The following pages link to Krzysztof Pietrzak (Q332266):
Displaying 40 items.
- A counterexample to the chain rule for conditional HILL entropy (Q332268) (← links)
- Parallel repetition of computationally sound protocols revisited (Q421032) (← links)
- Robust multi-property combiners for hash functions (Q744343) (← links)
- Sustained space complexity (Q1648824) (← links)
- Simple proofs of sequential work (Q1648847) (← links)
- Be adaptive, avoid overcommitting (Q1675723) (← links)
- Position-based cryptography and multiparty communication complexity (Q1690188) (← links)
- Efficient authentication from hard learning problems (Q1698400) (← links)
- Beyond Hellman's time-memory trade-offs with applications to proofs of space (Q1703929) (← links)
- On the parameterized complexity of the fixed alphabet shortest common supersequence and longest common subsequence problems (Q1877706) (← links)
- Limits on the adaptive security of Yao's garbling (Q2128573) (← links)
- Delayed authentication: preventing replay and relay attacks in private contact tracing (Q2152016) (← links)
- Adaptively secure proxy re-encryption (Q2289435) (← links)
- Trojan-resilience without cryptography (Q2697869) (← links)
- On treewidth, separators and Yao's garbling (Q2697873) (← links)
- Generic Security of NMAC and HMAC with Input Whitening (Q2795967) (← links)
- Standard Security Does Imply Security Against Selective Opening for Markov Distributions (Q2796129) (← links)
- Constrained PRFs for Unbounded Inputs (Q2799033) (← links)
- New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators (Q2811128) (← links)
- Offline Witness Encryption (Q2822676) (← links)
- Learning with Rounding, Revisited (Q2845660) (← links)
- Digital Signatures with Minimal Overhead from Indifferentiable Random Invertible Functions (Q2845695) (← links)
- The Exact PRF-Security of NMAC and HMAC (Q2874500) (← links)
- Cryptography from Learning Parity with Noise (Q2891361) (← links)
- Hardness Preserving Constructions of Pseudorandom Functions (Q2891495) (← links)
- Lossy Functions Do Not Amplify Well (Q2891500) (← links)
- Subspace LWE (Q2891505) (← links)
- Message Authentication, Revisited (Q2894418) (← links)
- Adaptive Security of Constrained PRFs (Q2936602) (← links)
- The Chain Rule for HILL Pseudoentropy, Revisited (Q2946442) (← links)
- Parallel Repetition for Leakage Resilience Amplification Revisited (Q3000532) (← links)
- Efficient Authentication from Hard Learning Problems (Q3003371) (← links)
- Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience (Q3012821) (← links)
- Leakage Resilient ElGamal Encryption (Q3058681) (← links)
- Pseudoentropy: Lower-Bounds for Chain Rules and Transformations (Q3179357) (← links)
- An Efficient Parallel Repetition Theorem (Q3408184) (← links)
- Leakage-Resilient Signatures (Q3408204) (← links)
- Proofs of Catalytic Space (Q5090438) (← links)
- Simple verifiable delay functions (Q5090439) (← links)
- Non-Uniform Attacks Against Pseudoentropy (Q5111370) (← links)