NSEC5 from Elliptic Curves: Provably Preventing DNSSEC Zone Enumeration with Shorter Responses.

Leonid Reyzin , Moni Naor , Sharon Goldberg , Dimitrios Papadopoulos
IACR Cryptology ePrint Archive 2016 83

9
2016
Authenticated hierarchical set operations and applications

Ran Canetti , Dimitrios Papadopoulos , Nikolaos Triandopoulos

5
2015
Zero-Knowledge Accumulators and Set Operations

Nikos Triandopoulos , Olga Ohrimenko , Roberto Tamassia , Esha Ghosh
IACR Cryptology ePrint Archive 2015 404

14
2015
NSEC5, DNSSEC Authenticated Denial of Existence

Sharon Goldberg , Dimitrios Papadopoulos , Shumon Huque , Jan Vcelak
Internet Engineering Task Force

2
2018
Can NSEC5 be practical for DNSSEC deployments

Leonid Reyzin , Moni Naor , Sharon Goldberg , Dimitrios Papadopoulos
IACR Cryptology ePrint Archive 2017 99

6
2017
A Zero-Knowledge Version of vSQL.

Charalampos Papamanthou , Daniel Genkin , Dimitrios Papadopoulos , Jonathan Katz
IACR Cryptology ePrint Archive 2017 1146

11
2017
NSEC5: Provably Preventing DNSSEC Zone Enumeration.

Leonid Reyzin , Moni Naor , Sharon Goldberg , Dimitrios Papadopoulos
IACR Cryptology ePrint Archive 2014 582

2
2014
Dynamic Searchable Encryption with Small Client Storage.

Charalampos Papamanthou , Dimitrios Papadopoulos , Ioannis Demertzis , Javad Ghareh Chamani
IACR Cryptology ePrint Archive 2019 1227

59
2019
{MIRAGE}: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs

Ahmed E. Kosba , Charalampos Papamanthou , Dawn Song , Dimitrios Papadopoulos
usenix security symposium 2129 -2146

2020
{SEAL}: Attack Mitigation for Encrypted Databases via Adjustable Leakage

Charalampos Papamanthou , Dimitrios Papadopoulos , Saurabh Shintre , Ioannis Demertzis
usenix security symposium 2433 -2450

6
2020
Agora: A Privacy-aware Data Marketplace

Sasu Tarkoma , Pan Hui , Dimitrios Papadopoulos , Dimitris Chatzopoulos
international conference on distributed computing systems 1211 -1212

28
2020
Verifiable Capacity-bound Functions: A New Primitive from Kolmogorov Complexity.

Giuseppe Ateniese , Qiang Tang , Dimitrios Papadopoulos , Long Chen
IACR Cryptology ePrint Archive 2021 162

2021
Multi-User Collusion-Resistant Searchable Encryption with Optimal Search Time

Dimitrios Papadopoulos , Yun Wang
computer and communications security

2021
Stateful Multi-client Verifiable Computation

Christian Cachin , Esha Ghosh , Dimitrios Papadopoulos , Björn Tackmann
applied cryptography and network security 637 -656

7
2018
New Constructions for Forward and Backward Private Symmetric Searchable Encryption

Javad Ghareh Chamani , Dimitrios Papadopoulos , Charalampos Papamanthou , Rasool Jalili
computer and communications security 1038 -1055

164
2018
Privacy in decentralized cryptocurrencies

Daniel Genkin , Dimitrios Papadopoulos , Charalampos Papamanthou
Communications of The ACM 61 ( 6) 78 -88

23
2018
Taking Authenticated Range Queries to Arbitrary Dimensions

Dimitrios Papadopoulos , Stavros Papadopoulos , Nikos Triandopoulos
computer and communications security 819 -830

25
2014
Server-Aided Secure Computation with Off-line Parties

Foteini Baldimtsi , Dimitrios Papadopoulos , Stavros Papadopoulos , Alessandra Scafuro
european symposium on research in computer security 103 -123

5
2017
Verifiable Set Operations over Outsourced Databases

Ran Canetti , Omer Paneth , Dimitrios Papadopoulos , Nikos Triandopoulos
public key cryptography 113 -130

37
2014
Searchable Encryption with Optimal Locality: Achieving Sublogarithmic Read Efficiency

Ioannis Demertzis , Dimitrios Papadopoulos , Charalampos Papamanthou
international cryptology conference 371 -406

63
2018