István András Seres
Cited by
Cited by
Topological analysis of bitcoin’s lightning network
IA Seres, L Gulyás, DA Nagy, P Burcsi
Mathematical Research for Blockchain Economy: 1st International Conference …, 2020
Blockchain is watching you: Profiling and deanonymizing ethereum users
F Béres, IA Seres, AA Benczúr, M Quintyne-Collins
2021 IEEE international conference on decentralized applications and …, 2021
A cryptoeconomic traffic analysis of Bitcoins lightning network
F Béres, IA Seres, AA Benczúr
Cryptoeconomic Systems Journal, 2019
MixEth: efficient, trustless coin mixing service for Ethereum
IA Seres, DA Nagy, C Buckland, P Burcsi
International Conference on Blockchain Economics, Security and Protocols …, 2019
The Legendre pseudorandom function as a multivariate quadratic cryptosystem: security and applications
IA Seres, M Horváth, P Burcsi
Applicable Algebra in Engineering, Communication and Computing, 1-31, 2023
Tutela: An open-source tool for assessing user-privacy on ethereum and tornado cash
M Wu, W McTighe, K Wang, IA Seres, N Bax, M Puebla, M Mendez, ...
arXiv preprint arXiv:2201.06811, 2022
Private signaling
V Madathil, A Scafuro, IA Seres, O Shlomovits, D Varlakov
31st USENIX Security Symposium (USENIX Security 22), 3309-3326, 2022
The effect of false positives: Why fuzzy message detection leads to fuzzy privacy guarantees?
IA Seres, B Pejó, P Burcsi
International Conference on Financial Cryptography and Data Security, 123-148, 2022
ShareLock: Mixing for Cryptocurrencies from Multiparty ECDSA
O Shlomovits, IA Seres
Cryptology ePrint Archive, Report 2019/563, Tech. Rep, 2019
WabiSabi: Centrally Coordinated CoinJoins with Variable Amounts
Á Ficsór, Y Kogman, L Ontivero, IA Seres
On Blockchain Metatransactions
IA Seres
IEEE International Conference on Blockchain, 2020
A note on low order assumptions in RSA groups
IA Seres, P Burcsi
Rad Hrvatske akademije znanosti i umjetnosti. Matematičke znanosti, 15-31, 2021
CryptoWills: How to Bequeath Cryptoassets.
IA Seres, O Shlomovits, PR Tiwari
IEEE Security & Privacy on the Blockchain (IEEE S&B 2020), 2020
How (not) to hash into class groups of imaginary quadratic fields?
IA Seres, P Burcsi, P Kutas
Cryptology ePrint Archive, 2024
Anonymity analysis of the umbra stealth address scheme on ethereum
AM Kovács, IA Seres
Companion Proceedings of the ACM on Web Conference 2024, 1768-1775, 2024
Atomic and Fair Data Exchange via Blockchain
EN Tas, IA Seres, Y Zhang, M Melczer, M Kelkar, J Bonneau, ...
Cryptology ePrint Archive, 2024
Integrated Onion Routing for Peer-to-Peer Validator Privacy in the Ethereum Network
DM Kelen, IA Seres, F Béres, AA Benczúr
Naysayer proofs
IA Seres, N Glaeser, J Bonneau
Cryptology ePrint Archive, 2023
Behemoth: transparent polynomial commitment scheme with constant opening proof size and verifier time
IA Seres, P Burcsi
Cryptology ePrint Archive, 2023
The Spatiotemporal Scaling Laws of Bitcoin Transactions
L Kelemen, IA Seres, Á Backhausz
arXiv preprint arXiv:2309.11884, 2023
The system can't perform the operation now. Try again later.
Articles 1–20