Maciej Skórski

From MaRDI portal
Person:2056740

Available identifiers

zbMath Open skorski.maciejMaRDI QIDQ2056740

List of research outcomes





PublicationDate of PublicationType
Entropy matters: understanding performance of sparse random embeddings2024-09-11Paper
Tight Chernoff-like bounds under limited independence2024-08-22Paper
The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free2024-03-14Paper
Bernstein-type bounds for beta distribution2023-06-22Paper
Hypercontractivity via tensor calculus2023-03-30Paper
Tight Chernoff-Like Bounds Under Limited Independence2022-09-04Paper
Concentration of the collision estimator2022-05-20Paper
The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free2021-12-08Paper
Renyi entropy estimation revisited2021-07-28Paper
Random Embeddings with Optimal Accuracy2020-12-31Paper
Bayesian root cause analysis by separable likelihoods2020-10-22Paper
Concentration Bounds for the Collision Estimator2020-06-12Paper
Non-uniform attacks against pseudoentropy2020-05-27Paper
Revisiting Concentration of Missing Mass2020-05-19Paper
Missing Mass Concentration for Markov Chains2020-01-10Paper
https://portal.mardi4nfdi.de/entity/Q52401072019-10-24Paper
https://portal.mardi4nfdi.de/entity/Q46366582018-04-19Paper
A Cryptographic View of Regularity Lemmas: Simpler Unified Proofs and Refined Bounds2017-05-19Paper
On the Complexity of Breaking Pseudoentropy2017-05-19Paper
Evaluating Entropy for True Random Number Generators: Efficient, Robust and Provably Secure2017-05-05Paper
A better chain rule for HILL pseudoentropy -- beyond bounded leakage2017-01-06Paper
Pseudoentropy: lower-bounds for chain rules and transformations2016-12-21Paper
Simulating auxiliary inputs, revisited2016-12-21Paper
Time-advantage ratios under simple transformations: applications in cryptography2016-04-26Paper
Optimal amplification of noisy leakages2016-04-08Paper
How to smooth entropy?2016-03-10Paper
On Provable Security of wPRF-Based Leakage-Resilient Stream Ciphers2016-01-27Paper
Efficiently simulating high min-entropy sources in the presence of side information2016-01-12Paper
Shannon entropy versus Renyi entropy from a cryptographic viewpoint2016-01-12Paper
A New Approximate Min-Max Theorem with Applications in Cryptography2016-01-11Paper
Condensed Unpredictability2015-10-27Paper
Modulus computational entropy2015-09-30Paper
Noisy leakage revisited2015-09-30Paper
Metric pseudoentropy: characterizations, transformations and applications2015-09-24Paper
Nonuniform indistinguishability and unpredictability hardcore lemmas: new proofs and applications to pseudoentropy2015-09-24Paper
The chain rule for HILL pseudoentropy, revisited2015-09-17Paper
Lower bounds on $q$-wise independence tails and applications to min-entropy condensers2015-04-09Paper
True random number generators secure in a changing environment: improved security bounds2015-02-20Paper

Research outcomes over time

This page was built for person: Maciej Skórski