default search action
Stanislaw Jarecki
Person information
- affiliation: University of California, Irvine, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Clemente Galdi, Stanislaw Jarecki:
Special Issue on 13th International Conference on Security and Cryptography for Networks (SCN 2022). Inf. Comput. 296: 105135 (2024) - [c71]Manuel Barbosa, Kai Gellert, Julia Hesse, Stanislaw Jarecki:
Bare PAKE: Universally Composable Key Exchange from Just Passwords. CRYPTO (2) 2024: 183-217 - [c70]Seoyeon Hwang, Stanislaw Jarecki, Zane Karl, Elina van Kempen, Gene Tsudik:
PsfIVA: Privacy-Preserving Identity Verification Methods for Accountless Users via Private List Intersection and Variants. ESORICS (3) 2024: 362-382 - [i35]Manuel Barbosa, Kai Gellert, Julia Hesse, Stanislaw Jarecki:
Bare PAKE: Universally Composable Key Exchange from just Passwords. IACR Cryptol. ePrint Arch. 2024: 234 (2024) - [i34]Afonso Arriaga, Manuel Barbosa, Stanislaw Jarecki, Marjan Skrobot:
C'est très CHIC: A compact password-authenticated key exchange from lattice-based KEM. IACR Cryptol. ePrint Arch. 2024: 308 (2024) - [i33]Manuel B. Santos, Dimitris Mouris, Mehmet Ugurbil, Stanislaw Jarecki, José Reis, Shubho Sengupta, Miguel de Vega:
Curl: Private LLMs through Wavelet-Encoded Look-Up Tables. IACR Cryptol. ePrint Arch. 2024: 1127 (2024) - [i32]Yanqi Gu, Stanislaw Jarecki, Pawel Kedzior, Phillip Nazarian, Jiayu Xu:
Threshold PAKE with Security against Compromise of all Servers. IACR Cryptol. ePrint Arch. 2024: 1455 (2024) - [i31]Stefan Dziembowski, Stanislaw Jarecki, Pawel Kedzior, Hugo Krawczyk, Chan Nam Ngo, Jiayu Xu:
Password-Protected Threshold Signatures. IACR Cryptol. ePrint Arch. 2024: 1469 (2024) - 2023
- [c69]Karim Eldefrawy, Nicholas Genise, Stanislaw Jarecki:
Short Concurrent Covert Authenticated Key Exchange (Short cAKE). ASIACRYPT (8) 2023: 75-109 - [c68]Julia Hesse, Stanislaw Jarecki, Hugo Krawczyk, Christopher Wood:
Password-Authenticated TLS via OPAQUE and Post-Handshake Authentication. EUROCRYPT (5) 2023: 98-127 - [c67]Bruno Freitas Dos Santos, Yanqi Gu, Stanislaw Jarecki:
Randomized Half-Ideal Cipher on Groups with Applications to UC (a)PAKE. EUROCRYPT (5) 2023: 128-156 - [i30]Julia Hesse, Stanislaw Jarecki, Hugo Krawczyk, Christopher Wood:
Password-Authenticated TLS via OPAQUE and Post-Handshake Authentication. IACR Cryptol. ePrint Arch. 2023: 220 (2023) - [i29]Bruno Freitas Dos Santos, Yanqi Gu, Stanislaw Jarecki:
Randomized Half-Ideal Cipher on Groups with applications to UC (a)PAKE. IACR Cryptol. ePrint Arch. 2023: 295 (2023) - [i28]Karim Eldafrawy, Nicholas Genise, Stanislaw Jarecki:
Short Concurrent Covert Authenticated Key Exchange (Short cAKE). IACR Cryptol. ePrint Arch. 2023: 1418 (2023) - [i27]Miguel de Vega, Andrei Lapets, Stanislaw Jarecki, Wicher Malten, Mehmet Ugurbil, Wyatt Howe:
Evaluation of Arithmetic Sum-of-Products Expressions in Linear Secret Sharing Schemes with a Non-Interactive Computation Phase. IACR Cryptol. ePrint Arch. 2023: 1740 (2023) - 2022
- [c66]Bruno Freitas Dos Santos, Yanqi Gu, Stanislaw Jarecki, Hugo Krawczyk:
Asymmetric PAKE with Low Computation and communication. EUROCRYPT (2) 2022: 127-156 - [e3]Clemente Galdi, Stanislaw Jarecki:
Security and Cryptography for Networks - 13th International Conference, SCN 2022, Amalfi, Italy, September 12-14, 2022, Proceedings. Lecture Notes in Computer Science 13409, Springer 2022, ISBN 978-3-031-14790-6 [contents] - 2021
- [j13]Stanislaw Jarecki, Mohammed Jubur, Hugo Krawczyk, Nitesh Saxena, Maliheh Shirvanian:
Two-factor Password-authenticated Key Exchange with End-to-end Security. ACM Trans. Priv. Secur. 24(3): 17:1-17:37 (2021) - [c65]Yanqi Gu, Stanislaw Jarecki, Hugo Krawczyk:
KHAPE: Asymmetric PAKE from Key-Hiding Key Exchange. CRYPTO (4) 2021: 701-730 - [c64]Stanislaw Jarecki, Hugo Krawczyk, Jiayu Xu:
On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding. Public Key Cryptography (2) 2021: 380-409 - [c63]Maliheh Shirvanian, Christopher Robert Price, Mohammed Jubur, Nitesh Saxena, Stanislaw Jarecki, Hugo Krawczyk:
A hidden-password online password manager. SAC 2021: 1683-1686 - [i26]Stanislaw Jarecki, Hugo Krawczyk, Jiayu Xu:
On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding. IACR Cryptol. ePrint Arch. 2021: 273 (2021) - [i25]Yanqi Gu, Stanislaw Jarecki, Hugo Krawczyk:
KHAPE: Asymmetric PAKE from Key-Hiding Key Exchange. IACR Cryptol. ePrint Arch. 2021: 873 (2021) - 2020
- [c62]Michel Abdalla, Manuel Barbosa, Tatiana Bradley, Stanislaw Jarecki, Jonathan Katz, Jiayu Xu:
Universally Composable Relaxed Password Authenticated Key Exchange. CRYPTO (1) 2020: 278-307 - [c61]Thomas Agrikola, Geoffroy Couteau, Yuval Ishai, Stanislaw Jarecki, Amit Sahai:
On Pseudorandom Encodings. TCC (3) 2020: 639-669 - [e2]Stanislaw Jarecki:
Topics in Cryptology - CT-RSA 2020 - The Cryptographers' Track at the RSA Conference 2020, San Francisco, CA, USA, February 24-28, 2020, Proceedings. Lecture Notes in Computer Science 12006, Springer 2020, ISBN 978-3-030-40185-6 [contents] - [i24]Michel Abdalla, Manuel Barbosa, Tatiana Bradley, Stanislaw Jarecki, Jonathan Katz, Jiayu Xu:
Universally Composable Relaxed Password Authenticated Key Exchange. IACR Cryptol. ePrint Arch. 2020: 320 (2020) - [i23]Thomas Agrikola, Geoffroy Couteau, Yuval Ishai, Stanislaw Jarecki, Amit Sahai:
On Pseudorandom Encodings. IACR Cryptol. ePrint Arch. 2020: 445 (2020)
2010 – 2019
- 2019
- [j12]Maliheh Shirvanian, Nitesh Saxena, Stanislaw Jarecki, Hugo Krawczyk:
Building and Studying a Password Store that Perfectly Hides Passwords from Itself. IEEE Trans. Dependable Secur. Comput. 16(5): 770-782 (2019) - [c60]Tatiana Bradley, Jan Camenisch, Stanislaw Jarecki, Anja Lehmann, Gregory Neven, Jiayu Xu:
Password-Authenticated Public-Key Encryption. ACNS 2019: 442-462 - [c59]Stanislaw Jarecki, Hugo Krawczyk, Jason K. Resch:
Updatable Oblivious Key Management for Storage Systems. CCS 2019: 379-393 - [c58]Tatiana Bradley, Stanislaw Jarecki, Jiayu Xu:
Strong Asymmetric PAKE Based on Trapdoor CKEM. CRYPTO (3) 2019: 798-825 - [i22]Tatiana Bradley, Jan Camenisch, Stanislaw Jarecki, Anja Lehmann, Gregory Neven, Jiayu Xu:
Password-Authenticated Public-Key Encryption. IACR Cryptol. ePrint Arch. 2019: 199 (2019) - [i21]Tatiana Bradley, Stanislaw Jarecki, Jiayu Xu:
Strong Asymmetric PAKE based on Trapdoor CKEM. IACR Cryptol. ePrint Arch. 2019: 647 (2019) - [i20]Stanislaw Jarecki, Hugo Krawczyk, Jason K. Resch:
Updatable Oblivious Key Management for Storage Systems. IACR Cryptol. ePrint Arch. 2019: 1275 (2019) - 2018
- [c57]Stanislaw Jarecki, Boyang Wei:
3PC ORAM with Low Latency, Low Bandwidth, and Fast Batch Retrieval. ACNS 2018: 360-378 - [c56]Stanislaw Jarecki, Hugo Krawczyk, Jiayu Xu:
OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-computation Attacks. EUROCRYPT (3) 2018: 456-486 - [c55]Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena:
Two-Factor Authentication with End-to-End Password Security. Public Key Cryptography (2) 2018: 431-461 - [c54]Stanislaw Jarecki:
Efficient Covert Two-Party Computation. Public Key Cryptography (1) 2018: 644-674 - [c53]Jung Yeon Hwang, Stanislaw Jarecki, Taekyoung Kwon, Joohee Lee, Ji Sun Shin, Jiayu Xu:
Round-Reduced Modular Construction of Asymmetric Password-Authenticated Key Exchange. SCN 2018: 485-504 - [i19]Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena:
Two-Factor Authentication with End-to-End Password Security. IACR Cryptol. ePrint Arch. 2018: 33 (2018) - [i18]Stanislaw Jarecki, Hugo Krawczyk, Jiayu Xu:
OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-Computation Attacks. IACR Cryptol. ePrint Arch. 2018: 163 (2018) - [i17]Stanislaw Jarecki, Boyang Wei:
3PC ORAM with Low Latency, Low Bandwidth, and Fast Batch Retrieval. IACR Cryptol. ePrint Arch. 2018: 347 (2018) - [i16]Maliheh Shirvanian, Stanislaw Jarecki, Hugo Krawczyk, Nitesh Saxena:
SPHINX: A Password Store that Perfectly Hides Passwords from Itself. IACR Cryptol. ePrint Arch. 2018: 695 (2018) - [i15]Stanislaw Jarecki, Hugo Krawczyk, Jason K. Resch:
Threshold Partially-Oblivious PRFs with Applications to Key Management. IACR Cryptol. ePrint Arch. 2018: 733 (2018) - 2017
- [c52]Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu:
TOPPSS: Cost-Minimal Password-Protected Secret Sharing Based on Threshold OPRF. ACNS 2017: 39-58 - [c51]Maliheh Shirvanian, Stanislaw Jarecki, Hugo Krawczyk, Nitesh Saxena:
SPHINX: A Password Store that Perfectly Hides Passwords from Itself. ICDCS 2017: 1094-1104 - [i14]Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu:
TOPPSS: Cost-minimal Password-Protected Secret Sharing based on Threshold OPRF. IACR Cryptol. ePrint Arch. 2017: 363 (2017) - 2016
- [c50]Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena:
Device-Enhanced Password Protocols with Optimal Online-Offline Protection. AsiaCCS 2016: 177-188 - [c49]Chongwon Cho, Dana Dachman-Soled, Stanislaw Jarecki:
Efficient Concurrent Covert Computation of String Equality and Set Intersection. CT-RSA 2016: 164-179 - [c48]Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu:
Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online). EuroS&P 2016: 276-291 - [i13]Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu:
Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online). IACR Cryptol. ePrint Arch. 2016: 144 (2016) - [i12]Stanislaw Jarecki:
Efficient Covert Two-Party Computation. IACR Cryptol. ePrint Arch. 2016: 1032 (2016) - 2015
- [c47]Sky Faber, Stanislaw Jarecki, Sotirios Kentros, Boyang Wei:
Three-Party ORAM for Secure Computation. ASIACRYPT (1) 2015: 360-385 - [c46]Sky Faber, Stanislaw Jarecki, Hugo Krawczyk, Quan Nguyen, Marcel-Catalin Rosu, Michael Steiner:
Rich Queries on Encrypted Data: Beyond Exact Matches. ESORICS (2) 2015: 123-145 - [i11]Sky Faber, Stanislaw Jarecki, Hugo Krawczyk, Quan Nguyen, Marcel-Catalin Rosu, Michael Steiner:
Rich Queries on Encrypted Data: Beyond Exact Matches. IACR Cryptol. ePrint Arch. 2015: 927 (2015) - [i10]Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena:
Device-Enhanced Password Protocols with Optimal Online-Offline Protection. IACR Cryptol. ePrint Arch. 2015: 1099 (2015) - 2014
- [c45]Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk:
Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model. ASIACRYPT (2) 2014: 233-253 - [c44]David Cash, Joseph Jaeger, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, Michael Steiner:
Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation. NDSS 2014 - [c43]Maliheh Shirvanian, Stanislaw Jarecki, Nitesh Saxena, Naveen Nathan:
Two-Factor Authentication Resilient to Server Compromise Using Mix-Bandwidth Devices. NDSS 2014 - [c42]Stanislaw Jarecki:
Practical Covert Authentication. Public Key Cryptography 2014: 611-629 - [i9]Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk:
Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model. IACR Cryptol. ePrint Arch. 2014: 650 (2014) - [i8]David Cash, Joseph Jaeger, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, Michael Steiner:
Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation. IACR Cryptol. ePrint Arch. 2014: 853 (2014) - 2013
- [c41]Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, Michael Steiner:
Outsourced symmetric private information retrieval. CCS 2013: 875-888 - [c40]David Cash, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, Michael Steiner:
Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries. CRYPTO (1) 2013: 353-373 - [i7]David Cash, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, Michael Steiner:
Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries. IACR Cryptol. ePrint Arch. 2013: 169 (2013) - [i6]Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, Michael Steiner:
Outsourced Symmetric Private Information Retrieval. IACR Cryptol. ePrint Arch. 2013: 720 (2013) - 2012
- [j11]Jung Hee Cheon, Stanislaw Jarecki, Jae Hong Seo:
Multi-Party Privacy-Preserving Set Intersection with Quasi-Linear Complexity. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(8): 1366-1378 (2012) - 2011
- [j10]Jung Hee Cheon, Stanislaw Jarecki, Taekyoung Kwon, Mun-Kyu Lee:
Fast Exponentiation Using Split Exponents. IEEE Trans. Inf. Theory 57(3): 1816-1826 (2011) - [j9]Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Flexible Robust Group Key Agreement. IEEE Trans. Parallel Distributed Syst. 22(5): 879-886 (2011) - [c39]Ali Bagherzandi, Stanislaw Jarecki, Nitesh Saxena, Yanbin Lu:
Password-protected secret sharing. CCS 2011: 433-444 - 2010
- [j8]Stanislaw Jarecki, Nitesh Saxena:
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol. IEEE Trans. Inf. Forensics Secur. 5(4): 739-749 (2010) - [c38]Ali Bagherzandi, Stanislaw Jarecki:
Identity-Based Aggregate and Multi-Signature Schemes Based on RSA. Public Key Cryptography 2010: 480-498 - [c37]Stanislaw Jarecki, Nitesh Saxena:
Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model. SCN 2010: 253-270 - [c36]Stanislaw Jarecki, Xiaomin Liu:
Fast Secure Computation of Set Intersection. SCN 2010: 418-435 - [i5]Jung Hee Cheon, Stanislaw Jarecki, Jae Hong Seo:
Multi-Party Privacy-Preserving Set Intersection with Quasi-Linear Complexity. IACR Cryptol. ePrint Arch. 2010: 512 (2010) - [i4]Stanislaw Jarecki, Ali Bagherzandi, Nitesh Saxena, Yanbin Lu:
Password-Protected Secret Sharing. IACR Cryptol. ePrint Arch. 2010: 561 (2010)
2000 – 2009
- 2009
- [j7]Michael Sirivianos, Xiaowei Yang, Stanislaw Jarecki:
Robust and efficient incentives for cooperative content distribution. IEEE/ACM Trans. Netw. 17(6): 1766-1779 (2009) - [c35]Stanislaw Jarecki, Xiaomin Liu:
Private Mutual Authentication and Conditional Oblivious Transfer. CRYPTO 2009: 90-107 - [c34]Emiliano De Cristofaro, Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Privacy-Preserving Policy-Based Information Transfer. Privacy Enhancing Technologies 2009: 164-184 - [c33]Stanislaw Jarecki, Xiaomin Liu:
Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection. TCC 2009: 577-594 - [e1]Stanislaw Jarecki, Gene Tsudik:
Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings. Lecture Notes in Computer Science 5443, Springer 2009, ISBN 978-3-642-00467-4 [contents] - 2008
- [c32]Ali Bagherzandi, Jung Hee Cheon, Stanislaw Jarecki:
Multisignatures secure under the discrete logarithm assumption and a generalized forking lemma. CCS 2008: 449-458 - [c31]Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange. CT-RSA 2008: 352-369 - [c30]Stanislaw Jarecki, Josh Olsen:
Proactive RSA with Non-interactive Signing. Financial Cryptography 2008: 215-230 - [c29]Stanislaw Jarecki, Xiaomin Liu:
Affiliation-Hiding Envelope and Authentication Schemes with Efficient Support for Multiple Credentials. ICALP (2) 2008: 715-726 - [c28]Ali Bagherzandi, Stanislaw Jarecki:
Multisignatures Using Proofs of Secret Key Possession, as Secure as the Diffie-Hellman Problem. SCN 2008: 218-235 - 2007
- [j6]Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. J. Cryptol. 20(1): 51-83 (2007) - [j5]Rosario Gennaro, Tal Rabin, Stanislaw Jarecki, Hugo Krawczyk:
Robust and Efficient Sharing of RSA Functions. J. Cryptol. 20(3): 393 (2007) - [j4]Eu-Jin Goh, Stanislaw Jarecki, Jonathan Katz, Nan Wang:
Efficient Signature Schemes with Tight Reductions to the Diffie-Hellman Problems. J. Cryptol. 20(4): 493-514 (2007) - [c27]Stanislaw Jarecki, Xiaomin Liu:
Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes. ACNS 2007: 270-287 - [c26]Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Robust group key agreement using short broadcasts. CCS 2007: 411-420 - [c25]Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement. CT-RSA 2007: 287-308 - [c24]Stanislaw Jarecki, Vitaly Shmatikov:
Efficient Two-Party Secure Computation on Committed Inputs. EUROCRYPT 2007: 97-114 - [c23]Michael Sirivianos, Jong Han Park, Xiaowei Yang, Stanislaw Jarecki:
Dandelion: Cooperative Content Distribution with Robust Incentives. USENIX ATC 2007: 157-170 - 2006
- [j3]Claude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Secure acknowledgment aggregation and multisignatures with limited robustness. Comput. Networks 50(10): 1639-1652 (2006) - [c22]Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Authentication for Paranoids: Multi-party Secret Handshakes. ACNS 2006: 325-339 - 2005
- [c21]Stanislaw Jarecki, Vitaly Shmatikov:
Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure. Financial Cryptography 2005: 172-187 - [c20]Stanislaw Jarecki, Nitesh Saxena:
Further Simplifications in Proactive RSA Signatures. TCC 2005: 510-528 - 2004
- [c19]Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik:
Secret Handshakes from CA-Oblivious Encryption. ASIACRYPT 2004: 293-307 - [c18]Yevgeniy Dodis, Michael J. Freedman, Stanislaw Jarecki, Shabsi Walfish:
Versatile padding schemes for joint signature and encryption. CCS 2004: 344-353 - [c17]Stanislaw Jarecki, Vitaly Shmatikov:
Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme. EUROCRYPT 2004: 590-608 - [c16]Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik:
Brief announcement: secret handshakes from CA-oblivious encryption. PODC 2004: 394 - [c15]Stanislaw Jarecki, Nitesh Saxena, Jeong Hyun Yi:
An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol. SASN 2004: 1-9 - [c14]Claude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
A Robust Multisignatures Scheme with Applications to Acknowledgment Aggregation. SCN 2004: 193-207 - [i3]Yevgeniy Dodis, Michael J. Freedman, Stanislaw Jarecki, Shabsi Walfish:
Optimal Signcryption from Any Trapdoor Permutation. IACR Cryptol. ePrint Arch. 2004: 20 (2004) - [i2]Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik:
Secret Handshakes from CA-Oblivious Encryption. IACR Cryptol. ePrint Arch. 2004: 133 (2004) - 2003
- [c13]Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Secure Applications of Pedersen's Distributed Key Generation Protocol. CT-RSA 2003: 373-390 - [c12]Eu-Jin Goh, Stanislaw Jarecki:
A Signature Scheme as Secure as the Diffie-Hellman Problem. EUROCRYPT 2003: 401-415 - 2002
- [c11]Philippe Golle, Stanislaw Jarecki, Ilya Mironov:
Cryptographic Primitives Enforcing Communication and Storage Complexity. Financial Cryptography 2002: 120-135 - [c10]Stanislaw Jarecki, Patrick Lincoln, Vitaly Shmatikov:
Negotiated Privacy: (Extended Abstract). ISSS 2002: 96-111 - 2001
- [b1]Stanislaw Jarecki:
Efficient threshold cryptosystems. Massachusetts Institute of Technology, Cambridge, MA, USA, 2001 - [j2]Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Robust Threshold DSS Signatures. Inf. Comput. 164(1): 54-84 (2001) - 2000
- [j1]Rosario Gennaro, Tal Rabin, Stanislaw Jarecki, Hugo Krawczyk:
Robust and Efficient Sharing of RSA Functions. J. Cryptol. 13(2): 273-300 (2000) - [c9]Stanislaw Jarecki, Anna Lysyanskaya:
Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures. EUROCRYPT 2000: 221-242
1990 – 1999
- 1999
- [c8]Ran Canetti, Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Adaptive Security for Threshold Cryptosystems. CRYPTO 1999: 98-115 - [c7]Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. EUROCRYPT 1999: 295-310 - 1997
- [c6]Amir Herzberg, Markus Jakobsson, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung:
Proactive Public Key and Signature Systems. CCS 1997: 100-110 - [c5]Stanislaw Jarecki, Andrew M. Odlyzko:
An Efficient Micropayment System Based on Probabilistic Polling. Financial Cryptography 1997: 173-192 - 1996
- [c4]Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Robust and Efficient Sharing of RSA Functions. CRYPTO 1996: 157-172 - [c3]Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Robust Threshold DSS Signatures. EUROCRYPT 1996: 354-371 - 1995
- [c2]Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung:
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage. CRYPTO 1995: 339-352 - [i1]Wlodek Zadrozny, Marcin Szummer, Stanislaw Jarecki, David E. Johnson, Leora Morgenstern:
NL Understanding with a Grammar of Constructions. CoRR cmp-lg/9501002 (1995) - 1994
- [c1]Wlodek Zadrozny, Marcin Szummer, Stanislaw Jarecki, David E. Johnson, Leora Morgenstern:
NL Understanding with a Grammar of Constructions. COLING 1994: 1289-1293
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 01:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint