Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Krzysztof Pietrzak
@article{DBLP:journals/iacr/AuerbachGP24, author = {Benedikt Auerbach and Christoph U. G{\"{u}}nther and Krzysztof Pietrzak}, title = {Trapdoor Memory-Hard Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {312}, year = {2024}, url = {https://eprint.iacr.org/2024/312}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AuerbachGP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HoffmannP24, author = {Charlotte Hoffmann and Krzysztof Pietrzak}, title = {Watermarkable and Zero-Knowledge Verifiable Delay Functions from any Proof of Exponentiation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {481}, year = {2024}, url = {https://eprint.iacr.org/2024/481}, timestamp = {Wed, 24 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HoffmannP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DodisFGHP23, author = {Yevgeniy Dodis and Niels Ferguson and Eli Goldin and Peter Hall and Krzysztof Pietrzak}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Random Oracle Combiners: Breaking the Concatenation Barrier for Collision-Resistance}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14082}, pages = {514--546}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38545-2\_17}, doi = {10.1007/978-3-031-38545-2\_17}, timestamp = {Mon, 14 Aug 2023 16:16:25 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DodisFGHP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/BaigCDGLP23, author = {Mirza Ahad Baig and Suvradip Chakraborty and Stefan Dziembowski and Malgorzata Galazka and Tomasz Lizurej and Krzysztof Pietrzak}, editor = {Yael Tauman Kalai}, title = {Efficiently Testable Circuits}, booktitle = {14th Innovations in Theoretical Computer Science Conference, {ITCS} 2023, January 10-13, 2023, MIT, Cambridge, Massachusetts, {USA}}, series = {LIPIcs}, volume = {251}, pages = {10:1--10:23}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2023}, url = {https://doi.org/10.4230/LIPIcs.ITCS.2023.10}, doi = {10.4230/LIPICS.ITCS.2023.10}, timestamp = {Thu, 02 Feb 2023 12:50:42 +0100}, biburl = {https://dblp.org/rec/conf/innovations/BaigCDGLP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HoffmannHKP23, author = {Charlotte Hoffmann and Pavel Hub{\'{a}}cek and Chethan Kamath and Krzysztof Pietrzak}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Certifying Giant Nonprimes}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13940}, pages = {530--553}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31368-4\_19}, doi = {10.1007/978-3-031-31368-4\_19}, timestamp = {Fri, 05 May 2023 22:44:30 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HoffmannHKP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BaigCDGLP23, author = {Mirza Ahad Baig and Suvradip Chakraborty and Stefan Dziembowski and Malgorzata Galazka and Tomasz Lizurej and Krzysztof Pietrzak}, editor = {Guy N. Rothblum and Hoeteck Wee}, title = {Efficiently Testable Circuits Without Conductivity}, booktitle = {Theory of Cryptography - 21st International Conference, {TCC} 2023, Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14371}, pages = {123--152}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-48621-0\_5}, doi = {10.1007/978-3-031-48621-0\_5}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/BaigCDGLP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AuerbachNPP23, author = {Benedikt Auerbach and Miguel Cueto Noval and Guillermo Pascual{-}Perez and Krzysztof Pietrzak}, editor = {Guy N. Rothblum and Hoeteck Wee}, title = {On the Cost of Post-compromise Security in Concurrent Continuous Group-Key Agreement}, booktitle = {Theory of Cryptography - 21st International Conference, {TCC} 2023, Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14371}, pages = {271--300}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-48621-0\_10}, doi = {10.1007/978-3-031-48621-0\_10}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/AuerbachNPP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HoffmannHKP23, author = {Charlotte Hoffmann and Pavel Hub{\'{a}}cek and Chethan Kamath and Krzysztof Pietrzak}, title = {Certifying Giant Nonprimes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {238}, year = {2023}, url = {https://eprint.iacr.org/2023/238}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HoffmannHKP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisFGHP23, author = {Yevgeniy Dodis and Niels Ferguson and Eli Goldin and Peter Hall and Krzysztof Pietrzak}, title = {Random Oracle Combiners: Breaking the Concatenation Barrier for Collision-Resistance}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1041}, year = {2023}, url = {https://eprint.iacr.org/2023/1041}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisFGHP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AuerbachNPP23, author = {Benedikt Auerbach and Miguel Cueto Noval and Guillermo Pascual{-}Perez and Krzysztof Pietrzak}, title = {On the Cost of Post-Compromise Security in Concurrent Continuous Group-Key Agreement}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1123}, year = {2023}, url = {https://eprint.iacr.org/2023/1123}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AuerbachNPP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaigCDGLP23, author = {Mirza Ahad Baig and Suvradip Chakraborty and Stefan Dziembowski and Malgorzata Galazka and Tomasz Lizurej and Krzysztof Pietrzak}, title = {Efficiently Testable Circuits without Conductivity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1795}, year = {2023}, url = {https://eprint.iacr.org/2023/1795}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BaigCDGLP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aft/TiwariYASP022, author = {Samarth Tiwari and Michelle Yeo and Zeta Avarikioti and Iosif Salem and Krzysztof Pietrzak and Stefan Schmid}, editor = {Maurice Herlihy and Neha Narula}, title = {Wiser: Increasing Throughput in Payment Channel Networks with Transaction Aggregation}, booktitle = {Proceedings of the 4th {ACM} Conference on Advances in Financial Technologies, {AFT} 2022, Cambridge, MA, USA, September 19-21, 2022}, pages = {217--231}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3558535.3559775}, doi = {10.1145/3558535.3559775}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aft/TiwariYASP022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HoffmannHKKP22, author = {Charlotte Hoffmann and Pavel Hub{\'{a}}cek and Chethan Kamath and Karen Klein and Krzysztof Pietrzak}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Practical Statistically-Sound Proofs of Exponentiation in Any Group}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13508}, pages = {370--399}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15979-4\_13}, doi = {10.1007/978-3-031-15979-4\_13}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/HoffmannHKKP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AlwenANKPPW22, author = {Jo{\"{e}}l Alwen and Benedikt Auerbach and Miguel Cueto Noval and Karen Klein and Guillermo Pascual{-}Perez and Krzysztof Pietrzak and Michael Walter}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {CoCoA: Concurrent Continuous Group Key Agreement}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13276}, pages = {815--844}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07085-3\_28}, doi = {10.1007/978-3-031-07085-3\_28}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/AlwenANKPPW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/AvarikiotiPSSTY22, author = {Zeta Avarikioti and Krzysztof Pietrzak and Iosif Salem and Stefan Schmid and Samarth Tiwari and Michelle Yeo}, editor = {Ittay Eyal and Juan A. Garay}, title = {Hide {\&} Seek: Privacy-Preserving Rebalancing on Payment Channel Networks}, booktitle = {Financial Cryptography and Data Security - 26th International Conference, {FC} 2022, Grenada, May 2-6, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13411}, pages = {358--373}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-18283-9\_17}, doi = {10.1007/978-3-031-18283-9\_17}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/AvarikiotiPSSTY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-11597, author = {Samarth Tiwari and Michelle Yeo and Zeta Avarikioti and Iosif Salem and Krzysztof Pietrzak and Stefan Schmid}, title = {Wiser: Increasing Throughput in Payment Channel Networks with Transaction Aggregation}, journal = {CoRR}, volume = {abs/2205.11597}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.11597}, doi = {10.48550/ARXIV.2205.11597}, eprinttype = {arXiv}, eprint = {2205.11597}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-11597.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlwenANKPPW22, author = {Jo{\"{e}}l Alwen and Benedikt Auerbach and Miguel Cueto Noval and Karen Klein and Guillermo Pascual{-}Perez and Krzysztof Pietrzak and Michael Walter}, title = {CoCoA: Concurrent Continuous Group Key Agreement}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {251}, year = {2022}, url = {https://eprint.iacr.org/2022/251}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AlwenANKPPW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlwenANKPP22, author = {Jo{\"{e}}l Alwen and Benedikt Auerbach and Miguel Cueto Noval and Karen Klein and Guillermo Pascual{-}Perez and Krzysztof Pietrzak}, title = {Coffee: Fast Healing Concurrent Continuous Group Key Agreement for Decentralized Group Messaging}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {559}, year = {2022}, url = {https://eprint.iacr.org/2022/559}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlwenANKPP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HoffmannHKKP22, author = {Charlotte Hoffmann and Pavel Hub{\'{a}}cek and Chethan Kamath and Karen Klein and Krzysztof Pietrzak}, title = {Practical Statistically-Sound Proofs of Exponentiation in any Group}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1021}, year = {2022}, url = {https://eprint.iacr.org/2022/1021}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HoffmannHKKP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaigCDGLP22, author = {Mirza Ahad Baig and Suvradip Chakraborty and Stefan Dziembowski and Malgorzata Galazka and Tomasz Lizurej and Krzysztof Pietrzak}, title = {Efficiently Testable Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1598}, year = {2022}, url = {https://eprint.iacr.org/2022/1598}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BaigCDGLP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KamathKPW21, author = {Chethan Kamath and Karen Klein and Krzysztof Pietrzak and Daniel Wichs}, editor = {Tal Malkin and Chris Peikert}, title = {Limits on the Adaptive Security of Yao's Garbling}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12826}, pages = {486--515}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84245-1\_17}, doi = {10.1007/978-3-030-84245-1\_17}, timestamp = {Mon, 16 Aug 2021 09:08:14 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KamathKPW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/AuerbachCKPP0Y21, author = {Benedikt Auerbach and Suvradip Chakraborty and Karen Klein and Guillermo Pascual{-}Perez and Krzysztof Pietrzak and Michael Walter and Michelle Yeo}, editor = {Kenneth G. Paterson}, title = {Inverse-Sybil Attacks in Automated Contact Tracing}, booktitle = {Topics in Cryptology - {CT-RSA} 2021 - Cryptographers' Track at the {RSA} Conference 2021, Virtual Event, May 17-20, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12704}, pages = {399--421}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75539-3\_17}, doi = {10.1007/978-3-030-75539-3\_17}, timestamp = {Mon, 28 Aug 2023 21:17:50 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/AuerbachCKPP0Y21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/networking/PietrzakS0Y21, author = {Krzysztof Pietrzak and Iosif Salem and Stefan Schmid and Michelle Yeo}, editor = {Zheng Yan and Gareth Tyson and Dimitrios Koutsonikolas}, title = {LightPIR: Privacy-Preserving Route Discovery for Payment Channel Networks}, booktitle = {{IFIP} Networking Conference, {IFIP} Networking 2021, Espoo and Helsinki, Finland, June 21-24, 2021}, pages = {1--9}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.23919/IFIPNetworking52078.2021.9472205}, doi = {10.23919/IFIPNETWORKING52078.2021.9472205}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/networking/PietrzakS0Y21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KleinPWKCCMYAP21, author = {Karen Klein and Guillermo Pascual{-}Perez and Michael Walter and Chethan Kamath and Margarita Capretto and Miguel Cueto and Ilia Markov and Michelle Yeo and Jo{\"{e}}l Alwen and Krzysztof Pietrzak}, title = {Keep the Dirt: Tainted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {268--284}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00035}, doi = {10.1109/SP40001.2021.00035}, timestamp = {Thu, 21 Sep 2023 15:57:26 +0200}, biburl = {https://dblp.org/rec/conf/sp/KleinPWKCCMYAP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AlwenABNKPP021, author = {Jo{\"{e}}l Alwen and Benedikt Auerbach and Mirza Ahad Baig and Miguel Cueto Noval and Karen Klein and Guillermo Pascual{-}Perez and Krzysztof Pietrzak and Michael Walter}, editor = {Kobbi Nissim and Brent Waters}, title = {Grafting Key Trees: Efficient Key Management for Overlapping Groups}, booktitle = {Theory of Cryptography - 19th International Conference, {TCC} 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13044}, pages = {222--253}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90456-2\_8}, doi = {10.1007/978-3-030-90456-2\_8}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/AlwenABNKPP021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/ChakrabortyDGLP21, author = {Suvradip Chakraborty and Stefan Dziembowski and Malgorzata Galazka and Tomasz Lizurej and Krzysztof Pietrzak and Michelle Yeo}, editor = {Kobbi Nissim and Brent Waters}, title = {Trojan-Resilience Without Cryptography}, booktitle = {Theory of Cryptography - 19th International Conference, {TCC} 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13043}, pages = {397--428}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90453-1\_14}, doi = {10.1007/978-3-030-90453-1\_14}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/ChakrabortyDGLP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/KamathKP21, author = {Chethan Kamath and Karen Klein and Krzysztof Pietrzak}, editor = {Kobbi Nissim and Brent Waters}, title = {On Treewidth, Separators and Yao's Garbling}, booktitle = {Theory of Cryptography - 19th International Conference, {TCC} 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13043}, pages = {486--517}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90453-1\_17}, doi = {10.1007/978-3-030-90453-1\_17}, timestamp = {Mon, 08 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/KamathKP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/KamathKP021, author = {Chethan Kamath and Karen Klein and Krzysztof Pietrzak and Michael Walter}, editor = {Kobbi Nissim and Brent Waters}, title = {The Cost of Adaptivity in Security Games on Graphs}, booktitle = {Theory of Cryptography - 19th International Conference, {TCC} 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13043}, pages = {550--581}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90453-1\_19}, doi = {10.1007/978-3-030-90453-1\_19}, timestamp = {Mon, 08 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/KamathKP021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-04293, author = {Krzysztof Pietrzak and Iosif Salem and Stefan Schmid and Michelle Yeo}, title = {LightPIR: Privacy-Preserving Route Discovery for Payment Channel Networks}, journal = {CoRR}, volume = {abs/2104.04293}, year = {2021}, url = {https://arxiv.org/abs/2104.04293}, eprinttype = {arXiv}, eprint = {2104.04293}, timestamp = {Tue, 13 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-04293.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-08848, author = {Zeta Avarikioti and Krzysztof Pietrzak and Iosif Salem and Stefan Schmid and Samarth Tiwari and Michelle Yeo}, title = {{HIDE} {\&} {SEEK:} Privacy-Preserving Rebalancing on Payment Channel Networks}, journal = {CoRR}, volume = {abs/2110.08848}, year = {2021}, url = {https://arxiv.org/abs/2110.08848}, eprinttype = {arXiv}, eprint = {2110.08848}, timestamp = {Fri, 22 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-08848.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KamathKPW21, author = {Chethan Kamath and Karen Klein and Krzysztof Pietrzak and Michael Walter}, title = {On the Cost of Adaptivity in Graph-Based Games}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {59}, year = {2021}, url = {https://eprint.iacr.org/2021/059}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KamathKPW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KamathKP21, author = {Chethan Kamath and Karen Klein and Krzysztof Pietrzak}, title = {On Treewidth, Separators and Yao's Garbling}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {926}, year = {2021}, url = {https://eprint.iacr.org/2021/926}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KamathKP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KamathKPW21a, author = {Chethan Kamath and Karen Klein and Krzysztof Pietrzak and Daniel Wichs}, title = {Limits on the Adaptive Security of Yao's Garbling}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {945}, year = {2021}, url = {https://eprint.iacr.org/2021/945}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KamathKPW21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlwenABCKPPW21, author = {Jo{\"{e}}l Alwen and Benedikt Auerbach and Mirza Ahad Baig and Miguel Cueto and Karen Klein and Guillermo Pascual{-}Perez and Krzysztof Pietrzak and Michael Walter}, title = {Grafting Key Trees: Efficient Key Management for Overlapping Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1158}, year = {2021}, url = {https://eprint.iacr.org/2021/1158}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlwenABCKPPW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChakrabortyDGLP21, author = {Suvradip Chakraborty and Stefan Dziembowski and Malgorzata Galazka and Tomasz Lizurej and Krzysztof Pietrzak and Michelle Yeo}, title = {Trojan-Resilience without Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1224}, year = {2021}, url = {https://eprint.iacr.org/2021/1224}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChakrabortyDGLP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AvarikiotiPSSTY21, author = {Zeta Avarikioti and Krzysztof Pietrzak and Iosif Salem and Stefan Schmid and Samarth Tiwari and Michelle Yeo}, title = {{HIDE} {\&} {SEEK:} Privacy-Preserving Rebalancing on Payment Channel Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1401}, year = {2021}, url = {https://eprint.iacr.org/2021/1401}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AvarikiotiPSSTY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AvarikiotiBMPSY21, author = {Zeta Avarikioti and Mahsa Bastankhah and Mohammad Ali Maddah{-}Ali and Krzysztof Pietrzak and Jakub Svoboda and Michelle Yeo}, title = {Route Discovery in Private Payment Channel Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1539}, year = {2021}, url = {https://eprint.iacr.org/2021/1539}, timestamp = {Fri, 10 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AvarikiotiBMPSY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/Pietrzak20, author = {Krzysztof Pietrzak}, editor = {Karthikeyan Bhargavan and Elisabeth Oswald and Manoj Prabhakaran}, title = {Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact Tracing}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2020 - 21st International Conference on Cryptology in India, Bangalore, India, December 13-16, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12578}, pages = {3--15}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65277-7\_1}, doi = {10.1007/978-3-030-65277-7\_1}, timestamp = {Wed, 17 Apr 2024 21:39:19 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/Pietrzak20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tcc/2020-1, editor = {Rafael Pass and Krzysztof Pietrzak}, title = {Theory of Cryptography - 18th International Conference, {TCC} 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12550}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64375-1}, doi = {10.1007/978-3-030-64375-1}, isbn = {978-3-030-64374-4}, timestamp = {Tue, 15 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/2020-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tcc/2020-2, editor = {Rafael Pass and Krzysztof Pietrzak}, title = {Theory of Cryptography - 18th International Conference, {TCC} 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12551}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64378-2}, doi = {10.1007/978-3-030-64378-2}, isbn = {978-3-030-64377-5}, timestamp = {Tue, 15 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/2020-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tcc/2020-3, editor = {Rafael Pass and Krzysztof Pietrzak}, title = {Theory of Cryptography - 18th International Conference, {TCC} 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12552}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64381-2}, doi = {10.1007/978-3-030-64381-2}, isbn = {978-3-030-64380-5}, timestamp = {Tue, 15 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/2020-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Pietrzak20, author = {Krzysztof Pietrzak}, title = {Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact Tracing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {418}, year = {2020}, url = {https://eprint.iacr.org/2020/418}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Pietrzak20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Austria20, author = {Benedikt Auerbach and Suvradip Chakraborty and Karen Klein and Guillermo Pascual{-}Perez and Krzysztof Pietrzak and Michael Walter and Michelle Yeo}, title = {Inverse-Sybil Attacks in Automated Contact Tracing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {670}, year = {2020}, url = {https://eprint.iacr.org/2020/670}, timestamp = {Mon, 10 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Austria20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AbusalahKKPW19, author = {Hamza Abusalah and Chethan Kamath and Karen Klein and Krzysztof Pietrzak and Michael Walter}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Reversible Proofs of Sequential Work}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11477}, pages = {277--291}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17656-3\_10}, doi = {10.1007/978-3-030-17656-3\_10}, timestamp = {Thu, 29 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/AbusalahKKPW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/Pietrzak19, author = {Krzysztof Pietrzak}, editor = {Avrim Blum}, title = {Proofs of Catalytic Space}, booktitle = {10th Innovations in Theoretical Computer Science Conference, {ITCS} 2019, January 10-12, 2019, San Diego, California, {USA}}, series = {LIPIcs}, volume = {124}, pages = {59:1--59:25}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2019}, url = {https://doi.org/10.4230/LIPIcs.ITCS.2019.59}, doi = {10.4230/LIPICS.ITCS.2019.59}, timestamp = {Tue, 11 Feb 2020 15:52:14 +0100}, biburl = {https://dblp.org/rec/conf/innovations/Pietrzak19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/Pietrzak19a, author = {Krzysztof Pietrzak}, editor = {Avrim Blum}, title = {Simple Verifiable Delay Functions}, booktitle = {10th Innovations in Theoretical Computer Science Conference, {ITCS} 2019, January 10-12, 2019, San Diego, California, {USA}}, series = {LIPIcs}, volume = {124}, pages = {60:1--60:15}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2019}, url = {https://doi.org/10.4230/LIPIcs.ITCS.2019.60}, doi = {10.4230/LIPICS.ITCS.2019.60}, timestamp = {Thu, 02 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/innovations/Pietrzak19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FuchsbauerKKP19, author = {Georg Fuchsbauer and Chethan Kamath and Karen Klein and Krzysztof Pietrzak}, editor = {Dongdai Lin and Kazue Sako}, title = {Adaptively Secure Proxy Re-encryption}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11443}, pages = {317--346}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17259-6\_11}, doi = {10.1007/978-3-030-17259-6\_11}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FuchsbauerKKP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/ChoudhuriHKPRR19, author = {Arka Rai Choudhuri and Pavel Hub{\'{a}}cek and Chethan Kamath and Krzysztof Pietrzak and Alon Rosen and Guy N. Rothblum}, editor = {Moses Charikar and Edith Cohen}, title = {Finding a Nash equilibrium is no easier than breaking Fiat-Shamir}, booktitle = {Proceedings of the 51st Annual {ACM} {SIGACT} Symposium on Theory of Computing, {STOC} 2019, Phoenix, AZ, USA, June 23-26, 2019}, pages = {1103--1114}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3313276.3316400}, doi = {10.1145/3313276.3316400}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stoc/ChoudhuriHKPRR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ChoudhuriHKPRR19, author = {Arka Rai Choudhuri and Pavel Hub{\'{a}}cek and Chethan Kamath and Krzysztof Pietrzak and Alon Rosen and Guy N. Rothblum}, title = {Finding a Nash Equilibrium Is No Easier Than Breaking Fiat-Shamir}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR19-074}}, year = {2019}, url = {https://eccc.weizmann.ac.il/report/2019/074}, eprinttype = {ECCC}, eprint = {TR19-074}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ChoudhuriHKPRR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbusalahKKPW19, author = {Hamza Abusalah and Chethan Kamath and Karen Klein and Krzysztof Pietrzak and Michael Walter}, title = {Reversible Proofs of Sequential Work}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {252}, year = {2019}, url = {https://eprint.iacr.org/2019/252}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AbusalahKKPW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoudhuriHKPRR19, author = {Arka Rai Choudhuri and Pavel Hub{\'{a}}cek and Chethan Kamath and Krzysztof Pietrzak and Alon Rosen and Guy N. Rothblum}, title = {Finding a Nash Equilibrium Is No Easier Than Breaking Fiat-Shamir}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {549}, year = {2019}, url = {https://eprint.iacr.org/2019/549}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoudhuriHKPRR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoudhuriHKPRR19a, author = {Arka Rai Choudhuri and Pavel Hub{\'{a}}cek and Chethan Kamath and Krzysztof Pietrzak and Alon Rosen and Guy N. Rothblum}, title = {PPAD-Hardness via Iterated Squaring Modulo a Composite}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {667}, year = {2019}, url = {https://eprint.iacr.org/2019/667}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoudhuriHKPRR19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlwenCCKKPPW19, author = {Jo{\"{e}}l Alwen and Margarita Capretto and Miguel Cueto and Chethan Kamath and Karen Klein and Guillermo Pascual{-}Perez and Krzysztof Pietrzak and Michael Walter}, title = {Keep the Dirt: Tainted TreeKEM, an Efficient and Provably Secure Continuous Group Key Agreement Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1489}, year = {2019}, url = {https://eprint.iacr.org/2019/1489}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AlwenCCKKPPW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/DziembowskiPW18, author = {Stefan Dziembowski and Krzysztof Pietrzak and Daniel Wichs}, title = {Non-Malleable Codes}, journal = {J. {ACM}}, volume = {65}, number = {4}, pages = {20:1--20:32}, year = {2018}, url = {https://doi.org/10.1145/3178432}, doi = {10.1145/3178432}, timestamp = {Fri, 25 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jacm/DziembowskiPW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AlwenGKKOPRRR18, author = {Jo{\"{e}}l Alwen and Peter Gazi and Chethan Kamath and Karen Klein and Georg Osang and Krzysztof Pietrzak and Leonid Reyzin and Michal Rol{\'{\i}}nek and Michal Ryb{\'{a}}r}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {On the Memory-Hardness of Data-Independent Password-Hashing Functions}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {51--65}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196534}, doi = {10.1145/3196494.3196534}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AlwenGKKOPRRR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AlwenBP18, author = {Jo{\"{e}}l Alwen and Jeremiah Blocki and Krzysztof Pietrzak}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Sustained Space Complexity}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10821}, pages = {99--130}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78375-8\_4}, doi = {10.1007/978-3-319-78375-8\_4}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/AlwenBP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CohenP18, author = {Bram Cohen and Krzysztof Pietrzak}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Simple Proofs of Sequential Work}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10821}, pages = {451--467}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78375-8\_15}, doi = {10.1007/978-3-319-78375-8\_15}, timestamp = {Mon, 16 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CohenP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ParkKFGAP18, author = {Sunoo Park and Albert Kwon and Georg Fuchsbauer and Peter Gazi and Jo{\"{e}}l Alwen and Krzysztof Pietrzak}, editor = {Sarah Meiklejohn and Kazue Sako}, title = {SpaceMint: {A} Cryptocurrency Based on Proofs of Space}, booktitle = {Financial Cryptography and Data Security - 22nd International Conference, {FC} 2018, Nieuwpoort, Cura{\c{c}}ao, February 26 - March 2, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10957}, pages = {480--499}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-662-58387-6\_26}, doi = {10.1007/978-3-662-58387-6\_26}, timestamp = {Fri, 30 Aug 2019 11:17:01 +0200}, biburl = {https://dblp.org/rec/conf/fc/ParkKFGAP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlwenBP18, author = {Jo{\"{e}}l Alwen and Jeremiah Blocki and Krzysztof Pietrzak}, title = {Sustained Space Complexity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {147}, year = {2018}, url = {http://eprint.iacr.org/2018/147}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlwenBP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CohenP18, author = {Bram Cohen and Krzysztof Pietrzak}, title = {Simple Proofs of Sequential Work}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {183}, year = {2018}, url = {http://eprint.iacr.org/2018/183}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CohenP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Pietrzak18, author = {Krzysztof Pietrzak}, title = {Proofs of Catalytic Space}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {194}, year = {2018}, url = {http://eprint.iacr.org/2018/194}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Pietrzak18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FuchsbauerKKP18, author = {Georg Fuchsbauer and Chethan Kamath and Karen Klein and Krzysztof Pietrzak}, title = {Adaptively Secure Proxy Re-encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {426}, year = {2018}, url = {https://eprint.iacr.org/2018/426}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FuchsbauerKKP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Pietrzak18a, author = {Krzysztof Pietrzak}, title = {Simple Verifiable Delay Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {627}, year = {2018}, url = {https://eprint.iacr.org/2018/627}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Pietrzak18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/KiltzPVCJ17, author = {Eike Kiltz and Krzysztof Pietrzak and Daniele Venturi and David Cash and Abhishek Jain}, title = {Efficient Authentication from Hard Learning Problems}, journal = {J. Cryptol.}, volume = {30}, number = {4}, pages = {1238--1275}, year = {2017}, url = {https://doi.org/10.1007/s00145-016-9247-3}, doi = {10.1007/S00145-016-9247-3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/KiltzPVCJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AbusalahACKPR17, author = {Hamza Abusalah and Jo{\"{e}}l Alwen and Bram Cohen and Danylo Khilko and Krzysztof Pietrzak and Leonid Reyzin}, editor = {Tsuyoshi Takagi and Thomas Peyrin}, title = {Beyond Hellman's Time-Memory Trade-Offs with Applications to Proofs of Space}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10625}, pages = {357--379}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70697-9\_13}, doi = {10.1007/978-3-319-70697-9\_13}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/AbusalahACKPR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/JafargholiKKKPW17, author = {Zahra Jafargholi and Chethan Kamath and Karen Klein and Ilan Komargodski and Krzysztof Pietrzak and Daniel Wichs}, editor = {Jonathan Katz and Hovav Shacham}, title = {Be Adaptive, Avoid Overcommitting}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10401}, pages = {133--163}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63688-7\_5}, doi = {10.1007/978-3-319-63688-7\_5}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/JafargholiKKKPW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AlwenBP17, author = {Jo{\"{e}}l Alwen and Jeremiah Blocki and Krzysztof Pietrzak}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Depth-Robust Graphs and Their Cumulative Memory Complexity}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10212}, pages = {3--32}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56617-7\_1}, doi = {10.1007/978-3-319-56617-7\_1}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/AlwenBP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AlwenCPRT17, author = {Jo{\"{e}}l Alwen and Binyi Chen and Krzysztof Pietrzak and Leonid Reyzin and Stefano Tessaro}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Scrypt Is Maximally Memory-Hard}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10212}, pages = {33--62}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56617-7\_2}, doi = {10.1007/978-3-319-56617-7\_2}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AlwenCPRT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/PietrzakS17, author = {Krzysztof Pietrzak and Maciej Skorski}, editor = {Ioannis Chatzigiannakis and Piotr Indyk and Fabian Kuhn and Anca Muscholl}, title = {Non-Uniform Attacks Against Pseudoentropy}, booktitle = {44th International Colloquium on Automata, Languages, and Programming, {ICALP} 2017, July 10-14, 2017, Warsaw, Poland}, series = {LIPIcs}, volume = {80}, pages = {39:1--39:13}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2017}, url = {https://doi.org/10.4230/LIPIcs.ICALP.2017.39}, doi = {10.4230/LIPICS.ICALP.2017.39}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/PietrzakS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BrodyDFP17, author = {Joshua Brody and Stefan Dziembowski and Sebastian Faust and Krzysztof Pietrzak}, editor = {Yael Kalai and Leonid Reyzin}, title = {Position-Based Cryptography and Multiparty Communication Complexity}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10677}, pages = {56--81}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70500-2\_3}, doi = {10.1007/978-3-319-70500-2\_3}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BrodyDFP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/PietrzakS17, author = {Krzysztof Pietrzak and Maciej Skorski}, title = {Non-Uniform Attacks Against Pseudoentropy}, journal = {CoRR}, volume = {abs/1704.08678}, year = {2017}, url = {http://arxiv.org/abs/1704.08678}, eprinttype = {arXiv}, eprint = {1704.08678}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/PietrzakS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AlwenBP17, author = {Jo{\"{e}}l Alwen and Jeremiah Blocki and Krzysztof Pietrzak}, title = {Sustained Space Complexity}, journal = {CoRR}, volume = {abs/1705.05313}, year = {2017}, url = {http://arxiv.org/abs/1705.05313}, eprinttype = {arXiv}, eprint = {1705.05313}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AlwenBP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaziPR17, author = {Peter Gazi and Krzysztof Pietrzak and Michal Ryb{\'{a}}r}, title = {The Exact Security of {PMAC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {69}, year = {2017}, url = {http://eprint.iacr.org/2017/069}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaziPR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JafargholiKKKPW17, author = {Zahra Jafargholi and Chethan Kamath and Karen Klein and Ilan Komargodski and Krzysztof Pietrzak and Daniel Wichs}, title = {Be Adaptive, Avoid Overcommitting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {515}, year = {2017}, url = {http://eprint.iacr.org/2017/515}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JafargholiKKKPW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbusalahACKPR17, author = {Hamza Abusalah and Jo{\"{e}}l Alwen and Bram Cohen and Danylo Khilko and Krzysztof Pietrzak and Leonid Reyzin}, title = {Beyond Hellman's Time-Memory Trade-Offs with Applications to Proofs of Space}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {893}, year = {2017}, url = {http://eprint.iacr.org/2017/893}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbusalahACKPR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cc/KrennPWW16, author = {Stephan Krenn and Krzysztof Pietrzak and Akshay Wadia and Daniel Wichs}, title = {A counterexample to the chain rule for conditional {HILL} entropy}, journal = {Comput. Complex.}, volume = {25}, number = {3}, pages = {567--605}, year = {2016}, url = {https://doi.org/10.1007/s00037-015-0120-9}, doi = {10.1007/S00037-015-0120-9}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cc/KrennPWW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GaziPR16, author = {Peter Gazi and Krzysztof Pietrzak and Michal Ryb{\'{a}}r}, title = {The Exact Security of {PMAC}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {2}, pages = {145--161}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i2.145-161}, doi = {10.13154/TOSC.V2016.I2.145-161}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/GaziPR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/AbusalahFP16, author = {Hamza Abusalah and Georg Fuchsbauer and Krzysztof Pietrzak}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {Offline Witness Encryption}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {285--303}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_16}, doi = {10.1007/978-3-319-39555-5\_16}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/AbusalahFP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/AbusalahFP16, author = {Hamza Abusalah and Georg Fuchsbauer and Krzysztof Pietrzak}, editor = {Kazue Sako}, title = {Constrained PRFs for Unbounded Inputs}, booktitle = {Topics in Cryptology - {CT-RSA} 2016 - The Cryptographers' Track at the {RSA} Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9610}, pages = {413--428}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-29485-8\_24}, doi = {10.1007/978-3-319-29485-8\_24}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/AbusalahFP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AlwenCKKPT16, author = {Jo{\"{e}}l Alwen and Binyi Chen and Chethan Kamath and Vladimir Kolmogorov and Krzysztof Pietrzak and Stefano Tessaro}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {358--387}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_13}, doi = {10.1007/978-3-662-49896-5\_13}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AlwenCKKPT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/PietrzakS16, author = {Krzysztof Pietrzak and Maciej Sk{\'{o}}rski}, editor = {Martin Hirt and Adam D. Smith}, title = {Pseudoentropy: Lower-Bounds for Chain Rules and Transformations}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9985}, pages = {183--203}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53641-4\_8}, doi = {10.1007/978-3-662-53641-4\_8}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/PietrzakS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/FuchsbauerHKP16, author = {Georg Fuchsbauer and Felix Heuer and Eike Kiltz and Krzysztof Pietrzak}, editor = {Eyal Kushilevitz and Tal Malkin}, title = {Standard Security Does Imply Security Against Selective Opening for Markov Distributions}, booktitle = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9562}, pages = {282--305}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49096-9\_12}, doi = {10.1007/978-3-662-49096-9\_12}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/FuchsbauerHKP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlwenCKKPT16, author = {Jo{\"{e}}l Alwen and Binyi Chen and Chethan Kamath and Vladimir Kolmogorov and Krzysztof Pietrzak and Stefano Tessaro}, title = {On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {100}, year = {2016}, url = {http://eprint.iacr.org/2016/100}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlwenCKKPT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PietrzakS16, author = {Krzysztof Pietrzak and Maciej Skorski}, title = {Pseudoentropy: Lower-bounds for Chain rules and Transformations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {159}, year = {2016}, url = {http://eprint.iacr.org/2016/159}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PietrzakS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FuchsbauerJP16, author = {Georg Fuchsbauer and Zahra Jafargholi and Krzysztof Pietrzak}, title = {A Quasipolynomial Reduction for Generalized Selective Decryption on Trees}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {389}, year = {2016}, url = {http://eprint.iacr.org/2016/389}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FuchsbauerJP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrodyDFP16, author = {Joshua Brody and Stefan Dziembowski and Sebastian Faust and Krzysztof Pietrzak}, title = {Position-Based Cryptography and Multiparty Communication Complexity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {536}, year = {2016}, url = {http://eprint.iacr.org/2016/536}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrodyDFP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FischlinLP16, author = {Marc Fischlin and Anja Lehmann and Krzysztof Pietrzak}, title = {Robust Multi-Property Combiners for Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {723}, year = {2016}, url = {http://eprint.iacr.org/2016/723}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FischlinLP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlwenGKKOPRRR16, author = {Jo{\"{e}}l Alwen and Peter Gazi and Chethan Kamath and Karen Klein and Georg Osang and Krzysztof Pietrzak and Leonid Reyzin and Michal Rol{\'{\i}}nek and Michal Ryb{\'{a}}r}, title = {On the Memory-Hardness of Data-Independent Password-Hashing Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {783}, year = {2016}, url = {http://eprint.iacr.org/2016/783}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlwenGKKOPRRR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlwenBP16, author = {Jo{\"{e}}l Alwen and Jeremiah Blocki and Krzysztof Pietrzak}, title = {Depth-Robust Graphs and Their Cumulative Memory Complexity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {875}, year = {2016}, url = {http://eprint.iacr.org/2016/875}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlwenBP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlwenCPRT16, author = {Jo{\"{e}}l Alwen and Binyi Chen and Krzysztof Pietrzak and Leonid Reyzin and Stefano Tessaro}, title = {Scrypt is Maximally Memory-Hard}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {989}, year = {2016}, url = {http://eprint.iacr.org/2016/989}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlwenCPRT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GaziPT15, author = {Peter Gazi and Krzysztof Pietrzak and Stefano Tessaro}, editor = {Tetsu Iwata and Jung Hee Cheon}, title = {Generic Security of {NMAC} and {HMAC} with Input Whitening}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9453}, pages = {85--109}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48800-3\_4}, doi = {10.1007/978-3-662-48800-3\_4}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/GaziPT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/OkamotoPWW15, author = {Tatsuaki Okamoto and Krzysztof Pietrzak and Brent Waters and Daniel Wichs}, editor = {Tetsu Iwata and Jung Hee Cheon}, title = {New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9452}, pages = {121--145}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48797-6\_6}, doi = {10.1007/978-3-662-48797-6\_6}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/OkamotoPWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GaziPT15, author = {Peter Gazi and Krzysztof Pietrzak and Stefano Tessaro}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {The Exact {PRF} Security of Truncation: Tight Bounds for Keyed Sponges and Truncated {CBC}}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {368--387}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_18}, doi = {10.1007/978-3-662-47989-6\_18}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GaziPT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DziembowskiFKP15, author = {Stefan Dziembowski and Sebastian Faust and Vladimir Kolmogorov and Krzysztof Pietrzak}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Proofs of Space}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {585--605}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_29}, doi = {10.1007/978-3-662-48000-7\_29}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DziembowskiFKP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FuchsbauerJP15, author = {Georg Fuchsbauer and Zahra Jafargholi and Krzysztof Pietrzak}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {A Quasipolynomial Reduction for Generalized Selective Decryption on Trees}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {601--620}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_29}, doi = {10.1007/978-3-662-47989-6\_29}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FuchsbauerJP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BenhamoudaKLP15, author = {Fabrice Benhamouda and Stephan Krenn and Vadim Lyubashevsky and Krzysztof Pietrzak}, editor = {G{\"{u}}nther Pernul and Peter Y. A. Ryan and Edgar R. Weippl}, title = {Efficient Zero-Knowledge Proofs for Commitments from Learning with Errors over Rings}, booktitle = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9326}, pages = {305--325}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24174-6\_16}, doi = {10.1007/978-3-319-24174-6\_16}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/BenhamoudaKLP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/SkorskiGP15, author = {Maciej Skorski and Alexander Golovnev and Krzysztof Pietrzak}, editor = {Magn{\'{u}}s M. Halld{\'{o}}rsson and Kazuo Iwama and Naoki Kobayashi and Bettina Speckmann}, title = {Condensed Unpredictability}, booktitle = {Automata, Languages, and Programming - 42nd International Colloquium, {ICALP} 2015, Kyoto, Japan, July 6-10, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9134}, pages = {1046--1057}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47672-7\_85}, doi = {10.1007/978-3-662-47672-7\_85}, timestamp = {Fri, 27 Mar 2020 09:02:59 +0100}, biburl = {https://dblp.org/rec/conf/icalp/SkorskiGP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/PietrzakS15, author = {Krzysztof Pietrzak and Maciej Skorski}, editor = {Kristin E. Lauter and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, title = {The Chain Rule for {HILL} Pseudoentropy, Revisited}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2015 - 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9230}, pages = {81--98}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22174-8\_5}, doi = {10.1007/978-3-319-22174-8\_5}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/latincrypt/PietrzakS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/0001FPPS15, author = {Abhishek Banerjee and Georg Fuchsbauer and Chris Peikert and Krzysztof Pietrzak and Sophie Stevens}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {Key-Homomorphic Constrained Pseudorandom Functions}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9015}, pages = {31--60}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46497-7\_2}, doi = {10.1007/978-3-662-46497-7\_2}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/0001FPPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SkorskiGP15, author = {Maciej Skorski and Alexander Golovnev and Krzysztof Pietrzak}, title = {Condensed Unpredictability}, journal = {CoRR}, volume = {abs/1504.07621}, year = {2015}, url = {http://arxiv.org/abs/1504.07621}, eprinttype = {arXiv}, eprint = {1504.07621}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SkorskiGP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaziPT15, author = {Peter Gazi and Krzysztof Pietrzak and Stefano Tessaro}, title = {Tight Bounds for Keyed Sponges and Truncated {CBC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {53}, year = {2015}, url = {http://eprint.iacr.org/2015/053}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaziPT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001FPPS15, author = {Abhishek Banerjee and Georg Fuchsbauer and Chris Peikert and Krzysztof Pietrzak and Sophie Stevens}, title = {Key-Homomorphic Constrained Pseudorandom Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {180}, year = {2015}, url = {http://eprint.iacr.org/2015/180}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001FPPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SkorskiGP15, author = {Maciej Skorski and Alexander Golovnev and Krzysztof Pietrzak}, title = {Condensed Unpredictability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {384}, year = {2015}, url = {http://eprint.iacr.org/2015/384}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SkorskiGP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiltzMP15, author = {Eike Kiltz and Daniel Masny and Krzysztof Pietrzak}, title = {Simple Chosen-Ciphertext Security from Low-Noise {LPN}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {401}, year = {2015}, url = {http://eprint.iacr.org/2015/401}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiltzMP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ParkPAFG15, author = {Sunoo Park and Krzysztof Pietrzak and Albert Kwon and Jo{\"{e}}l Alwen and Georg Fuchsbauer and Peter Gazi}, title = {Spacemint: {A} Cryptocurrency Based on Proofs of Space}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {528}, year = {2015}, url = {http://eprint.iacr.org/2015/528}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ParkPAFG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PietrzakS15, author = {Krzysztof Pietrzak and Maciej Skorski}, title = {The Chain Rule for {HILL} Pseudoentropy, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {599}, year = {2015}, url = {http://eprint.iacr.org/2015/599}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PietrzakS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbusalahFP15, author = {Hamza Abusalah and Georg Fuchsbauer and Krzysztof Pietrzak}, title = {Offline Witness Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {838}, year = {2015}, url = {http://eprint.iacr.org/2015/838}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbusalahFP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeuerKP15, author = {Felix Heuer and Eike Kiltz and Krzysztof Pietrzak}, title = {Standard Security Does Imply Security Against Selective Opening for Markov Distributions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {853}, year = {2015}, url = {http://eprint.iacr.org/2015/853}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeuerKP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OkamotoPWW15, author = {Tatsuaki Okamoto and Krzysztof Pietrzak and Brent Waters and Daniel Wichs}, title = {New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {869}, year = {2015}, url = {http://eprint.iacr.org/2015/869}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OkamotoPWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaziPT15a, author = {Peter Gazi and Krzysztof Pietrzak and Stefano Tessaro}, title = {Generic Security of {NMAC} and {HMAC} with Input Whitening}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {881}, year = {2015}, url = {http://eprint.iacr.org/2015/881}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaziPT15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/FischlinLP14, author = {Marc Fischlin and Anja Lehmann and Krzysztof Pietrzak}, title = {Robust Multi-Property Combiners for Hash Functions}, journal = {J. Cryptol.}, volume = {27}, number = {3}, pages = {397--428}, year = {2014}, url = {https://doi.org/10.1007/s00145-013-9148-7}, doi = {10.1007/S00145-013-9148-7}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/FischlinLP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/FuchsbauerKPR14, author = {Georg Fuchsbauer and Momchil Konstantinov and Krzysztof Pietrzak and Vanishree Rao}, editor = {Palash Sarkar and Tetsu Iwata}, title = {Adaptive Security of Constrained PRFs}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8874}, pages = {82--101}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45608-8\_5}, doi = {10.1007/978-3-662-45608-8\_5}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/FuchsbauerKPR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GaziPR14, author = {Peter Gazi and Krzysztof Pietrzak and Michal Ryb{\'{a}}r}, editor = {Juan A. Garay and Rosario Gennaro}, title = {The Exact PRF-Security of {NMAC} and {HMAC}}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {113--130}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_7}, doi = {10.1007/978-3-662-44371-2\_7}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GaziPR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DodisPW14, author = {Yevgeniy Dodis and Krzysztof Pietrzak and Daniel Wichs}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Key Derivation without Entropy Waste}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {93--110}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_6}, doi = {10.1007/978-3-642-55220-5\_6}, timestamp = {Thu, 14 Oct 2021 09:58:16 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DodisPW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KiltzMP14, author = {Eike Kiltz and Daniel Masny and Krzysztof Pietrzak}, editor = {Hugo Krawczyk}, title = {Simple Chosen-Ciphertext Security from Low-Noise {LPN}}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {1--18}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_1}, doi = {10.1007/978-3-642-54631-0\_1}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KiltzMP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/JetchevP14, author = {Dimitar Jetchev and Krzysztof Pietrzak}, editor = {Yehuda Lindell}, title = {How to Fake Auxiliary Input}, booktitle = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC} 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8349}, pages = {566--590}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54242-8\_24}, doi = {10.1007/978-3-642-54242-8\_24}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/JetchevP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FuchsbauerKPR14, author = {Georg Fuchsbauer and Momchil Konstantinov and Krzysztof Pietrzak and Vanishree Rao}, title = {Adaptive Security of Constrained PRFs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {416}, year = {2014}, url = {http://eprint.iacr.org/2014/416}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FuchsbauerKPR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaziPR14, author = {Peter Gazi and Krzysztof Pietrzak and Michal Ryb{\'{a}}r}, title = {The Exact PRF-Security of {NMAC} and {HMAC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {578}, year = {2014}, url = {http://eprint.iacr.org/2014/578}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaziPR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KrennPWW14a, author = {Stephan Krenn and Krzysztof Pietrzak and Akshay Wadia and Daniel Wichs}, title = {A Counterexample to the Chain Rule for Conditional {HILL} Entropy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {678}, year = {2014}, url = {http://eprint.iacr.org/2014/678}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KrennPWW14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbusalahFP14, author = {Hamza Abusalah and Georg Fuchsbauer and Krzysztof Pietrzak}, title = {Constrained PRFs for Unbounded Inputs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {840}, year = {2014}, url = {http://eprint.iacr.org/2014/840}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbusalahFP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BenhamoudaKLP14, author = {Fabrice Benhamouda and Stephan Krenn and Vadim Lyubashevsky and Krzysztof Pietrzak}, title = {Efficient Zero-Knowledge Proofs for Commitments from Learning With Errors over Rings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {889}, year = {2014}, url = {http://eprint.iacr.org/2014/889}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BenhamoudaKLP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AlwenKPW13, author = {Jo{\"{e}}l Alwen and Stephan Krenn and Krzysztof Pietrzak and Daniel Wichs}, editor = {Ran Canetti and Juan A. Garay}, title = {Learning with Rounding, Revisited - New Reduction, Properties and Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {57--74}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_4}, doi = {10.1007/978-3-642-40041-4\_4}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AlwenKPW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KiltzPS13, author = {Eike Kiltz and Krzysztof Pietrzak and Mario Szegedy}, editor = {Ran Canetti and Juan A. Garay}, title = {Digital Signatures with Minimal Overhead from Indifferentiable Random Invertible Functions}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {571--588}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_31}, doi = {10.1007/978-3-642-40041-4\_31}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KiltzPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/KrennPW13, author = {Stephan Krenn and Krzysztof Pietrzak and Akshay Wadia}, editor = {Amit Sahai}, title = {A Counterexample to the Chain Rule for Conditional {HILL} Entropy - And What Deniable Encryption Has to Do with It}, booktitle = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC} 2013, Tokyo, Japan, March 3-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7785}, pages = {23--39}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36594-2\_2}, doi = {10.1007/978-3-642-36594-2\_2}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/KrennPW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlwenKPW13, author = {Jo{\"{e}}l Alwen and Stephan Krenn and Krzysztof Pietrzak and Daniel Wichs}, title = {Learning with Rounding, Revisited: New Reduction, Properties and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {98}, year = {2013}, url = {http://eprint.iacr.org/2013/098}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlwenKPW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Pietrzak13, author = {Krzysztof Pietrzak}, title = {A Closer Look at {HMAC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {212}, year = {2013}, url = {http://eprint.iacr.org/2013/212}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Pietrzak13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisPW13, author = {Yevgeniy Dodis and Krzysztof Pietrzak and Daniel Wichs}, title = {Key Derivation Without Entropy Waste}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {708}, year = {2013}, url = {http://eprint.iacr.org/2013/708}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisPW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DziembowskiFKP13, author = {Stefan Dziembowski and Sebastian Faust and Vladimir Kolmogorov and Krzysztof Pietrzak}, title = {Proofs of Space}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {796}, year = {2013}, url = {http://eprint.iacr.org/2013/796}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DziembowskiFKP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JetchevP13, author = {Dimitar Jetchev and Krzysztof Pietrzak}, title = {How to Fake Auxiliary Input}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {869}, year = {2013}, url = {http://eprint.iacr.org/2013/869}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JetchevP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/PietrzakW12, author = {Krzysztof Pietrzak and Douglas Wikstr{\"{o}}m}, title = {Parallel Repetition of Computationally Sound Protocols Revisited}, journal = {J. Cryptol.}, volume = {25}, number = {1}, pages = {116--135}, year = {2012}, url = {https://doi.org/10.1007/s00145-010-9090-x}, doi = {10.1007/S00145-010-9090-X}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/PietrzakW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/0002KPT12, author = {Abhishek Jain and Stephan Krenn and Krzysztof Pietrzak and Aris Tentes}, editor = {Xiaoyun Wang and Kazue Sako}, title = {Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7658}, pages = {663--680}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34961-4\_40}, doi = {10.1007/978-3-642-34961-4\_40}, timestamp = {Mon, 25 Nov 2019 15:32:14 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/0002KPT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/FaustPS12, author = {Sebastian Faust and Krzysztof Pietrzak and Joachim Schipper}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {Practical Leakage-Resilient Symmetric Cryptography}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {213--232}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_13}, doi = {10.1007/978-3-642-33027-8\_13}, timestamp = {Mon, 15 Jun 2020 17:09:16 +0200}, biburl = {https://dblp.org/rec/conf/ches/FaustPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DodisKPW12, author = {Yevgeniy Dodis and Eike Kiltz and Krzysztof Pietrzak and Daniel Wichs}, editor = {David Pointcheval and Thomas Johansson}, title = {Message Authentication, Revisited}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {355--374}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_22}, doi = {10.1007/978-3-642-29011-4\_22}, timestamp = {Sun, 12 Nov 2023 02:15:08 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/DodisKPW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/HeyseKLPP12, author = {Stefan Heyse and Eike Kiltz and Vadim Lyubashevsky and Christof Paar and Krzysztof Pietrzak}, editor = {Anne Canteaut}, title = {Lapin: An Efficient Authentication Protocol Based on Ring-LPN}, booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7549}, pages = {346--365}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34047-5\_20}, doi = {10.1007/978-3-642-34047-5\_20}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/HeyseKLPP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sofsem/Pietrzak12, author = {Krzysztof Pietrzak}, editor = {M{\'{a}}ria Bielikov{\'{a}} and Gerhard Friedrich and Georg Gottlob and Stefan Katzenbeisser and Gy{\"{o}}rgy Tur{\'{a}}n}, title = {Cryptography from Learning Parity with Noise}, booktitle = {{SOFSEM} 2012: Theory and Practice of Computer Science - 38th Conference on Current Trends in Theory and Practice of Computer Science, {\v{S}}pindler{\r{u}}v Ml{\'{y}}n, Czech Republic, January 21-27, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7147}, pages = {99--114}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-27660-6\_9}, doi = {10.1007/978-3-642-27660-6\_9}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/sofsem/Pietrzak12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/JainPT12, author = {Abhishek Jain and Krzysztof Pietrzak and Aris Tentes}, editor = {Ronald Cramer}, title = {Hardness Preserving Constructions of Pseudorandom Functions}, booktitle = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC} 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7194}, pages = {369--382}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28914-9\_21}, doi = {10.1007/978-3-642-28914-9\_21}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/JainPT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/PietrzakRS12, author = {Krzysztof Pietrzak and Alon Rosen and Gil Segev}, editor = {Ronald Cramer}, title = {Lossy Functions Do Not Amplify Well}, booktitle = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC} 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7194}, pages = {458--475}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28914-9\_26}, doi = {10.1007/978-3-642-28914-9\_26}, timestamp = {Sun, 16 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/PietrzakRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Pietrzak12, author = {Krzysztof Pietrzak}, editor = {Ronald Cramer}, title = {Subspace {LWE}}, booktitle = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC} 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7194}, pages = {548--563}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28914-9\_31}, doi = {10.1007/978-3-642-28914-9\_31}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Pietrzak12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisKPW12, author = {Yevgeniy Dodis and Eike Kiltz and Krzysztof Pietrzak and Daniel Wichs}, title = {Message Authentication, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {59}, year = {2012}, url = {http://eprint.iacr.org/2012/059}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisKPW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0002KPT12, author = {Abhishek Jain and Stephan Krenn and Krzysztof Pietrzak and Aris Tentes}, title = {Commitments and Efficient Zero-Knowledge Proofs from Hard Learning Problems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {513}, year = {2012}, url = {http://eprint.iacr.org/2012/513}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0002KPT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiltzPS12, author = {Eike Kiltz and Krzysztof Pietrzak and Mario Szegedy}, title = {Digital Signatures with Minimal Overhead}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {658}, year = {2012}, url = {http://eprint.iacr.org/2012/658}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiltzPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BarakDKPPSY11, author = {Boaz Barak and Yevgeniy Dodis and Hugo Krawczyk and Olivier Pereira and Krzysztof Pietrzak and Fran{\c{c}}ois{-}Xavier Standaert and Yu Yu}, editor = {Phillip Rogaway}, title = {Leftover Hash Lemma, Revisited}, booktitle = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6841}, pages = {1--20}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22792-9\_1}, doi = {10.1007/978-3-642-22792-9\_1}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BarakDKPPSY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KiltzPCJV11, author = {Eike Kiltz and Krzysztof Pietrzak and David Cash and Abhishek Jain and Daniele Venturi}, editor = {Kenneth G. Paterson}, title = {Efficient Authentication from Hard Learning Problems}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {7--26}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_3}, doi = {10.1007/978-3-642-20465-4\_3}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KiltzPCJV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/FaustPV11, author = {Sebastian Faust and Krzysztof Pietrzak and Daniele Venturi}, editor = {Luca Aceto and Monika Henzinger and Jir{\'{\i}} Sgall}, title = {Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience}, booktitle = {Automata, Languages and Programming - 38th International Colloquium, {ICALP} 2011, Zurich, Switzerland, July 4-8, 2011, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {6755}, pages = {391--402}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22006-7\_33}, doi = {10.1007/978-3-642-22006-7\_33}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/FaustPV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/JainP11, author = {Abhishek Jain and Krzysztof Pietrzak}, editor = {Yuval Ishai}, title = {Parallel Repetition for Leakage Resilience Amplification Revisited}, booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC} 2011, Providence, RI, USA, March 28-30, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6597}, pages = {58--69}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19571-6\_5}, doi = {10.1007/978-3-642-19571-6\_5}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/JainP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarakDKPPSY11, author = {Boaz Barak and Yevgeniy Dodis and Hugo Krawczyk and Olivier Pereira and Krzysztof Pietrzak and Fran{\c{c}}ois{-}Xavier Standaert and Yu Yu}, title = {Leftover Hash Lemma, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {88}, year = {2011}, url = {http://eprint.iacr.org/2011/088}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarakDKPPSY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaustPV11, author = {Sebastian Faust and Krzysztof Pietrzak and Daniele Venturi}, title = {Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {314}, year = {2011}, url = {http://eprint.iacr.org/2011/314}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FaustPV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KiltzP10, author = {Eike Kiltz and Krzysztof Pietrzak}, editor = {Masayuki Abe}, title = {Leakage Resilient ElGamal Encryption}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6477}, pages = {595--612}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17373-8\_34}, doi = {10.1007/978-3-642-17373-8\_34}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KiltzP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DodisP10, author = {Yevgeniy Dodis and Krzysztof Pietrzak}, editor = {Tal Rabin}, title = {Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {21--40}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_2}, doi = {10.1007/978-3-642-14623-7\_2}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DodisP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/DziembowskiPW10, author = {Stefan Dziembowski and Krzysztof Pietrzak and Daniel Wichs}, editor = {Andrew Chi{-}Chih Yao}, title = {Non-Malleable Codes}, booktitle = {Innovations in Computer Science - {ICS} 2010, Tsinghua University, Beijing, China, January 5-7, 2010. Proceedings}, pages = {434--452}, publisher = {Tsinghua University Press}, year = {2010}, url = {http://conference.iiis.tsinghua.edu.cn/ICS2010/content/papers/34.html}, timestamp = {Wed, 04 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/innovations/DziembowskiPW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HastadPWP10, author = {Johan H{\aa}stad and Rafael Pass and Douglas Wikstr{\"{o}}m and Krzysztof Pietrzak}, editor = {Daniele Micciancio}, title = {An Efficient Parallel Repetition Theorem}, booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC} 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5978}, pages = {1--18}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11799-2\_1}, doi = {10.1007/978-3-642-11799-2\_1}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/HastadPWP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/FaustKPR10, author = {Sebastian Faust and Eike Kiltz and Krzysztof Pietrzak and Guy N. Rothblum}, editor = {Daniele Micciancio}, title = {Leakage-Resilient Signatures}, booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC} 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5978}, pages = {343--360}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11799-2\_21}, doi = {10.1007/978-3-642-11799-2\_21}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/FaustKPR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KiltzP09, author = {Eike Kiltz and Krzysztof Pietrzak}, editor = {Antoine Joux}, title = {On the Security of Padding-Based Encryption Schemes - or - Why We Cannot Prove {OAEP} Secure in the Standard Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5479}, pages = {389--406}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01001-9\_23}, doi = {10.1007/978-3-642-01001-9\_23}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KiltzP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Pietrzak09, author = {Krzysztof Pietrzak}, editor = {Antoine Joux}, title = {A Leakage-Resilient Mode of Operation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5479}, pages = {462--482}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01001-9\_27}, doi = {10.1007/978-3-642-01001-9\_27}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Pietrzak09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KiltzPSY09, author = {Eike Kiltz and Krzysztof Pietrzak and Martijn Stam and Moti Yung}, editor = {Antoine Joux}, title = {A New Randomness Extraction Paradigm for Hybrid Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5479}, pages = {590--609}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01001-9\_34}, doi = {10.1007/978-3-642-01001-9\_34}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KiltzPSY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaustKPR09, author = {Sebastian Faust and Eike Kiltz and Krzysztof Pietrzak and Guy N. Rothblum}, title = {Leakage-Resilient Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {282}, year = {2009}, url = {http://eprint.iacr.org/2009/282}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FaustKPR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DziembowskiPW09, author = {Stefan Dziembowski and Krzysztof Pietrzak and Daniel Wichs}, title = {Non-Malleable Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {608}, year = {2009}, url = {http://eprint.iacr.org/2009/608}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DziembowskiPW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Pietrzak08, author = {Krzysztof Pietrzak}, editor = {David A. Wagner}, title = {Compression from Collisions, or Why {CRHF} Combiners Have a Long Output}, booktitle = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5157}, pages = {413--432}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85174-5\_23}, doi = {10.1007/978-3-540-85174-5\_23}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Pietrzak08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DodisPP08, author = {Yevgeniy Dodis and Krzysztof Pietrzak and Prashant Puniya}, editor = {Nigel P. Smart}, title = {A New Mode of Operation for Block Ciphers and Length-Preserving MACs}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4965}, pages = {198--219}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78967-3\_12}, doi = {10.1007/978-3-540-78967-3\_12}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DodisPP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/DziembowskiP08, author = {Stefan Dziembowski and Krzysztof Pietrzak}, title = {Leakage-Resilient Cryptography}, booktitle = {49th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS} 2008, October 25-28, 2008, Philadelphia, PA, {USA}}, pages = {293--302}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/FOCS.2008.56}, doi = {10.1109/FOCS.2008.56}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/DziembowskiP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/PietrzakS08, author = {Krzysztof Pietrzak and Johan Sj{\"{o}}din}, editor = {Luca Aceto and Ivan Damg{\aa}rd and Leslie Ann Goldberg and Magn{\'{u}}s M. Halld{\'{o}}rsson and Anna Ing{\'{o}}lfsd{\'{o}}ttir and Igor Walukiewicz}, title = {Weak Pseudorandom Functions in Minicrypt}, booktitle = {Automata, Languages and Programming, 35th International Colloquium, {ICALP} 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part {II} - Track {B:} Logic, Semantics, and Theory of Programming {\&} Track {C:} Security and Cryptography Foundations}, series = {Lecture Notes in Computer Science}, volume = {5126}, pages = {423--436}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70583-3\_35}, doi = {10.1007/978-3-540-70583-3\_35}, timestamp = {Fri, 27 Mar 2020 09:02:59 +0100}, biburl = {https://dblp.org/rec/conf/icalp/PietrzakS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/FischlinLP08, author = {Marc Fischlin and Anja Lehmann and Krzysztof Pietrzak}, editor = {Luca Aceto and Ivan Damg{\aa}rd and Leslie Ann Goldberg and Magn{\'{u}}s M. Halld{\'{o}}rsson and Anna Ing{\'{o}}lfsd{\'{o}}ttir and Igor Walukiewicz}, title = {Robust Multi-property Combiners for Hash Functions Revisited}, booktitle = {Automata, Languages and Programming, 35th International Colloquium, {ICALP} 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part {II} - Track {B:} Logic, Semantics, and Theory of Programming {\&} Track {C:} Security and Cryptography Foundations}, series = {Lecture Notes in Computer Science}, volume = {5126}, pages = {655--666}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70583-3\_53}, doi = {10.1007/978-3-540-70583-3\_53}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/FischlinLP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DziembowskiP08, author = {Stefan Dziembowski and Krzysztof Pietrzak}, title = {Leakage-Resilient Cryptography in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {240}, year = {2008}, url = {http://eprint.iacr.org/2008/240}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DziembowskiP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiltzPSY08, author = {Eike Kiltz and Krzysztof Pietrzak and Martijn Stam and Moti Yung}, title = {A New Randomness Extraction Paradigm for Hybrid Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {304}, year = {2008}, url = {http://eprint.iacr.org/2008/304}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiltzPSY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MaurerPR07, author = {Ueli M. Maurer and Krzysztof Pietrzak and Renato Renner}, editor = {Alfred Menezes}, title = {Indistinguishability Amplification}, booktitle = {Advances in Cryptology - {CRYPTO} 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4622}, pages = {130--149}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74143-5\_8}, doi = {10.1007/978-3-540-74143-5\_8}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MaurerPR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Pietrzak07, author = {Krzysztof Pietrzak}, editor = {Moni Naor}, title = {Non-trivial Black-Box Combiners for Collision-Resistant Hash-Functions Don't Exist}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4515}, pages = {23--33}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72540-4\_2}, doi = {10.1007/978-3-540-72540-4\_2}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Pietrzak07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/PietrzakS07, author = {Krzysztof Pietrzak and Johan Sj{\"{o}}din}, editor = {Moni Naor}, title = {Range Extension for Weak PRFs; The Good, the Bad, and the Ugly}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4515}, pages = {517--533}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72540-4\_30}, doi = {10.1007/978-3-540-72540-4\_30}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/PietrzakS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/DziembowskiP07, author = {Stefan Dziembowski and Krzysztof Pietrzak}, title = {Intrusion-Resilient Secret Sharing}, booktitle = {48th Annual {IEEE} Symposium on Foundations of Computer Science {(FOCS} 2007), October 20-23, 2007, Providence, RI, USA, Proceedings}, pages = {227--237}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/FOCS.2007.63}, doi = {10.1109/FOCS.2007.63}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/DziembowskiP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DodisP07, author = {Yevgeniy Dodis and Krzysztof Pietrzak}, editor = {Alex Biryukov}, title = {Improving the Security of MACs Via Randomized Message Preprocessing}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {414--433}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_26}, doi = {10.1007/978-3-540-74619-5\_26}, timestamp = {Sun, 25 Oct 2020 23:06:50 +0100}, biburl = {https://dblp.org/rec/conf/fse/DodisP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/PietrzakW07, author = {Krzysztof Pietrzak and Douglas Wikstr{\"{o}}m}, editor = {Salil P. Vadhan}, title = {Parallel Repetition of Computationally Sound Protocols Revisited}, booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC} 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4392}, pages = {86--102}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-70936-7\_5}, doi = {10.1007/978-3-540-70936-7\_5}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/PietrzakW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DziembowskiP07, author = {Stefan Dziembowski and Krzysztof Pietrzak}, title = {Intrusion-Resilient Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {359}, year = {2007}, url = {http://eprint.iacr.org/2007/359}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DziembowskiP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ch/Pietrzak2006, author = {Krzysztof Pietrzak}, title = {Indistinguishability and composition of random systems}, school = {{ETH} Zurich}, year = {2006}, url = {https://d-nb.info/978735072}, isbn = {3-86628-063-7}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ch/Pietrzak2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Pietrzak06, author = {Krzysztof Pietrzak}, editor = {Serge Vaudenay}, title = {Composition Implies Adaptive Security in Minicrypt}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4004}, pages = {328--338}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11761679\_20}, doi = {10.1007/11761679\_20}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Pietrzak06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MaurerOPS06, author = {Ueli M. Maurer and Yvonne Anne Oswald and Krzysztof Pietrzak and Johan Sj{\"{o}}din}, editor = {Serge Vaudenay}, title = {Luby-Rackoff Ciphers from Weak Round Functions?}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4004}, pages = {391--408}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11761679\_24}, doi = {10.1007/11761679\_24}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MaurerOPS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/Pietrzak06, author = {Krzysztof Pietrzak}, editor = {Michele Bugliesi and Bart Preneel and Vladimiro Sassone and Ingo Wegener}, title = {A Tight Bound for {EMAC}}, booktitle = {Automata, Languages and Programming, 33rd International Colloquium, {ICALP} 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {4052}, pages = {168--179}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11787006\_15}, doi = {10.1007/11787006\_15}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/Pietrzak06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DodisPP06, author = {Yevgeniy Dodis and Krzysztof Pietrzak and Bartosz Przydatek}, editor = {Shai Halevi and Tal Rabin}, title = {Separating Sources for Encryption and Secret Sharing}, booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC} 2006, New York, NY, USA, March 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3876}, pages = {601--616}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11681878\_31}, doi = {10.1007/11681878\_31}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DodisPP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaurerOPS06, author = {Ueli Maurer and Yvonne Anne Oswald and Krzysztof Pietrzak and Johan Sj{\"{o}}din}, title = {Luby-Rackoff Ciphers from Weak Round Functions?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {213}, year = {2006}, url = {http://eprint.iacr.org/2006/213}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaurerOPS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Pietrzak06, author = {Krzysztof Pietrzak}, title = {Non-Trivial Black-Box Combiners for Collision-Resistant Hash-Functions don't Exist}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {348}, year = {2006}, url = {http://eprint.iacr.org/2006/348}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Pietrzak06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaurerPR06, author = {Ueli Maurer and Krzysztof Pietrzak and Renato Renner}, title = {Indistinguishability Amplification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {456}, year = {2006}, url = {http://eprint.iacr.org/2006/456}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaurerPR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Pietrzak05, author = {Krzysztof Pietrzak}, editor = {Victor Shoup}, title = {Composition Does Not Imply Adaptive Security}, booktitle = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3621}, pages = {55--65}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11535218\_4}, doi = {10.1007/11535218\_4}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Pietrzak05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DodisOP05, author = {Yevgeniy Dodis and Roberto Oliveira and Krzysztof Pietrzak}, editor = {Victor Shoup}, title = {On the Generic Insecurity of the Full Domain Hash}, booktitle = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3621}, pages = {449--466}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11535218\_27}, doi = {10.1007/11535218\_27}, timestamp = {Thu, 22 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/DodisOP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BellarePR05, author = {Mihir Bellare and Krzysztof Pietrzak and Phillip Rogaway}, editor = {Victor Shoup}, title = {Improved Security Analyses for {CBC} MACs}, booktitle = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3621}, pages = {527--545}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11535218\_32}, doi = {10.1007/11535218\_32}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BellarePR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/MaurerP04, author = {Ueli M. Maurer and Krzysztof Pietrzak}, editor = {Moni Naor}, title = {Composition of Random Systems: When Two Weak Make One Strong}, booktitle = {Theory of Cryptography, First Theory of Cryptography Conference, {TCC} 2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2951}, pages = {410--427}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24638-1\_23}, doi = {10.1007/978-3-540-24638-1\_23}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/MaurerP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/Pietrzak03, author = {Krzysztof Pietrzak}, title = {On the parameterized complexity of the fixed alphabet shortest common supersequence and longest common subsequence problems}, journal = {J. Comput. Syst. Sci.}, volume = {67}, number = {4}, pages = {757--771}, year = {2003}, url = {https://doi.org/10.1016/S0022-0000(03)00078-3}, doi = {10.1016/S0022-0000(03)00078-3}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcss/Pietrzak03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MaurerP03, author = {Ueli M. Maurer and Krzysztof Pietrzak}, editor = {Eli Biham}, title = {The Security of Many-Round Luby-Rackoff Pseudo-Random Permutations}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2656}, pages = {544--561}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-39200-9\_34}, doi = {10.1007/3-540-39200-9\_34}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MaurerP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.