Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.




92 Publications

2016 | Conference Paper | IST-REx-ID: 1179   OA
Pseudoentropy: Lower-bounds for chain rules and transformations
K.Z. Pietrzak, S. Maciej, in:, Springer, 2016, pp. 183–203.
View | DOI | Download (ext.)
 
2016 | Journal Article | IST-REx-ID: 1592
Structure preserving signatures and commitments to group elements
M. Abe, G. Fuchsbauer, J. Groth, K. Haralambiev, M. Ohkubo, Journal of Cryptology 29 (2016) 363–421.
View | DOI
 
2016 | Conference Paper | IST-REx-ID: 1225
Practical round-optimal blind signatures in the standard model from weaker assumptions
G. Fuchsbauer, C. Hanser, C. Kamath Hosdurg, D. Slamanig, in:, Springer, 2016, pp. 391–408.
View | Files available | DOI | Download (ext.)
 
2016 | Conference Paper | IST-REx-ID: 1233   OA
Standard security does imply security against selective opening for markov distributions
G. Fuchsbauer, F. Heuer, E. Kiltz, K.Z. Pietrzak, in:, Springer, 2016, pp. 282–305.
View | DOI | Download (ext.)
 
2016 | Conference Paper | IST-REx-ID: 1365   OA
Efficiently computing data-independent memory-hard functions
J.F. Alwen, J. Blocki, in:, Springer, 2016, pp. 241–271.
View | DOI | Download (ext.)
 
2016 | Conference Paper | IST-REx-ID: 1366   OA
Provably robust sponge-based PRNGs and KDFs
P. Gazi, S. Tessaro, in:, Springer, 2016, pp. 87–116.
View | DOI | Download (ext.)
 
2016 | Journal Article | IST-REx-ID: 1479
A counterexample to the chain rule for conditional HILL entropy
S. Krenn, K.Z. Pietrzak, A. Wadia, D. Wichs, Computational Complexity 25 (2016) 567–605.
View | Files available | DOI
 
2016 | Journal Article | IST-REx-ID: 1177   OA
A closer look at multiple-forking: Leveraging (in)dependence for a tighter bound
C. Kamath Hosdurg, S. Chatterjee, Algorithmica 74 (2016) 1321–1362.
View | DOI | Download (ext.)
 
2016 | Conference Paper | IST-REx-ID: 1653   OA
New realizations of somewhere statistically binding hashing and positional accumulators
T. Okamoto, K.Z. Pietrzak, B. Waters, D. Wichs, in:, Springer, 2016, pp. 121–145.
View | Files available | DOI
 
2016 | Conference Paper | IST-REx-ID: 1235
Constrained PRFs for unbounded inputs with short keys
H.M. Abusalah, G. Fuchsbauer, in:, Springer, 2016, pp. 445–463.
View | Files available | DOI | Download (ext.)
 
2015 | Conference Paper | IST-REx-ID: 1654   OA
Generic security of NMAC and HMAC with input whitening
P. Gazi, K.Z. Pietrzak, S. Tessaro, 9453 (2015) 85–109.
View | Files available | DOI
 
2015 | Conference Paper | IST-REx-ID: 1647   OA
Practical round-optimal blind signatures in the standard model
G. Fuchsbauer, C. Hanser, D. Slamanig, in:, Springer, 2015, pp. 233–253.
View | Files available | DOI | Download (ext.)
 
2015 | Conference Paper | IST-REx-ID: 1648   OA
A quasipolynomial reduction for generalized selective decryption on trees
G. Fuchsbauer, Z. Jafargholi, K.Z. Pietrzak, in:, Springer, 2015, pp. 601–620.
View | Files available | DOI
 
2015 | Conference Paper | IST-REx-ID: 1650   OA
Condensed unpredictability
M. Skórski, A. Golovnev, K.Z. Pietrzak, in:, Springer, 2015, pp. 1046–1057.
View | Files available | DOI
 
2015 | Conference Paper | IST-REx-ID: 1649   OA
Efficient zero-knowledge proofs for commitments from learning with errors over rings
F. Benhamouda, S. Krenn, V. Lyubashevsky, K.Z. Pietrzak, 9326 (2015) 305–325.
View | Files available | DOI
 
2015 | Conference Paper | IST-REx-ID: 1651
Anonymous transferable e-cash
F. Baldimtsi, M. Chase, G. Fuchsbauer, M. Kohlweiss, in:, Springer, 2015, pp. 101–124.
View | DOI
 
2015 | Conference Paper | IST-REx-ID: 1644   OA
Query-complexity amplification for random oracles
G. Demay, P. Gazi, U. Maurer, B. Tackmann, in:, Springer, 2015, pp. 159–180.
View | DOI | Download (ext.)
 
2015 | Conference Paper | IST-REx-ID: 1668   OA
Relaxing full-codebook security: A refined analysis of key-length extension schemes
P. Gazi, J. Lee, Y. Seurin, J. Steinberger, S. Tessaro, 9054 (2015) 319–341.
View | DOI | Download (ext.)
 
2015 | Conference Paper | IST-REx-ID: 1675
Proofs of space
S. Dziembowski, S. Faust, V. Kolmogorov, K.Z. Pietrzak, 9216 (2015) 585–605.
View | Files available | DOI
 
2015 | Conference Paper | IST-REx-ID: 1645
Secret-key cryptography from ideal primitives: A systematic verview
P. Gazi, S. Tessaro, in:, 2015 IEEE Information Theory Workshop, IEEE, 2015.
View | DOI
 

Search

Filter Publications

Display / Sort

Export / Embed