Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.




127 Publications

2014 | Conference Paper | IST-REx-ID: 2082 | OA
Gazi P, Pietrzak KZ, Rybar M. The exact PRF-security of NMAC and HMAC. In: Garay J, Gennaro R, eds. Vol 8616. Springer; 2014:113-130. doi:10.1007/978-3-662-44371-2_7
[Submitted Version] View | Files available | DOI
 
2013 | Conference Paper | IST-REx-ID: 2259 | OA
Alwen JF, Krenn S, Pietrzak KZ, Wichs D. Learning with rounding, revisited: New reduction properties and applications. 2013;8042(1):57-74. doi:10.1007/978-3-642-40041-4_4
[Published Version] View | Files available | DOI
 
2013 | Conference Paper | IST-REx-ID: 2258 | OA
Kiltz E, Pietrzak KZ, Szegedy M. Digital signatures with minimal overhead from indifferentiable random invertible functions. 2013;8042:571-588. doi:10.1007/978-3-642-40041-4_31
[Submitted Version] View | Files available | DOI
 
2013 | Conference Paper | IST-REx-ID: 2260 | OA
Bernhard D, Fuchsbauer G, Ghadafi E. Efficient signatures of knowledge and DAA in the standard model. 2013;7954:518-533. doi:10.1007/978-3-642-38980-1_33
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 
2013 | Conference Paper | IST-REx-ID: 2291 | OA
Ferrara A, Fuchsbauer G, Warinschi B. Cryptographically enforced RBAC. In: IEEE; 2013:115-129. doi:10.1109/CSF.2013.15
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 
2013 | Conference Paper | IST-REx-ID: 2940 | OA
Krenn S, Pietrzak KZ, Wadia A. A counterexample to the chain rule for conditional HILL entropy, and what deniable encryption has to do with it. In: Sahai A, ed. Vol 7785. Springer; 2013:23-39. doi:10.1007/978-3-642-36594-2_2
[Submitted Version] View | Files available | DOI
 
2013 | Journal Article | IST-REx-ID: 502
Blazy O, Fuchsbauer G, Pointcheval D, Vergnaud D. Short blind signatures. Journal of Computer Security. 2013;21(5):627-661. doi:10.3233/JCS-130477
View | DOI
 
2013 | Report | IST-REx-ID: 2274 | OA
Dziembowski S, Faust S, Kolmogorov V, Pietrzak KZ. Proofs of Space. IST Austria; 2013.
[Published Version] View | Files available
 
2012 | Conference Paper | IST-REx-ID: 2048 | OA
Faust S, Pietrzak KZ, Schipper J. Practical leakage-resilient symmetric cryptography. In: Conference Proceedings CHES 2012. Vol 7428. Springer; 2012:213-232. doi:10.1007/978-3-642-33027-8_13
[Preprint] View | DOI | Download Preprint (ext.)
 
2012 | Conference Paper | IST-REx-ID: 2049 | OA
Heyse S, Kiltz E, Lyubashevsky V, Paar C, Pietrzak KZ. Lapin: An efficient authentication protocol based on ring-LPN. In: Conference Proceedings FSE 2012. Vol 7549. Springer; 2012:346-365. doi:10.1007/978-3-642-34047-5_20
[Preprint] View | DOI | Download Preprint (ext.)
 
2012 | Conference Paper | IST-REx-ID: 2937 | OA
Almeida J, Barbosa M, Bangerter E, Barthe G, Krenn S, Béguelin S. Full proof cryptography: Verifiable compilation of efficient zero-knowledge protocols. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security. ACM; 2012:488-500. doi:10.1145/2382196.2382249
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 
2012 | Conference Paper | IST-REx-ID: 2974 | OA
Jain A, Krenn S, Pietrzak KZ, Tentes A. Commitments and efficient zero knowledge proofs from learning parity with noise. In: Wang X, Sako K, eds. Vol 7658. Springer; 2012:663-680. doi:10.1007/978-3-642-34961-4_40
[Submitted Version] View | Files available | DOI
 
2012 | Conference Paper | IST-REx-ID: 3250
Pietrzak KZ. Cryptography from learning parity with noise. In: Vol 7147. Springer; 2012:99-114. doi:10.1007/978-3-642-27660-6_9
View | DOI
 
2012 | Conference Paper | IST-REx-ID: 3282 | OA
Dodis Y, Pietrzak KZ, Kiltz E, Wichs D. Message authentication, revisited. In: Vol 7237. Springer; 2012:355-374. doi:10.1007/978-3-642-29011-4_22
[Submitted Version] View | Files available | DOI
 
2012 | Conference Paper | IST-REx-ID: 3280 | OA
Pietrzak KZ. Subspace LWE. In: Vol 7194. Springer; 2012:548-563. doi:10.1007/978-3-642-28914-9_31
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 
2012 | Conference Paper | IST-REx-ID: 3281
Pietrzak KZ, Rosen A, Segev G. Lossy functions do not amplify well. In: Vol 7194. Springer; 2012:458-475. doi:10.1007/978-3-642-28914-9_26
View | DOI | Download None (ext.)
 
2012 | Conference Paper | IST-REx-ID: 3279
Jain A, Pietrzak KZ, Tentes A. Hardness preserving constructions of pseudorandom functions. In: Vol 7194. Springer; 2012:369-382. doi:10.1007/978-3-642-28914-9_21
View | DOI | Download None (ext.)
 

Search

Filter Publications