The following pages link to Stanislaw Jarecki (Q882772):
Displaying 50 items.
- Secure distributed key generation for discrete-log based cryptosystems (Q882774) (← links)
- OPAQUE: an asymmetric PAKE protocol secure against pre-computation attacks (Q1653103) (← links)
- 3PC ORAM with low latency, low bandwidth, and fast batch retrieval (Q1656051) (← links)
- Efficient covert two-party computation (Q1749305) (← links)
- Two-factor authentication with end-to-end password security (Q1753861) (← links)
- Round-reduced modular construction of asymmetric password-authenticated key exchange (Q1796814) (← links)
- Robust threshold DSS signatures (Q1854399) (← links)
- On the (in)security of the Diffie-Hellman oblivious PRF with multiplicative blinding (Q2061963) (← links)
- Universally composable relaxed password authenticated key exchange (Q2096488) (← links)
- On pseudorandom encodings (Q2119099) (← links)
- KHAPE: Asymmetric PAKE from key-hiding key exchange (Q2139655) (← links)
- Asymmetric PAKE with low computation \textit{and} communication (Q2170042) (← links)
- Password-authenticated public-key encryption (Q2291402) (← links)
- Strong asymmetric PAKE based on trapdoor CKEM (Q2304947) (← links)
- Efficient signature schemes with tight reductions to the Diffie-Hellman problems (Q2463446) (← links)
- Secure acknowledgment aggregation and multisignatures with limited robustness (Q2495488) (← links)
- Efficient Concurrent Covert Computation of String Equality and Set Intersection (Q2799012) (← links)
- Three-Party ORAM for Secure Computation (Q2811139) (← links)
- Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries (Q2845683) (← links)
- Authenticated Key Agreement with Key Re-Use in the Short Authenticated Strings Model (Q2869267) (← links)
- Robust Threshold DSS Signatures (Q2876915) (← links)
- Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model (Q2936611) (← links)
- Cryptographic Primitives Enforcing Communication and Storage Complexity (Q2995366) (← links)
- Private Mutual Authentication and Conditional Oblivious Transfer (Q3183558) (← links)
- (Q3374910) (← links)
- Robust and Efficient Sharing of RSA Functions (Q3452349) (← links)
- Affiliation-Hiding Envelope and Authentication Schemes with Efficient Support for Multiple Credentials (Q3519546) (← links)
- Multisignatures Using Proofs of Secret Key Possession, as Secure as the Diffie-Hellman Problem (Q3540048) (← links)
- Identity-Based Aggregate and Multi-Signature Schemes Based on RSA (Q3562916) (← links)
- Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model (Q3588345) (← links)
- Fast Secure Computation of Set Intersection (Q3588357) (← links)
- Proactive RSA with Non-interactive Signing (Q3603009) (← links)
- Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection (Q3611789) (← links)
- Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes (Q3612387) (← links)
- (Q4250769) (← links)
- (Q4343446) (← links)
- (Q4418550) (← links)
- (Q4418566) (← links)
- (Q4434889) (← links)
- (Q4941850) (← links)
- Fast Exponentiation Using Split Exponents (Q5281061) (← links)
- Advances in Cryptology - EUROCRYPT 2004 (Q5307277) (← links)
- Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement (Q5385959) (← links)
- Practical Covert Authentication (Q5402996) (← links)
- Efficient Two-Party Secure Computation on Committed Inputs (Q5429385) (← links)
- Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange (Q5458951) (← links)
- Secret Handshakes from CA-Oblivious Encryption (Q5465819) (← links)
- Security in Communication Networks (Q5491699) (← links)
- Theory of Cryptography (Q5711661) (← links)
- Financial Cryptography and Data Security (Q5712240) (← links)