


default search action
Przemyslaw Kubiak 0001
Person information
- affiliation: Wrocław University of Technology, Poland
Other persons with the same name
- Przemyslaw Kubiak 0002 ![0000-0003-0225-9609 [0000-0003-0225-9609]](https://dblp.dagstuhl.de/img/orcid-mark.12x12.png) — Łódź University of Technology, Poland — Łódź University of Technology, Poland
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2013
 [j1]Blazej Brzezniak, Lucjan Hanzlik, Przemyslaw Kubiak, Miroslaw Kutylowski: [j1]Blazej Brzezniak, Lucjan Hanzlik, Przemyslaw Kubiak, Miroslaw Kutylowski:
 Attack against Ibrahim's Distributed Key Generation for RSA. Int. J. Netw. Secur. 15(4): 313-316 (2013)
Conference and Workshop Papers
- 2025
 [c30]Adrian Cinal, Przemyslaw Kubiak, Miroslaw Kutylowski, Gabriel Wechta: [c30]Adrian Cinal, Przemyslaw Kubiak, Miroslaw Kutylowski, Gabriel Wechta:
 Anamorphic Monero Transactions: The Threat of Bypassing Anti-money Laundering Laws. ESORICS (2) 2025: 103-123
- 2024
 [c29]Przemyslaw Kubiak [c29]Przemyslaw Kubiak , Oliwer Sobolewski , Oliwer Sobolewski : :
 HBSS+: Simple Hash-Based Stateless Signatures Revisited - (Preliminary Version, Short Paper). CSCML 2024: 368-379
 [c28]Konrad S. Wrona [c28]Konrad S. Wrona , Oliwer Sobolewski, Joanna Sliwa, Miroslaw Kutylowski, Przemyslaw Kubiak, Gabriel Wechta, Adrian Cinal, Mateusz Lesniak , Oliwer Sobolewski, Joanna Sliwa, Miroslaw Kutylowski, Przemyslaw Kubiak, Gabriel Wechta, Adrian Cinal, Mateusz Lesniak , Michal Wronski: , Michal Wronski:
 Quantum-Resistant One-to-One Communication for Underwater Acoustic Networks. MILCOM 2024: 190-195
 [c27]Oliwer Sobolewski, Konrad S. Wrona [c27]Oliwer Sobolewski, Konrad S. Wrona , Adrian Cinal, Gabriel Wechta, Joanna Sliwa, Mateusz Lesniak , Adrian Cinal, Gabriel Wechta, Joanna Sliwa, Mateusz Lesniak , Michal Wronski, Miroslaw Kutylowski, Przemyslaw Kubiak: , Michal Wronski, Miroslaw Kutylowski, Przemyslaw Kubiak:
 Quantum-Resistant Key Management for Underwater Acoustic Multicast Communication. MILCOM 2024: 196-201
- 2021
 [c26]Patryk Koziel, Przemyslaw Kubiak, Miroslaw Kutylowski: [c26]Patryk Koziel, Przemyslaw Kubiak, Miroslaw Kutylowski:
 PACE with Mutual Authentication - Towards an Upgraded eID in Europe. ESORICS (2) 2021: 501-519
 [c25]Miroslaw Kutylowski, Przemyslaw Kubiak, Patryk Koziel, Yanmei Cao: [c25]Miroslaw Kutylowski, Przemyslaw Kubiak, Patryk Koziel, Yanmei Cao:
 Poster: eID in Europe - Password Authentication Revisited. Networking 2021: 1-3
- 2020
 [c24]Przemyslaw Kubiak, Miroslaw Kutylowski: [c24]Przemyslaw Kubiak, Miroslaw Kutylowski:
 Preventing a Fork in a Blockchain - David Fighting Goliath. TrustCom 2020: 1044-1051
- 2019
 [c23]Miroslaw Kutylowski, Przemyslaw Kubiak [c23]Miroslaw Kutylowski, Przemyslaw Kubiak : :
 Privacy and Security Analysis of PACE GM Protocol. TrustCom/BigDataSE 2019: 763-768
- 2015
 [c22]Lucjan Hanzlik, Przemyslaw Kubiak [c22]Lucjan Hanzlik, Przemyslaw Kubiak , Miroslaw Kutylowski: , Miroslaw Kutylowski:
 Tracing Attacks on U-Prove with Revocation Mechanism: Tracing Attacks for U-Prove. AsiaCCS 2015: 603-608
 [c21]Kamil Kluczniak, Lucjan Hanzlik, Przemyslaw Kubiak [c21]Kamil Kluczniak, Lucjan Hanzlik, Przemyslaw Kubiak , Miroslaw Kutylowski: , Miroslaw Kutylowski:
 Anonymous Evaluation System. NSS 2015: 283-299
- 2014
 [c20]Lucjan Hanzlik, Przemyslaw Kubiak [c20]Lucjan Hanzlik, Przemyslaw Kubiak , Miroslaw Kutylowski: , Miroslaw Kutylowski:
 Stand-by Attacks on E-ID Password Authentication. Inscrypt 2014: 475-495
 [c19]Miroslaw Kutylowski, Lucjan Hanzlik, Kamil Kluczniak, Przemyslaw Kubiak [c19]Miroslaw Kutylowski, Lucjan Hanzlik, Kamil Kluczniak, Przemyslaw Kubiak , Lukasz Krzywiecki , Lukasz Krzywiecki : :
 Forbidden City Model - Towards a Practice Relevant Framework for Designing Cryptographic Protocols. ISPEC 2014: 42-59
 [c18]Lukasz Krzywiecki [c18]Lukasz Krzywiecki , Przemyslaw Kubiak , Przemyslaw Kubiak , Miroslaw Kutylowski: , Miroslaw Kutylowski:
 Probabilistic Admissible Encoding on Elliptic Curves - Towards PACE with Generalized Integrated Mapping. SOFSEM 2014: 395-406
- 2013
 [c17]Przemyslaw Kubiak [c17]Przemyslaw Kubiak , Miroslaw Kutylowski: , Miroslaw Kutylowski:
 Supervised Usage of Signature Creation Devices. Inscrypt 2013: 132-149
- 2012
 [c16]Lukasz Krzywiecki [c16]Lukasz Krzywiecki , Przemyslaw Kubiak , Przemyslaw Kubiak , Miroslaw Kutylowski, Michal Tabor, Daniel Wachnik: , Miroslaw Kutylowski, Michal Tabor, Daniel Wachnik:
 Lightweight Certificates - Towards a Practical Model for PKI. BIS 2012: 296-307
 [c15]Lukasz Krzywiecki [c15]Lukasz Krzywiecki , Przemyslaw Kubiak , Przemyslaw Kubiak , Miroslaw Kutylowski: , Miroslaw Kutylowski:
 Stamp and Extend - Instant But Undeniable Timestamping Based on Lazy Trees. INTRUST 2012: 5-24
 [c14]Lucjan Hanzlik, Kamil Kluczniak, Przemyslaw Kubiak [c14]Lucjan Hanzlik, Kamil Kluczniak, Przemyslaw Kubiak , Miroslaw Kutylowski: , Miroslaw Kutylowski:
 Restricted Identification without Group Keys. TrustCom 2012: 1194-1199
- 2011
 [c13]Miroslaw Kutylowski, Przemyslaw Blaskiewicz, Lukasz Krzywiecki [c13]Miroslaw Kutylowski, Przemyslaw Blaskiewicz, Lukasz Krzywiecki , Przemyslaw Kubiak , Przemyslaw Kubiak , Wieslaw Paluszynski, Michal Tabor: , Wieslaw Paluszynski, Michal Tabor:
 Technical and Legal Meaning of "Sole Control" - Towards Verifiability in Signing Systems. BIS (Workshops) 2011: 270-281
 [c12]Miroslaw Kutylowski, Lukasz Krzywiecki [c12]Miroslaw Kutylowski, Lukasz Krzywiecki , Przemyslaw Kubiak , Przemyslaw Kubiak , Michal Koza: , Michal Koza:
 Restricted Identification Scheme and Diffie-Hellman Linking Problem. INTRUST 2011: 221-238
- 2010
 [c11]Przemyslaw Kubiak [c11]Przemyslaw Kubiak , Miroslaw Kutylowski, Jun Shao: , Miroslaw Kutylowski, Jun Shao:
 How to Construct State Registries-Matching Undeniability with Public Security. ACIIDS (1) 2010: 64-73
 [c10]Przemyslaw Kubiak [c10]Przemyslaw Kubiak , Miroslaw Kutylowski, Anna Lauks-Dutka , Miroslaw Kutylowski, Anna Lauks-Dutka , Michal Tabor: , Michal Tabor:
 Mediated Signatures - Towards Undeniability of Digital Data in Technical and Legal Framework. BIS (Workshops) 2010: 298-309
 [c9]Przemyslaw Blaskiewicz, Przemyslaw Kubiak [c9]Przemyslaw Blaskiewicz, Przemyslaw Kubiak , Miroslaw Kutylowski: , Miroslaw Kutylowski:
 Digital Signatures for e-Government - A Long-Term Security Architecture. e-Forensics 2010: 256-270
 [c8]Przemyslaw Blaskiewicz, Przemyslaw Kubiak [c8]Przemyslaw Blaskiewicz, Przemyslaw Kubiak , Miroslaw Kutylowski: , Miroslaw Kutylowski:
 Two-Head Dragon Protocol: Preventing Cloning of Signature Keys - Work in Progress. INTRUST 2010: 173-188
 [c7]Miroslaw Kutylowski, Przemyslaw Kubiak: [c7]Miroslaw Kutylowski, Przemyslaw Kubiak:
 Polish Concepts for Securing E-Government Document Flow. ISSE 2010: 399-407
- 2008
 [c6]Marek Klonowski, Przemyslaw Kubiak, Miroslaw Kutylowski: [c6]Marek Klonowski, Przemyslaw Kubiak, Miroslaw Kutylowski:
 Practical Deniable Encryption. SOFSEM 2008: 599-609
- 2007
 [c5]Przemyslaw Kubiak [c5]Przemyslaw Kubiak , Miroslaw Kutylowski, Filip Zagórski: , Miroslaw Kutylowski, Filip Zagórski:
 Kleptographic attacks on a cascade of mix servers. AsiaCCS 2007: 57-62
- 2006
 [c4]Lukasz Krzywiecki [c4]Lukasz Krzywiecki , Przemyslaw Kubiak, Miroslaw Kutylowski: , Przemyslaw Kubiak, Miroslaw Kutylowski:
 A Revocation Scheme Preserving Privacy. Inscrypt 2006: 130-143
 [c3]Marcin Gogolewski, Marek Klonowski, Przemyslaw Kubiak [c3]Marcin Gogolewski, Marek Klonowski, Przemyslaw Kubiak , Miroslaw Kutylowski, Anna Lauks , Miroslaw Kutylowski, Anna Lauks , Filip Zagórski , Filip Zagórski : :
 Kleptographic Attacks on E-Voting Schemes. ETRICS 2006: 494-508
 [c2]Piotr Borzecki, Jedrzej Kabarowski, Przemyslaw Kubiak [c2]Piotr Borzecki, Jedrzej Kabarowski, Przemyslaw Kubiak , Miroslaw Kutylowski, Filip Zagórski , Miroslaw Kutylowski, Filip Zagórski : :
 Kleptographic Weaknesses in Benaloh-Tuinstra Protocol. ICSNC 2006: 26
 [c1]Marek Klonowski, Przemyslaw Kubiak, Miroslaw Kutylowski, Anna Lauks [c1]Marek Klonowski, Przemyslaw Kubiak, Miroslaw Kutylowski, Anna Lauks : :
 How to Protect a Signature from Being Shown to a Third Party. TrustBus 2006: 192-202
Editorship
- 2008
 [e1]Miroslaw Kutylowski, Jacek Cichon [e1]Miroslaw Kutylowski, Jacek Cichon , Przemyslaw Kubiak: , Przemyslaw Kubiak:
 Algorithmic Aspects of Wireless Sensor Networks, Third International Workshop, ALGOSENSORS 2007, Wroclaw, Poland, July 14, 2007, Revised Selected Papers. Lecture Notes in Computer Science 4837, Springer 2008, ISBN 978-3-540-77870-7 [contents]
Informal and Other Publications
- 2025
 [i3]Adrian Cinal, Przemyslaw Kubiak, Miroslaw Kutylowski, Gabriel Wechta: [i3]Adrian Cinal, Przemyslaw Kubiak, Miroslaw Kutylowski, Gabriel Wechta:
 Anamorphic Monero Transactions: the Threat of Bypassing Anti-Money Laundering Laws. IACR Cryptol. ePrint Arch. 2025: 1961 (2025)
- 2015
 [i2]Lucjan Hanzlik, Przemyslaw Kubiak, Miroslaw Kutylowski: [i2]Lucjan Hanzlik, Przemyslaw Kubiak, Miroslaw Kutylowski:
 Tracing Attacks on U-Prove with Revocation Mechanism. IACR Cryptol. ePrint Arch. 2015: 108 (2015)
- 2013
 [i1]Lukasz Krzywiecki [i1]Lukasz Krzywiecki , Przemyslaw Kubiak, Miroslaw Kutylowski: , Przemyslaw Kubiak, Miroslaw Kutylowski:
 Stamp \& Extend - Instant but Undeniable Timestamping based on Lazy Trees. IACR Cryptol. ePrint Arch. 2013: 730 (2013)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from  to the list of external document links (if available).
 to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the  of the Internet Archive (if available).
 of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from  ,
,  , and
, and  to record detail pages.
 to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from  and
 and  to record detail pages.
 to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from  .
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-10-31 01:10 CET by the dblp team
 all metadata released as open data under CC0 1.0 license
 all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID







