Maciej Skórski

From MaRDI portal
Person:2056740



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Entropy matters: understanding performance of sparse random embeddings2024-09-11Paper
Tight Chernoff-like bounds under limited independence2024-08-22Paper
The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free
IEEE Transactions on Information Theory
2024-03-14Paper
Bernstein-type bounds for beta distribution
Modern Stochastics. Theory and Applications
2023-06-22Paper
Hypercontractivity via tensor calculus2023-03-30Paper
Tight Chernoff-Like Bounds Under Limited Independence2022-09-04Paper
Concentration of the collision estimator2022-05-20Paper
The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free2021-12-08Paper
Renyi entropy estimation revisited2021-07-28Paper
Random Embeddings with Optimal Accuracy2020-12-31Paper
Bayesian root cause analysis by separable likelihoods
(available as arXiv preprint)
2020-10-22Paper
Concentration Bounds for the Collision Estimator2020-06-12Paper
Non-uniform attacks against pseudoentropy
(available as arXiv preprint)
2020-05-27Paper
Revisiting Concentration of Missing Mass2020-05-19Paper
Missing Mass Concentration for Markov Chains2020-01-10Paper
scientific article; zbMATH DE number 7121810 (Why is no real title available?)2019-10-24Paper
scientific article; zbMATH DE number 6862149 (Why is no real title available?)2018-04-19Paper
A Cryptographic View of Regularity Lemmas: Simpler Unified Proofs and Refined Bounds
Lecture Notes in Computer Science
2017-05-19Paper
On the Complexity of Breaking Pseudoentropy
Lecture Notes in Computer Science
2017-05-19Paper
Evaluating Entropy for True Random Number Generators: Efficient, Robust and Provably Secure
Information Security and Cryptology
2017-05-05Paper
A better chain rule for HILL pseudoentropy -- beyond bounded leakage
Lecture Notes in Computer Science
2017-01-06Paper
Pseudoentropy: lower-bounds for chain rules and transformations
Theory of Cryptography
2016-12-21Paper
Simulating auxiliary inputs, revisited
Theory of Cryptography
2016-12-21Paper
Time-advantage ratios under simple transformations: applications in cryptography
Cryptography and Information Security in the Balkans
2016-04-26Paper
Optimal amplification of noisy leakages
Theory of Cryptography
2016-04-08Paper
How to smooth entropy?
Lecture Notes in Computer Science
2016-03-10Paper
On Provable Security of wPRF-Based Leakage-Resilient Stream Ciphers
Provable Security
2016-01-27Paper
Efficiently simulating high min-entropy sources in the presence of side information
Progress in Cryptology -- INDOCRYPT 2015
2016-01-12Paper
Shannon entropy versus Renyi entropy from a cryptographic viewpoint
Cryptography and Coding
2016-01-12Paper
A New Approximate Min-Max Theorem with Applications in Cryptography
Algorithms and Computation
2016-01-11Paper
Condensed Unpredictability
Automata, Languages, and Programming
2015-10-27Paper
Condensed Unpredictability
Automata, Languages, and Programming
2015-10-27Paper
Modulus computational entropy
Lecture Notes in Computer Science
2015-09-30Paper
Noisy leakage revisited
Advances in Cryptology - EUROCRYPT 2015
2015-09-30Paper
Metric pseudoentropy: characterizations, transformations and applications
Lecture Notes in Computer Science
2015-09-24Paper
Nonuniform indistinguishability and unpredictability hardcore lemmas: new proofs and applications to pseudoentropy
Lecture Notes in Computer Science
2015-09-24Paper
The chain rule for HILL pseudoentropy, revisited
Progress in Cryptology -- LATINCRYPT 2015
2015-09-17Paper
Lower bounds on $q$-wise independence tails and applications to min-entropy condensers2015-04-09Paper
True random number generators secure in a changing environment: improved security bounds
Lecture Notes in Computer Science
2015-02-20Paper


Research outcomes over time


This page was built for person: Maciej Skórski