Follow
Mary Maller
Mary Maller
Ethereum Foundation
Verified email at ethereum.org - Homepage
Title
Cited by
Cited by
Year
Marlin: Preprocessing zkSNARKs with universal and updatable SRS
A Chiesa, Y Hu, M Maller, P Mishra, N Vesely, N Ward
Advances in Cryptology–EUROCRYPT 2020: 39th Annual International Conference …, 2020
4642020
Sonic: Zero-knowledge SNARKs from linear-size universal and updatable structured reference strings
M Maller, S Bowe, M Kohlweiss, S Meiklejohn
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
4432019
Snarky signatures: Minimal signatures of knowledge from simulation-extractable SNARKs
J Groth, M Maller
Annual International Cryptology Conference, 581-612, 2017
2692017
Updatable and universal common reference strings with applications to zk-SNARKs
J Groth, M Kohlweiss, M Maller, S Meiklejohn, I Miers
Annual International Cryptology Conference, 698-728, 2018
2302018
An empirical analysis of anonymity in zcash
G Kappos, H Yousaf, M Maller, S Meiklejohn
27th USENIX Security Symposium (USENIX Security 18), 463-477, 2018
2272018
Proofs for inner pairing products and applications
B Bünz, M Maller, P Mishra, N Tyagi, P Vesely
Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021
1182021
Reaching consensus for asynchronous distributed key generation
I Abraham, P Jovanovic, M Maller, S Meiklejohn, G Stern, A Tomescu
Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing …, 2021
962021
Egalitarian society or benevolent dictatorship: The state of cryptocurrency governance
S Azouvi, M Maller, S Meiklejohn
Financial Cryptography and Data Security: FC 2018 International Workshops …, 2019
872019
Arya: Nearly linear-time zero-knowledge proofs for correct program execution
J Bootle, A Cerulli, J Groth, S Jakobsen, M Maller
International Conference on the Theory and Application of Cryptology and …, 2018
782018
Caulk: Lookup arguments in sublinear time
A Zapico, V Buterin, D Khovratovich, M Maller, A Nitulescu, M Simkin
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
602022
Aggregatable distributed key generation
K Gurkan, P Jovanovic, M Maller, S Meiklejohn, G Stern, A Tomescu
Annual International Conference on the Theory and Applications of …, 2021
592021
Better than advertised security for non-interactive threshold signatures
M Bellare, E Crites, C Komlo, M Maller, S Tessaro, C Zhu
Annual International Cryptology Conference, 517-550, 2022
462022
Snarkpack: Practical snark aggregation
N Gailly, M Maller, A Nitulescu
International Conference on Financial Cryptography and Data Security, 203-229, 2022
452022
Fully adaptive schnorr threshold signatures
E Crites, C Komlo, M Maller
Annual International Cryptology Conference, 678-709, 2023
442023
How to prove schnorr assuming schnorr: Security of multi-and threshold signatures
E Crites, C Komlo, M Maller
Cryptology ePrint Archive, 2021
442021
Snarky Ceremonies
M Kohlweiss, M Maller, J Siim, M Volkhov
382021
Baloo: nearly optimal lookup arguments
A Zapico, A Gabizon, D Khovratovich, M Maller, C Rafols
Cryptology ePrint Archive, 2022
312022
Bingo: Adaptively Secure Packed Asynchronous Verifiable Secret Sharing and Asynchronous Distributed Key Generation.
I Abraham, P Jovanovic, M Maller, S Meiklejohn, G Stern
IACR Cryptol. ePrint Arch. 2022, 1759, 2022
232022
Bingo: Adaptivity and asynchrony in verifiable secret sharing and distributed key generation
I Abraham, P Jovanovic, M Maller, S Meiklejohn, G Stern
Annual International Cryptology Conference, 39-70, 2023
222023
Déjà Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions
M Chase, M Maller, S Meiklejohn
International Conference on the Theory and Application of Cryptology and …, 2016
212016
The system can't perform the operation now. Try again later.
Articles 1–20