default search action
Kamil Kluczniak
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Johannes Mono, Kamil Kluczniak, Tim Güneysu:
Improved Circuit Synthesis with Multi-Value Bootstrapping for FHEW-like Schemes. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(4): 633-656 (2024) - [i15]Kamil Kluczniak, Leonard Schild:
FDFB2: Functional Bootstrapping via Sparse Polynomial Multiplication. IACR Cryptol. ePrint Arch. 2024: 1376 (2024) - 2023
- [j6]Kamil Kluczniak, Leonard Schild:
FDFB: Full Domain Functional Bootstrapping Towards Practical Fully Homomorphic Encryption. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(1): 501-537 (2023) - [i14]Kamil Kluczniak, Giacomo Santato:
On Circuit Private, Multikey and Threshold Approximate Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2023: 301 (2023) - [i13]Johannes Mono, Kamil Kluczniak, Tim Güneysu:
Improved Circuit Synthesis with Amortized Bootstrapping for FHEW-like Schemes. IACR Cryptol. ePrint Arch. 2023: 1223 (2023) - 2022
- [c25]Kamil Kluczniak:
NTRU-v-um: Secure Fully Homomorphic Encryption from NTRU with Small Modulus. CCS 2022: 1783-1797 - [c24]Lucjan Hanzlik, Kamil Kluczniak:
Explainable Arguments. Financial Cryptography 2022: 59-79 - [c23]Kamil Kluczniak:
Lockable Obfuscation from Circularly Insecure Fully Homomorphic Encryption. Public Key Cryptography (2) 2022: 69-98 - [i12]Kamil Kluczniak:
NTRU-ν-um: Secure Fully Homomorphic Encryption from NTRU with Small Modulus. IACR Cryptol. ePrint Arch. 2022: 89 (2022) - [i11]Kamil Kluczniak:
Circuit Privacy for FHEW/TFHE-Style Fully Homomorphic Encryption in Practice. IACR Cryptol. ePrint Arch. 2022: 1459 (2022) - 2021
- [i10]Kamil Kluczniak, Leonard Schild:
FDFB: Full Domain Functional Bootstrapping Towards Practical Fully Homomorphic Encryption. CoRR abs/2109.02731 (2021) - [i9]Kamil Kluczniak, Leonard Schild:
FDFB: Full Domain Functional Bootstrapping Towards Practical Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2021: 1135 (2021) - [i8]Kamil Kluczniak:
Lockable Obfuscation from Circularly Insecure Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2021: 1324 (2021) - 2020
- [i7]Kamil Kluczniak:
Witness Encryption from Garbled Circuit and Multikey Fully Homomorphic Encryption Techniques. IACR Cryptol. ePrint Arch. 2020: 1502 (2020)
2010 – 2019
- 2019
- [j5]Lucjan Hanzlik, Kamil Kluczniak, Miroslaw Kutylowski:
CTRL-PACE: Controlled Randomness for e-Passport Password Authentication. Fundam. Informaticae 169(4): 295-330 (2019) - [j4]Kamil Kluczniak, Jianfeng Wang, Xiaofeng Chen, Miroslaw Kutylowski:
Multi-device anonymous authentication. Int. J. Inf. Sec. 18(2): 181-197 (2019) - [c22]Michael Backes, Nico Döttling, Lucjan Hanzlik, Kamil Kluczniak, Jonas Schneider:
Ring Signatures: Logarithmic-Size, No Setup - from Standard Assumptions. EUROCRYPT (3) 2019: 281-311 - [c21]Miroslaw Kutylowski, Jakub Lemiesz, Marta Slowik, Marcin Slowik, Kamil Kluczniak, Maciej Gebala:
GDPR-Compliant Reputation System Based on Self-certifying Domain Signatures. ISPEC 2019: 341-361 - [p1]Przemyslaw Blaskiewicz, Lucjan Hanzlik, Kamil Kluczniak, Lukasz Krzywiecki, Miroslaw Kutylowski, Marcin Slowik, Marta Wszola:
Pseudonymous Signature Schemes. Advances in Cyber Security 2019: 185-255 - [i6]Michael Backes, Nico Döttling, Lucjan Hanzlik, Kamil Kluczniak, Jonas Schneider:
Ring Signatures: Logarithmic-Size, No Setup - from Standard Assumptions. IACR Cryptol. ePrint Arch. 2019: 196 (2019) - 2018
- [j3]Lukasz Krzywiecki, Kamil Kluczniak, Patryk Koziel, Nisha Panwar:
Privacy-oriented dependency via deniable SIGMA protocol. Comput. Secur. 79: 53-67 (2018) - [j2]Kamil Kluczniak, Lucjan Hanzlik, Jianfeng Wang:
Efficient VLR group signatures for smart cards. Int. J. Embed. Syst. 10(3): 203-216 (2018) - [c20]Michael Backes, Lucjan Hanzlik, Kamil Kluczniak, Jonas Schneider:
Signatures with Flexible Public Key: Introducing Equivalence Classes for Public Keys. ASIACRYPT (2) 2018: 405-434 - [e1]Man Ho Au, Siu-Ming Yiu, Jin Li, Xiapu Luo, Cong Wang, Aniello Castiglione, Kamil Kluczniak:
Network and System Security - 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings. Lecture Notes in Computer Science 11058, Springer 2018, ISBN 978-3-030-02743-8 [contents] - [i5]Kamil Kluczniak, Man Ho Au:
Fine-Tuning Decentralized Anonymous Payment Systems based on Arguments for Arithmetic Circuit Satisfiability. IACR Cryptol. ePrint Arch. 2018: 176 (2018) - [i4]Michael Backes, Lucjan Hanzlik, Kamil Kluczniak, Jonas Schneider:
Signatures with Flexible Public Key: A Unified Approach to Privacy-Preserving Signatures (Full Version). IACR Cryptol. ePrint Arch. 2018: 191 (2018) - [i3]Miroslaw Kutylowski, Lucjan Hanzlik, Kamil Kluczniak:
Towards Practical Security of Pseudonymous Signature on the BSI eIDAS Token. IACR Cryptol. ePrint Arch. 2018: 1148 (2018) - 2017
- [j1]Jianfeng Wang, Xiaofeng Chen, Jin Li, Kamil Kluczniak, Miroslaw Kutylowski:
TrDup: enhancing secure data deduplication with user traceability in cloud computing. Int. J. Web Grid Serv. 13(3): 270-289 (2017) - [c19]Lucjan Hanzlik, Kamil Kluczniak:
Two-Move and Setup-Free Blind Signatures with Perfect Blindness. APKC@AsiaCCS 2017: 1-11 - 2016
- [c18]Miroslaw Kutylowski, Lucjan Hanzlik, Kamil Kluczniak:
Pseudonymous Signature on eIDAS Token - Implementation Based Privacy Threats. ACISP (2) 2016: 467-477 - [c17]Lucjan Hanzlik, Kamil Kluczniak:
A Short Paper on Blind Signatures from Knowledge Assumptions. Financial Cryptography 2016: 535-543 - [c16]Kamil Kluczniak, Lucjan Hanzlik, Miroslaw Kutylowski:
A Formal Concept of Domain Pseudonymous Signatures. ISPEC 2016: 238-254 - [c15]Lucjan Hanzlik, Kamil Kluczniak, Miroslaw Kutylowski:
Controlled Randomness - A Defense Against Backdoors in Cryptographic Devices. Mycrypt 2016: 215-232 - [c14]Miroslaw Kutylowski, Jacek Cichon, Lucjan Hanzlik, Kamil Kluczniak, Xiaofeng Chen, Jianfeng Wang:
Protecting Electronic Signatures in Case of Key Leakage. Mycrypt 2016: 252-274 - [c13]Kamil Kluczniak, Jianfeng Wang, Xiaofeng Chen, Miroslaw Kutylowski:
Multi-device Anonymous Authentication. NSS 2016: 21-36 - [c12]Wojciech Wodo, Lucjan Hanzlik, Kamil Kluczniak:
Computations on Private Sets and their Application to Biometric based Authentication Systems. SECRYPT 2016: 452-457 - [c11]Lucjan Hanzlik, Kamil Kluczniak, Miroslaw Kutylowski, Shlomi Dolev:
Local Self-Organization with Strong Privacy Protection. Trustcom/BigDataSE/ISPA 2016: 775-782 - [i2]Kamil Kluczniak:
Domain-Specific Pseudonymous Signatures Revisited. IACR Cryptol. ePrint Arch. 2016: 70 (2016) - [i1]Lucjan Hanzlik, Kamil Kluczniak:
Security Analysis of ePrint Report 2016/500 "Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups". IACR Cryptol. ePrint Arch. 2016: 512 (2016) - 2015
- [c10]Jianfeng Wang, Xiaofeng Chen, Jin Li, Kamil Kluczniak, Miroslaw Kutylowski:
A New Secure Data Deduplication Approach Supporting User Traceability. BWCCA 2015: 120-124 - [c9]Kamil Kluczniak, Lucjan Hanzlik, Przemyslaw Kubiak, Miroslaw Kutylowski:
Anonymous Evaluation System. NSS 2015: 283-299 - [c8]Lucjan Hanzlik, Kamil Kluczniak, Miroslaw Kutylowski:
Insecurity of Anonymous Login with German Personal Identity Cards. SocialSec 2015: 39-43 - 2014
- [c7]Lucjan Hanzlik, Kamil Kluczniak:
A Short Paper on How to Improve U-Prove Using Self-Blindable Certificates. Financial Cryptography 2014: 273-282 - [c6]Lucjan Hanzlik, Kamil Kluczniak, Miroslaw Kutylowski:
Attack on U-Prove Revocation Scheme from FC'13 - Passing Verification by Revoked Users. Financial Cryptography 2014: 283-290 - [c5]Miroslaw Kutylowski, Lucjan Hanzlik, Kamil Kluczniak, Przemyslaw Kubiak, Lukasz Krzywiecki:
Forbidden City Model - Towards a Practice Relevant Framework for Designing Cryptographic Protocols. ISPEC 2014: 42-59 - [c4]Lucjan Hanzlik, Kamil Kluczniak:
Attack against a Pairing Based Anonymous Authentication Protocol. SOFSEM 2014: 306-314 - 2013
- [c3]Lucjan Hanzlik, Kamil Kluczniak, Miroslaw Kutylowski, Lukasz Krzywiecki:
Mutual Restricted Identification. EuroPKI 2013: 119-133 - [c2]Lucjan Hanzlik, Kamil Kluczniak, Lukasz Krzywiecki, Miroslaw Kutylowski:
Mutual Chip Authentication. TrustCom/ISPA/IUCC 2013: 1683-1689 - 2012
- [c1]Lucjan Hanzlik, Kamil Kluczniak, Przemyslaw Kubiak, Miroslaw Kutylowski:
Restricted Identification without Group Keys. TrustCom 2012: 1194-1199
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 01:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint