Sumcheck arguments and their applications J Bootle, A Chiesa, K Sotiraki Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021 | 43 | 2021 |
PPP-completeness with connections to cryptography K Sotiraki, M Zampetakis, G Zirdelis 2018 IEEE 59th Annual Symposium on Foundations of Computer Science (FOCS …, 2018 | 38 | 2018 |
Consensus-halving: Does it ever get easier? A Filos-Ratsikas, A Hollender, K Sotiraki, M Zampetakis Proceedings of the 21st ACM Conference on Economics and Computation, 381-399, 2020 | 32 | 2020 |
Limits on the efficiency of (ring) LWE-based non-interactive key exchange S Guo, P Kamath, A Rosen, K Sotiraki Journal of Cryptology 35 (1), 1, 2022 | 22 | 2022 |
A Topological Characterization of Modulo-p Arguments and Implications for Necklace Splitting A Filos-Ratsikas, A Hollender, K Sotiraki, M Zampetakis Proceedings of the 2021 ACM-SIAM Symposium on Discrete Algorithms (SODA …, 2021 | 22 | 2021 |
Occupational fraud detection through visualization EN Argyriou, AA Sotiraki, A Symvonis 2013 IEEE International Conference on Intelligence and Security Informatics, 4-6, 2013 | 22 | 2013 |
On the complexity of modulo-q arguments and the Chevalley-Warning theorem M Göös, P Kamath, K Sotiraki, M Zampetakis arXiv preprint arXiv:1912.04467, 2019 | 16 | 2019 |
Privately computing set-maximal matches in genomic data K Sotiraki, E Ghosh, H Chen BMC Medical Genomics 13, 1-8, 2020 | 12 | 2020 |
Towards non-interactive zero-knowledge for NP from LWE RD Rothblum, A Sealfon, K Sotiraki IACR International Workshop on Public Key Cryptography, 472-503, 2019 | 12 | 2019 |
Lattice-based succinct arguments for np with polylogarithmic-time verification J Bootle, A Chiesa, K Sotiraki Annual International Cryptology Conference, 227-251, 2023 | 11 | 2023 |
Toward non-interactive zero-knowledge proofs for NP from LWE RD Rothblum, A Sealfon, K Sotiraki Journal of cryptology 34 (1), 3, 2021 | 10 | 2021 |
HOLMES: A Platform for Detecting Malicious Inputs in Secure Collaborative Computation. W Chen, K Sotiraki, I Chang, M Kantarcioglu, RA Popa IACR Cryptol. ePrint Arch. 2021, 1517, 2021 | 6 | 2021 |
{HOLMES}: Efficient Distribution Testing for Secure Collaborative Learning I Chang, K Sotiraki, W Chen, M Kantarcioglu, R Popa 32nd USENIX Security Symposium (USENIX Security 23), 4823-4840, 2023 | 5 | 2023 |
Brief announcement: Agreement in partitioned dynamic networks A Sealfon, AA Sotiraki Proceedings 28th International Symposium on Distributed Computing (DISC’14 …, 2014 | 5 | 2014 |
Authentication protocol using trapdoored matrices A Sotiraki Massachusetts Institute of Technology, 2016 | 4 | 2016 |
Injecting Undetectable Backdoors in Deep Learning and Language Models A Kalavasis, A Karbasi, A Oikonomou, K Sotiraki, G Velegkas, ... arXiv preprint arXiv:2406.05660, 2024 | 1 | 2024 |
CrossFyre 2024: 13th International Workshop on Cryptography, Robustness, and Provably Secure Schemes for Female Young Researchers J Bootle, E Crites, K Sotiraki, A Zapico Annual International Conference on the Theory and Applications of …, 2024 | | 2024 |
DoS-resistant Oblivious Message Retrieval and Snake-eye Resistant PKE from LWE Z Liu, K Sotiraki, E Tromer, Y Wang Cryptology ePrint Archive, 2024 | | 2024 |
DoS-resistant Oblivious Message Retrieval from Snake-eye Resistant PKE. Z Liu, K Sotiraki, E Tromer, Y Wang IACR Cryptol. ePrint Arch. 2024, 510, 2024 | | 2024 |
Injecting Undetectable Backdoors in Obfuscated Neural Networks and Language Models A Kalavasis, A Karbasi, A Oikonomou, K Sotiraki, G Velegkas, ... The Thirty-eighth Annual Conference on Neural Information Processing Systems, 0 | | |