Stanislaw Jarecki

From MaRDI portal
Person:882772


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Security without trusted third parties: VRF-based authentication with short authenticated strings
 
2026-03-31Paper
Bare PAKE: universally composable key exchange from just passwords
 
2024-12-04Paper
Short concurrent covert authenticated key exchange (short cAKE)
 
2024-06-26Paper
Randomized half-ideal cipher on groups with applications to UC (a)PAKE
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Password Authenticated Key Exchange
Asymmetric Cryptography
2023-08-04Paper
Universally composable relaxed password authenticated key exchange
 
2022-11-09Paper
Asymmetric PAKE with low computation \textit{and} communication
 
2022-08-30Paper
TOPPSS: cost-minimal password-protected secret sharing based on threshold OPRF
 
2022-07-01Paper
KHAPE: Asymmetric PAKE from key-hiding key exchange
 
2022-05-18Paper
On pseudorandom encodings
 
2022-03-23Paper
On the (in)security of the Diffie-Hellman oblivious PRF with multiplicative blinding
 
2021-12-21Paper
Strong asymmetric PAKE based on trapdoor CKEM
 
2020-03-09Paper
Password-authenticated public-key encryption
 
2020-01-30Paper
Round-reduced modular construction of asymmetric password-authenticated key exchange
 
2018-10-17Paper
3PC ORAM with low latency, low bandwidth, and fast batch retrieval
 
2018-08-10Paper
OPAQUE: an asymmetric PAKE protocol secure against pre-computation attacks
 
2018-07-17Paper
Two-factor authentication with end-to-end password security
 
2018-05-29Paper
Efficient covert two-party computation
 
2018-05-16Paper
Fast Exponentiation Using Split Exponents
IEEE Transactions on Information Theory
2017-07-27Paper
Three-party ORAM for secure computation
Advances in Cryptology -- ASIACRYPT 2015
2016-06-10Paper
Efficient Concurrent Covert Computation of String Equality and Set Intersection
Topics in Cryptology - CT-RSA 2016
2016-04-08Paper
Robust and efficient sharing of RSA functions
Advances in Cryptology — CRYPTO ’96
2015-11-11Paper
Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model
Lecture Notes in Computer Science
2015-01-06Paper
Robust threshold DSS signatures
Advances in Cryptology — EUROCRYPT ’96
2014-08-20Paper
Practical covert authentication
Public-Key Cryptography – PKC 2014
2014-03-25Paper
Authenticated key agreement with key re-use in the short authenticated strings model
Computational and Combinatorial Group Theory and Cryptography
2014-01-03Paper
Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Cryptographic primitives enforcing communication and storage complexity
Financial Cryptography
2011-04-20Paper
Fast secure computation of set intersection
Lecture Notes in Computer Science
2010-09-10Paper
Authenticated key agreement with key re-use in the short authenticated strings model
Lecture Notes in Computer Science
2010-09-10Paper
Identity-based aggregate and multi-signature schemes based on RSA
Public Key Cryptography – PKC 2010
2010-05-28Paper
Private Mutual Authentication and Conditional Oblivious Transfer
Advances in Cryptology - CRYPTO 2009
2009-10-20Paper
Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes
Applied Cryptography and Network Security
2009-03-10Paper
Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection
Theory of Cryptography
2009-03-03Paper
Proactive RSA with Non-interactive Signing
Financial Cryptography and Data Security
2009-02-12Paper
Multisignatures Using Proofs of Secret Key Possession, as Secure as the Diffie-Hellman Problem
Lecture Notes in Computer Science
2008-11-20Paper
Affiliation-Hiding Envelope and Authentication Schemes with Efficient Support for Multiple Credentials
Automata, Languages and Programming
2008-08-19Paper
Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange
Topics in Cryptology – CT-RSA 2008
2008-04-24Paper
Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement
Lecture Notes in Computer Science
2008-04-17Paper
Efficient signature schemes with tight reductions to the Diffie-Hellman problems
Journal of Cryptology
2007-12-06Paper
Efficient Two-Party Secure Computation on Committed Inputs
Advances in Cryptology - EUROCRYPT 2007
2007-11-29Paper
Advances in Cryptology - EUROCRYPT 2004
Lecture Notes in Computer Science
2007-09-25Paper
Secure distributed key generation for discrete-log based cryptosystems
Journal of Cryptology
2007-05-24Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2007-05-02Paper
Security in Communication Networks
Lecture Notes in Computer Science
2006-10-10Paper
Secure acknowledgment aggregation and multisignatures with limited robustness
Computer Networks
2006-06-30Paper
scientific article; zbMATH DE number 5009201 (Why is no real title available?)
 
2006-03-01Paper
Financial Cryptography and Data Security
Lecture Notes in Computer Science
2005-12-22Paper
Theory of Cryptography
Lecture Notes in Computer Science
2005-12-07Paper
Secret Handshakes from CA-Oblivious Encryption
 
2005-08-12Paper
scientific article; zbMATH DE number 2009970 (Why is no real title available?)
 
2003-11-26Paper
scientific article; zbMATH DE number 1962743 (Why is no real title available?)
 
2003-08-11Paper
scientific article; zbMATH DE number 1962164 (Why is no real title available?)
 
2003-08-10Paper
Robust threshold DSS signatures
Information and Computation
2003-01-14Paper
scientific article; zbMATH DE number 1418290 (Why is no real title available?)
 
2000-07-19Paper
scientific article; zbMATH DE number 1304079 (Why is no real title available?)
 
2000-03-07Paper
scientific article; zbMATH DE number 1031003 (Why is no real title available?)
 
1997-07-06Paper


Research outcomes over time


This page was built for person: Stanislaw Jarecki