diff --git a/404.html b/404.html index 2a83015..fafd182 100644 --- a/404.html +++ b/404.html @@ -4,7 +4,7 @@ SDF Research - + diff --git a/assets/js/935f2afb.1f23919e.js b/assets/js/935f2afb.b51da226.js similarity index 70% rename from assets/js/935f2afb.1f23919e.js rename to assets/js/935f2afb.b51da226.js index 7ef7cc9..0f880c8 100644 --- a/assets/js/935f2afb.1f23919e.js +++ b/assets/js/935f2afb.b51da226.js @@ -1 +1 @@ -"use strict";(self.webpackChunkresearch=self.webpackChunkresearch||[]).push([[581],{5610:e=>{e.exports=JSON.parse('{"pluginId":"default","version":"current","label":"Next","banner":null,"badge":false,"noIndex":false,"className":"docs-version-current","isLast":true,"docsSidebars":{"contentsSidebar":[{"type":"link","label":"Research at the SDF","href":"/","docId":"welcome","unlisted":false},{"type":"category","label":"Academic Research Grants","collapsible":true,"collapsed":true,"items":[{"type":"link","label":"Grantees","href":"/research-grants/grantees","docId":"research-grants/grantees","unlisted":false},{"type":"link","label":"Publications","href":"/research-grants/publications","docId":"research-grants/publications","unlisted":false}],"href":"/research-grants"},{"type":"link","label":"Workshops","href":"/workshops","docId":"workshops","unlisted":false},{"type":"link","label":"Publications","href":"/publications","docId":"publications","unlisted":false}]},"docs":{"publications":{"id":"publications","title":"Publications co-authored by SDF researchers","description":"Eli Gafni and Giuliano Losa. \u201cBrief Announcement//doi.org/10.4230/LIPIcs.DISC.2023.41","sidebar":"contentsSidebar"},"research-grants/grantees":{"id":"research-grants/grantees","title":"Awarded research grants by quarter","description":"Q4 2023","sidebar":"contentsSidebar"},"research-grants/index":{"id":"research-grants/index","title":"Academic Research Grants","description":"The Stellar Development Foundation is soliciting proposals for scientific, technological, economic, and legal research advancing the foundation\u2019s goals of financial inclusion, fast and inexpensive cross-border payments, efficient decentralized markets, and other beneficial applications of blockchain technology.","sidebar":"contentsSidebar"},"research-grants/publications":{"id":"research-grants/publications","title":"Publications acknowledging SDF funding","description":"Leemon Baird, Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, and Yinuo Zhang. 2023. \u201cThreshold Signatures in the Multiverse.\u201d In 2023 IEEE Symposium on Security and Privacy (SP), 1454\u201370. https://doi.org/10.1109/SP46215.2023.10179436.","sidebar":"contentsSidebar"},"welcome":{"id":"welcome","title":"Research at the Stellar Development Foundation","description":"The Stellar Development Foundation supports technological and scientific research through its in-house research team and its academic grants program.","sidebar":"contentsSidebar"},"workshops":{"id":"workshops","title":"Scientific Workshops","description":"We help organize workshops that bring scientists together and spur scientific progress.","sidebar":"contentsSidebar"}}}')}}]); \ No newline at end of file +"use strict";(self.webpackChunkresearch=self.webpackChunkresearch||[]).push([[581],{5610:e=>{e.exports=JSON.parse('{"pluginId":"default","version":"current","label":"Next","banner":null,"badge":false,"noIndex":false,"className":"docs-version-current","isLast":true,"docsSidebars":{"contentsSidebar":[{"type":"link","label":"Research at the SDF","href":"/","docId":"welcome","unlisted":false},{"type":"category","label":"Academic Research Grants","collapsible":true,"collapsed":true,"items":[{"type":"link","label":"Grantees","href":"/research-grants/grantees","docId":"research-grants/grantees","unlisted":false},{"type":"link","label":"Publications","href":"/research-grants/publications","docId":"research-grants/publications","unlisted":false}],"href":"/research-grants"},{"type":"link","label":"Workshops","href":"/workshops","docId":"workshops","unlisted":false},{"type":"link","label":"Publications","href":"/publications","docId":"publications","unlisted":false}]},"docs":{"publications":{"id":"publications","title":"Publications co-authored by SDF researchers","description":"Eli Gafni and Giuliano Losa. \u201cBrief Announcement//doi.org/10.4230/LIPIcs.DISC.2023.41","sidebar":"contentsSidebar"},"research-grants/grantees":{"id":"research-grants/grantees","title":"Awarded research grants by quarter","description":"Q4 2023","sidebar":"contentsSidebar"},"research-grants/index":{"id":"research-grants/index","title":"Academic Research Grants","description":"The Stellar Development Foundation is soliciting proposals for scientific, technological, economic, and legal research advancing the foundation\u2019s goals of financial inclusion, fast and inexpensive cross-border payments, efficient decentralized markets, and other beneficial applications of blockchain technology.","sidebar":"contentsSidebar"},"research-grants/publications":{"id":"research-grants/publications","title":"Publications acknowledging SDF funding","description":"Sanjam Garg, Dimitris Kolonelos, Guru-Vamsi Policharla, and Mingyuan Wang. \\"Threshold Encryption with Silent Setup.\\" Cryptology ePrint Archive (2024). https://eprint.iacr.org/2024/263","sidebar":"contentsSidebar"},"welcome":{"id":"welcome","title":"Research at the Stellar Development Foundation","description":"The Stellar Development Foundation supports technological and scientific research through its in-house research team and its academic grants program.","sidebar":"contentsSidebar"},"workshops":{"id":"workshops","title":"Scientific Workshops","description":"We help organize workshops that bring scientists together and spur scientific progress.","sidebar":"contentsSidebar"}}}')}}]); \ No newline at end of file diff --git a/assets/js/a6e0a6ed.21a28af0.js b/assets/js/a6e0a6ed.21a28af0.js new file mode 100644 index 0000000..53bec22 --- /dev/null +++ b/assets/js/a6e0a6ed.21a28af0.js @@ -0,0 +1 @@ +"use strict";(self.webpackChunkresearch=self.webpackChunkresearch||[]).push([[579],{4512:(n,e,r)=>{r.r(e),r.d(e,{assets:()=>h,contentTitle:()=>s,default:()=>d,frontMatter:()=>a,metadata:()=>o,toc:()=>c});var i=r(4848),t=r(8453);const a={sidebar_label:"Publications",sidebar_position:2,slug:"/research-grants/publications"},s="Publications acknowledging SDF funding",o={id:"research-grants/publications",title:"Publications acknowledging SDF funding",description:'Sanjam Garg, Dimitris Kolonelos, Guru-Vamsi Policharla, and Mingyuan Wang. "Threshold Encryption with Silent Setup." Cryptology ePrint Archive (2024). https://eprint.iacr.org/2024/263',source:"@site/docs/research-grants/publications.md",sourceDirName:"research-grants",slug:"/research-grants/publications",permalink:"/research-grants/publications",draft:!1,unlisted:!1,tags:[],version:"current",sidebarPosition:2,frontMatter:{sidebar_label:"Publications",sidebar_position:2,slug:"/research-grants/publications"},sidebar:"contentsSidebar",previous:{title:"Grantees",permalink:"/research-grants/grantees"},next:{title:"Workshops",permalink:"/workshops"}},h={},c=[];function l(n){const e={a:"a",em:"em",h1:"h1",p:"p",...(0,t.R)(),...n.components};return(0,i.jsxs)(i.Fragment,{children:[(0,i.jsx)(e.h1,{id:"publications-acknowledging-sdf-funding",children:"Publications acknowledging SDF funding"}),"\n",(0,i.jsxs)(e.p,{children:['Sanjam Garg, Dimitris Kolonelos, Guru-Vamsi Policharla, and Mingyuan Wang. "Threshold Encryption with Silent Setup." Cryptology ePrint Archive (2024). ',(0,i.jsx)(e.a,{href:"https://eprint.iacr.org/2024/263",children:"https://eprint.iacr.org/2024/263"})]}),"\n",(0,i.jsxs)(e.p,{children:['Arka Rai Choudhuri, Sanjam Garg, Julien Piet, and Guru-Vamsi Policharla. "Mempool Privacy via Batched Threshold Encryption: Attacks and Defenses." Cryptology ePrint Archive (2024). ',(0,i.jsx)(e.a,{href:"https://eprint.iacr.org/2024/669",children:"https://eprint.iacr.org/2024/669"})]}),"\n",(0,i.jsxs)(e.p,{children:['Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, and Yinuo Zhang. "Cryptography with weights: MPC, encryption and signatures." Annual International Cryptology Conference. 2022. ',(0,i.jsx)(e.a,{href:"https://link.springer.com/chapter/10.1007/978-3-031-38557-5_10",children:"https://link.springer.com/chapter/10.1007/978-3-031-38557-5_10"})]}),"\n",(0,i.jsxs)(e.p,{children:["Leemon Baird, Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, and Yinuo Zhang. 2023. \u201cThreshold Signatures in the Multiverse.\u201d In ",(0,i.jsx)(e.em,{children:"2023 IEEE Symposium on Security and Privacy (SP)"}),", 1454\u201370. ",(0,i.jsx)(e.a,{href:"https://doi.org/10.1109/SP46215.2023.10179436",children:"https://doi.org/10.1109/SP46215.2023.10179436"}),"."]}),"\n",(0,i.jsxs)(e.p,{children:["Hanwen Feng and Qiang Tang. 2023. \u201cWitness Authenticating NIZKs and Applications.\u201d 2023. ",(0,i.jsx)(e.a,{href:"https://eprint.iacr.org/2023/1276",children:"https://eprint.iacr.org/2023/1276"}),"."]}),"\n",(0,i.jsxs)(e.p,{children:["Yingzi Gao, Yuan Lu, Zhenliang Lu, Qiang Tang, Jing Xu, and Zhenfeng Zhang. 2022. \u201cDumbo-NG: Fast Asynchronous BFT Consensus with Throughput-Oblivious Latency.\u201d In ",(0,i.jsx)(e.em,{children:"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security"}),", 1187\u20131201. CCS \u201922. ",(0,i.jsx)(e.a,{href:"https://doi.org/10.1145/3548606.3559379",children:"https://doi.org/10.1145/3548606.3559379"}),"."]}),"\n",(0,i.jsxs)(e.p,{children:["Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, and Yinuo Zhang. 2023. \u201chinTS: Threshold Signatures with Silent Setup.\u201d 2023. ",(0,i.jsx)(e.a,{href:"https://eprint.iacr.org/2023/567",children:"https://eprint.iacr.org/2023/567"}),"."]}),"\n",(0,i.jsxs)(e.p,{children:["Andr\xe9 Gaul, Ismail Khoffi, J\xf6rg Liesen, and Torsten St\xfcber. 2019. \u201cMathematical Analysis and Algorithms for Federated Byzantine Agreement Systems.\u201d December 3, 2019. ",(0,i.jsx)(e.a,{href:"https://doi.org/10.48550/arXiv.1912.01365",children:"https://doi.org/10.48550/arXiv.1912.01365"}),"."]}),"\n",(0,i.jsxs)(e.p,{children:["Andr\xe9 Gaul and J\xf6rg Liesen. 2020. \u201cCentrality of Nodes in Federated Byzantine Agreement Systems.\u201d December 7, 2020. ",(0,i.jsx)(e.a,{href:"https://doi.org/10.48550/arXiv.2012.03913",children:"https://doi.org/10.48550/arXiv.2012.03913"}),"."]}),"\n",(0,i.jsxs)(e.p,{children:["Giuliano Losa and Mike Dodds. 2020. \u201cOn the Formal Verification of the Stellar Consensus Protocol.\u201d In ",(0,i.jsx)(e.em,{children:"2nd Workshop on Formal Methods for Blockchains (FMBC 2020)"}),". ",(0,i.jsx)(e.a,{href:"https://doi.org/10.4230/OASIcs.FMBC.2020.9",children:"https://doi.org/10.4230/OASIcs.FMBC.2020.9"}),"."]}),"\n",(0,i.jsxs)(e.p,{children:["Lu, Yuan, Zhenliang Lu, and Qiang Tang. 2022. \u201cBolt-Dumbo Transformer: Asynchronous Consensus As Fast As the Pipelined BFT.\u201d In ",(0,i.jsx)(e.em,{children:"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security"}),", 2159\u201373. CCS \u201922. ",(0,i.jsx)(e.a,{href:"https://doi.org/10.1145/3548606.3559346",children:"https://doi.org/10.1145/3548606.3559346"}),"."]})]})}function d(n={}){const{wrapper:e}={...(0,t.R)(),...n.components};return e?(0,i.jsx)(e,{...n,children:(0,i.jsx)(l,{...n})}):l(n)}},8453:(n,e,r)=>{r.d(e,{R:()=>s,x:()=>o});var i=r(6540);const t={},a=i.createContext(t);function s(n){const e=i.useContext(a);return i.useMemo((function(){return"function"==typeof n?n(e):{...e,...n}}),[e,n])}function o(n){let e;return e=n.disableParentContext?"function"==typeof n.components?n.components(t):n.components||t:s(n.components),i.createElement(a.Provider,{value:e},n.children)}}}]); \ No newline at end of file diff --git a/assets/js/a6e0a6ed.cf16e17a.js b/assets/js/a6e0a6ed.cf16e17a.js deleted file mode 100644 index b0a56a9..0000000 --- a/assets/js/a6e0a6ed.cf16e17a.js +++ /dev/null @@ -1 +0,0 @@ -"use strict";(self.webpackChunkresearch=self.webpackChunkresearch||[]).push([[579],{4512:(n,e,i)=>{i.r(e),i.d(e,{assets:()=>h,contentTitle:()=>a,default:()=>u,frontMatter:()=>t,metadata:()=>o,toc:()=>c});var r=i(4848),s=i(8453);const t={sidebar_label:"Publications",sidebar_position:2,slug:"/research-grants/publications"},a="Publications acknowledging SDF funding",o={id:"research-grants/publications",title:"Publications acknowledging SDF funding",description:"Leemon Baird, Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, and Yinuo Zhang. 2023. \u201cThreshold Signatures in the Multiverse.\u201d In 2023 IEEE Symposium on Security and Privacy (SP), 1454\u201370. https://doi.org/10.1109/SP46215.2023.10179436.",source:"@site/docs/research-grants/publications.md",sourceDirName:"research-grants",slug:"/research-grants/publications",permalink:"/research-grants/publications",draft:!1,unlisted:!1,tags:[],version:"current",sidebarPosition:2,frontMatter:{sidebar_label:"Publications",sidebar_position:2,slug:"/research-grants/publications"},sidebar:"contentsSidebar",previous:{title:"Grantees",permalink:"/research-grants/grantees"},next:{title:"Workshops",permalink:"/workshops"}},h={},c=[];function d(n){const e={a:"a",em:"em",h1:"h1",p:"p",...(0,s.R)(),...n.components};return(0,r.jsxs)(r.Fragment,{children:[(0,r.jsx)(e.h1,{id:"publications-acknowledging-sdf-funding",children:"Publications acknowledging SDF funding"}),"\n",(0,r.jsxs)(e.p,{children:["Leemon Baird, Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, and Yinuo Zhang. 2023. \u201cThreshold Signatures in the Multiverse.\u201d In ",(0,r.jsx)(e.em,{children:"2023 IEEE Symposium on Security and Privacy (SP)"}),", 1454\u201370. ",(0,r.jsx)(e.a,{href:"https://doi.org/10.1109/SP46215.2023.10179436",children:"https://doi.org/10.1109/SP46215.2023.10179436"}),"."]}),"\n",(0,r.jsxs)(e.p,{children:["Hanwen Feng and Qiang Tang. 2023. \u201cWitness Authenticating NIZKs and Applications.\u201d 2023. ",(0,r.jsx)(e.a,{href:"https://eprint.iacr.org/2023/1276",children:"https://eprint.iacr.org/2023/1276"}),"."]}),"\n",(0,r.jsxs)(e.p,{children:["Yingzi Gao, Yuan Lu, Zhenliang Lu, Qiang Tang, Jing Xu, and Zhenfeng Zhang. 2022. \u201cDumbo-NG: Fast Asynchronous BFT Consensus with Throughput-Oblivious Latency.\u201d In ",(0,r.jsx)(e.em,{children:"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security"}),", 1187\u20131201. CCS \u201922. ",(0,r.jsx)(e.a,{href:"https://doi.org/10.1145/3548606.3559379",children:"https://doi.org/10.1145/3548606.3559379"}),"."]}),"\n",(0,r.jsxs)(e.p,{children:["Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, and Yinuo Zhang. 2023. \u201chinTS: Threshold Signatures with Silent Setup.\u201d 2023. ",(0,r.jsx)(e.a,{href:"https://eprint.iacr.org/2023/567",children:"https://eprint.iacr.org/2023/567"}),"."]}),"\n",(0,r.jsxs)(e.p,{children:["Andr\xe9 Gaul, Ismail Khoffi, J\xf6rg Liesen, and Torsten St\xfcber. 2019. \u201cMathematical Analysis and Algorithms for Federated Byzantine Agreement Systems.\u201d December 3, 2019. ",(0,r.jsx)(e.a,{href:"https://doi.org/10.48550/arXiv.1912.01365",children:"https://doi.org/10.48550/arXiv.1912.01365"}),"."]}),"\n",(0,r.jsxs)(e.p,{children:["Andr\xe9 Gaul and J\xf6rg Liesen. 2020. \u201cCentrality of Nodes in Federated Byzantine Agreement Systems.\u201d December 7, 2020. ",(0,r.jsx)(e.a,{href:"https://doi.org/10.48550/arXiv.2012.03913",children:"https://doi.org/10.48550/arXiv.2012.03913"}),"."]}),"\n",(0,r.jsxs)(e.p,{children:["Giuliano Losa and Mike Dodds. 2020. \u201cOn the Formal Verification of the Stellar Consensus Protocol.\u201d In ",(0,r.jsx)(e.em,{children:"2nd Workshop on Formal Methods for Blockchains (FMBC 2020)"}),". ",(0,r.jsx)(e.a,{href:"https://doi.org/10.4230/OASIcs.FMBC.2020.9",children:"https://doi.org/10.4230/OASIcs.FMBC.2020.9"}),"."]}),"\n",(0,r.jsxs)(e.p,{children:["Lu, Yuan, Zhenliang Lu, and Qiang Tang. 2022. \u201cBolt-Dumbo Transformer: Asynchronous Consensus As Fast As the Pipelined BFT.\u201d In ",(0,r.jsx)(e.em,{children:"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security"}),", 2159\u201373. CCS \u201922. ",(0,r.jsx)(e.a,{href:"https://doi.org/10.1145/3548606.3559346",children:"https://doi.org/10.1145/3548606.3559346"}),"."]})]})}function u(n={}){const{wrapper:e}={...(0,s.R)(),...n.components};return e?(0,r.jsx)(e,{...n,children:(0,r.jsx)(d,{...n})}):d(n)}},8453:(n,e,i)=>{i.d(e,{R:()=>a,x:()=>o});var r=i(6540);const s={},t=r.createContext(s);function a(n){const e=r.useContext(t);return r.useMemo((function(){return"function"==typeof n?n(e):{...e,...n}}),[e,n])}function o(n){let e;return e=n.disableParentContext?"function"==typeof n.components?n.components(s):n.components||s:a(n.components),r.createElement(t.Provider,{value:e},n.children)}}}]); \ No newline at end of file diff --git a/assets/js/runtime~main.2fcd3322.js b/assets/js/runtime~main.1502e2a8.js similarity index 98% rename from assets/js/runtime~main.2fcd3322.js rename to assets/js/runtime~main.1502e2a8.js index 5c71834..562ad5a 100644 --- a/assets/js/runtime~main.2fcd3322.js +++ b/assets/js/runtime~main.1502e2a8.js @@ -1 +1 @@ -(()=>{"use strict";var e,r,t,a,o,n={},i={};function f(e){var r=i[e];if(void 0!==r)return r.exports;var t=i[e]={id:e,loaded:!1,exports:{}};return n[e].call(t.exports,t,t.exports,f),t.loaded=!0,t.exports}f.m=n,f.c=i,e=[],f.O=(r,t,a,o)=>{if(!t){var n=1/0;for(u=0;u=o)&&Object.keys(f.O).every((e=>f.O[e](t[c])))?t.splice(c--,1):(i=!1,o0&&e[u-1][2]>o;u--)e[u]=e[u-1];e[u]=[t,a,o]},f.n=e=>{var r=e&&e.__esModule?()=>e.default:()=>e;return f.d(r,{a:r}),r},t=Object.getPrototypeOf?e=>Object.getPrototypeOf(e):e=>e.__proto__,f.t=function(e,a){if(1&a&&(e=this(e)),8&a)return e;if("object"==typeof e&&e){if(4&a&&e.__esModule)return e;if(16&a&&"function"==typeof e.then)return e}var o=Object.create(null);f.r(o);var n={};r=r||[null,t({}),t([]),t(t)];for(var i=2&a&&e;"object"==typeof i&&!~r.indexOf(i);i=t(i))Object.getOwnPropertyNames(i).forEach((r=>n[r]=()=>e[r]));return n.default=()=>e,f.d(o,n),o},f.d=(e,r)=>{for(var t in r)f.o(r,t)&&!f.o(e,t)&&Object.defineProperty(e,t,{enumerable:!0,get:r[t]})},f.f={},f.e=e=>Promise.all(Object.keys(f.f).reduce(((r,t)=>(f.f[t](e,r),r)),[])),f.u=e=>"assets/js/"+({17:"b5d444f3",48:"a94703ab",98:"a7bd4aaa",102:"87d6e656",184:"0b46e8e7",401:"17896441",579:"a6e0a6ed",581:"935f2afb",647:"5e95c892",749:"0276bb65",924:"fb5046e1",934:"282d1385"}[e]||e)+"."+{17:"9012ede0",48:"f63066de",98:"04e112fa",102:"469dd3e4",184:"8e9b60eb",237:"89684c8c",401:"1bbd2d8e",579:"cf16e17a",581:"1f23919e",647:"c5fca54b",749:"674330ec",924:"3744107f",934:"ee9d49e8"}[e]+".js",f.miniCssF=e=>{},f.g=function(){if("object"==typeof globalThis)return globalThis;try{return this||new Function("return this")()}catch(e){if("object"==typeof window)return window}}(),f.o=(e,r)=>Object.prototype.hasOwnProperty.call(e,r),a={},o="research:",f.l=(e,r,t,n)=>{if(a[e])a[e].push(r);else{var i,c;if(void 0!==t)for(var d=document.getElementsByTagName("script"),u=0;u{i.onerror=i.onload=null,clearTimeout(b);var o=a[e];if(delete a[e],i.parentNode&&i.parentNode.removeChild(i),o&&o.forEach((e=>e(t))),r)return r(t)},b=setTimeout(s.bind(null,void 0,{type:"timeout",target:i}),12e4);i.onerror=s.bind(null,i.onerror),i.onload=s.bind(null,i.onload),c&&document.head.appendChild(i)}},f.r=e=>{"undefined"!=typeof Symbol&&Symbol.toStringTag&&Object.defineProperty(e,Symbol.toStringTag,{value:"Module"}),Object.defineProperty(e,"__esModule",{value:!0})},f.p="/",f.gca=function(e){return e={17896441:"401",b5d444f3:"17",a94703ab:"48",a7bd4aaa:"98","87d6e656":"102","0b46e8e7":"184",a6e0a6ed:"579","935f2afb":"581","5e95c892":"647","0276bb65":"749",fb5046e1:"924","282d1385":"934"}[e]||e,f.p+f.u(e)},(()=>{var e={354:0,869:0};f.f.j=(r,t)=>{var a=f.o(e,r)?e[r]:void 0;if(0!==a)if(a)t.push(a[2]);else if(/^(354|869)$/.test(r))e[r]=0;else{var o=new Promise(((t,o)=>a=e[r]=[t,o]));t.push(a[2]=o);var n=f.p+f.u(r),i=new Error;f.l(n,(t=>{if(f.o(e,r)&&(0!==(a=e[r])&&(e[r]=void 0),a)){var o=t&&("load"===t.type?"missing":t.type),n=t&&t.target&&t.target.src;i.message="Loading chunk "+r+" failed.\n("+o+": "+n+")",i.name="ChunkLoadError",i.type=o,i.request=n,a[1](i)}}),"chunk-"+r,r)}},f.O.j=r=>0===e[r];var r=(r,t)=>{var a,o,n=t[0],i=t[1],c=t[2],d=0;if(n.some((r=>0!==e[r]))){for(a in i)f.o(i,a)&&(f.m[a]=i[a]);if(c)var u=c(f)}for(r&&r(t);d{"use strict";var e,r,t,a,o,n={},i={};function f(e){var r=i[e];if(void 0!==r)return r.exports;var t=i[e]={id:e,loaded:!1,exports:{}};return n[e].call(t.exports,t,t.exports,f),t.loaded=!0,t.exports}f.m=n,f.c=i,e=[],f.O=(r,t,a,o)=>{if(!t){var n=1/0;for(u=0;u=o)&&Object.keys(f.O).every((e=>f.O[e](t[c])))?t.splice(c--,1):(i=!1,o0&&e[u-1][2]>o;u--)e[u]=e[u-1];e[u]=[t,a,o]},f.n=e=>{var r=e&&e.__esModule?()=>e.default:()=>e;return f.d(r,{a:r}),r},t=Object.getPrototypeOf?e=>Object.getPrototypeOf(e):e=>e.__proto__,f.t=function(e,a){if(1&a&&(e=this(e)),8&a)return e;if("object"==typeof e&&e){if(4&a&&e.__esModule)return e;if(16&a&&"function"==typeof e.then)return e}var o=Object.create(null);f.r(o);var n={};r=r||[null,t({}),t([]),t(t)];for(var i=2&a&&e;"object"==typeof i&&!~r.indexOf(i);i=t(i))Object.getOwnPropertyNames(i).forEach((r=>n[r]=()=>e[r]));return n.default=()=>e,f.d(o,n),o},f.d=(e,r)=>{for(var t in r)f.o(r,t)&&!f.o(e,t)&&Object.defineProperty(e,t,{enumerable:!0,get:r[t]})},f.f={},f.e=e=>Promise.all(Object.keys(f.f).reduce(((r,t)=>(f.f[t](e,r),r)),[])),f.u=e=>"assets/js/"+({17:"b5d444f3",48:"a94703ab",98:"a7bd4aaa",102:"87d6e656",184:"0b46e8e7",401:"17896441",579:"a6e0a6ed",581:"935f2afb",647:"5e95c892",749:"0276bb65",924:"fb5046e1",934:"282d1385"}[e]||e)+"."+{17:"9012ede0",48:"f63066de",98:"04e112fa",102:"469dd3e4",184:"8e9b60eb",237:"89684c8c",401:"1bbd2d8e",579:"21a28af0",581:"b51da226",647:"c5fca54b",749:"674330ec",924:"3744107f",934:"ee9d49e8"}[e]+".js",f.miniCssF=e=>{},f.g=function(){if("object"==typeof globalThis)return globalThis;try{return this||new Function("return this")()}catch(e){if("object"==typeof window)return window}}(),f.o=(e,r)=>Object.prototype.hasOwnProperty.call(e,r),a={},o="research:",f.l=(e,r,t,n)=>{if(a[e])a[e].push(r);else{var i,c;if(void 0!==t)for(var d=document.getElementsByTagName("script"),u=0;u{i.onerror=i.onload=null,clearTimeout(b);var o=a[e];if(delete a[e],i.parentNode&&i.parentNode.removeChild(i),o&&o.forEach((e=>e(t))),r)return r(t)},b=setTimeout(s.bind(null,void 0,{type:"timeout",target:i}),12e4);i.onerror=s.bind(null,i.onerror),i.onload=s.bind(null,i.onload),c&&document.head.appendChild(i)}},f.r=e=>{"undefined"!=typeof Symbol&&Symbol.toStringTag&&Object.defineProperty(e,Symbol.toStringTag,{value:"Module"}),Object.defineProperty(e,"__esModule",{value:!0})},f.p="/",f.gca=function(e){return e={17896441:"401",b5d444f3:"17",a94703ab:"48",a7bd4aaa:"98","87d6e656":"102","0b46e8e7":"184",a6e0a6ed:"579","935f2afb":"581","5e95c892":"647","0276bb65":"749",fb5046e1:"924","282d1385":"934"}[e]||e,f.p+f.u(e)},(()=>{var e={354:0,869:0};f.f.j=(r,t)=>{var a=f.o(e,r)?e[r]:void 0;if(0!==a)if(a)t.push(a[2]);else if(/^(354|869)$/.test(r))e[r]=0;else{var o=new Promise(((t,o)=>a=e[r]=[t,o]));t.push(a[2]=o);var n=f.p+f.u(r),i=new Error;f.l(n,(t=>{if(f.o(e,r)&&(0!==(a=e[r])&&(e[r]=void 0),a)){var o=t&&("load"===t.type?"missing":t.type),n=t&&t.target&&t.target.src;i.message="Loading chunk "+r+" failed.\n("+o+": "+n+")",i.name="ChunkLoadError",i.type=o,i.request=n,a[1](i)}}),"chunk-"+r,r)}},f.O.j=r=>0===e[r];var r=(r,t)=>{var a,o,n=t[0],i=t[1],c=t[2],d=0;if(n.some((r=>0!==e[r]))){for(a in i)f.o(i,a)&&(f.m[a]=i[a]);if(c)var u=c(f)}for(r&&r(t);d Research at the Stellar Development Foundation | SDF Research - + diff --git a/publications.html b/publications.html index c2ac70e..4886a2d 100644 --- a/publications.html +++ b/publications.html @@ -4,7 +4,7 @@ Publications co-authored by SDF researchers | SDF Research - + diff --git a/research-grants.html b/research-grants.html index 8aa8f45..bf2ea71 100644 --- a/research-grants.html +++ b/research-grants.html @@ -4,7 +4,7 @@ Academic Research Grants | SDF Research - + diff --git a/research-grants/grantees.html b/research-grants/grantees.html index c8d8b16..7f58f3c 100644 --- a/research-grants/grantees.html +++ b/research-grants/grantees.html @@ -4,7 +4,7 @@ Awarded research grants by quarter | SDF Research - + diff --git a/research-grants/publications.html b/research-grants/publications.html index 130bc68..25124be 100644 --- a/research-grants/publications.html +++ b/research-grants/publications.html @@ -3,12 +3,15 @@ -Publications acknowledging SDF funding | SDF Research - +Publications acknowledging SDF funding | SDF Research +

Publications acknowledging SDF funding

+

Sanjam Garg, Dimitris Kolonelos, Guru-Vamsi Policharla, and Mingyuan Wang. "Threshold Encryption with Silent Setup." Cryptology ePrint Archive (2024). https://eprint.iacr.org/2024/263

+

Arka Rai Choudhuri, Sanjam Garg, Julien Piet, and Guru-Vamsi Policharla. "Mempool Privacy via Batched Threshold Encryption: Attacks and Defenses." Cryptology ePrint Archive (2024). https://eprint.iacr.org/2024/669

+

Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, and Yinuo Zhang. "Cryptography with weights: MPC, encryption and signatures." Annual International Cryptology Conference. 2022. https://link.springer.com/chapter/10.1007/978-3-031-38557-5_10

Leemon Baird, Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, and Yinuo Zhang. 2023. “Threshold Signatures in the Multiverse.” In 2023 IEEE Symposium on Security and Privacy (SP), 1454–70. https://doi.org/10.1109/SP46215.2023.10179436.

Hanwen Feng and Qiang Tang. 2023. “Witness Authenticating NIZKs and Applications.” 2023. https://eprint.iacr.org/2023/1276.

Yingzi Gao, Yuan Lu, Zhenliang Lu, Qiang Tang, Jing Xu, and Zhenfeng Zhang. 2022. “Dumbo-NG: Fast Asynchronous BFT Consensus with Throughput-Oblivious Latency.” In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 1187–1201. CCS ’22. https://doi.org/10.1145/3548606.3559379.

diff --git a/workshops.html b/workshops.html index 594c596..ca769dc 100644 --- a/workshops.html +++ b/workshops.html @@ -4,7 +4,7 @@ Scientific Workshops | SDF Research - +