Krzysztof Pietrzak

From MaRDI portal
Person:332266

Available identifiers

zbMath Open pietrzak.krzysztofWikidataQ102310388 ScholiaQ102310388MaRDI QIDQ332266

List of research outcomes

PublicationDate of PublicationType
Certifying giant nonprimes2023-11-24Paper
Practical statistically-sound proofs of exponentiation in any group2023-06-28Paper
\textsc{Hide} \& \textsc{Seek}: privacy-preserving rebalancing on payment channel networks2023-05-26Paper
Trojan-resilience without cryptography2023-04-13Paper
On treewidth, separators and Yao's garbling2023-04-13Paper
Efficient Zero-Knowledge Proofs for Commitments from Learning with Errors over Rings2022-08-19Paper
Proofs of Catalytic Space2022-07-18Paper
Simple verifiable delay functions2022-07-18Paper
Delayed authentication: preventing replay and relay attacks in private contact tracing2022-07-06Paper
Limits on the adaptive security of Yao's garbling2022-04-22Paper
Non-Uniform Attacks Against Pseudoentropy2020-05-27Paper
Finding a Nash equilibrium is no easier than breaking Fiat-Shamir2020-01-30Paper
Adaptively secure proxy re-encryption2020-01-28Paper
Non-Malleable Codes2018-12-06Paper
Sustained space complexity2018-07-09Paper
Simple proofs of sequential work2018-07-09Paper
Beyond Hellman's time-memory trade-offs with applications to proofs of space2018-03-08Paper
Efficient authentication from hard learning problems2018-02-15Paper
Position-based cryptography and multiparty communication complexity2018-01-19Paper
Be adaptive, avoid overcommitting2017-11-03Paper
Depth-Robust Graphs and Their Cumulative Memory Complexity2017-06-23Paper
Scrypt Is Maximally Memory-Hard2017-06-23Paper
Pseudoentropy: Lower-Bounds for Chain Rules and Transformations2016-12-21Paper
A counterexample to the chain rule for conditional HILL entropy2016-10-28Paper
Offline Witness Encryption2016-10-04Paper
On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model2016-07-15Paper
New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators2016-06-10Paper
Constrained PRFs for Unbounded Inputs2016-04-08Paper
Generic Security of NMAC and HMAC with Input Whitening2016-03-23Paper
Standard Security Does Imply Security Against Selective Opening for Markov Distributions2016-03-23Paper
Proofs of Space2015-12-10Paper
The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC2015-12-10Paper
A Quasipolynomial Reduction for Generalized Selective Decryption on Trees2015-12-10Paper
Condensed Unpredictability2015-10-27Paper
The Chain Rule for HILL Pseudoentropy, Revisited2015-09-17Paper
Key-Homomorphic Constrained Pseudorandom Functions2015-07-06Paper
Adaptive Security of Constrained PRFs2015-01-06Paper
Robust multi-property combiners for hash functions2014-09-25Paper
The Exact PRF-Security of NMAC and HMAC2014-08-07Paper
Key Derivation without Entropy Waste2014-05-27Paper
Simple Chosen-Ciphertext Security from Low-Noise LPN2014-03-25Paper
How to Fake Auxiliary Input2014-02-18Paper
Learning with Rounding, Revisited2013-09-02Paper
Digital Signatures with Minimal Overhead from Indifferentiable Random Invertible Functions2013-09-02Paper
Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise2013-03-19Paper
A Counterexample to the Chain Rule for Conditional HILL Entropy2013-03-18Paper
Lapin: An Efficient Authentication Protocol Based on Ring-LPN2013-01-08Paper
Practical Leakage-Resilient Symmetric Cryptography2012-11-13Paper
Message Authentication, Revisited2012-06-29Paper
Cryptography from Learning Parity with Noise2012-06-15Paper
Hardness Preserving Constructions of Pseudorandom Functions2012-06-15Paper
Lossy Functions Do Not Amplify Well2012-06-15Paper
Subspace LWE2012-06-15Paper
Parallel repetition of computationally sound protocols revisited2012-05-23Paper
Leftover Hash Lemma, Revisited2011-08-12Paper
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience2011-07-06Paper
Efficient Authentication from Hard Learning Problems2011-05-27Paper
Parallel Repetition for Leakage Resilience Amplification Revisited2011-05-19Paper
Leakage Resilient ElGamal Encryption2010-12-07Paper
Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks2010-08-24Paper
An Efficient Parallel Repetition Theorem2010-02-24Paper
Leakage-Resilient Signatures2010-02-24Paper
Theory of Cryptography2009-05-14Paper
On the Security of Padding-Based Encryption Schemes – or – Why We Cannot Prove OAEP Secure in the Standard Model2009-05-12Paper
A Leakage-Resilient Mode of Operation2009-05-12Paper
A New Randomness Extraction Paradigm for Hybrid Encryption2009-05-12Paper
Indistinguishability Amplification2009-03-10Paper
Compression from Collisions, or Why CRHF Combiners Have a Long Output2009-02-10Paper
Improving the Security of MACs Via Randomized Message Preprocessing2008-09-16Paper
Weak Pseudorandom Functions in Minicrypt2008-08-19Paper
Robust Multi-property Combiners for Hash Functions Revisited2008-08-19Paper
A New Mode of Operation for Block Ciphers and Length-Preserving MACs2008-04-15Paper
Composition Does Not Imply Adaptive Security2008-03-17Paper
On the Generic Insecurity of the Full Domain Hash2008-03-17Paper
Improved Security Analyses for CBC MACs2008-03-17Paper
Non-trivial Black-Box Combiners for Collision-Resistant Hash-Functions Don’t Exist2007-11-29Paper
Range Extension for Weak PRFs; The Good, the Bad, and the Ugly2007-11-29Paper
Composition Implies Adaptive Security in Minicrypt2007-09-24Paper
Luby-Rackoff Ciphers from Weak Round Functions?2007-09-24Paper
A Tight Bound for EMAC2007-09-11Paper
Parallel Repetition of Computationally Sound Protocols Revisited2007-08-30Paper
Theory of Cryptography2007-02-12Paper
On the parameterized complexity of the fixed alphabet shortest common supersequence and longest common subsequence problems2004-08-19Paper
https://portal.mardi4nfdi.de/entity/Q44348982003-11-26Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Krzysztof Pietrzak