Krzysztof Pietrzak

From MaRDI portal
Revision as of 03:07, 7 October 2023 by Import231006081045 (talk | contribs) (Created automatically from import231006081045)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:332266

Available identifiers

zbMath Open pietrzak.krzysztofWikidataQ102310388 ScholiaQ102310388MaRDI QIDQ332266

List of research outcomes





PublicationDate of PublicationType
Trapdoor memory-hard functions2024-11-13Paper
Efficiently testable circuits2024-09-25Paper
Efficiently testable circuits without conductivity2024-08-02Paper
On the cost of post-compromise security in concurrent continuous group-key agreement2024-08-02Paper
Certifying giant nonprimes2023-11-24Paper
Practical statistically-sound proofs of exponentiation in any group2023-06-28Paper
\textsc{Hide} \& \textsc{Seek}: privacy-preserving rebalancing on payment channel networks2023-05-26Paper
Trojan-resilience without cryptography2023-04-13Paper
On treewidth, separators and Yao's garbling2023-04-13Paper
Efficient Zero-Knowledge Proofs for Commitments from Learning with Errors over Rings2022-08-19Paper
Proofs of Catalytic Space2022-07-18Paper
Simple verifiable delay functions2022-07-18Paper
Delayed authentication: preventing replay and relay attacks in private contact tracing2022-07-06Paper
Limits on the adaptive security of Yao's garbling2022-04-22Paper
Non-Uniform Attacks Against Pseudoentropy2020-05-27Paper
Finding a Nash equilibrium is no easier than breaking Fiat-Shamir2020-01-30Paper
Adaptively secure proxy re-encryption2020-01-28Paper
Non-Malleable Codes2018-12-06Paper
Sustained space complexity2018-07-09Paper
Simple proofs of sequential work2018-07-09Paper
Beyond Hellman's time-memory trade-offs with applications to proofs of space2018-03-08Paper
Efficient authentication from hard learning problems2018-02-15Paper
Position-based cryptography and multiparty communication complexity2018-01-19Paper
Be adaptive, avoid overcommitting2017-11-03Paper
Depth-Robust Graphs and Their Cumulative Memory Complexity2017-06-23Paper
Scrypt Is Maximally Memory-Hard2017-06-23Paper
Pseudoentropy: Lower-Bounds for Chain Rules and Transformations2016-12-21Paper
A counterexample to the chain rule for conditional HILL entropy2016-10-28Paper
Offline Witness Encryption2016-10-04Paper
On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model2016-07-15Paper
New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators2016-06-10Paper
Constrained PRFs for Unbounded Inputs2016-04-08Paper
Generic Security of NMAC and HMAC with Input Whitening2016-03-23Paper
Standard Security Does Imply Security Against Selective Opening for Markov Distributions2016-03-23Paper
Proofs of Space2015-12-10Paper
The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC2015-12-10Paper
A Quasipolynomial Reduction for Generalized Selective Decryption on Trees2015-12-10Paper
Condensed Unpredictability2015-10-27Paper
The Chain Rule for HILL Pseudoentropy, Revisited2015-09-17Paper
Key-Homomorphic Constrained Pseudorandom Functions2015-07-06Paper
Adaptive Security of Constrained PRFs2015-01-06Paper
Robust multi-property combiners for hash functions2014-09-25Paper
The Exact PRF-Security of NMAC and HMAC2014-08-07Paper
Key Derivation without Entropy Waste2014-05-27Paper
Simple Chosen-Ciphertext Security from Low-Noise LPN2014-03-25Paper
How to Fake Auxiliary Input2014-02-18Paper
Learning with Rounding, Revisited2013-09-02Paper
Digital Signatures with Minimal Overhead from Indifferentiable Random Invertible Functions2013-09-02Paper
Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise2013-03-19Paper
A Counterexample to the Chain Rule for Conditional HILL Entropy2013-03-18Paper
Lapin: An Efficient Authentication Protocol Based on Ring-LPN2013-01-08Paper
Practical Leakage-Resilient Symmetric Cryptography2012-11-13Paper
Message Authentication, Revisited2012-06-29Paper
Cryptography from Learning Parity with Noise2012-06-15Paper
Hardness Preserving Constructions of Pseudorandom Functions2012-06-15Paper
Lossy Functions Do Not Amplify Well2012-06-15Paper
Subspace LWE2012-06-15Paper
Parallel repetition of computationally sound protocols revisited2012-05-23Paper
Leftover Hash Lemma, Revisited2011-08-12Paper
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience2011-07-06Paper
Efficient Authentication from Hard Learning Problems2011-05-27Paper
Parallel Repetition for Leakage Resilience Amplification Revisited2011-05-19Paper
Leakage Resilient ElGamal Encryption2010-12-07Paper
Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks2010-08-24Paper
An Efficient Parallel Repetition Theorem2010-02-24Paper
Leakage-Resilient Signatures2010-02-24Paper
Theory of Cryptography2009-05-14Paper
On the Security of Padding-Based Encryption Schemes – or – Why We Cannot Prove OAEP Secure in the Standard Model2009-05-12Paper
A Leakage-Resilient Mode of Operation2009-05-12Paper
A New Randomness Extraction Paradigm for Hybrid Encryption2009-05-12Paper
Indistinguishability Amplification2009-03-10Paper
Compression from Collisions, or Why CRHF Combiners Have a Long Output2009-02-10Paper
Improving the Security of MACs Via Randomized Message Preprocessing2008-09-16Paper
Weak Pseudorandom Functions in Minicrypt2008-08-19Paper
Robust Multi-property Combiners for Hash Functions Revisited2008-08-19Paper
A New Mode of Operation for Block Ciphers and Length-Preserving MACs2008-04-15Paper
Composition Does Not Imply Adaptive Security2008-03-17Paper
On the Generic Insecurity of the Full Domain Hash2008-03-17Paper
Improved Security Analyses for CBC MACs2008-03-17Paper
Non-trivial Black-Box Combiners for Collision-Resistant Hash-Functions Don’t Exist2007-11-29Paper
Range Extension for Weak PRFs; The Good, the Bad, and the Ugly2007-11-29Paper
Composition Implies Adaptive Security in Minicrypt2007-09-24Paper
Luby-Rackoff Ciphers from Weak Round Functions?2007-09-24Paper
A Tight Bound for EMAC2007-09-11Paper
Parallel Repetition of Computationally Sound Protocols Revisited2007-08-30Paper
Theory of Cryptography2007-02-12Paper
On the parameterized complexity of the fixed alphabet shortest common supersequence and longest common subsequence problems2004-08-19Paper
https://portal.mardi4nfdi.de/entity/Q44348982003-11-26Paper

Research outcomes over time

This page was built for person: Krzysztof Pietrzak