Krzysztof Pietrzak

From MaRDI portal
(Redirected from Person:332266)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Continuous group-key agreement: concurrent updates without pruning2026-02-06Paper
Watermarkable and zero-knowledge verifiable delay functions from any proof of exponentiation2025-07-29Paper
The cost of maintaining keys in dynamic groups with applications to multicast encryption and group messaging2025-07-23Paper
Fully automated selfish mining analysis in efficient proof systems blockchains2025-06-13Paper
Trapdoor memory-hard functions2024-11-13Paper
Efficiently testable circuits2024-09-25Paper
Efficiently testable circuits without conductivity2024-08-02Paper
On the cost of post-compromise security in concurrent continuous group-key agreement2024-08-02Paper
Certifying giant nonprimes
Lecture Notes in Computer Science
2023-11-24Paper
Practical statistically-sound proofs of exponentiation in any group
Advances in Cryptology – CRYPTO 2022
2023-06-28Paper
\textsc{Hide} \& \textsc{Seek}: privacy-preserving rebalancing on payment channel networks
Financial Cryptography and Data Security
2023-05-26Paper
On treewidth, separators and Yao's garbling2023-04-13Paper
Trojan-resilience without cryptography2023-04-13Paper
Efficient Zero-Knowledge Proofs for Commitments from Learning with Errors over Rings
Computer Security -- ESORICS 2015
2022-08-19Paper
Simple verifiable delay functions2022-07-18Paper
Proofs of Catalytic Space2022-07-18Paper
Delayed authentication: preventing replay and relay attacks in private contact tracing2022-07-06Paper
Limits on the adaptive security of Yao's garbling2022-04-22Paper
Non-uniform attacks against pseudoentropy
(available as arXiv preprint)
2020-05-27Paper
Finding a Nash equilibrium is no easier than breaking Fiat-Shamir
Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing
2020-01-30Paper
Adaptively secure proxy re-encryption2020-01-28Paper
Non-malleable codes
Journal of the ACM
2018-12-06Paper
Sustained space complexity
(available as arXiv preprint)
2018-07-09Paper
Simple proofs of sequential work2018-07-09Paper
Beyond Hellman's time-memory trade-offs with applications to proofs of space2018-03-08Paper
Efficient authentication from hard learning problems
Journal of Cryptology
2018-02-15Paper
Position-based cryptography and multiparty communication complexity2018-01-19Paper
Be adaptive, avoid overcommitting2017-11-03Paper
Depth-robust graphs and their cumulative memory complexity
Lecture Notes in Computer Science
2017-06-23Paper
Scrypt is maximally memory-hard
Lecture Notes in Computer Science
2017-06-23Paper
Pseudoentropy: lower-bounds for chain rules and transformations
Theory of Cryptography
2016-12-21Paper
A counterexample to the chain rule for conditional HILL entropy
Computational Complexity
2016-10-28Paper
Offline witness encryption
Applied Cryptography and Network Security
2016-10-04Paper
On the complexity of \textsf{scrypt} and proofs of space in the parallel random oracle model
Advances in Cryptology – EUROCRYPT 2016
2016-07-15Paper
New realizations of somewhere statistically binding hashing and positional accumulators
Advances in Cryptology -- ASIACRYPT 2015
2016-06-10Paper
Constrained PRFs for unbounded inputs
Topics in Cryptology - CT-RSA 2016
2016-04-08Paper
Standard Security Does Imply Security Against Selective Opening for Markov Distributions
Theory of Cryptography
2016-03-23Paper
Generic security of NMAC and HMAC with input whitening
Advances in Cryptology – ASIACRYPT 2015
2016-03-23Paper
The exact PRF security of truncation: tight bounds for keyed sponges and truncated CBC
Lecture Notes in Computer Science
2015-12-10Paper
Proofs of space
Lecture Notes in Computer Science
2015-12-10Paper
A quasipolynomial reduction for generalized selective decryption on trees
Lecture Notes in Computer Science
2015-12-10Paper
Condensed Unpredictability
Automata, Languages, and Programming
2015-10-27Paper
Condensed Unpredictability
Automata, Languages, and Programming
2015-10-27Paper
The chain rule for HILL pseudoentropy, revisited
Progress in Cryptology -- LATINCRYPT 2015
2015-09-17Paper
Key-homomorphic constrained pseudorandom functions
Theory of Cryptography
2015-07-06Paper
Adaptive Security of Constrained PRFs
Lecture Notes in Computer Science
2015-01-06Paper
Robust multi-property combiners for hash functions
Journal of Cryptology
2014-09-25Paper
The exact PRF-security of NMAC and HMAC
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Key derivation without entropy waste
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
Simple chosen-ciphertext security from low-noise LPN
Public-Key Cryptography – PKC 2014
2014-03-25Paper
How to fake auxiliary input
Theory of Cryptography
2014-02-18Paper
Digital Signatures with Minimal Overhead from Indifferentiable Random Invertible Functions
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Learning with rounding, revisited. New reduction, properties and applications
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Commitments and efficient zero-knowledge proofs from learning parity with noise
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
A counterexample to the chain rule for conditional HILL entropy. And what deniable encryption has to do with it
Theory of Cryptography
2013-03-18Paper
Lapin: an efficient authentication protocol based on ring-LPN
Fast Software Encryption
2013-01-08Paper
Practical leakage-resilient symmetric cryptography
Cryptographic Hardware and Embedded Systems – CHES 2012
2012-11-13Paper
Message authentication, revisited
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
Cryptography from learning parity with noise
SOFSEM 2012: Theory and Practice of Computer Science
2012-06-15Paper
Hardness preserving constructions of pseudorandom functions
Theory of Cryptography
2012-06-15Paper
Subspace LWE
Theory of Cryptography
2012-06-15Paper
Lossy functions do not amplify well
Theory of Cryptography
2012-06-15Paper
Parallel repetition of computationally sound protocols revisited
Journal of Cryptology
2012-05-23Paper
Leftover Hash Lemma, Revisited
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience
Automata, Languages and Programming
2011-07-06Paper
Efficient Authentication from Hard Learning Problems
Advances in Cryptology – EUROCRYPT 2011
2011-05-27Paper
Parallel Repetition for Leakage Resilience Amplification Revisited
Theory of Cryptography
2011-05-19Paper
Leakage resilient ElGamal encryption
Advances in Cryptology - ASIACRYPT 2010
2010-12-07Paper
Leakage-resilient pseudorandom functions and side-channel attacks on Feistel networks
Advances in Cryptology – CRYPTO 2010
2010-08-24Paper
An efficient parallel repetition theorem
Theory of Cryptography
2010-02-24Paper
Leakage-resilient signatures
Theory of Cryptography
2010-02-24Paper
Theory of Cryptography
Lecture Notes in Computer Science
2009-05-14Paper
A Leakage-Resilient Mode of Operation
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
On the Security of Padding-Based Encryption Schemes – or – Why We Cannot Prove OAEP Secure in the Standard Model
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
A New Randomness Extraction Paradigm for Hybrid Encryption
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
Indistinguishability Amplification
Advances in Cryptology - CRYPTO 2007
2009-03-10Paper
Compression from Collisions, or Why CRHF Combiners Have a Long Output
Lecture Notes in Computer Science
2009-02-10Paper
Improving the Security of MACs Via Randomized Message Preprocessing
Fast Software Encryption
2008-09-16Paper
Robust Multi-property Combiners for Hash Functions Revisited
Automata, Languages and Programming
2008-08-19Paper
Weak Pseudorandom Functions in Minicrypt
Automata, Languages and Programming
2008-08-19Paper
A New Mode of Operation for Block Ciphers and Length-Preserving MACs
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
On the Generic Insecurity of the Full Domain Hash
Advances in Cryptology – CRYPTO 2005
2008-03-17Paper
Improved Security Analyses for CBC MACs
Advances in Cryptology – CRYPTO 2005
2008-03-17Paper
Composition Does Not Imply Adaptive Security
Advances in Cryptology – CRYPTO 2005
2008-03-17Paper
Non-trivial Black-Box Combiners for Collision-Resistant Hash-Functions Don’t Exist
Advances in Cryptology - EUROCRYPT 2007
2007-11-29Paper
Range Extension for Weak PRFs; The Good, the Bad, and the Ugly
Advances in Cryptology - EUROCRYPT 2007
2007-11-29Paper
Luby-Rackoff Ciphers from Weak Round Functions?
Advances in Cryptology - EUROCRYPT 2006
2007-09-24Paper
Composition Implies Adaptive Security in Minicrypt
Advances in Cryptology - EUROCRYPT 2006
2007-09-24Paper
A Tight Bound for EMAC
Automata, Languages and Programming
2007-09-11Paper
Parallel Repetition of Computationally Sound Protocols Revisited
Theory of Cryptography
2007-08-30Paper
Theory of Cryptography
Lecture Notes in Computer Science
2007-02-12Paper
On the parameterized complexity of the fixed alphabet shortest common supersequence and longest common subsequence problems
Journal of Computer and System Sciences
2004-08-19Paper
scientific article; zbMATH DE number 2009979 (Why is no real title available?)2003-11-26Paper


Research outcomes over time


This page was built for person: Krzysztof Pietrzak