Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.




92 Publications

2020 | Thesis | IST-REx-ID: 7896   OA
Kamath Hosdurg, Chethan. On the Average-Case Hardness of Total Search Problems. IST Austria, 2020, doi:10.15479/AT:ISTA:7896.
View | Files available | DOI
 
2020 | Conference Paper | IST-REx-ID: 7966   OA
Auerbach, Benedikt, et al. “Everybody’s a Target: Scalability in Public-Key Encryption.” Advances in Cryptology – EUROCRYPT 2020, vol. 12107, Springer Nature, 2020, pp. 475–506, doi:10.1007/978-3-030-45727-3_16.
View | DOI | Download (ext.)
 
2019 | Conference Paper | IST-REx-ID: 6528   OA
Pietrzak, Krzysztof Z. “Simple Verifiable Delay Functions.” 10th Innovations in Theoretical Computer Science Conference, vol. 124, 60, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2019, doi:10.4230/LIPICS.ITCS.2019.60.
View | Files available | DOI | Download (ext.)
 
2019 | Conference Paper | IST-REx-ID: 6430
Fuchsbauer, Georg, et al. Adaptively Secure Proxy Re-Encryption. Vol. 11443, Springer Nature, 2019, pp. 317–46, doi:10.1007/978-3-030-17259-6_11.
View | DOI
 
2019 | Book Chapter | IST-REx-ID: 6726
Walter, Michael. “Sampling the Integers with Low Relative Error.” Progress in Cryptology – AFRICACRYPT 2019, edited by J Buchmann et al., vol. 11627, Springer Nature, 2019, pp. 157–80, doi:10.1007/978-3-030-23696-0_9.
View | DOI
 
2019 | Journal Article | IST-REx-ID: 5887
Demay, Gregory, et al. “Per-Session Security: Password-Based Cryptography Revisited.” Journal of Computer Security, vol. 27, no. 1, IOS Press, 2019, pp. 75–111, doi:10.3233/JCS-181131.
View | DOI
 
2019 | Conference Paper | IST-REx-ID: 7136   OA
Skórski, Maciej. “Strong Chain Rules for Min-Entropy under Few Bits Spoiled.” 2019 IEEE International Symposium on Information Theory, 8849240, IEEE, 2019, doi:10.1109/isit.2019.8849240.
View | DOI | Download (ext.) | arXiv
 
2019 | Conference Paper | IST-REx-ID: 7411   OA
Abusalah, Hamza M., et al. “Reversible Proofs of Sequential Work.” Advances in Cryptology – EUROCRYPT 2019, vol. 11477, Springer International Publishing, 2019, pp. 277–91, doi:10.1007/978-3-030-17656-3_10.
View | DOI | Download (ext.)
 
2019 | Conference Paper | IST-REx-ID: 6677
Choudhuri, Arka Rai, et al. “Finding a Nash Equilibrium Is No Easier than Breaking Fiat-Shamir.” Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing  - STOC 2019, ACM Press, 2019, pp. 1103–14, doi:10.1145/3313276.3316400.
View | Files available | DOI
 
2018 | Conference Paper | IST-REx-ID: 193   OA
Alwen, Joel F., et al. “On the Memory Hardness of Data Independent Password Hashing Functions.” Proceedings of the 2018 on Asia Conference on Computer and Communication Security, ACM, 2018, pp. 51–65, doi:10.1145/3196494.3196534.
View | DOI | Download (ext.)
 
2018 | Conference Paper | IST-REx-ID: 302   OA
Cohen, Bram, and Krzysztof Z. Pietrzak. Simple Proofs of Sequential Work. Vol. 10821, Springer, 2018, pp. 451–67, doi:10.1007/978-3-319-78375-8_15.
View | DOI | Download (ext.)
 
2018 | Journal Article | IST-REx-ID: 5980
Chatterjee, Sanjit, et al. “Private Set-Intersection with Common Set-Up.” American Institute of Mathematical Sciences, vol. 12, no. 1, AIMS, 2018, pp. 17–47, doi:10.3934/amc.2018002.
View | DOI
 
2018 | Conference Paper | IST-REx-ID: 6941   OA
Park, Sunoo, et al. “SpaceMint: A Cryptocurrency Based on Proofs of Space.” 22nd International Conference on Financial Cryptography and Data Security, vol. 10957, Springer Nature, 2018, pp. 480–99, doi:10.1007/978-3-662-58387-6_26.
View | DOI | Download (ext.)
 
2018 | Journal Article | IST-REx-ID: 107
Dziembowski, Stefan, et al. “Non-Malleable Codes.” Journal of the ACM, vol. 65, no. 4, 20, ACM, 2018, doi:10.1145/3178432.
View | DOI
 
2018 | Conference Paper | IST-REx-ID: 7407   OA
Pietrzak, Krzysztof Z. “Proofs of Catalytic Space.” 10th Innovations in Theoretical Computer Science  Conference (ITCS 2019), vol. 124, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2018, p. 59:1-59:25, doi:10.4230/LIPICS.ITCS.2019.59.
View | Files available | DOI | Download (ext.)
 
2018 | Conference Paper | IST-REx-ID: 108   OA
Obremski, Marciej, and Maciej Skorski. Inverted Leftover Hash Lemma. Vol. 2018, IEEE, 2018, doi:10.1109/ISIT.2018.8437654.
View | DOI | Download (ext.)
 
2018 | Thesis | IST-REx-ID: 83   OA
Abusalah, Hamza M. Proof Systems for Sustainable Decentralized Cryptocurrencies. IST Austria, 2018, doi:10.15479/AT:ISTA:TH_1046.
View | Files available | DOI
 
2018 | Conference Paper | IST-REx-ID: 300   OA
Micciancio, Daniele, and Michael Walter. On the Bit Security of Cryptographic Primitives. Edited by Michael Walter, vol. 10820, Springer, 2018, pp. 3–28, doi:10.1007/978-3-319-78381-9_1.
View | DOI | Download (ext.)
 
2018 | Conference Paper | IST-REx-ID: 298   OA
Alwen, Joel F., et al. Sustained Space Complexity. Vol. 10821, Springer, 2018, pp. 99–130, doi:10.1007/978-3-319-78375-8_4.
View | DOI | Download (ext.) | arXiv
 
2017 | Conference Paper | IST-REx-ID: 605   OA
Brody, Joshua, et al. Position Based Cryptography and Multiparty Communication Complexity. Edited by Yael Kalai and Leonid Reyzin, vol. 10677, Springer, 2017, pp. 56–81, doi:10.1007/978-3-319-70500-2_3.
View | DOI | Download (ext.)
 

Search

Filter Publications

Display / Sort

Citation Style: MLA

Export / Embed