Search Results for author: George Danezis

Found 9 papers, 7 papers with code

Replay Attacks and Defenses Against Cross-shard Consensus in Sharded Distributed Ledgers

1 code implementation31 Jan 2019 Alberto Sonnino, Shehar Bano, Mustafa Al-Bassam, George Danezis

We present a family of replay attacks against sharded distributed ledgers, that target cross-shard consensus protocols, such as the recently proposed Chainspace and Omniledger.

Cryptography and Security

Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers

8 code implementations20 Feb 2018 Alberto Sonnino, Mustafa Al-Bassam, Shehar Bano, Sarah Meiklejohn, George Danezis

Coconut is a novel selective disclosure credential scheme supporting distributed threshold issuance, public and private attributes, re-randomization, and multiple unlinkable selective attribute revelations.

Cryptography and Security

Consensus in the Age of Blockchains

no code implementations10 Nov 2017 Shehar Bano, Alberto Sonnino, Mustafa Al-Bassam, Sarah Azouvi, Patrick McCorry, Sarah Meiklejohn, George Danezis

The blockchain initially gained traction in 2008 as the technology underlying bitcoin, but now has been employed in a diverse range of applications and created a global market worth over $150B as of 2017.

Cryptography and Security

A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components

1 code implementation12 Sep 2017 Vasilios Mavroudis, Andrea Cerulli, Petr Svenda, Dan Cvrcek, Dusan Klinec, George Danezis

To evaluate our design, we build a Hardware Security Module that provides the highest level of assurance possible with COTS components.

Cryptography and Security

Learning Universal Adversarial Perturbations with Generative Models

1 code implementation17 Aug 2017 Jamie Hayes, George Danezis

Neural networks are known to be vulnerable to adversarial examples, inputs that have been intentionally perturbed to remain visually similar to the source input, but cause a misclassification.

Ranked #8 on Graph Classification on NCI1 (using extra training data)

Graph Classification

ClaimChain: Improving the Security and Privacy of In-band Key Distribution for Messaging

2 code implementations19 Jul 2017 Bogdan Kulynych, Wouter Lueks, Marios Isaakidis, George Danezis, Carmela Troncoso

Autocrypt is a new community-driven open specification for e-mail encryption that attempts to respond to this demand.

Cryptography and Security

LOGAN: Membership Inference Attacks Against Generative Models

1 code implementation22 May 2017 Jamie Hayes, Luca Melis, George Danezis, Emiliano De Cristofaro

Generative models estimate the underlying distribution of a dataset to generate realistic samples according to that distribution.

Generating Steganographic Images via Adversarial Training

1 code implementation NeurIPS 2017 Jamie Hayes, George Danezis

In this paper, we apply adversarial training techniques to the discriminative task of learning a steganographic algorithm.

Image Generation

Centrally Banked Cryptocurrencies

no code implementations26 May 2015 George Danezis, Sarah Meiklejohn

Current cryptocurrencies, starting with Bitcoin, build a decentralized blockchain-based transaction ledger, maintained through proofs-of-work that also generate a monetary supply.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.