Krzysztof Pietrzak

From MaRDI portal
Person:332266

Available identifiers

zbMath Open pietrzak.krzysztofWikidataQ102310388 ScholiaQ102310388MaRDI QIDQ332266

List of research outcomes





PublicationDate of PublicationType
Trapdoor memory-hard functions2024-11-13Paper
Efficiently testable circuits2024-09-25Paper
Efficiently testable circuits without conductivity2024-08-02Paper
On the cost of post-compromise security in concurrent continuous group-key agreement2024-08-02Paper
Certifying giant nonprimes2023-11-24Paper
Practical statistically-sound proofs of exponentiation in any group2023-06-28Paper
\textsc{Hide} \& \textsc{Seek}: privacy-preserving rebalancing on payment channel networks2023-05-26Paper
On treewidth, separators and Yao's garbling2023-04-13Paper
Trojan-resilience without cryptography2023-04-13Paper
Efficient Zero-Knowledge Proofs for Commitments from Learning with Errors over Rings2022-08-19Paper
Simple verifiable delay functions2022-07-18Paper
Proofs of Catalytic Space2022-07-18Paper
Delayed authentication: preventing replay and relay attacks in private contact tracing2022-07-06Paper
Limits on the adaptive security of Yao's garbling2022-04-22Paper
Non-uniform attacks against pseudoentropy2020-05-27Paper
Finding a Nash equilibrium is no easier than breaking Fiat-Shamir2020-01-30Paper
Adaptively secure proxy re-encryption2020-01-28Paper
Non-malleable codes2018-12-06Paper
Sustained space complexity2018-07-09Paper
Simple proofs of sequential work2018-07-09Paper
Beyond Hellman's time-memory trade-offs with applications to proofs of space2018-03-08Paper
Efficient authentication from hard learning problems2018-02-15Paper
Position-based cryptography and multiparty communication complexity2018-01-19Paper
Be adaptive, avoid overcommitting2017-11-03Paper
Depth-robust graphs and their cumulative memory complexity2017-06-23Paper
Scrypt is maximally memory-hard2017-06-23Paper
Pseudoentropy: lower-bounds for chain rules and transformations2016-12-21Paper
A counterexample to the chain rule for conditional HILL entropy2016-10-28Paper
Offline witness encryption2016-10-04Paper
On the complexity of \textsf{scrypt} and proofs of space in the parallel random oracle model2016-07-15Paper
New realizations of somewhere statistically binding hashing and positional accumulators2016-06-10Paper
Constrained PRFs for unbounded inputs2016-04-08Paper
Standard Security Does Imply Security Against Selective Opening for Markov Distributions2016-03-23Paper
Generic security of NMAC and HMAC with input whitening2016-03-23Paper
The exact PRF security of truncation: tight bounds for keyed sponges and truncated CBC2015-12-10Paper
Proofs of space2015-12-10Paper
A quasipolynomial reduction for generalized selective decryption on trees2015-12-10Paper
Condensed Unpredictability2015-10-27Paper
The chain rule for HILL pseudoentropy, revisited2015-09-17Paper
Key-homomorphic constrained pseudorandom functions2015-07-06Paper
Adaptive Security of Constrained PRFs2015-01-06Paper
Robust multi-property combiners for hash functions2014-09-25Paper
The exact PRF-security of NMAC and HMAC2014-08-07Paper
Key derivation without entropy waste2014-05-27Paper
Simple chosen-ciphertext security from low-noise LPN2014-03-25Paper
How to fake auxiliary input2014-02-18Paper
Digital Signatures with Minimal Overhead from Indifferentiable Random Invertible Functions2013-09-02Paper
Learning with rounding, revisited. New reduction, properties and applications2013-09-02Paper
Commitments and efficient zero-knowledge proofs from learning parity with noise2013-03-19Paper
A counterexample to the chain rule for conditional HILL entropy. And what deniable encryption has to do with it2013-03-18Paper
Lapin: an efficient authentication protocol based on ring-LPN2013-01-08Paper
Practical leakage-resilient symmetric cryptography2012-11-13Paper
Message authentication, revisited2012-06-29Paper
Cryptography from learning parity with noise2012-06-15Paper
Hardness preserving constructions of pseudorandom functions2012-06-15Paper
Subspace LWE2012-06-15Paper
Lossy functions do not amplify well2012-06-15Paper
Parallel repetition of computationally sound protocols revisited2012-05-23Paper
Leftover Hash Lemma, Revisited2011-08-12Paper
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience2011-07-06Paper
Efficient Authentication from Hard Learning Problems2011-05-27Paper
Parallel Repetition for Leakage Resilience Amplification Revisited2011-05-19Paper
Leakage resilient ElGamal encryption2010-12-07Paper
Leakage-resilient pseudorandom functions and side-channel attacks on Feistel networks2010-08-24Paper
An efficient parallel repetition theorem2010-02-24Paper
Leakage-resilient signatures2010-02-24Paper
Theory of Cryptography2009-05-14Paper
A Leakage-Resilient Mode of Operation2009-05-12Paper
On the Security of Padding-Based Encryption Schemes – or – Why We Cannot Prove OAEP Secure in the Standard Model2009-05-12Paper
A New Randomness Extraction Paradigm for Hybrid Encryption2009-05-12Paper
Indistinguishability Amplification2009-03-10Paper
Compression from Collisions, or Why CRHF Combiners Have a Long Output2009-02-10Paper
Improving the Security of MACs Via Randomized Message Preprocessing2008-09-16Paper
Robust Multi-property Combiners for Hash Functions Revisited2008-08-19Paper
Weak Pseudorandom Functions in Minicrypt2008-08-19Paper
A New Mode of Operation for Block Ciphers and Length-Preserving MACs2008-04-15Paper
On the Generic Insecurity of the Full Domain Hash2008-03-17Paper
Improved Security Analyses for CBC MACs2008-03-17Paper
Composition Does Not Imply Adaptive Security2008-03-17Paper
Non-trivial Black-Box Combiners for Collision-Resistant Hash-Functions Don’t Exist2007-11-29Paper
Range Extension for Weak PRFs; The Good, the Bad, and the Ugly2007-11-29Paper
Luby-Rackoff Ciphers from Weak Round Functions?2007-09-24Paper
Composition Implies Adaptive Security in Minicrypt2007-09-24Paper
A Tight Bound for EMAC2007-09-11Paper
Parallel Repetition of Computationally Sound Protocols Revisited2007-08-30Paper
Theory of Cryptography2007-02-12Paper
On the parameterized complexity of the fixed alphabet shortest common supersequence and longest common subsequence problems2004-08-19Paper
https://portal.mardi4nfdi.de/entity/Q44348982003-11-26Paper

Research outcomes over time

This page was built for person: Krzysztof Pietrzak