Maciej Skórski

From MaRDI portal
Person:2056740

Available identifiers

zbMath Open skorski.maciejMaRDI QIDQ2056740

List of research outcomes





PublicationDate of PublicationType
Entropy matters: understanding performance of sparse random embeddings2024-09-11Paper
Tight Chernoff-like bounds under limited independence2024-08-22Paper
The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free2024-03-14Paper
Bernstein-type bounds for beta distribution2023-06-22Paper
Hypercontractivity via tensor calculus2023-03-30Paper
Tight Chernoff-Like Bounds Under Limited Independence2022-09-04Paper
Concentration of the collision estimator2022-05-20Paper
The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free2021-12-08Paper
https://portal.mardi4nfdi.de/entity/Q50026232021-07-28Paper
Random Embeddings with Optimal Accuracy2020-12-31Paper
Bayesian root cause analysis by separable likelihoods2020-10-22Paper
Concentration Bounds for the Collision Estimator2020-06-12Paper
Non-Uniform Attacks Against Pseudoentropy2020-05-27Paper
Revisiting Concentration of Missing Mass2020-05-19Paper
Missing Mass Concentration for Markov Chains2020-01-10Paper
https://portal.mardi4nfdi.de/entity/Q52401072019-10-24Paper
https://portal.mardi4nfdi.de/entity/Q46366582018-04-19Paper
A Cryptographic View of Regularity Lemmas: Simpler Unified Proofs and Refined Bounds2017-05-19Paper
On the Complexity of Breaking Pseudoentropy2017-05-19Paper
Evaluating Entropy for True Random Number Generators: Efficient, Robust and Provably Secure2017-05-05Paper
A Better Chain Rule for HILL Pseudoentropy - Beyond Bounded Leakage2017-01-06Paper
Pseudoentropy: Lower-Bounds for Chain Rules and Transformations2016-12-21Paper
Simulating Auxiliary Inputs, Revisited2016-12-21Paper
Time-Advantage Ratios Under Simple Transformations: Applications in Cryptography2016-04-26Paper
Optimal Amplification of Noisy Leakages2016-04-08Paper
How to Smooth Entropy?2016-03-10Paper
On Provable Security of wPRF-Based Leakage-Resilient Stream Ciphers2016-01-27Paper
Efficiently Simulating High Min-entropy Sources in the Presence of Side Information2016-01-12Paper
Shannon Entropy Versus Renyi Entropy from a Cryptographic Viewpoint2016-01-12Paper
A New Approximate Min-Max Theorem with Applications in Cryptography2016-01-11Paper
Condensed Unpredictability2015-10-27Paper
Modulus Computational Entropy2015-09-30Paper
Noisy Leakage Revisited2015-09-30Paper
Metric Pseudoentropy: Characterizations, Transformations and Applications2015-09-24Paper
Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications to Pseudoentropy2015-09-24Paper
The Chain Rule for HILL Pseudoentropy, Revisited2015-09-17Paper
Lower bounds on $q$-wise independence tails and applications to min-entropy condensers2015-04-09Paper
True Random Number Generators Secure in a Changing Environment: Improved Security Bounds2015-02-20Paper

Research outcomes over time

This page was built for person: Maciej Skórski