Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.




92 Publications

2013 | Report | IST-REx-ID: 2274   OA
Proofs of Space
S. Dziembowski, S. Faust, V. Kolmogorov, K.Z. Pietrzak, Proofs of Space, IST Austria, 2013.
View | Files available
 
2013 | Conference Paper | IST-REx-ID: 2940   OA
A counterexample to the chain rule for conditional HILL entropy, and what deniable encryption has to do with it
S. Krenn, K.Z. Pietrzak, A. Wadia, in:, A. Sahai (Ed.), Springer, 2013, pp. 23–39.
View | Files available | DOI
 
2013 | Journal Article | IST-REx-ID: 502
Short blind signatures
O. Blazy, G. Fuchsbauer, D. Pointcheval, D. Vergnaud, Journal of Computer Security 21 (2013) 627–661.
View | DOI
 
2012 | Conference Paper | IST-REx-ID: 2049   OA
Lapin: An efficient authentication protocol based on ring-LPN
S. Heyse, E. Kiltz, V. Lyubashevsky, C. Paar, K.Z. Pietrzak, in:, Conference Proceedings FSE 2012, Springer, 2012, pp. 346–365.
View | DOI | Download (ext.)
 
2012 | Conference Paper | IST-REx-ID: 2974   OA
Commitments and efficient zero knowledge proofs from learning parity with noise
A. Jain, S. Krenn, K.Z. Pietrzak, A. Tentes, in:, X. Wang, K. Sako (Eds.), Springer, 2012, pp. 663–680.
View | Files available | DOI
 
2012 | Conference Paper | IST-REx-ID: 3282   OA
Message authentication, revisited
Y. Dodis, K.Z. Pietrzak, E. Kiltz, D. Wichs, in:, Springer, 2012, pp. 355–374.
View | Files available | DOI
 
2012 | Conference Paper | IST-REx-ID: 2937   OA
Full proof cryptography: Verifiable compilation of efficient zero-knowledge protocols
J. Almeida, M. Barbosa, E. Bangerter, G. Barthe, S. Krenn, S. Béguelin, in:, Proceedings of the 2012 ACM Conference on Computer and Communications Security, ACM, 2012, pp. 488–500.
View | DOI | Download (ext.)
 
2012 | Conference Paper | IST-REx-ID: 3280   OA
Subspace LWE
K.Z. Pietrzak, in:, Springer, 2012, pp. 548–563.
View | DOI | Download (ext.)
 
2012 | Conference Paper | IST-REx-ID: 2048   OA
Practical leakage-resilient symmetric cryptography
S. Faust, K.Z. Pietrzak, J. Schipper, in:, Conference Proceedings CHES 2012, Springer, 2012, pp. 213–232.
View | DOI | Download (ext.)
 
2012 | Conference Paper | IST-REx-ID: 3279
Hardness preserving constructions of pseudorandom functions
A. Jain, K.Z. Pietrzak, A. Tentes, in:, Springer, 2012, pp. 369–382.
View | DOI | Download (ext.)
 
2012 | Conference Paper | IST-REx-ID: 3281
Lossy functions do not amplify well
K.Z. Pietrzak, A. Rosen, G. Segev, in:, Springer, 2012, pp. 458–475.
View | DOI | Download (ext.)
 
2012 | Conference Paper | IST-REx-ID: 3250
Cryptography from learning parity with noise
K.Z. Pietrzak, in:, Springer, 2012, pp. 99–114.
View | DOI
 

Search

Filter Publications

Display / Sort

Export / Embed