Aviv

Results: 1642



#Item
1Cryptocurrencies / Computing / Bitcoin / Internet / Free software / Alternative currencies / Blockchains / Internet security / BGP hijacking / Mining pool / Ghash.io / Denial-of-service attack

Hijacking Bitcoin: Routing Attacks on Cryptocurrencies https://btc-hijack.ethz.ch Maria Apostolaki Aviv Zohar

Add to Reading List

Source URL: nsg.ee.ethz.ch

Language: English - Date: 2017-04-17 08:02:51
2Leader election

Synthesizing Universally-Quantified Inductive Invariants Sharon Shoham Tel Aviv University

Add to Reading List

Source URL: www.react.uni-saarland.de

Language: English - Date: 2017-08-02 04:54:12
    3Cryptography / Computing / Internet / Internet protocols / Public-key cryptography / Transport Layer Security / Secure communication / Cryptographic protocols / QUIC / Transmission Control Protocol / Forward secrecy

    Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange David Derler‡ , Tibor Jagerk , Daniel Slamanig§ , Christoph Striecks§ May 3, 2018—Eurocrypt 2018, Tel Aviv, Israel

    Add to Reading List

    Source URL: david.derler.info

    Language: English - Date: 2018-10-15 14:18:42
    4Cryptocurrencies / Computing / Bitcoin / Internet / Free software / Alternative currencies / Blockchains / Internet security / BGP hijacking / Mining pool / Ghash.io / Denial-of-service attack

    Hijacking Bitcoin: Routing Attacks on Cryptocurrencies https://btc-hijack.ethz.ch Maria Apostolaki Aviv Zohar

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-03 15:58:18
    5Statistical classification / Coding theory / Computer arithmetic / Error detection and correction / Machine learning / Computing / Naive Bayes classifier / Learning / Advanced Encryption Standard / Block cipher / Bit array / Hamming

    Practical Template-Algebraic Side Channel Attacks with Extremely Low Data Complexity Yossef Oren, Ofir Weisse and Avishai Wool Cryptography and Network Security Lab School of Electrical Engineering Tel-Aviv University, R

    Add to Reading List

    Source URL: www.ofirweisse.com

    Language: English - Date: 2018-10-17 09:19:20
    6

    On the Existence of Extractable One-Way Functions ∗ Nir Bitansky † Tel Aviv University

    Add to Reading List

    Source URL: www.eecs.harvard.edu

    Language: English - Date: 2014-05-25 01:26:50
      7

      Inclusive Block Chain Protocols Yoad Lewenberg1 , Yonatan Sompolinsky1 , and Aviv Zohar1,2 1 The School of Engineering and Computer Science, The Hebrew University of Jerusalem, Israel

      Add to Reading List

      Source URL: www.cs.huji.ac.il

      Language: English - Date: 2015-07-23 04:46:02
        8Cryptocurrencies / Computing / Bitcoin / Internet / Free software / Alternative currencies / Blockchains / Internet security / BGP hijacking / Mining pool / Ghash.io / Denial-of-service attack

        Hijacking Bitcoin: Routing Attacks on Cryptocurrencies https://btc-hijack.ethz.ch Maria Apostolaki Aviv Zohar

        Add to Reading List

        Source URL: www.vanbever.eu

        Language: English - Date: 2017-04-03 13:06:45
        9

        A Local Computation Approximation Scheme to Maximum Matching Yishay Mansour? and Shai Vardi?? School of Computer Science, Tel Aviv University, Tel Aviv 69978, Israel. mansour, Keywords: Local Compu

        Add to Reading List

        Source URL: www.shaivardi.com

        Language: English - Date: 2016-11-07 02:11:06
          10

          Ontology Assisted Crowd Mining Yael Amsterdamer1 , Susan B. Davidson2 , Tova Milo1 , Slava Novgorodov1 , and Amit Somech1 1 2 Tel Aviv University, Tel Aviv, Israel

          Add to Reading List

          Source URL: www.vldb.org

          Language: English - Date: 2014-07-11 17:32:38
            UPDATE