]Raghavan Kumar, Philipp Jovanovic, Wayne P. Burleson, Ilia Polian:
Parametric Trojans for Fault-Injection Attacks on Cryptographic Hardware. FDTC 2014: 18-28 - [c3]Raghavan Kumar, Philipp Jovanovic, Ilia Polian:
Precise fault-injections using voltage and temperature manipulation for differential cryptanalysis. IOLTS 2014: 43-48 - [c2]Jean-Philippe Aumasson, Philipp Jovanovic, Samuel Neves:
Analysis of NORX: Investigating Differential and Rotational Properties. LATINCRYPT 2014: 306-324 - [i6]Philipp Jovanovic, Samuel Neves, Jean-Philippe Aumasson:
Analysis of NORX. IACR Cryptol. ePrint Arch. 2014: 317 (2014) - [i5]Philipp Jovanovic, Atul Luykx, Bart Mennink:
Beyond 2c/2 Security in Sponge-Based Authenticated Encryption Modes. IACR Cryptol. ePrint Arch. 2014: 373 (2014) - [i4]Raghavan Kumar, Philipp Jovanovic, Ilia Polian:
Precise Fault-Injections using Voltage and Temperature Manipulation for Differential Cryptanalysis. IACR Cryptol. ePrint Arch. 2014: 782 (2014) - [i3]Raghavan Kumar, Philipp Jovanovic, Wayne P. Burleson, Ilia Polian:
Parametric Trojans for Fault-Injection Attacks on Cryptographic Hardware. IACR Cryptol. ePrint Arch. 2014: 783 (2014) - 2013
- [i2]Philipp Jovanovic, Martin Kreuzer, Ilia Polian:
Multi-Stage Fault Attacks on Block Ciphers. IACR Cryptol. ePrint Arch. 2013: 778 (2013) - 2012
- [c1]Philipp Jovanovic, Martin Kreuzer, Ilia Polian:
A Fault Attack on the LED Block Cipher. COSADE 2012: 120-134 - [i1]Philipp Jovanovic, Martin Kreuzer, Ilia Polian:
An Algebraic Fault Attack on the LED Block Cipher. IACR Cryptol. ePrint Arch. 2012: 400 (2012) - 2010
- [j1]Philipp Jovanovic, Martin Kreuzer:
Algebraic attacks using SAT-solvers. Groups Complex. Cryptol. 2(2): 247-259 (2010)
Coauthor Index
aka: Lefteris Kokoris-Kogias
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 21:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint