BibTeX records: Krzysztof Pietrzak

download as .bib file

@article{DBLP:journals/iacr/AuerbachGP24,
  author       = {Benedikt Auerbach and
                  Christoph U. G{\"{u}}nther and
                  Krzysztof Pietrzak},
  title        = {Trapdoor Memory-Hard Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {312},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/312},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AuerbachGP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoffmannP24,
  author       = {Charlotte Hoffmann and
                  Krzysztof Pietrzak},
  title        = {Watermarkable and Zero-Knowledge Verifiable Delay Functions from any
                  Proof of Exponentiation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {481},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/481},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HoffmannP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DodisFGHP23,
  author       = {Yevgeniy Dodis and
                  Niels Ferguson and
                  Eli Goldin and
                  Peter Hall and
                  Krzysztof Pietrzak},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Random Oracle Combiners: Breaking the Concatenation Barrier for Collision-Resistance},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14082},
  pages        = {514--546},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38545-2\_17},
  doi          = {10.1007/978-3-031-38545-2\_17},
  timestamp    = {Mon, 14 Aug 2023 16:16:25 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DodisFGHP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/BaigCDGLP23,
  author       = {Mirza Ahad Baig and
                  Suvradip Chakraborty and
                  Stefan Dziembowski and
                  Malgorzata Galazka and
                  Tomasz Lizurej and
                  Krzysztof Pietrzak},
  editor       = {Yael Tauman Kalai},
  title        = {Efficiently Testable Circuits},
  booktitle    = {14th Innovations in Theoretical Computer Science Conference, {ITCS}
                  2023, January 10-13, 2023, MIT, Cambridge, Massachusetts, {USA}},
  series       = {LIPIcs},
  volume       = {251},
  pages        = {10:1--10:23},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2023},
  url          = {https://doi.org/10.4230/LIPIcs.ITCS.2023.10},
  doi          = {10.4230/LIPICS.ITCS.2023.10},
  timestamp    = {Thu, 02 Feb 2023 12:50:42 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/BaigCDGLP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HoffmannHKP23,
  author       = {Charlotte Hoffmann and
                  Pavel Hub{\'{a}}cek and
                  Chethan Kamath and
                  Krzysztof Pietrzak},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {Certifying Giant Nonprimes},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13940},
  pages        = {530--553},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31368-4\_19},
  doi          = {10.1007/978-3-031-31368-4\_19},
  timestamp    = {Fri, 05 May 2023 22:44:30 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HoffmannHKP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BaigCDGLP23,
  author       = {Mirza Ahad Baig and
                  Suvradip Chakraborty and
                  Stefan Dziembowski and
                  Malgorzata Galazka and
                  Tomasz Lizurej and
                  Krzysztof Pietrzak},
  editor       = {Guy N. Rothblum and
                  Hoeteck Wee},
  title        = {Efficiently Testable Circuits Without Conductivity},
  booktitle    = {Theory of Cryptography - 21st International Conference, {TCC} 2023,
                  Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part
                  {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14371},
  pages        = {123--152},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-48621-0\_5},
  doi          = {10.1007/978-3-031-48621-0\_5},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/BaigCDGLP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AuerbachNPP23,
  author       = {Benedikt Auerbach and
                  Miguel Cueto Noval and
                  Guillermo Pascual{-}Perez and
                  Krzysztof Pietrzak},
  editor       = {Guy N. Rothblum and
                  Hoeteck Wee},
  title        = {On the Cost of Post-compromise Security in Concurrent Continuous Group-Key
                  Agreement},
  booktitle    = {Theory of Cryptography - 21st International Conference, {TCC} 2023,
                  Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part
                  {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14371},
  pages        = {271--300},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-48621-0\_10},
  doi          = {10.1007/978-3-031-48621-0\_10},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/AuerbachNPP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoffmannHKP23,
  author       = {Charlotte Hoffmann and
                  Pavel Hub{\'{a}}cek and
                  Chethan Kamath and
                  Krzysztof Pietrzak},
  title        = {Certifying Giant Nonprimes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {238},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/238},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HoffmannHKP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisFGHP23,
  author       = {Yevgeniy Dodis and
                  Niels Ferguson and
                  Eli Goldin and
                  Peter Hall and
                  Krzysztof Pietrzak},
  title        = {Random Oracle Combiners: Breaking the Concatenation Barrier for Collision-Resistance},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1041},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1041},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisFGHP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AuerbachNPP23,
  author       = {Benedikt Auerbach and
                  Miguel Cueto Noval and
                  Guillermo Pascual{-}Perez and
                  Krzysztof Pietrzak},
  title        = {On the Cost of Post-Compromise Security in Concurrent Continuous Group-Key
                  Agreement},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1123},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1123},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AuerbachNPP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaigCDGLP23,
  author       = {Mirza Ahad Baig and
                  Suvradip Chakraborty and
                  Stefan Dziembowski and
                  Malgorzata Galazka and
                  Tomasz Lizurej and
                  Krzysztof Pietrzak},
  title        = {Efficiently Testable Circuits without Conductivity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1795},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1795},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BaigCDGLP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aft/TiwariYASP022,
  author       = {Samarth Tiwari and
                  Michelle Yeo and
                  Zeta Avarikioti and
                  Iosif Salem and
                  Krzysztof Pietrzak and
                  Stefan Schmid},
  editor       = {Maurice Herlihy and
                  Neha Narula},
  title        = {Wiser: Increasing Throughput in Payment Channel Networks with Transaction
                  Aggregation},
  booktitle    = {Proceedings of the 4th {ACM} Conference on Advances in Financial Technologies,
                  {AFT} 2022, Cambridge, MA, USA, September 19-21, 2022},
  pages        = {217--231},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3558535.3559775},
  doi          = {10.1145/3558535.3559775},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aft/TiwariYASP022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HoffmannHKKP22,
  author       = {Charlotte Hoffmann and
                  Pavel Hub{\'{a}}cek and
                  Chethan Kamath and
                  Karen Klein and
                  Krzysztof Pietrzak},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Practical Statistically-Sound Proofs of Exponentiation in Any Group},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13508},
  pages        = {370--399},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15979-4\_13},
  doi          = {10.1007/978-3-031-15979-4\_13},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/HoffmannHKKP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AlwenANKPPW22,
  author       = {Jo{\"{e}}l Alwen and
                  Benedikt Auerbach and
                  Miguel Cueto Noval and
                  Karen Klein and
                  Guillermo Pascual{-}Perez and
                  Krzysztof Pietrzak and
                  Michael Walter},
  editor       = {Orr Dunkelman and
                  Stefan Dziembowski},
  title        = {CoCoA: Concurrent Continuous Group Key Agreement},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13276},
  pages        = {815--844},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-07085-3\_28},
  doi          = {10.1007/978-3-031-07085-3\_28},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AlwenANKPPW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AvarikiotiPSSTY22,
  author       = {Zeta Avarikioti and
                  Krzysztof Pietrzak and
                  Iosif Salem and
                  Stefan Schmid and
                  Samarth Tiwari and
                  Michelle Yeo},
  editor       = {Ittay Eyal and
                  Juan A. Garay},
  title        = {Hide {\&} Seek: Privacy-Preserving Rebalancing on Payment Channel
                  Networks},
  booktitle    = {Financial Cryptography and Data Security - 26th International Conference,
                  {FC} 2022, Grenada, May 2-6, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13411},
  pages        = {358--373},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-18283-9\_17},
  doi          = {10.1007/978-3-031-18283-9\_17},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/AvarikiotiPSSTY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-11597,
  author       = {Samarth Tiwari and
                  Michelle Yeo and
                  Zeta Avarikioti and
                  Iosif Salem and
                  Krzysztof Pietrzak and
                  Stefan Schmid},
  title        = {Wiser: Increasing Throughput in Payment Channel Networks with Transaction
                  Aggregation},
  journal      = {CoRR},
  volume       = {abs/2205.11597},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.11597},
  doi          = {10.48550/ARXIV.2205.11597},
  eprinttype    = {arXiv},
  eprint       = {2205.11597},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-11597.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlwenANKPPW22,
  author       = {Jo{\"{e}}l Alwen and
                  Benedikt Auerbach and
                  Miguel Cueto Noval and
                  Karen Klein and
                  Guillermo Pascual{-}Perez and
                  Krzysztof Pietrzak and
                  Michael Walter},
  title        = {CoCoA: Concurrent Continuous Group Key Agreement},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {251},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/251},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AlwenANKPPW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlwenANKPP22,
  author       = {Jo{\"{e}}l Alwen and
                  Benedikt Auerbach and
                  Miguel Cueto Noval and
                  Karen Klein and
                  Guillermo Pascual{-}Perez and
                  Krzysztof Pietrzak},
  title        = {Coffee: Fast Healing Concurrent Continuous Group Key Agreement for
                  Decentralized Group Messaging},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {559},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/559},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlwenANKPP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoffmannHKKP22,
  author       = {Charlotte Hoffmann and
                  Pavel Hub{\'{a}}cek and
                  Chethan Kamath and
                  Karen Klein and
                  Krzysztof Pietrzak},
  title        = {Practical Statistically-Sound Proofs of Exponentiation in any Group},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1021},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1021},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HoffmannHKKP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaigCDGLP22,
  author       = {Mirza Ahad Baig and
                  Suvradip Chakraborty and
                  Stefan Dziembowski and
                  Malgorzata Galazka and
                  Tomasz Lizurej and
                  Krzysztof Pietrzak},
  title        = {Efficiently Testable Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1598},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1598},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BaigCDGLP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KamathKPW21,
  author       = {Chethan Kamath and
                  Karen Klein and
                  Krzysztof Pietrzak and
                  Daniel Wichs},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Limits on the Adaptive Security of Yao's Garbling},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12826},
  pages        = {486--515},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84245-1\_17},
  doi          = {10.1007/978-3-030-84245-1\_17},
  timestamp    = {Mon, 16 Aug 2021 09:08:14 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KamathKPW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/AuerbachCKPP0Y21,
  author       = {Benedikt Auerbach and
                  Suvradip Chakraborty and
                  Karen Klein and
                  Guillermo Pascual{-}Perez and
                  Krzysztof Pietrzak and
                  Michael Walter and
                  Michelle Yeo},
  editor       = {Kenneth G. Paterson},
  title        = {Inverse-Sybil Attacks in Automated Contact Tracing},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2021 - Cryptographers' Track at the
                  {RSA} Conference 2021, Virtual Event, May 17-20, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12704},
  pages        = {399--421},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75539-3\_17},
  doi          = {10.1007/978-3-030-75539-3\_17},
  timestamp    = {Mon, 28 Aug 2023 21:17:50 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/AuerbachCKPP0Y21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/PietrzakS0Y21,
  author       = {Krzysztof Pietrzak and
                  Iosif Salem and
                  Stefan Schmid and
                  Michelle Yeo},
  editor       = {Zheng Yan and
                  Gareth Tyson and
                  Dimitrios Koutsonikolas},
  title        = {LightPIR: Privacy-Preserving Route Discovery for Payment Channel Networks},
  booktitle    = {{IFIP} Networking Conference, {IFIP} Networking 2021, Espoo and Helsinki,
                  Finland, June 21-24, 2021},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.23919/IFIPNetworking52078.2021.9472205},
  doi          = {10.23919/IFIPNETWORKING52078.2021.9472205},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/networking/PietrzakS0Y21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KleinPWKCCMYAP21,
  author       = {Karen Klein and
                  Guillermo Pascual{-}Perez and
                  Michael Walter and
                  Chethan Kamath and
                  Margarita Capretto and
                  Miguel Cueto and
                  Ilia Markov and
                  Michelle Yeo and
                  Jo{\"{e}}l Alwen and
                  Krzysztof Pietrzak},
  title        = {Keep the Dirt: Tainted TreeKEM, Adaptively and Actively Secure Continuous
                  Group Key Agreement},
  booktitle    = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco,
                  CA, USA, 24-27 May 2021},
  pages        = {268--284},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SP40001.2021.00035},
  doi          = {10.1109/SP40001.2021.00035},
  timestamp    = {Thu, 21 Sep 2023 15:57:26 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/KleinPWKCCMYAP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AlwenABNKPP021,
  author       = {Jo{\"{e}}l Alwen and
                  Benedikt Auerbach and
                  Mirza Ahad Baig and
                  Miguel Cueto Noval and
                  Karen Klein and
                  Guillermo Pascual{-}Perez and
                  Krzysztof Pietrzak and
                  Michael Walter},
  editor       = {Kobbi Nissim and
                  Brent Waters},
  title        = {Grafting Key Trees: Efficient Key Management for Overlapping Groups},
  booktitle    = {Theory of Cryptography - 19th International Conference, {TCC} 2021,
                  Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13044},
  pages        = {222--253},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90456-2\_8},
  doi          = {10.1007/978-3-030-90456-2\_8},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/AlwenABNKPP021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/ChakrabortyDGLP21,
  author       = {Suvradip Chakraborty and
                  Stefan Dziembowski and
                  Malgorzata Galazka and
                  Tomasz Lizurej and
                  Krzysztof Pietrzak and
                  Michelle Yeo},
  editor       = {Kobbi Nissim and
                  Brent Waters},
  title        = {Trojan-Resilience Without Cryptography},
  booktitle    = {Theory of Cryptography - 19th International Conference, {TCC} 2021,
                  Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13043},
  pages        = {397--428},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90453-1\_14},
  doi          = {10.1007/978-3-030-90453-1\_14},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/ChakrabortyDGLP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/KamathKP21,
  author       = {Chethan Kamath and
                  Karen Klein and
                  Krzysztof Pietrzak},
  editor       = {Kobbi Nissim and
                  Brent Waters},
  title        = {On Treewidth, Separators and Yao's Garbling},
  booktitle    = {Theory of Cryptography - 19th International Conference, {TCC} 2021,
                  Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13043},
  pages        = {486--517},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90453-1\_17},
  doi          = {10.1007/978-3-030-90453-1\_17},
  timestamp    = {Mon, 08 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/KamathKP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/KamathKP021,
  author       = {Chethan Kamath and
                  Karen Klein and
                  Krzysztof Pietrzak and
                  Michael Walter},
  editor       = {Kobbi Nissim and
                  Brent Waters},
  title        = {The Cost of Adaptivity in Security Games on Graphs},
  booktitle    = {Theory of Cryptography - 19th International Conference, {TCC} 2021,
                  Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13043},
  pages        = {550--581},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90453-1\_19},
  doi          = {10.1007/978-3-030-90453-1\_19},
  timestamp    = {Mon, 08 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/KamathKP021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-04293,
  author       = {Krzysztof Pietrzak and
                  Iosif Salem and
                  Stefan Schmid and
                  Michelle Yeo},
  title        = {LightPIR: Privacy-Preserving Route Discovery for Payment Channel Networks},
  journal      = {CoRR},
  volume       = {abs/2104.04293},
  year         = {2021},
  url          = {https://arxiv.org/abs/2104.04293},
  eprinttype    = {arXiv},
  eprint       = {2104.04293},
  timestamp    = {Tue, 13 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-04293.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-08848,
  author       = {Zeta Avarikioti and
                  Krzysztof Pietrzak and
                  Iosif Salem and
                  Stefan Schmid and
                  Samarth Tiwari and
                  Michelle Yeo},
  title        = {{HIDE} {\&} {SEEK:} Privacy-Preserving Rebalancing on Payment
                  Channel Networks},
  journal      = {CoRR},
  volume       = {abs/2110.08848},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.08848},
  eprinttype    = {arXiv},
  eprint       = {2110.08848},
  timestamp    = {Fri, 22 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-08848.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KamathKPW21,
  author       = {Chethan Kamath and
                  Karen Klein and
                  Krzysztof Pietrzak and
                  Michael Walter},
  title        = {On the Cost of Adaptivity in Graph-Based Games},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {59},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/059},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KamathKPW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KamathKP21,
  author       = {Chethan Kamath and
                  Karen Klein and
                  Krzysztof Pietrzak},
  title        = {On Treewidth, Separators and Yao's Garbling},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {926},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/926},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KamathKP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KamathKPW21a,
  author       = {Chethan Kamath and
                  Karen Klein and
                  Krzysztof Pietrzak and
                  Daniel Wichs},
  title        = {Limits on the Adaptive Security of Yao's Garbling},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {945},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/945},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KamathKPW21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlwenABCKPPW21,
  author       = {Jo{\"{e}}l Alwen and
                  Benedikt Auerbach and
                  Mirza Ahad Baig and
                  Miguel Cueto and
                  Karen Klein and
                  Guillermo Pascual{-}Perez and
                  Krzysztof Pietrzak and
                  Michael Walter},
  title        = {Grafting Key Trees: Efficient Key Management for Overlapping Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1158},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1158},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlwenABCKPPW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChakrabortyDGLP21,
  author       = {Suvradip Chakraborty and
                  Stefan Dziembowski and
                  Malgorzata Galazka and
                  Tomasz Lizurej and
                  Krzysztof Pietrzak and
                  Michelle Yeo},
  title        = {Trojan-Resilience without Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1224},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1224},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChakrabortyDGLP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AvarikiotiPSSTY21,
  author       = {Zeta Avarikioti and
                  Krzysztof Pietrzak and
                  Iosif Salem and
                  Stefan Schmid and
                  Samarth Tiwari and
                  Michelle Yeo},
  title        = {{HIDE} {\&} {SEEK:} Privacy-Preserving Rebalancing on Payment
                  Channel Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1401},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1401},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AvarikiotiPSSTY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AvarikiotiBMPSY21,
  author       = {Zeta Avarikioti and
                  Mahsa Bastankhah and
                  Mohammad Ali Maddah{-}Ali and
                  Krzysztof Pietrzak and
                  Jakub Svoboda and
                  Michelle Yeo},
  title        = {Route Discovery in Private Payment Channel Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1539},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1539},
  timestamp    = {Fri, 10 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AvarikiotiBMPSY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/Pietrzak20,
  author       = {Krzysztof Pietrzak},
  editor       = {Karthikeyan Bhargavan and
                  Elisabeth Oswald and
                  Manoj Prabhakaran},
  title        = {Delayed Authentication: Preventing Replay and Relay Attacks in Private
                  Contact Tracing},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2020 - 21st International Conference
                  on Cryptology in India, Bangalore, India, December 13-16, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12578},
  pages        = {3--15},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65277-7\_1},
  doi          = {10.1007/978-3-030-65277-7\_1},
  timestamp    = {Wed, 17 Apr 2024 21:39:19 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/Pietrzak20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2020-1,
  editor       = {Rafael Pass and
                  Krzysztof Pietrzak},
  title        = {Theory of Cryptography - 18th International Conference, {TCC} 2020,
                  Durham, NC, USA, November 16-19, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12550},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64375-1},
  doi          = {10.1007/978-3-030-64375-1},
  isbn         = {978-3-030-64374-4},
  timestamp    = {Tue, 15 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/2020-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2020-2,
  editor       = {Rafael Pass and
                  Krzysztof Pietrzak},
  title        = {Theory of Cryptography - 18th International Conference, {TCC} 2020,
                  Durham, NC, USA, November 16-19, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12551},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64378-2},
  doi          = {10.1007/978-3-030-64378-2},
  isbn         = {978-3-030-64377-5},
  timestamp    = {Tue, 15 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/2020-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2020-3,
  editor       = {Rafael Pass and
                  Krzysztof Pietrzak},
  title        = {Theory of Cryptography - 18th International Conference, {TCC} 2020,
                  Durham, NC, USA, November 16-19, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12552},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64381-2},
  doi          = {10.1007/978-3-030-64381-2},
  isbn         = {978-3-030-64380-5},
  timestamp    = {Tue, 15 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/2020-3.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Pietrzak20,
  author       = {Krzysztof Pietrzak},
  title        = {Delayed Authentication: Preventing Replay and Relay Attacks in Private
                  Contact Tracing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {418},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/418},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Pietrzak20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Austria20,
  author       = {Benedikt Auerbach and
                  Suvradip Chakraborty and
                  Karen Klein and
                  Guillermo Pascual{-}Perez and
                  Krzysztof Pietrzak and
                  Michael Walter and
                  Michelle Yeo},
  title        = {Inverse-Sybil Attacks in Automated Contact Tracing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {670},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/670},
  timestamp    = {Mon, 10 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Austria20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AbusalahKKPW19,
  author       = {Hamza Abusalah and
                  Chethan Kamath and
                  Karen Klein and
                  Krzysztof Pietrzak and
                  Michael Walter},
  editor       = {Yuval Ishai and
                  Vincent Rijmen},
  title        = {Reversible Proofs of Sequential Work},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11477},
  pages        = {277--291},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17656-3\_10},
  doi          = {10.1007/978-3-030-17656-3\_10},
  timestamp    = {Thu, 29 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AbusalahKKPW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/Pietrzak19,
  author       = {Krzysztof Pietrzak},
  editor       = {Avrim Blum},
  title        = {Proofs of Catalytic Space},
  booktitle    = {10th Innovations in Theoretical Computer Science Conference, {ITCS}
                  2019, January 10-12, 2019, San Diego, California, {USA}},
  series       = {LIPIcs},
  volume       = {124},
  pages        = {59:1--59:25},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2019},
  url          = {https://doi.org/10.4230/LIPIcs.ITCS.2019.59},
  doi          = {10.4230/LIPICS.ITCS.2019.59},
  timestamp    = {Tue, 11 Feb 2020 15:52:14 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/Pietrzak19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/Pietrzak19a,
  author       = {Krzysztof Pietrzak},
  editor       = {Avrim Blum},
  title        = {Simple Verifiable Delay Functions},
  booktitle    = {10th Innovations in Theoretical Computer Science Conference, {ITCS}
                  2019, January 10-12, 2019, San Diego, California, {USA}},
  series       = {LIPIcs},
  volume       = {124},
  pages        = {60:1--60:15},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2019},
  url          = {https://doi.org/10.4230/LIPIcs.ITCS.2019.60},
  doi          = {10.4230/LIPICS.ITCS.2019.60},
  timestamp    = {Thu, 02 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/innovations/Pietrzak19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FuchsbauerKKP19,
  author       = {Georg Fuchsbauer and
                  Chethan Kamath and
                  Karen Klein and
                  Krzysztof Pietrzak},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Adaptively Secure Proxy Re-encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11443},
  pages        = {317--346},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17259-6\_11},
  doi          = {10.1007/978-3-030-17259-6\_11},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FuchsbauerKKP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/ChoudhuriHKPRR19,
  author       = {Arka Rai Choudhuri and
                  Pavel Hub{\'{a}}cek and
                  Chethan Kamath and
                  Krzysztof Pietrzak and
                  Alon Rosen and
                  Guy N. Rothblum},
  editor       = {Moses Charikar and
                  Edith Cohen},
  title        = {Finding a Nash equilibrium is no easier than breaking Fiat-Shamir},
  booktitle    = {Proceedings of the 51st Annual {ACM} {SIGACT} Symposium on Theory
                  of Computing, {STOC} 2019, Phoenix, AZ, USA, June 23-26, 2019},
  pages        = {1103--1114},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3313276.3316400},
  doi          = {10.1145/3313276.3316400},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stoc/ChoudhuriHKPRR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ChoudhuriHKPRR19,
  author       = {Arka Rai Choudhuri and
                  Pavel Hub{\'{a}}cek and
                  Chethan Kamath and
                  Krzysztof Pietrzak and
                  Alon Rosen and
                  Guy N. Rothblum},
  title        = {Finding a Nash Equilibrium Is No Easier Than Breaking Fiat-Shamir},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR19-074}},
  year         = {2019},
  url          = {https://eccc.weizmann.ac.il/report/2019/074},
  eprinttype    = {ECCC},
  eprint       = {TR19-074},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/ChoudhuriHKPRR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbusalahKKPW19,
  author       = {Hamza Abusalah and
                  Chethan Kamath and
                  Karen Klein and
                  Krzysztof Pietrzak and
                  Michael Walter},
  title        = {Reversible Proofs of Sequential Work},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {252},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/252},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AbusalahKKPW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoudhuriHKPRR19,
  author       = {Arka Rai Choudhuri and
                  Pavel Hub{\'{a}}cek and
                  Chethan Kamath and
                  Krzysztof Pietrzak and
                  Alon Rosen and
                  Guy N. Rothblum},
  title        = {Finding a Nash Equilibrium Is No Easier Than Breaking Fiat-Shamir},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {549},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/549},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoudhuriHKPRR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoudhuriHKPRR19a,
  author       = {Arka Rai Choudhuri and
                  Pavel Hub{\'{a}}cek and
                  Chethan Kamath and
                  Krzysztof Pietrzak and
                  Alon Rosen and
                  Guy N. Rothblum},
  title        = {PPAD-Hardness via Iterated Squaring Modulo a Composite},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {667},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/667},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoudhuriHKPRR19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlwenCCKKPPW19,
  author       = {Jo{\"{e}}l Alwen and
                  Margarita Capretto and
                  Miguel Cueto and
                  Chethan Kamath and
                  Karen Klein and
                  Guillermo Pascual{-}Perez and
                  Krzysztof Pietrzak and
                  Michael Walter},
  title        = {Keep the Dirt: Tainted TreeKEM, an Efficient and Provably Secure Continuous
                  Group Key Agreement Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1489},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1489},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AlwenCCKKPPW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/DziembowskiPW18,
  author       = {Stefan Dziembowski and
                  Krzysztof Pietrzak and
                  Daniel Wichs},
  title        = {Non-Malleable Codes},
  journal      = {J. {ACM}},
  volume       = {65},
  number       = {4},
  pages        = {20:1--20:32},
  year         = {2018},
  url          = {https://doi.org/10.1145/3178432},
  doi          = {10.1145/3178432},
  timestamp    = {Fri, 25 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jacm/DziembowskiPW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AlwenGKKOPRRR18,
  author       = {Jo{\"{e}}l Alwen and
                  Peter Gazi and
                  Chethan Kamath and
                  Karen Klein and
                  Georg Osang and
                  Krzysztof Pietrzak and
                  Leonid Reyzin and
                  Michal Rol{\'{\i}}nek and
                  Michal Ryb{\'{a}}r},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {On the Memory-Hardness of Data-Independent Password-Hashing Functions},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {51--65},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196534},
  doi          = {10.1145/3196494.3196534},
  timestamp    = {Fri, 29 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AlwenGKKOPRRR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AlwenBP18,
  author       = {Jo{\"{e}}l Alwen and
                  Jeremiah Blocki and
                  Krzysztof Pietrzak},
  editor       = {Jesper Buus Nielsen and
                  Vincent Rijmen},
  title        = {Sustained Space Complexity},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10821},
  pages        = {99--130},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-78375-8\_4},
  doi          = {10.1007/978-3-319-78375-8\_4},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AlwenBP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CohenP18,
  author       = {Bram Cohen and
                  Krzysztof Pietrzak},
  editor       = {Jesper Buus Nielsen and
                  Vincent Rijmen},
  title        = {Simple Proofs of Sequential Work},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10821},
  pages        = {451--467},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-78375-8\_15},
  doi          = {10.1007/978-3-319-78375-8\_15},
  timestamp    = {Mon, 16 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CohenP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ParkKFGAP18,
  author       = {Sunoo Park and
                  Albert Kwon and
                  Georg Fuchsbauer and
                  Peter Gazi and
                  Jo{\"{e}}l Alwen and
                  Krzysztof Pietrzak},
  editor       = {Sarah Meiklejohn and
                  Kazue Sako},
  title        = {SpaceMint: {A} Cryptocurrency Based on Proofs of Space},
  booktitle    = {Financial Cryptography and Data Security - 22nd International Conference,
                  {FC} 2018, Nieuwpoort, Cura{\c{c}}ao, February 26 - March 2, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10957},
  pages        = {480--499},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-662-58387-6\_26},
  doi          = {10.1007/978-3-662-58387-6\_26},
  timestamp    = {Fri, 30 Aug 2019 11:17:01 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/ParkKFGAP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlwenBP18,
  author       = {Jo{\"{e}}l Alwen and
                  Jeremiah Blocki and
                  Krzysztof Pietrzak},
  title        = {Sustained Space Complexity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {147},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/147},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlwenBP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CohenP18,
  author       = {Bram Cohen and
                  Krzysztof Pietrzak},
  title        = {Simple Proofs of Sequential Work},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {183},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/183},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CohenP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Pietrzak18,
  author       = {Krzysztof Pietrzak},
  title        = {Proofs of Catalytic Space},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {194},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/194},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Pietrzak18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuchsbauerKKP18,
  author       = {Georg Fuchsbauer and
                  Chethan Kamath and
                  Karen Klein and
                  Krzysztof Pietrzak},
  title        = {Adaptively Secure Proxy Re-encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {426},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/426},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FuchsbauerKKP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Pietrzak18a,
  author       = {Krzysztof Pietrzak},
  title        = {Simple Verifiable Delay Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {627},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/627},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Pietrzak18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/KiltzPVCJ17,
  author       = {Eike Kiltz and
                  Krzysztof Pietrzak and
                  Daniele Venturi and
                  David Cash and
                  Abhishek Jain},
  title        = {Efficient Authentication from Hard Learning Problems},
  journal      = {J. Cryptol.},
  volume       = {30},
  number       = {4},
  pages        = {1238--1275},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00145-016-9247-3},
  doi          = {10.1007/S00145-016-9247-3},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/KiltzPVCJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AbusalahACKPR17,
  author       = {Hamza Abusalah and
                  Jo{\"{e}}l Alwen and
                  Bram Cohen and
                  Danylo Khilko and
                  Krzysztof Pietrzak and
                  Leonid Reyzin},
  editor       = {Tsuyoshi Takagi and
                  Thomas Peyrin},
  title        = {Beyond Hellman's Time-Memory Trade-Offs with Applications to Proofs
                  of Space},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Hong Kong, China, December 3-7, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10625},
  pages        = {357--379},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70697-9\_13},
  doi          = {10.1007/978-3-319-70697-9\_13},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AbusalahACKPR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/JafargholiKKKPW17,
  author       = {Zahra Jafargholi and
                  Chethan Kamath and
                  Karen Klein and
                  Ilan Komargodski and
                  Krzysztof Pietrzak and
                  Daniel Wichs},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Be Adaptive, Avoid Overcommitting},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10401},
  pages        = {133--163},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63688-7\_5},
  doi          = {10.1007/978-3-319-63688-7\_5},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/JafargholiKKKPW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AlwenBP17,
  author       = {Jo{\"{e}}l Alwen and
                  Jeremiah Blocki and
                  Krzysztof Pietrzak},
  editor       = {Jean{-}S{\'{e}}bastien Coron and
                  Jesper Buus Nielsen},
  title        = {Depth-Robust Graphs and Their Cumulative Memory Complexity},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10212},
  pages        = {3--32},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-56617-7\_1},
  doi          = {10.1007/978-3-319-56617-7\_1},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AlwenBP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AlwenCPRT17,
  author       = {Jo{\"{e}}l Alwen and
                  Binyi Chen and
                  Krzysztof Pietrzak and
                  Leonid Reyzin and
                  Stefano Tessaro},
  editor       = {Jean{-}S{\'{e}}bastien Coron and
                  Jesper Buus Nielsen},
  title        = {Scrypt Is Maximally Memory-Hard},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10212},
  pages        = {33--62},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-56617-7\_2},
  doi          = {10.1007/978-3-319-56617-7\_2},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AlwenCPRT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/PietrzakS17,
  author       = {Krzysztof Pietrzak and
                  Maciej Skorski},
  editor       = {Ioannis Chatzigiannakis and
                  Piotr Indyk and
                  Fabian Kuhn and
                  Anca Muscholl},
  title        = {Non-Uniform Attacks Against Pseudoentropy},
  booktitle    = {44th International Colloquium on Automata, Languages, and Programming,
                  {ICALP} 2017, July 10-14, 2017, Warsaw, Poland},
  series       = {LIPIcs},
  volume       = {80},
  pages        = {39:1--39:13},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2017},
  url          = {https://doi.org/10.4230/LIPIcs.ICALP.2017.39},
  doi          = {10.4230/LIPICS.ICALP.2017.39},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/PietrzakS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BrodyDFP17,
  author       = {Joshua Brody and
                  Stefan Dziembowski and
                  Sebastian Faust and
                  Krzysztof Pietrzak},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {Position-Based Cryptography and Multiparty Communication Complexity},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10677},
  pages        = {56--81},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70500-2\_3},
  doi          = {10.1007/978-3-319-70500-2\_3},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BrodyDFP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/PietrzakS17,
  author       = {Krzysztof Pietrzak and
                  Maciej Skorski},
  title        = {Non-Uniform Attacks Against Pseudoentropy},
  journal      = {CoRR},
  volume       = {abs/1704.08678},
  year         = {2017},
  url          = {http://arxiv.org/abs/1704.08678},
  eprinttype    = {arXiv},
  eprint       = {1704.08678},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/PietrzakS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AlwenBP17,
  author       = {Jo{\"{e}}l Alwen and
                  Jeremiah Blocki and
                  Krzysztof Pietrzak},
  title        = {Sustained Space Complexity},
  journal      = {CoRR},
  volume       = {abs/1705.05313},
  year         = {2017},
  url          = {http://arxiv.org/abs/1705.05313},
  eprinttype    = {arXiv},
  eprint       = {1705.05313},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AlwenBP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaziPR17,
  author       = {Peter Gazi and
                  Krzysztof Pietrzak and
                  Michal Ryb{\'{a}}r},
  title        = {The Exact Security of {PMAC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {69},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/069},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaziPR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JafargholiKKKPW17,
  author       = {Zahra Jafargholi and
                  Chethan Kamath and
                  Karen Klein and
                  Ilan Komargodski and
                  Krzysztof Pietrzak and
                  Daniel Wichs},
  title        = {Be Adaptive, Avoid Overcommitting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {515},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/515},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JafargholiKKKPW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbusalahACKPR17,
  author       = {Hamza Abusalah and
                  Jo{\"{e}}l Alwen and
                  Bram Cohen and
                  Danylo Khilko and
                  Krzysztof Pietrzak and
                  Leonid Reyzin},
  title        = {Beyond Hellman's Time-Memory Trade-Offs with Applications to Proofs
                  of Space},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {893},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/893},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbusalahACKPR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cc/KrennPWW16,
  author       = {Stephan Krenn and
                  Krzysztof Pietrzak and
                  Akshay Wadia and
                  Daniel Wichs},
  title        = {A counterexample to the chain rule for conditional {HILL} entropy},
  journal      = {Comput. Complex.},
  volume       = {25},
  number       = {3},
  pages        = {567--605},
  year         = {2016},
  url          = {https://doi.org/10.1007/s00037-015-0120-9},
  doi          = {10.1007/S00037-015-0120-9},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cc/KrennPWW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GaziPR16,
  author       = {Peter Gazi and
                  Krzysztof Pietrzak and
                  Michal Ryb{\'{a}}r},
  title        = {The Exact Security of {PMAC}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {2},
  pages        = {145--161},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i2.145-161},
  doi          = {10.13154/TOSC.V2016.I2.145-161},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/GaziPR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/AbusalahFP16,
  author       = {Hamza Abusalah and
                  Georg Fuchsbauer and
                  Krzysztof Pietrzak},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {Offline Witness Encryption},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {285--303},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_16},
  doi          = {10.1007/978-3-319-39555-5\_16},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/AbusalahFP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/AbusalahFP16,
  author       = {Hamza Abusalah and
                  Georg Fuchsbauer and
                  Krzysztof Pietrzak},
  editor       = {Kazue Sako},
  title        = {Constrained PRFs for Unbounded Inputs},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2016 - The Cryptographers' Track at
                  the {RSA} Conference 2016, San Francisco, CA, USA, February 29 - March
                  4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9610},
  pages        = {413--428},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-29485-8\_24},
  doi          = {10.1007/978-3-319-29485-8\_24},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/AbusalahFP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AlwenCKKPT16,
  author       = {Jo{\"{e}}l Alwen and
                  Binyi Chen and
                  Chethan Kamath and
                  Vladimir Kolmogorov and
                  Krzysztof Pietrzak and
                  Stefano Tessaro},
  editor       = {Marc Fischlin and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {On the Complexity of Scrypt and Proofs of Space in the Parallel Random
                  Oracle Model},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9666},
  pages        = {358--387},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49896-5\_13},
  doi          = {10.1007/978-3-662-49896-5\_13},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AlwenCKKPT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/PietrzakS16,
  author       = {Krzysztof Pietrzak and
                  Maciej Sk{\'{o}}rski},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Pseudoentropy: Lower-Bounds for Chain Rules and Transformations},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9985},
  pages        = {183--203},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53641-4\_8},
  doi          = {10.1007/978-3-662-53641-4\_8},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/PietrzakS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/FuchsbauerHKP16,
  author       = {Georg Fuchsbauer and
                  Felix Heuer and
                  Eike Kiltz and
                  Krzysztof Pietrzak},
  editor       = {Eyal Kushilevitz and
                  Tal Malkin},
  title        = {Standard Security Does Imply Security Against Selective Opening for
                  Markov Distributions},
  booktitle    = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A,
                  Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9562},
  pages        = {282--305},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49096-9\_12},
  doi          = {10.1007/978-3-662-49096-9\_12},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/FuchsbauerHKP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlwenCKKPT16,
  author       = {Jo{\"{e}}l Alwen and
                  Binyi Chen and
                  Chethan Kamath and
                  Vladimir Kolmogorov and
                  Krzysztof Pietrzak and
                  Stefano Tessaro},
  title        = {On the Complexity of Scrypt and Proofs of Space in the Parallel Random
                  Oracle Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {100},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/100},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlwenCKKPT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PietrzakS16,
  author       = {Krzysztof Pietrzak and
                  Maciej Skorski},
  title        = {Pseudoentropy: Lower-bounds for Chain rules and Transformations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {159},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/159},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PietrzakS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuchsbauerJP16,
  author       = {Georg Fuchsbauer and
                  Zahra Jafargholi and
                  Krzysztof Pietrzak},
  title        = {A Quasipolynomial Reduction for Generalized Selective Decryption on
                  Trees},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {389},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/389},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FuchsbauerJP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrodyDFP16,
  author       = {Joshua Brody and
                  Stefan Dziembowski and
                  Sebastian Faust and
                  Krzysztof Pietrzak},
  title        = {Position-Based Cryptography and Multiparty Communication Complexity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {536},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/536},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrodyDFP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FischlinLP16,
  author       = {Marc Fischlin and
                  Anja Lehmann and
                  Krzysztof Pietrzak},
  title        = {Robust Multi-Property Combiners for Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {723},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/723},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FischlinLP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlwenGKKOPRRR16,
  author       = {Jo{\"{e}}l Alwen and
                  Peter Gazi and
                  Chethan Kamath and
                  Karen Klein and
                  Georg Osang and
                  Krzysztof Pietrzak and
                  Leonid Reyzin and
                  Michal Rol{\'{\i}}nek and
                  Michal Ryb{\'{a}}r},
  title        = {On the Memory-Hardness of Data-Independent Password-Hashing Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {783},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/783},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlwenGKKOPRRR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlwenBP16,
  author       = {Jo{\"{e}}l Alwen and
                  Jeremiah Blocki and
                  Krzysztof Pietrzak},
  title        = {Depth-Robust Graphs and Their Cumulative Memory Complexity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {875},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/875},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlwenBP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlwenCPRT16,
  author       = {Jo{\"{e}}l Alwen and
                  Binyi Chen and
                  Krzysztof Pietrzak and
                  Leonid Reyzin and
                  Stefano Tessaro},
  title        = {Scrypt is Maximally Memory-Hard},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {989},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/989},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlwenCPRT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GaziPT15,
  author       = {Peter Gazi and
                  Krzysztof Pietrzak and
                  Stefano Tessaro},
  editor       = {Tetsu Iwata and
                  Jung Hee Cheon},
  title        = {Generic Security of {NMAC} and {HMAC} with Input Whitening},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9453},
  pages        = {85--109},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48800-3\_4},
  doi          = {10.1007/978-3-662-48800-3\_4},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GaziPT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/OkamotoPWW15,
  author       = {Tatsuaki Okamoto and
                  Krzysztof Pietrzak and
                  Brent Waters and
                  Daniel Wichs},
  editor       = {Tetsu Iwata and
                  Jung Hee Cheon},
  title        = {New Realizations of Somewhere Statistically Binding Hashing and Positional
                  Accumulators},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9452},
  pages        = {121--145},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48797-6\_6},
  doi          = {10.1007/978-3-662-48797-6\_6},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/OkamotoPWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GaziPT15,
  author       = {Peter Gazi and
                  Krzysztof Pietrzak and
                  Stefano Tessaro},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {The Exact {PRF} Security of Truncation: Tight Bounds for Keyed Sponges
                  and Truncated {CBC}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {368--387},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_18},
  doi          = {10.1007/978-3-662-47989-6\_18},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GaziPT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DziembowskiFKP15,
  author       = {Stefan Dziembowski and
                  Sebastian Faust and
                  Vladimir Kolmogorov and
                  Krzysztof Pietrzak},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Proofs of Space},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {585--605},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_29},
  doi          = {10.1007/978-3-662-48000-7\_29},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DziembowskiFKP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FuchsbauerJP15,
  author       = {Georg Fuchsbauer and
                  Zahra Jafargholi and
                  Krzysztof Pietrzak},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {A Quasipolynomial Reduction for Generalized Selective Decryption on
                  Trees},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {601--620},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_29},
  doi          = {10.1007/978-3-662-47989-6\_29},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FuchsbauerJP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BenhamoudaKLP15,
  author       = {Fabrice Benhamouda and
                  Stephan Krenn and
                  Vadim Lyubashevsky and
                  Krzysztof Pietrzak},
  editor       = {G{\"{u}}nther Pernul and
                  Peter Y. A. Ryan and
                  Edgar R. Weippl},
  title        = {Efficient Zero-Knowledge Proofs for Commitments from Learning with
                  Errors over Rings},
  booktitle    = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research
                  in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9326},
  pages        = {305--325},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24174-6\_16},
  doi          = {10.1007/978-3-319-24174-6\_16},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/BenhamoudaKLP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/SkorskiGP15,
  author       = {Maciej Skorski and
                  Alexander Golovnev and
                  Krzysztof Pietrzak},
  editor       = {Magn{\'{u}}s M. Halld{\'{o}}rsson and
                  Kazuo Iwama and
                  Naoki Kobayashi and
                  Bettina Speckmann},
  title        = {Condensed Unpredictability},
  booktitle    = {Automata, Languages, and Programming - 42nd International Colloquium,
                  {ICALP} 2015, Kyoto, Japan, July 6-10, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9134},
  pages        = {1046--1057},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47672-7\_85},
  doi          = {10.1007/978-3-662-47672-7\_85},
  timestamp    = {Fri, 27 Mar 2020 09:02:59 +0100},
  biburl       = {https://dblp.org/rec/conf/icalp/SkorskiGP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/PietrzakS15,
  author       = {Krzysztof Pietrzak and
                  Maciej Skorski},
  editor       = {Kristin E. Lauter and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title        = {The Chain Rule for {HILL} Pseudoentropy, Revisited},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2015 - 4th International Conference
                  on Cryptology and Information Security in Latin America, Guadalajara,
                  Mexico, August 23-26, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9230},
  pages        = {81--98},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22174-8\_5},
  doi          = {10.1007/978-3-319-22174-8\_5},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/latincrypt/PietrzakS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/0001FPPS15,
  author       = {Abhishek Banerjee and
                  Georg Fuchsbauer and
                  Chris Peikert and
                  Krzysztof Pietrzak and
                  Sophie Stevens},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {Key-Homomorphic Constrained Pseudorandom Functions},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9015},
  pages        = {31--60},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46497-7\_2},
  doi          = {10.1007/978-3-662-46497-7\_2},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/0001FPPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SkorskiGP15,
  author       = {Maciej Skorski and
                  Alexander Golovnev and
                  Krzysztof Pietrzak},
  title        = {Condensed Unpredictability},
  journal      = {CoRR},
  volume       = {abs/1504.07621},
  year         = {2015},
  url          = {http://arxiv.org/abs/1504.07621},
  eprinttype    = {arXiv},
  eprint       = {1504.07621},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/SkorskiGP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaziPT15,
  author       = {Peter Gazi and
                  Krzysztof Pietrzak and
                  Stefano Tessaro},
  title        = {Tight Bounds for Keyed Sponges and Truncated {CBC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {53},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/053},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaziPT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001FPPS15,
  author       = {Abhishek Banerjee and
                  Georg Fuchsbauer and
                  Chris Peikert and
                  Krzysztof Pietrzak and
                  Sophie Stevens},
  title        = {Key-Homomorphic Constrained Pseudorandom Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {180},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/180},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001FPPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SkorskiGP15,
  author       = {Maciej Skorski and
                  Alexander Golovnev and
                  Krzysztof Pietrzak},
  title        = {Condensed Unpredictability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {384},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/384},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SkorskiGP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiltzMP15,
  author       = {Eike Kiltz and
                  Daniel Masny and
                  Krzysztof Pietrzak},
  title        = {Simple Chosen-Ciphertext Security from Low-Noise {LPN}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {401},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/401},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiltzMP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ParkPAFG15,
  author       = {Sunoo Park and
                  Krzysztof Pietrzak and
                  Albert Kwon and
                  Jo{\"{e}}l Alwen and
                  Georg Fuchsbauer and
                  Peter Gazi},
  title        = {Spacemint: {A} Cryptocurrency Based on Proofs of Space},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {528},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/528},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ParkPAFG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PietrzakS15,
  author       = {Krzysztof Pietrzak and
                  Maciej Skorski},
  title        = {The Chain Rule for {HILL} Pseudoentropy, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {599},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/599},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PietrzakS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbusalahFP15,
  author       = {Hamza Abusalah and
                  Georg Fuchsbauer and
                  Krzysztof Pietrzak},
  title        = {Offline Witness Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {838},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/838},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbusalahFP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeuerKP15,
  author       = {Felix Heuer and
                  Eike Kiltz and
                  Krzysztof Pietrzak},
  title        = {Standard Security Does Imply Security Against Selective Opening for
                  Markov Distributions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {853},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/853},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeuerKP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OkamotoPWW15,
  author       = {Tatsuaki Okamoto and
                  Krzysztof Pietrzak and
                  Brent Waters and
                  Daniel Wichs},
  title        = {New Realizations of Somewhere Statistically Binding Hashing and Positional
                  Accumulators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {869},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/869},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OkamotoPWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaziPT15a,
  author       = {Peter Gazi and
                  Krzysztof Pietrzak and
                  Stefano Tessaro},
  title        = {Generic Security of {NMAC} and {HMAC} with Input Whitening},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {881},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/881},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaziPT15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/FischlinLP14,
  author       = {Marc Fischlin and
                  Anja Lehmann and
                  Krzysztof Pietrzak},
  title        = {Robust Multi-Property Combiners for Hash Functions},
  journal      = {J. Cryptol.},
  volume       = {27},
  number       = {3},
  pages        = {397--428},
  year         = {2014},
  url          = {https://doi.org/10.1007/s00145-013-9148-7},
  doi          = {10.1007/S00145-013-9148-7},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/FischlinLP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/FuchsbauerKPR14,
  author       = {Georg Fuchsbauer and
                  Momchil Konstantinov and
                  Krzysztof Pietrzak and
                  Vanishree Rao},
  editor       = {Palash Sarkar and
                  Tetsu Iwata},
  title        = {Adaptive Security of Constrained PRFs},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8874},
  pages        = {82--101},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45608-8\_5},
  doi          = {10.1007/978-3-662-45608-8\_5},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/FuchsbauerKPR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GaziPR14,
  author       = {Peter Gazi and
                  Krzysztof Pietrzak and
                  Michal Ryb{\'{a}}r},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {The Exact PRF-Security of {NMAC} and {HMAC}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {113--130},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_7},
  doi          = {10.1007/978-3-662-44371-2\_7},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GaziPR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DodisPW14,
  author       = {Yevgeniy Dodis and
                  Krzysztof Pietrzak and
                  Daniel Wichs},
  editor       = {Phong Q. Nguyen and
                  Elisabeth Oswald},
  title        = {Key Derivation without Entropy Waste},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8441},
  pages        = {93--110},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55220-5\_6},
  doi          = {10.1007/978-3-642-55220-5\_6},
  timestamp    = {Thu, 14 Oct 2021 09:58:16 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DodisPW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KiltzMP14,
  author       = {Eike Kiltz and
                  Daniel Masny and
                  Krzysztof Pietrzak},
  editor       = {Hugo Krawczyk},
  title        = {Simple Chosen-Ciphertext Security from Low-Noise {LPN}},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_1},
  doi          = {10.1007/978-3-642-54631-0\_1},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KiltzMP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/JetchevP14,
  author       = {Dimitar Jetchev and
                  Krzysztof Pietrzak},
  editor       = {Yehuda Lindell},
  title        = {How to Fake Auxiliary Input},
  booktitle    = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC}
                  2014, San Diego, CA, USA, February 24-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8349},
  pages        = {566--590},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54242-8\_24},
  doi          = {10.1007/978-3-642-54242-8\_24},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/JetchevP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuchsbauerKPR14,
  author       = {Georg Fuchsbauer and
                  Momchil Konstantinov and
                  Krzysztof Pietrzak and
                  Vanishree Rao},
  title        = {Adaptive Security of Constrained PRFs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {416},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/416},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FuchsbauerKPR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaziPR14,
  author       = {Peter Gazi and
                  Krzysztof Pietrzak and
                  Michal Ryb{\'{a}}r},
  title        = {The Exact PRF-Security of {NMAC} and {HMAC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {578},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/578},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaziPR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KrennPWW14a,
  author       = {Stephan Krenn and
                  Krzysztof Pietrzak and
                  Akshay Wadia and
                  Daniel Wichs},
  title        = {A Counterexample to the Chain Rule for Conditional {HILL} Entropy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {678},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/678},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KrennPWW14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbusalahFP14,
  author       = {Hamza Abusalah and
                  Georg Fuchsbauer and
                  Krzysztof Pietrzak},
  title        = {Constrained PRFs for Unbounded Inputs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {840},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/840},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbusalahFP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenhamoudaKLP14,
  author       = {Fabrice Benhamouda and
                  Stephan Krenn and
                  Vadim Lyubashevsky and
                  Krzysztof Pietrzak},
  title        = {Efficient Zero-Knowledge Proofs for Commitments from Learning With
                  Errors over Rings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {889},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/889},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BenhamoudaKLP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AlwenKPW13,
  author       = {Jo{\"{e}}l Alwen and
                  Stephan Krenn and
                  Krzysztof Pietrzak and
                  Daniel Wichs},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Learning with Rounding, Revisited - New Reduction, Properties and
                  Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {57--74},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_4},
  doi          = {10.1007/978-3-642-40041-4\_4},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AlwenKPW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KiltzPS13,
  author       = {Eike Kiltz and
                  Krzysztof Pietrzak and
                  Mario Szegedy},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Digital Signatures with Minimal Overhead from Indifferentiable Random
                  Invertible Functions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {571--588},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_31},
  doi          = {10.1007/978-3-642-40041-4\_31},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KiltzPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/KrennPW13,
  author       = {Stephan Krenn and
                  Krzysztof Pietrzak and
                  Akshay Wadia},
  editor       = {Amit Sahai},
  title        = {A Counterexample to the Chain Rule for Conditional {HILL} Entropy
                  - And What Deniable Encryption Has to Do with It},
  booktitle    = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC}
                  2013, Tokyo, Japan, March 3-6, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7785},
  pages        = {23--39},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36594-2\_2},
  doi          = {10.1007/978-3-642-36594-2\_2},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/KrennPW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlwenKPW13,
  author       = {Jo{\"{e}}l Alwen and
                  Stephan Krenn and
                  Krzysztof Pietrzak and
                  Daniel Wichs},
  title        = {Learning with Rounding, Revisited: New Reduction, Properties and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {98},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/098},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlwenKPW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Pietrzak13,
  author       = {Krzysztof Pietrzak},
  title        = {A Closer Look at {HMAC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {212},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/212},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Pietrzak13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisPW13,
  author       = {Yevgeniy Dodis and
                  Krzysztof Pietrzak and
                  Daniel Wichs},
  title        = {Key Derivation Without Entropy Waste},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {708},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/708},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisPW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DziembowskiFKP13,
  author       = {Stefan Dziembowski and
                  Sebastian Faust and
                  Vladimir Kolmogorov and
                  Krzysztof Pietrzak},
  title        = {Proofs of Space},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {796},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/796},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DziembowskiFKP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JetchevP13,
  author       = {Dimitar Jetchev and
                  Krzysztof Pietrzak},
  title        = {How to Fake Auxiliary Input},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {869},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/869},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JetchevP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/PietrzakW12,
  author       = {Krzysztof Pietrzak and
                  Douglas Wikstr{\"{o}}m},
  title        = {Parallel Repetition of Computationally Sound Protocols Revisited},
  journal      = {J. Cryptol.},
  volume       = {25},
  number       = {1},
  pages        = {116--135},
  year         = {2012},
  url          = {https://doi.org/10.1007/s00145-010-9090-x},
  doi          = {10.1007/S00145-010-9090-X},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/PietrzakW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/0002KPT12,
  author       = {Abhishek Jain and
                  Stephan Krenn and
                  Krzysztof Pietrzak and
                  Aris Tentes},
  editor       = {Xiaoyun Wang and
                  Kazue Sako},
  title        = {Commitments and Efficient Zero-Knowledge Proofs from Learning Parity
                  with Noise},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Beijing, China, December 2-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7658},
  pages        = {663--680},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34961-4\_40},
  doi          = {10.1007/978-3-642-34961-4\_40},
  timestamp    = {Mon, 25 Nov 2019 15:32:14 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/0002KPT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/FaustPS12,
  author       = {Sebastian Faust and
                  Krzysztof Pietrzak and
                  Joachim Schipper},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {Practical Leakage-Resilient Symmetric Cryptography},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {213--232},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_13},
  doi          = {10.1007/978-3-642-33027-8\_13},
  timestamp    = {Mon, 15 Jun 2020 17:09:16 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/FaustPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DodisKPW12,
  author       = {Yevgeniy Dodis and
                  Eike Kiltz and
                  Krzysztof Pietrzak and
                  Daniel Wichs},
  editor       = {David Pointcheval and
                  Thomas Johansson},
  title        = {Message Authentication, Revisited},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cambridge, UK, April 15-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7237},
  pages        = {355--374},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29011-4\_22},
  doi          = {10.1007/978-3-642-29011-4\_22},
  timestamp    = {Sun, 12 Nov 2023 02:15:08 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DodisKPW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/HeyseKLPP12,
  author       = {Stefan Heyse and
                  Eike Kiltz and
                  Vadim Lyubashevsky and
                  Christof Paar and
                  Krzysztof Pietrzak},
  editor       = {Anne Canteaut},
  title        = {Lapin: An Efficient Authentication Protocol Based on Ring-LPN},
  booktitle    = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
                  Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7549},
  pages        = {346--365},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34047-5\_20},
  doi          = {10.1007/978-3-642-34047-5\_20},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/HeyseKLPP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sofsem/Pietrzak12,
  author       = {Krzysztof Pietrzak},
  editor       = {M{\'{a}}ria Bielikov{\'{a}} and
                  Gerhard Friedrich and
                  Georg Gottlob and
                  Stefan Katzenbeisser and
                  Gy{\"{o}}rgy Tur{\'{a}}n},
  title        = {Cryptography from Learning Parity with Noise},
  booktitle    = {{SOFSEM} 2012: Theory and Practice of Computer Science - 38th Conference
                  on Current Trends in Theory and Practice of Computer Science, {\v{S}}pindler{\r{u}}v
                  Ml{\'{y}}n, Czech Republic, January 21-27, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7147},
  pages        = {99--114},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-27660-6\_9},
  doi          = {10.1007/978-3-642-27660-6\_9},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/sofsem/Pietrzak12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/JainPT12,
  author       = {Abhishek Jain and
                  Krzysztof Pietrzak and
                  Aris Tentes},
  editor       = {Ronald Cramer},
  title        = {Hardness Preserving Constructions of Pseudorandom Functions},
  booktitle    = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC}
                  2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7194},
  pages        = {369--382},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28914-9\_21},
  doi          = {10.1007/978-3-642-28914-9\_21},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/JainPT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/PietrzakRS12,
  author       = {Krzysztof Pietrzak and
                  Alon Rosen and
                  Gil Segev},
  editor       = {Ronald Cramer},
  title        = {Lossy Functions Do Not Amplify Well},
  booktitle    = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC}
                  2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7194},
  pages        = {458--475},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28914-9\_26},
  doi          = {10.1007/978-3-642-28914-9\_26},
  timestamp    = {Sun, 16 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/PietrzakRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Pietrzak12,
  author       = {Krzysztof Pietrzak},
  editor       = {Ronald Cramer},
  title        = {Subspace {LWE}},
  booktitle    = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC}
                  2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7194},
  pages        = {548--563},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28914-9\_31},
  doi          = {10.1007/978-3-642-28914-9\_31},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Pietrzak12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisKPW12,
  author       = {Yevgeniy Dodis and
                  Eike Kiltz and
                  Krzysztof Pietrzak and
                  Daniel Wichs},
  title        = {Message Authentication, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {59},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/059},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisKPW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0002KPT12,
  author       = {Abhishek Jain and
                  Stephan Krenn and
                  Krzysztof Pietrzak and
                  Aris Tentes},
  title        = {Commitments and Efficient Zero-Knowledge Proofs from Hard Learning
                  Problems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {513},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/513},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0002KPT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiltzPS12,
  author       = {Eike Kiltz and
                  Krzysztof Pietrzak and
                  Mario Szegedy},
  title        = {Digital Signatures with Minimal Overhead},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {658},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/658},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiltzPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BarakDKPPSY11,
  author       = {Boaz Barak and
                  Yevgeniy Dodis and
                  Hugo Krawczyk and
                  Olivier Pereira and
                  Krzysztof Pietrzak and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Yu Yu},
  editor       = {Phillip Rogaway},
  title        = {Leftover Hash Lemma, Revisited},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 14-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6841},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22792-9\_1},
  doi          = {10.1007/978-3-642-22792-9\_1},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BarakDKPPSY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KiltzPCJV11,
  author       = {Eike Kiltz and
                  Krzysztof Pietrzak and
                  David Cash and
                  Abhishek Jain and
                  Daniele Venturi},
  editor       = {Kenneth G. Paterson},
  title        = {Efficient Authentication from Hard Learning Problems},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {7--26},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_3},
  doi          = {10.1007/978-3-642-20465-4\_3},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KiltzPCJV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/FaustPV11,
  author       = {Sebastian Faust and
                  Krzysztof Pietrzak and
                  Daniele Venturi},
  editor       = {Luca Aceto and
                  Monika Henzinger and
                  Jir{\'{\i}} Sgall},
  title        = {Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience},
  booktitle    = {Automata, Languages and Programming - 38th International Colloquium,
                  {ICALP} 2011, Zurich, Switzerland, July 4-8, 2011, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6755},
  pages        = {391--402},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22006-7\_33},
  doi          = {10.1007/978-3-642-22006-7\_33},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/FaustPV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/JainP11,
  author       = {Abhishek Jain and
                  Krzysztof Pietrzak},
  editor       = {Yuval Ishai},
  title        = {Parallel Repetition for Leakage Resilience Amplification Revisited},
  booktitle    = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC}
                  2011, Providence, RI, USA, March 28-30, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6597},
  pages        = {58--69},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19571-6\_5},
  doi          = {10.1007/978-3-642-19571-6\_5},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/JainP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarakDKPPSY11,
  author       = {Boaz Barak and
                  Yevgeniy Dodis and
                  Hugo Krawczyk and
                  Olivier Pereira and
                  Krzysztof Pietrzak and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Yu Yu},
  title        = {Leftover Hash Lemma, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {88},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/088},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarakDKPPSY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustPV11,
  author       = {Sebastian Faust and
                  Krzysztof Pietrzak and
                  Daniele Venturi},
  title        = {Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {314},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/314},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FaustPV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KiltzP10,
  author       = {Eike Kiltz and
                  Krzysztof Pietrzak},
  editor       = {Masayuki Abe},
  title        = {Leakage Resilient ElGamal Encryption},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 5-9, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6477},
  pages        = {595--612},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17373-8\_34},
  doi          = {10.1007/978-3-642-17373-8\_34},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KiltzP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DodisP10,
  author       = {Yevgeniy Dodis and
                  Krzysztof Pietrzak},
  editor       = {Tal Rabin},
  title        = {Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks
                  on Feistel Networks},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {21--40},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_2},
  doi          = {10.1007/978-3-642-14623-7\_2},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DodisP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/DziembowskiPW10,
  author       = {Stefan Dziembowski and
                  Krzysztof Pietrzak and
                  Daniel Wichs},
  editor       = {Andrew Chi{-}Chih Yao},
  title        = {Non-Malleable Codes},
  booktitle    = {Innovations in Computer Science - {ICS} 2010, Tsinghua University,
                  Beijing, China, January 5-7, 2010. Proceedings},
  pages        = {434--452},
  publisher    = {Tsinghua University Press},
  year         = {2010},
  url          = {http://conference.iiis.tsinghua.edu.cn/ICS2010/content/papers/34.html},
  timestamp    = {Wed, 04 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/innovations/DziembowskiPW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HastadPWP10,
  author       = {Johan H{\aa}stad and
                  Rafael Pass and
                  Douglas Wikstr{\"{o}}m and
                  Krzysztof Pietrzak},
  editor       = {Daniele Micciancio},
  title        = {An Efficient Parallel Repetition Theorem},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_1},
  doi          = {10.1007/978-3-642-11799-2\_1},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/HastadPWP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/FaustKPR10,
  author       = {Sebastian Faust and
                  Eike Kiltz and
                  Krzysztof Pietrzak and
                  Guy N. Rothblum},
  editor       = {Daniele Micciancio},
  title        = {Leakage-Resilient Signatures},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {343--360},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_21},
  doi          = {10.1007/978-3-642-11799-2\_21},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/FaustKPR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KiltzP09,
  author       = {Eike Kiltz and
                  Krzysztof Pietrzak},
  editor       = {Antoine Joux},
  title        = {On the Security of Padding-Based Encryption Schemes - or - Why We
                  Cannot Prove {OAEP} Secure in the Standard Model},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cologne, Germany, April 26-30, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5479},
  pages        = {389--406},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01001-9\_23},
  doi          = {10.1007/978-3-642-01001-9\_23},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KiltzP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Pietrzak09,
  author       = {Krzysztof Pietrzak},
  editor       = {Antoine Joux},
  title        = {A Leakage-Resilient Mode of Operation},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cologne, Germany, April 26-30, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5479},
  pages        = {462--482},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01001-9\_27},
  doi          = {10.1007/978-3-642-01001-9\_27},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Pietrzak09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KiltzPSY09,
  author       = {Eike Kiltz and
                  Krzysztof Pietrzak and
                  Martijn Stam and
                  Moti Yung},
  editor       = {Antoine Joux},
  title        = {A New Randomness Extraction Paradigm for Hybrid Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cologne, Germany, April 26-30, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5479},
  pages        = {590--609},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01001-9\_34},
  doi          = {10.1007/978-3-642-01001-9\_34},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KiltzPSY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustKPR09,
  author       = {Sebastian Faust and
                  Eike Kiltz and
                  Krzysztof Pietrzak and
                  Guy N. Rothblum},
  title        = {Leakage-Resilient Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {282},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/282},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FaustKPR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DziembowskiPW09,
  author       = {Stefan Dziembowski and
                  Krzysztof Pietrzak and
                  Daniel Wichs},
  title        = {Non-Malleable Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {608},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/608},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DziembowskiPW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Pietrzak08,
  author       = {Krzysztof Pietrzak},
  editor       = {David A. Wagner},
  title        = {Compression from Collisions, or Why {CRHF} Combiners Have a Long Output},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5157},
  pages        = {413--432},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85174-5\_23},
  doi          = {10.1007/978-3-540-85174-5\_23},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Pietrzak08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DodisPP08,
  author       = {Yevgeniy Dodis and
                  Krzysztof Pietrzak and
                  Prashant Puniya},
  editor       = {Nigel P. Smart},
  title        = {A New Mode of Operation for Block Ciphers and Length-Preserving MACs},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Istanbul, Turkey, April 13-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4965},
  pages        = {198--219},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78967-3\_12},
  doi          = {10.1007/978-3-540-78967-3\_12},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DodisPP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/DziembowskiP08,
  author       = {Stefan Dziembowski and
                  Krzysztof Pietrzak},
  title        = {Leakage-Resilient Cryptography},
  booktitle    = {49th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
                  2008, October 25-28, 2008, Philadelphia, PA, {USA}},
  pages        = {293--302},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/FOCS.2008.56},
  doi          = {10.1109/FOCS.2008.56},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/DziembowskiP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/PietrzakS08,
  author       = {Krzysztof Pietrzak and
                  Johan Sj{\"{o}}din},
  editor       = {Luca Aceto and
                  Ivan Damg{\aa}rd and
                  Leslie Ann Goldberg and
                  Magn{\'{u}}s M. Halld{\'{o}}rsson and
                  Anna Ing{\'{o}}lfsd{\'{o}}ttir and
                  Igor Walukiewicz},
  title        = {Weak Pseudorandom Functions in Minicrypt},
  booktitle    = {Automata, Languages and Programming, 35th International Colloquium,
                  {ICALP} 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part
                  {II} - Track {B:} Logic, Semantics, and Theory of Programming {\&}
                  Track {C:} Security and Cryptography Foundations},
  series       = {Lecture Notes in Computer Science},
  volume       = {5126},
  pages        = {423--436},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70583-3\_35},
  doi          = {10.1007/978-3-540-70583-3\_35},
  timestamp    = {Fri, 27 Mar 2020 09:02:59 +0100},
  biburl       = {https://dblp.org/rec/conf/icalp/PietrzakS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/FischlinLP08,
  author       = {Marc Fischlin and
                  Anja Lehmann and
                  Krzysztof Pietrzak},
  editor       = {Luca Aceto and
                  Ivan Damg{\aa}rd and
                  Leslie Ann Goldberg and
                  Magn{\'{u}}s M. Halld{\'{o}}rsson and
                  Anna Ing{\'{o}}lfsd{\'{o}}ttir and
                  Igor Walukiewicz},
  title        = {Robust Multi-property Combiners for Hash Functions Revisited},
  booktitle    = {Automata, Languages and Programming, 35th International Colloquium,
                  {ICALP} 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part
                  {II} - Track {B:} Logic, Semantics, and Theory of Programming {\&}
                  Track {C:} Security and Cryptography Foundations},
  series       = {Lecture Notes in Computer Science},
  volume       = {5126},
  pages        = {655--666},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70583-3\_53},
  doi          = {10.1007/978-3-540-70583-3\_53},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/FischlinLP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DziembowskiP08,
  author       = {Stefan Dziembowski and
                  Krzysztof Pietrzak},
  title        = {Leakage-Resilient Cryptography in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {240},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/240},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DziembowskiP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiltzPSY08,
  author       = {Eike Kiltz and
                  Krzysztof Pietrzak and
                  Martijn Stam and
                  Moti Yung},
  title        = {A New Randomness Extraction Paradigm for Hybrid Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {304},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/304},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiltzPSY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MaurerPR07,
  author       = {Ueli M. Maurer and
                  Krzysztof Pietrzak and
                  Renato Renner},
  editor       = {Alfred Menezes},
  title        = {Indistinguishability Amplification},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2007, 27th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4622},
  pages        = {130--149},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74143-5\_8},
  doi          = {10.1007/978-3-540-74143-5\_8},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MaurerPR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Pietrzak07,
  author       = {Krzysztof Pietrzak},
  editor       = {Moni Naor},
  title        = {Non-trivial Black-Box Combiners for Collision-Resistant Hash-Functions
                  Don't Exist},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Barcelona, Spain, May 20-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4515},
  pages        = {23--33},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72540-4\_2},
  doi          = {10.1007/978-3-540-72540-4\_2},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Pietrzak07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/PietrzakS07,
  author       = {Krzysztof Pietrzak and
                  Johan Sj{\"{o}}din},
  editor       = {Moni Naor},
  title        = {Range Extension for Weak PRFs; The Good, the Bad, and the Ugly},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Barcelona, Spain, May 20-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4515},
  pages        = {517--533},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72540-4\_30},
  doi          = {10.1007/978-3-540-72540-4\_30},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/PietrzakS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/DziembowskiP07,
  author       = {Stefan Dziembowski and
                  Krzysztof Pietrzak},
  title        = {Intrusion-Resilient Secret Sharing},
  booktitle    = {48th Annual {IEEE} Symposium on Foundations of Computer Science {(FOCS}
                  2007), October 20-23, 2007, Providence, RI, USA, Proceedings},
  pages        = {227--237},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/FOCS.2007.63},
  doi          = {10.1109/FOCS.2007.63},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/DziembowskiP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DodisP07,
  author       = {Yevgeniy Dodis and
                  Krzysztof Pietrzak},
  editor       = {Alex Biryukov},
  title        = {Improving the Security of MACs Via Randomized Message Preprocessing},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {414--433},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_26},
  doi          = {10.1007/978-3-540-74619-5\_26},
  timestamp    = {Sun, 25 Oct 2020 23:06:50 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/DodisP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/PietrzakW07,
  author       = {Krzysztof Pietrzak and
                  Douglas Wikstr{\"{o}}m},
  editor       = {Salil P. Vadhan},
  title        = {Parallel Repetition of Computationally Sound Protocols Revisited},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {86--102},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_5},
  doi          = {10.1007/978-3-540-70936-7\_5},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/PietrzakW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DziembowskiP07,
  author       = {Stefan Dziembowski and
                  Krzysztof Pietrzak},
  title        = {Intrusion-Resilient Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {359},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/359},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DziembowskiP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ch/Pietrzak2006,
  author       = {Krzysztof Pietrzak},
  title        = {Indistinguishability and composition of random systems},
  school       = {{ETH} Zurich},
  year         = {2006},
  url          = {https://d-nb.info/978735072},
  isbn         = {3-86628-063-7},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ch/Pietrzak2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Pietrzak06,
  author       = {Krzysztof Pietrzak},
  editor       = {Serge Vaudenay},
  title        = {Composition Implies Adaptive Security in Minicrypt},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4004},
  pages        = {328--338},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11761679\_20},
  doi          = {10.1007/11761679\_20},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Pietrzak06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/MaurerOPS06,
  author       = {Ueli M. Maurer and
                  Yvonne Anne Oswald and
                  Krzysztof Pietrzak and
                  Johan Sj{\"{o}}din},
  editor       = {Serge Vaudenay},
  title        = {Luby-Rackoff Ciphers from Weak Round Functions?},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4004},
  pages        = {391--408},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11761679\_24},
  doi          = {10.1007/11761679\_24},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/MaurerOPS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/Pietrzak06,
  author       = {Krzysztof Pietrzak},
  editor       = {Michele Bugliesi and
                  Bart Preneel and
                  Vladimiro Sassone and
                  Ingo Wegener},
  title        = {A Tight Bound for {EMAC}},
  booktitle    = {Automata, Languages and Programming, 33rd International Colloquium,
                  {ICALP} 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4052},
  pages        = {168--179},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11787006\_15},
  doi          = {10.1007/11787006\_15},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/Pietrzak06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DodisPP06,
  author       = {Yevgeniy Dodis and
                  Krzysztof Pietrzak and
                  Bartosz Przydatek},
  editor       = {Shai Halevi and
                  Tal Rabin},
  title        = {Separating Sources for Encryption and Secret Sharing},
  booktitle    = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC}
                  2006, New York, NY, USA, March 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3876},
  pages        = {601--616},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11681878\_31},
  doi          = {10.1007/11681878\_31},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DodisPP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaurerOPS06,
  author       = {Ueli Maurer and
                  Yvonne Anne Oswald and
                  Krzysztof Pietrzak and
                  Johan Sj{\"{o}}din},
  title        = {Luby-Rackoff Ciphers from Weak Round Functions?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {213},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/213},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaurerOPS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Pietrzak06,
  author       = {Krzysztof Pietrzak},
  title        = {Non-Trivial Black-Box Combiners for Collision-Resistant Hash-Functions
                  don't Exist},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {348},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/348},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Pietrzak06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaurerPR06,
  author       = {Ueli Maurer and
                  Krzysztof Pietrzak and
                  Renato Renner},
  title        = {Indistinguishability Amplification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {456},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/456},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaurerPR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Pietrzak05,
  author       = {Krzysztof Pietrzak},
  editor       = {Victor Shoup},
  title        = {Composition Does Not Imply Adaptive Security},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 14-18,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3621},
  pages        = {55--65},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11535218\_4},
  doi          = {10.1007/11535218\_4},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Pietrzak05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DodisOP05,
  author       = {Yevgeniy Dodis and
                  Roberto Oliveira and
                  Krzysztof Pietrzak},
  editor       = {Victor Shoup},
  title        = {On the Generic Insecurity of the Full Domain Hash},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 14-18,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3621},
  pages        = {449--466},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11535218\_27},
  doi          = {10.1007/11535218\_27},
  timestamp    = {Thu, 22 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/DodisOP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BellarePR05,
  author       = {Mihir Bellare and
                  Krzysztof Pietrzak and
                  Phillip Rogaway},
  editor       = {Victor Shoup},
  title        = {Improved Security Analyses for {CBC} MACs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 14-18,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3621},
  pages        = {527--545},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11535218\_32},
  doi          = {10.1007/11535218\_32},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BellarePR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/MaurerP04,
  author       = {Ueli M. Maurer and
                  Krzysztof Pietrzak},
  editor       = {Moni Naor},
  title        = {Composition of Random Systems: When Two Weak Make One Strong},
  booktitle    = {Theory of Cryptography, First Theory of Cryptography Conference, {TCC}
                  2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2951},
  pages        = {410--427},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24638-1\_23},
  doi          = {10.1007/978-3-540-24638-1\_23},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/MaurerP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/Pietrzak03,
  author       = {Krzysztof Pietrzak},
  title        = {On the parameterized complexity of the fixed alphabet shortest common
                  supersequence and longest common subsequence problems},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {67},
  number       = {4},
  pages        = {757--771},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0022-0000(03)00078-3},
  doi          = {10.1016/S0022-0000(03)00078-3},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcss/Pietrzak03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/MaurerP03,
  author       = {Ueli M. Maurer and
                  Krzysztof Pietrzak},
  editor       = {Eli Biham},
  title        = {The Security of Many-Round Luby-Rackoff Pseudo-Random Permutations},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Warsaw,
                  Poland, May 4-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2656},
  pages        = {544--561},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-39200-9\_34},
  doi          = {10.1007/3-540-39200-9\_34},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/MaurerP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics