83 Publications

Mark all

[83]
2019 | Conference Paper | IST-REx-ID: 6528   OA
Pietrzak KZ. Simple verifiable delay functions. In: 10th Innovations in Theoretical Computer Science Conference. Vol 124. Schloss Dagstuhl - Leibniz-Zentrum für Informatik; 2019:60. doi:10.4230/LIPICS.ITCS.2019.60
View | Files available | DOI
 
[82]
2019 | Conference Paper | IST-REx-ID: 6430
Fuchsbauer G, Kamath Hosdurg C, Klein K, Pietrzak KZ. Adaptively secure proxy re-encryption. In: Vol 11443. Springer Nature; 2019:317-346. doi:10.1007/978-3-030-17259-6_11
View | DOI
 
[81]
2019 | Conference Paper | IST-REx-ID: 6677
Choudhuri AR, Hubáček P, Kamath Hosdurg C, Pietrzak KZ, Rosen A, Rothblum GN. Finding a Nash equilibrium is no easier than breaking Fiat-Shamir. In: Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing  - STOC 2019. ACM Press; 2019:1103-1114. doi:10.1145/3313276.3316400
View | DOI
 
[80]
2018 | Conference Paper | IST-REx-ID: 193   OA
Alwen JF, Gazi P, Kamath Hosdurg C, et al. On the memory hardness of data independent password hashing functions. In: Proceedings of the 2018 on Asia Conference on Computer and Communication Security. ACM; 2018:51-65. doi:10.1145/3196494.3196534
View | DOI | Download (ext.)
 
[79]
2018 | Conference Paper | IST-REx-ID: 302   OA
Cohen B, Pietrzak KZ. Simple proofs of sequential work. In: Vol 10821. Springer; 2018:451-467. doi:10.1007/978-3-319-78375-8_15
View | DOI | Download (ext.)
 
[78]
2018 | Conference Paper | IST-REx-ID: 6941   OA
Park S, Kwon A, Fuchsbauer G, Gazi P, Alwen JF, Pietrzak KZ. SpaceMint: A cryptocurrency based on proofs of space. In: 22nd International Conference on Financial Cryptography and Data Security. Vol 10957. Springer Nature; 2018:480-499. doi:10.1007/978-3-662-58387-6_26
View | DOI | Download (ext.)
 
[77]
2018 | Journal Article | IST-REx-ID: 107
Dziembowski S, Pietrzak KZ, Wichs D. Non-malleable codes. Journal of the ACM. 2018;65(4). doi:10.1145/3178432
View | DOI
 
[76]
2018 | Conference Paper | IST-REx-ID: 298   OA
Alwen JF, Blocki J, Pietrzak KZ. Sustained space complexity. In: Vol 10821. Springer; 2018:99-130. doi:10.1007/978-3-319-78375-8_4
View | DOI | Download (ext.)
 
[75]
2017 | Conference Paper | IST-REx-ID: 605   OA
Brody J, Dziembowski S, Faust S, Pietrzak KZ. Position based cryptography and multiparty communication complexity. In: Kalai Y, Reyzin L, eds. Vol 10677. Springer; 2017:56-81. doi:10.1007/978-3-319-70500-2_3
View | DOI | Download (ext.)
 
[74]
2017 | Conference Paper | IST-REx-ID: 559   OA
Abusalah HM, Alwen JF, Cohen B, Khilko D, Pietrzak KZ, Reyzin L. Beyond Hellman’s time-memory trade-offs with applications to proofs of space. In: Vol 10625. Springer; 2017:357-379. doi:10.1007/978-3-319-70697-9_13
View | Files available | DOI | Download (ext.)
 
[73]
2017 | Conference Paper | IST-REx-ID: 637   OA
Jafargholi Z, Kamath Hosdurg C, Klein K, Komargodski I, Pietrzak KZ, Wichs D. Be adaptive avoid overcommitting. In: Katz J, Shacham H, eds. Vol 10401. Springer; 2017:133-163. doi:10.1007/978-3-319-63688-7_5
View | DOI | Download (ext.)
 
[72]
2017 | Journal Article | IST-REx-ID: 1187
Kiltz E, Pietrzak KZ, Venturi D, Cash D, Jain A. Efficient authentication from hard learning problems. Journal of Cryptology. 2017;30(4):1238-1275. doi:10.1007/s00145-016-9247-3
View | Files available | DOI
 
[71]
2017 | Conference Paper | IST-REx-ID: 640   OA
Alwen JF, Blocki J, Pietrzak KZ. Depth-robust graphs and their cumulative memory complexity. In: Coron J-S, Buus Nielsen J, eds. Vol 10212. Springer; 2017:3-32. doi:10.1007/978-3-319-56617-7_1
View | DOI | Download (ext.)
 
[70]
2017 | Conference Paper | IST-REx-ID: 635   OA
Alwen JF, Chen B, Pietrzak KZ, Reyzin L, Tessaro S. Scrypt is maximally memory hard. In: Coron J-S, Buus Nielsen J, eds. Vol 10212. Springer; 2017:33-62. doi:10.1007/978-3-319-56617-7_2
View | DOI | Download (ext.)
 
[69]
2017 | Conference Paper | IST-REx-ID: 697   OA
Pietrzak KZ, Skórski M. Non uniform attacks against pseudoentropy. In: Vol 80. Schloss Dagstuhl - Leibniz-Zentrum für Informatik; 2017. doi:10.4230/LIPIcs.ICALP.2017.39
View | Files available | DOI
 
[68]
2017 | Journal Article | IST-REx-ID: 6196   OA
Gazi P, Pietrzak KZ, Rybar M. The exact security of PMAC. IACR Transactions on Symmetric Cryptology. 2017;2016(2):145-161. doi:10.13154/TOSC.V2016.I2.145-161
View | Files available | DOI
 
[67]
2016 | Conference Paper | IST-REx-ID: 1231   OA
Alwen JF, Chen B, Kamath Hosdurg C, Kolmogorov V, Pietrzak KZ, Tessaro S. On the complexity of scrypt and proofs of space in the parallel random oracle model. In: Vol 9666. Springer; 2016:358-387. doi:10.1007/978-3-662-49896-5_13
View | DOI | Download (ext.)
 
[66]
2016 | Conference Paper | IST-REx-ID: 1229
Abusalah HM, Fuchsbauer G, Pietrzak KZ. Offline witness encryption. In: Vol 9696. Springer; 2016:285-303. doi:10.1007/978-3-319-39555-5_16
View | Files available | DOI
 
[65]
2016 | Conference Paper | IST-REx-ID: 1236
Abusalah HM, Fuchsbauer G, Pietrzak KZ. Constrained PRFs for unbounded inputs. In: Vol 9610. Springer; 2016:413-428. doi:10.1007/978-3-319-29485-8_24
View | Files available | DOI
 
[64]
2016 | Conference Paper | IST-REx-ID: 1179   OA
Pietrzak KZ, Maciej S. Pseudoentropy: Lower-bounds for chain rules and transformations. In: Vol 9985. Springer; 2016:183-203. doi:10.1007/978-3-662-53641-4_8
View | DOI | Download (ext.)
 
[63]
2016 | Conference Paper | IST-REx-ID: 1233   OA
Fuchsbauer G, Heuer F, Kiltz E, Pietrzak KZ. Standard security does imply security against selective opening for markov distributions. In: Vol 9562. Springer; 2016:282-305. doi:10.1007/978-3-662-49096-9_12
View | DOI | Download (ext.)
 
[62]
2016 | Journal Article | IST-REx-ID: 1479
Krenn S, Pietrzak KZ, Wadia A, Wichs D. A counterexample to the chain rule for conditional HILL entropy. Computational Complexity. 2016;25(3):567-605. doi:10.1007/s00037-015-0120-9
View | Files available | DOI
 
[61]
2016 | Conference Paper | IST-REx-ID: 1653   OA
Okamoto T, Pietrzak KZ, Waters B, Wichs D. New realizations of somewhere statistically binding hashing and positional accumulators. In: Vol 9452. Springer; 2016:121-145. doi:10.1007/978-3-662-48797-6_6
View | Files available | DOI
 
[60]
2015 | Conference Paper | IST-REx-ID: 1654   OA
Gazi P, Pietrzak KZ, Tessaro S. Generic security of NMAC and HMAC with input whitening. 2015;9453:85-109. doi:10.1007/978-3-662-48800-3_4
View | Files available | DOI
 
[59]
2015 | Conference Paper | IST-REx-ID: 1648   OA
Fuchsbauer G, Jafargholi Z, Pietrzak KZ. A quasipolynomial reduction for generalized selective decryption on trees. In: Vol 9215. Springer; 2015:601-620. doi:10.1007/978-3-662-47989-6_29
View | Files available | DOI
 
[58]
2015 | Conference Paper | IST-REx-ID: 1650   OA
Skórski M, Golovnev A, Pietrzak KZ. Condensed unpredictability . In: Vol 9134. Springer; 2015:1046-1057. doi:10.1007/978-3-662-47672-7_85
View | Files available | DOI
 
[57]
2015 | Conference Paper | IST-REx-ID: 1649   OA
Benhamouda F, Krenn S, Lyubashevsky V, Pietrzak KZ. Efficient zero-knowledge proofs for commitments from learning with errors over rings. 2015;9326:305-325. doi:10.1007/978-3-319-24174-6_16
View | Files available | DOI
 
[56]
2015 | Conference Paper | IST-REx-ID: 1675
Dziembowski S, Faust S, Kolmogorov V, Pietrzak KZ. Proofs of space. 2015;9216:585-605. doi:10.1007/978-3-662-48000-7_29
View | Files available | DOI
 
[55]
2015 | Conference Paper | IST-REx-ID: 1669   OA
Pietrzak KZ, Skórski M. The chain rule for HILL pseudoentropy, revisited. 2015;9230:81-98. doi:10.1007/978-3-319-22174-8_5
View | Files available | DOI
 
[54]
2015 | Conference Paper | IST-REx-ID: 1671   OA
Gazi P, Pietrzak KZ, Tessaro S. The exact PRF security of truncation: Tight bounds for keyed sponges and truncated CBC. In: Vol 9215. Springer; 2015:368-387. doi:10.1007/978-3-662-47989-6_18
View | Files available | DOI
 
[53]
2015 | Conference Paper | IST-REx-ID: 1646   OA
Banerjee A, Fuchsbauer G, Peikert C, Pietrzak KZ, Stevens S. Key-homomorphic constrained pseudorandom functions. 2015;9015:31-60. doi:10.1007/978-3-662-46497-7_2
View | Files available | DOI
 
[52]
2014 | Conference Paper | IST-REx-ID: 2082
Gazi P, Pietrzak KZ, Rybar M. The exact PRF-security of NMAC and HMAC. In: Garay J, Gennaro R, eds. Vol 8616. Springer; 2014:113-130. doi:10.1007/978-3-662-44371-2_7
View | Files available | DOI
 
[51]
2014 | Conference Paper | IST-REx-ID: 1927   OA
Fuchsbauer G, Konstantinov M, Pietrzak KZ, Rao V. Adaptive security of constrained PRFs. In: Vol 8874. Springer; 2014:173-192. doi:10.1145/2591796.2591825
View | DOI | Download (ext.)
 
[50]
2014 | Conference Paper | IST-REx-ID: 2185   OA
Dodis Y, Pietrzak KZ, Wichs D. Key derivation without entropy waste. In: Nguyen P, Oswald E, eds. Vol 8441. Springer; 2014:93-110. doi:10.1007/978-3-642-55220-5_6
View | Files available | DOI
 
[49]
2014 | Conference Paper | IST-REx-ID: 2236   OA
Jetchev D, Pietrzak KZ. How to fake auxiliary input. In: Lindell Y, ed. Vol 8349. Springer; 2014:566-590. doi:10.1007/978-3-642-54242-8_24
View | Files available | DOI | Download (ext.)
 
[48]
2014 | Journal Article | IST-REx-ID: 2852
Fischlin M, Lehmann A, Pietrzak KZ. Robust multi-property combiners for hash functions. Journal of Cryptology. 2014;27(3):397-428. doi:10.1007/s00145-013-9148-7
View | Files available | DOI
 
[47]
2014 | Conference Paper | IST-REx-ID: 2219   OA
Kiltz E, Masny D, Pietrzak KZ. Simple chosen-ciphertext security from low noise LPN. In: Vol 8383. Springer; 2014:1-18. doi:10.1007/978-3-642-54631-0_1
View | DOI | Download (ext.)
 
[46]
2013 | Conference Paper | IST-REx-ID: 2258   OA
Kiltz E, Pietrzak KZ, Szegedy M. Digital signatures with minimal overhead from indifferentiable random invertible functions. 2013;8042:571-588. doi:10.1007/978-3-642-40041-4_31
View | Files available | DOI
 
[45]
2013 | Conference Paper | IST-REx-ID: 2259   OA
Alwen JF, Krenn S, Pietrzak KZ, Wichs D. Learning with rounding, revisited: New reduction properties and applications. 2013;8042(1):57-74. doi:10.1007/978-3-642-40041-4_4
View | Files available | DOI
 
[44]
2013 | Conference Paper | IST-REx-ID: 2940   OA
Krenn S, Pietrzak KZ, Wadia A. A counterexample to the chain rule for conditional HILL entropy, and what deniable encryption has to do with it. In: Sahai A, ed. Vol 7785. Springer; 2013:23-39. doi:10.1007/978-3-642-36594-2_2
View | Files available | DOI
 
[43]
2013 | Report | IST-REx-ID: 2274   OA
Dziembowski S, Faust S, Kolmogorov V, Pietrzak KZ. Proofs of Space. IST Austria; 2013.
View | Files available
 
[42]
2012 | Conference Paper | IST-REx-ID: 2049   OA
Heyse S, Kiltz E, Lyubashevsky V, Paar C, Pietrzak KZ. Lapin: An efficient authentication protocol based on ring-LPN. In: Conference Proceedings FSE 2012. Vol 7549. Springer; 2012:346-365. doi:10.1007/978-3-642-34047-5_20
View | DOI | Download (ext.)
 
[41]
2012 | Conference Paper | IST-REx-ID: 2974   OA
Jain A, Krenn S, Pietrzak KZ, Tentes A. Commitments and efficient zero knowledge proofs from learning parity with noise. In: Wang X, Sako K, eds. Vol 7658. Springer; 2012:663-680. doi:10.1007/978-3-642-34961-4_40
View | Files available | DOI
 
[40]
2012 | Conference Paper | IST-REx-ID: 3282   OA
Dodis Y, Pietrzak KZ, Kiltz E, Wichs D. Message authentication, revisited. In: Vol 7237. Springer; 2012:355-374. doi:10.1007/978-3-642-29011-4_22
View | Files available | DOI
 
[39]
2012 | Journal Article | IST-REx-ID: 3241
Pietrzak KZ, Wikström D. Parallel repetition of computationally sound protocols revisited. Journal of Cryptology. 2012;25(1):116-135. doi:10.1007/s00145-010-9090-x
View | DOI
 
[38]
2012 | Conference Paper | IST-REx-ID: 3280   OA
Pietrzak KZ. Subspace LWE. In: Vol 7194. Springer; 2012:548-563. doi:10.1007/978-3-642-28914-9_31
View | DOI | Download (ext.)
 
[37]
2012 | Conference Paper | IST-REx-ID: 3279
Jain A, Pietrzak KZ, Tentes A. Hardness preserving constructions of pseudorandom functions. In: Vol 7194. Springer; 2012:369-382. doi:10.1007/978-3-642-28914-9_21
View | DOI | Download (ext.)
 
[36]
2012 | Conference Paper | IST-REx-ID: 3281
Pietrzak KZ, Rosen A, Segev G. Lossy functions do not amplify well. In: Vol 7194. Springer; 2012:458-475. doi:10.1007/978-3-642-28914-9_26
View | DOI | Download (ext.)
 
[35]
2012 | Conference Paper | IST-REx-ID: 3250
Pietrzak KZ. Cryptography from learning parity with noise. In: Vol 7147. Springer; 2012:99-114. doi:10.1007/978-3-642-27660-6_9
View | DOI
 
[34]
2012 | Conference Paper | IST-REx-ID: 2048   OA
Faust S, Pietrzak KZ, Schipper J. Practical leakage-resilient symmetric cryptography. In: Conference Proceedings CHES 2012. Vol 7428. Springer; 2012:213-232. doi:10.1007/978-3-642-33027-8_13
View | DOI | Download (ext.)
 
[33]
2011 | Conference Paper | IST-REx-ID: 3240
Barak B, Dodis Y, Krawczyk H, et al. Leftover hash lemma revisited. In: Vol 6841. Springer; 2011:1-20. doi: 10.1007/978-3-642-22792-9_1
View | DOI
 
[32]
2011 | Conference Paper | IST-REx-ID: 3238
Kiltz E, Pietrzak KZ, Cash D, Jain A, Venturi D. Efficient authentication from hard learning problems. In: Vol 6632. Springer; 2011:7-26. doi:10.1007/978-3-642-20465-4_3
View | Files available | DOI
 
[31]
2011 | Conference Paper | IST-REx-ID: 3239
Faust S, Pietrzak KZ, Venturi D. Tamper proof circuits How to trade leakage for tamper resilience. In: Vol 6755. Springer; 2011:391-402. doi:10.1007/978-3-642-22006-7_33
View | DOI
 
[30]
2011 | Conference Paper | IST-REx-ID: 3236
Jain A, Pietrzak KZ. Parallel repetition for leakage resilience amplification revisited. In: Vol 6597. Springer; 2011:58-69. doi:10.1007/978-3-642-19571-6_5
View | DOI
 
[29]
2010 | Conference Paper | IST-REx-ID: 3237
Kiltz E, Pietrzak KZ. Leakage resilient ElGamal encryption. In: Vol 6477. Springer; 2010:595-612. doi:10.1007/978-3-642-17373-8_34
View | DOI
 
[28]
2010 | Conference Paper | IST-REx-ID: 3233
Håstad J, Pass R, Wikström D, Pietrzak KZ. An efficient parallel repetition theorem. In: Vol 5978. Springer; 2010:1-18. doi:10.1007/978-3-642-11799-2_1
View | DOI
 
[27]
2010 | Conference Paper | IST-REx-ID: 3234
Faust S, Kiltz E, Pietrzak KZ, Rothblum G. Leakage resilient signatures. In: Vol 5978. Springer; 2010:343-360. doi:10.1007/978-3-642-11799-2_21
View | DOI
 
[26]
2010 | Conference Paper | IST-REx-ID: 3235
Dodis Y, Pietrzak KZ. Leakage resilient pseudorandom functions and side channel attacks on feistel networks. In: Vol 6223. Springer; 2010:21-40. doi:10.1007/978-3-642-14623-7_2
View | DOI
 
[25]
2009 | Conference Paper | IST-REx-ID: 3232
Pietrzak KZ. A leakage resilient mode of operation. In: Vol 5479. Springer; 2009:462-482. doi:10.1007/978-3-642-01001-9_27
View | DOI
 
[24]
2009 | Conference Paper | IST-REx-ID: 3230
Kiltz E, Pietrzak KZ, Stam M, Yung M. A new randomness extraction paradigm for hybrid encryption. In: Vol 5479. Springer; 2009:590-609. doi:10.1007/978-3-642-01001-9_34
View | DOI
 
[23]
2009 | Conference Paper | IST-REx-ID: 3231
Kiltz E, Pietrzak KZ. On the security of padding based encryption schemes Why We cannot prove OAEP secure in the standard model. In: Vol 5479. Springer; 2009:389-406. doi:10.1007/978-3-642-01001-9_23
View | DOI
 
[22]
2008 | Conference Paper | IST-REx-ID: 3225
Fischlin M, Lehmann A, Pietrzak KZ. Robust multi property combiners for hash functions revisited. In: Vol 5126. Springer; 2008:655-666. doi:10.1007/978-3-540-70583-3_53
View | Files available | DOI
 
[21]
2008 | Conference Paper | IST-REx-ID: 3226
Pietrzak KZ, Sjödin J. Weak pseudorandom functions in minicrypt. In: Vol 5126. Springer; 2008:423-436. doi:10.1007/978-3-540-70583-3_35
View | DOI
 
[20]
2008 | Journal Article | IST-REx-ID: 3227
Zubielik P, Nadaczny J, Pietrzak KZ, Lawenda M. Elektrowiz – system of measurement data management. Przeglad Elektrotechniczny. 2008;84(10):239-242.
View | Download (ext.)
 
[19]
2008 | Conference Paper | IST-REx-ID: 3228
Pietrzak KZ. Compression from collisions or why CRHF combiners have a long output. In: Vol 5157. Springer; 2008:413-432. doi:10.1007/978-3-540-85174-5_23
View | DOI
 
[18]
2008 | Conference Paper | IST-REx-ID: 3224
Dodis Y, Pietrzak KZ, Puniya P. A new mode of operation for block ciphers and length preserving MACs. In: Vol 4965. Springer; 2008:198-219. doi:10.1007/978-3-540-78967-3_12
View | DOI
 
[17]
2008 | Conference Paper | IST-REx-ID: 3229
Dziembowski S, Pietrzak KZ. Leakage resilient cryptography. In: IEEE; 2008:293-302. doi:10.1109/FOCS.2008.56
View | DOI
 
[16]
2007 | Conference Paper | IST-REx-ID: 3218
Pietrzak KZ. Non-trivial black-box combiners for collision-resistant hash-functions don’t exist. In: Vol 4515. Springer; 2007:23-33. doi:10.1007/978-3-540-72540-4_2
View | DOI
 
[15]
2007 | Conference Paper | IST-REx-ID: 3220
Dziembowski S, Pietrzak KZ. Intrusion resilient secret sharing. In: IEEE; 2007:227-237. doi:10.1109/FOCS.2007.63
View | DOI
 
[14]
2007 | Conference Paper | IST-REx-ID: 3219
Maurer U, Pietrzak KZ, Renner R. Indistinguishability amplification. In: Vol 4622. Springer; 2007:130-149. doi:10.1007/978-3-540-74143-5_8
View | DOI
 
[13]
2007 | Conference Paper | IST-REx-ID: 3221
Pietrzak KZ, Sjödin J. Range extension for weak PRFs the good the bad and the ugly. In: Vol 4515. Springer; 2007:517-533. doi:10.1007/978-3-540-72540-4_30
View | DOI
 
[12]
2007 | Conference Paper | IST-REx-ID: 3222
Pietrzak KZ, Wikström D. Parallel repetition of computationally sound protocols revisited. In: Vol 4392. Springer; 2007:86-102. doi:10.1007/978-3-540-70936-7_5
View | DOI
 
[11]
2007 | Conference Paper | IST-REx-ID: 3223
Dodis Y, Pietrzak KZ. Improving the security of MACs via randomized message preprocessing. In: Vol 4593. Springer; 2007:414-433. doi:10.1007/978-3-540-74619-5_26
View | DOI
 
[10]
2006 | Conference Paper | IST-REx-ID: 3214
Maurer U, Oswald Y, Pietrzak KZ, Sjödin J. Luby Rackoff ciphers from weak round functions . In: Vol 4004. Springer; 2006:391-408. doi:10.1007/11761679_24
View | DOI
 
[9]
2006 | Conference Paper | IST-REx-ID: 3215
Dodis Y, Pietrzak KZ, Przydatek B. Separating sources for encryption and secret sharing. In: Vol 3876. Springer; 2006:601-616. doi:10.1007/11681878_31
View | DOI
 
[8]
2006 | Conference Paper | IST-REx-ID: 3216
Pietrzak KZ. A tight bound for EMAC. In: Vol 4052. Springer; 2006:168-179. doi:10.1007/11787006_15
View | DOI
 
[7]
2006 | Conference Paper | IST-REx-ID: 3217
Pietrzak KZ. Composition implies adaptive security in minicrypt. In: Vol 4004. Springer; 2006:328-338. doi:10.1007/11761679_20
View | DOI
 
[6]
2005 | Conference Paper | IST-REx-ID: 3213
Pietrzak KZ. Composition does not imply adaptive security. In: Vol 3621. Springer; 2005:55-65. doi:10.1007/11535218_4
View | DOI
 
[5]
2005 | Conference Paper | IST-REx-ID: 3211
Bellare M, Pietrzak KZ, Rogaway P. Improved security analyses for CBC MACs. In: Vol 3621. Springer; 2005:527-545. doi:10.1007/11535218_32
View | DOI
 
[4]
2005 | Conference Paper | IST-REx-ID: 3212
Dodis Y, Oliveira R, Pietrzak KZ. On the generic insecurity of the full domain hash. In: Vol 3621. Springer; 2005:449-466. doi:10.1007/11535218_27
View | DOI
 
[3]
2004 | Conference Paper | IST-REx-ID: 3208
Maurer U, Pietrzak KZ. Composition of random systems: When two weak make one strong. In: Vol 2951. Springer; 2004:410-427. doi:10.1007/978-3-540-24638-1_23
View | DOI
 
[2]
2003 | Conference Paper | IST-REx-ID: 3210
Maurer U, Pietrzak KZ. The security of many round Luby Rackoff pseudo random permutations. In: Vol 2656. Springer; 2003:544-561. doi:10.1007/3-540-39200-9_34
View | DOI
 
[1]
2003 | Journal Article | IST-REx-ID: 3209
Pietrzak KZ. On the parameterized complexity of the fixed alphabet shortest common supersequence and longest common subsequence problems. Journal of Computer and System Sciences. 2003;67(4):757-771. doi:10.1016/S0022-0000(03)00078-3
View | DOI
 

Search

Filter Publications

Display / Sort

Citation Style: AMA

Export / Embed

83 Publications

Mark all

[83]
2019 | Conference Paper | IST-REx-ID: 6528   OA
Pietrzak KZ. Simple verifiable delay functions. In: 10th Innovations in Theoretical Computer Science Conference. Vol 124. Schloss Dagstuhl - Leibniz-Zentrum für Informatik; 2019:60. doi:10.4230/LIPICS.ITCS.2019.60
View | Files available | DOI
 
[82]
2019 | Conference Paper | IST-REx-ID: 6430
Fuchsbauer G, Kamath Hosdurg C, Klein K, Pietrzak KZ. Adaptively secure proxy re-encryption. In: Vol 11443. Springer Nature; 2019:317-346. doi:10.1007/978-3-030-17259-6_11
View | DOI
 
[81]
2019 | Conference Paper | IST-REx-ID: 6677
Choudhuri AR, Hubáček P, Kamath Hosdurg C, Pietrzak KZ, Rosen A, Rothblum GN. Finding a Nash equilibrium is no easier than breaking Fiat-Shamir. In: Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing  - STOC 2019. ACM Press; 2019:1103-1114. doi:10.1145/3313276.3316400
View | DOI
 
[80]
2018 | Conference Paper | IST-REx-ID: 193   OA
Alwen JF, Gazi P, Kamath Hosdurg C, et al. On the memory hardness of data independent password hashing functions. In: Proceedings of the 2018 on Asia Conference on Computer and Communication Security. ACM; 2018:51-65. doi:10.1145/3196494.3196534
View | DOI | Download (ext.)
 
[79]
2018 | Conference Paper | IST-REx-ID: 302   OA
Cohen B, Pietrzak KZ. Simple proofs of sequential work. In: Vol 10821. Springer; 2018:451-467. doi:10.1007/978-3-319-78375-8_15
View | DOI | Download (ext.)
 
[78]
2018 | Conference Paper | IST-REx-ID: 6941   OA
Park S, Kwon A, Fuchsbauer G, Gazi P, Alwen JF, Pietrzak KZ. SpaceMint: A cryptocurrency based on proofs of space. In: 22nd International Conference on Financial Cryptography and Data Security. Vol 10957. Springer Nature; 2018:480-499. doi:10.1007/978-3-662-58387-6_26
View | DOI | Download (ext.)
 
[77]
2018 | Journal Article | IST-REx-ID: 107
Dziembowski S, Pietrzak KZ, Wichs D. Non-malleable codes. Journal of the ACM. 2018;65(4). doi:10.1145/3178432
View | DOI
 
[76]
2018 | Conference Paper | IST-REx-ID: 298   OA
Alwen JF, Blocki J, Pietrzak KZ. Sustained space complexity. In: Vol 10821. Springer; 2018:99-130. doi:10.1007/978-3-319-78375-8_4
View | DOI | Download (ext.)
 
[75]
2017 | Conference Paper | IST-REx-ID: 605   OA
Brody J, Dziembowski S, Faust S, Pietrzak KZ. Position based cryptography and multiparty communication complexity. In: Kalai Y, Reyzin L, eds. Vol 10677. Springer; 2017:56-81. doi:10.1007/978-3-319-70500-2_3
View | DOI | Download (ext.)
 
[74]
2017 | Conference Paper | IST-REx-ID: 559   OA
Abusalah HM, Alwen JF, Cohen B, Khilko D, Pietrzak KZ, Reyzin L. Beyond Hellman’s time-memory trade-offs with applications to proofs of space. In: Vol 10625. Springer; 2017:357-379. doi:10.1007/978-3-319-70697-9_13
View | Files available | DOI | Download (ext.)
 
[73]
2017 | Conference Paper | IST-REx-ID: 637   OA
Jafargholi Z, Kamath Hosdurg C, Klein K, Komargodski I, Pietrzak KZ, Wichs D. Be adaptive avoid overcommitting. In: Katz J, Shacham H, eds. Vol 10401. Springer; 2017:133-163. doi:10.1007/978-3-319-63688-7_5
View | DOI | Download (ext.)
 
[72]
2017 | Journal Article | IST-REx-ID: 1187
Kiltz E, Pietrzak KZ, Venturi D, Cash D, Jain A. Efficient authentication from hard learning problems. Journal of Cryptology. 2017;30(4):1238-1275. doi:10.1007/s00145-016-9247-3
View | Files available | DOI
 
[71]
2017 | Conference Paper | IST-REx-ID: 640   OA
Alwen JF, Blocki J, Pietrzak KZ. Depth-robust graphs and their cumulative memory complexity. In: Coron J-S, Buus Nielsen J, eds. Vol 10212. Springer; 2017:3-32. doi:10.1007/978-3-319-56617-7_1
View | DOI | Download (ext.)
 
[70]
2017 | Conference Paper | IST-REx-ID: 635   OA
Alwen JF, Chen B, Pietrzak KZ, Reyzin L, Tessaro S. Scrypt is maximally memory hard. In: Coron J-S, Buus Nielsen J, eds. Vol 10212. Springer; 2017:33-62. doi:10.1007/978-3-319-56617-7_2
View | DOI | Download (ext.)
 
[69]
2017 | Conference Paper | IST-REx-ID: 697   OA
Pietrzak KZ, Skórski M. Non uniform attacks against pseudoentropy. In: Vol 80. Schloss Dagstuhl - Leibniz-Zentrum für Informatik; 2017. doi:10.4230/LIPIcs.ICALP.2017.39
View | Files available | DOI
 
[68]
2017 | Journal Article | IST-REx-ID: 6196   OA
Gazi P, Pietrzak KZ, Rybar M. The exact security of PMAC. IACR Transactions on Symmetric Cryptology. 2017;2016(2):145-161. doi:10.13154/TOSC.V2016.I2.145-161
View | Files available | DOI
 
[67]
2016 | Conference Paper | IST-REx-ID: 1231   OA
Alwen JF, Chen B, Kamath Hosdurg C, Kolmogorov V, Pietrzak KZ, Tessaro S. On the complexity of scrypt and proofs of space in the parallel random oracle model. In: Vol 9666. Springer; 2016:358-387. doi:10.1007/978-3-662-49896-5_13
View | DOI | Download (ext.)
 
[66]
2016 | Conference Paper | IST-REx-ID: 1229
Abusalah HM, Fuchsbauer G, Pietrzak KZ. Offline witness encryption. In: Vol 9696. Springer; 2016:285-303. doi:10.1007/978-3-319-39555-5_16
View | Files available | DOI
 
[65]
2016 | Conference Paper | IST-REx-ID: 1236
Abusalah HM, Fuchsbauer G, Pietrzak KZ. Constrained PRFs for unbounded inputs. In: Vol 9610. Springer; 2016:413-428. doi:10.1007/978-3-319-29485-8_24
View | Files available | DOI
 
[64]
2016 | Conference Paper | IST-REx-ID: 1179   OA
Pietrzak KZ, Maciej S. Pseudoentropy: Lower-bounds for chain rules and transformations. In: Vol 9985. Springer; 2016:183-203. doi:10.1007/978-3-662-53641-4_8
View | DOI | Download (ext.)
 
[63]
2016 | Conference Paper | IST-REx-ID: 1233   OA
Fuchsbauer G, Heuer F, Kiltz E, Pietrzak KZ. Standard security does imply security against selective opening for markov distributions. In: Vol 9562. Springer; 2016:282-305. doi:10.1007/978-3-662-49096-9_12
View | DOI | Download (ext.)
 
[62]
2016 | Journal Article | IST-REx-ID: 1479
Krenn S, Pietrzak KZ, Wadia A, Wichs D. A counterexample to the chain rule for conditional HILL entropy. Computational Complexity. 2016;25(3):567-605. doi:10.1007/s00037-015-0120-9
View | Files available | DOI
 
[61]
2016 | Conference Paper | IST-REx-ID: 1653   OA
Okamoto T, Pietrzak KZ, Waters B, Wichs D. New realizations of somewhere statistically binding hashing and positional accumulators. In: Vol 9452. Springer; 2016:121-145. doi:10.1007/978-3-662-48797-6_6
View | Files available | DOI
 
[60]
2015 | Conference Paper | IST-REx-ID: 1654   OA
Gazi P, Pietrzak KZ, Tessaro S. Generic security of NMAC and HMAC with input whitening. 2015;9453:85-109. doi:10.1007/978-3-662-48800-3_4
View | Files available | DOI
 
[59]
2015 | Conference Paper | IST-REx-ID: 1648   OA
Fuchsbauer G, Jafargholi Z, Pietrzak KZ. A quasipolynomial reduction for generalized selective decryption on trees. In: Vol 9215. Springer; 2015:601-620. doi:10.1007/978-3-662-47989-6_29
View | Files available | DOI
 
[58]
2015 | Conference Paper | IST-REx-ID: 1650   OA
Skórski M, Golovnev A, Pietrzak KZ. Condensed unpredictability . In: Vol 9134. Springer; 2015:1046-1057. doi:10.1007/978-3-662-47672-7_85
View | Files available | DOI
 
[57]
2015 | Conference Paper | IST-REx-ID: 1649   OA
Benhamouda F, Krenn S, Lyubashevsky V, Pietrzak KZ. Efficient zero-knowledge proofs for commitments from learning with errors over rings. 2015;9326:305-325. doi:10.1007/978-3-319-24174-6_16
View | Files available | DOI
 
[56]
2015 | Conference Paper | IST-REx-ID: 1675
Dziembowski S, Faust S, Kolmogorov V, Pietrzak KZ. Proofs of space. 2015;9216:585-605. doi:10.1007/978-3-662-48000-7_29
View | Files available | DOI
 
[55]
2015 | Conference Paper | IST-REx-ID: 1669   OA
Pietrzak KZ, Skórski M. The chain rule for HILL pseudoentropy, revisited. 2015;9230:81-98. doi:10.1007/978-3-319-22174-8_5
View | Files available | DOI
 
[54]
2015 | Conference Paper | IST-REx-ID: 1671   OA
Gazi P, Pietrzak KZ, Tessaro S. The exact PRF security of truncation: Tight bounds for keyed sponges and truncated CBC. In: Vol 9215. Springer; 2015:368-387. doi:10.1007/978-3-662-47989-6_18
View | Files available | DOI
 
[53]
2015 | Conference Paper | IST-REx-ID: 1646   OA
Banerjee A, Fuchsbauer G, Peikert C, Pietrzak KZ, Stevens S. Key-homomorphic constrained pseudorandom functions. 2015;9015:31-60. doi:10.1007/978-3-662-46497-7_2
View | Files available | DOI
 
[52]
2014 | Conference Paper | IST-REx-ID: 2082
Gazi P, Pietrzak KZ, Rybar M. The exact PRF-security of NMAC and HMAC. In: Garay J, Gennaro R, eds. Vol 8616. Springer; 2014:113-130. doi:10.1007/978-3-662-44371-2_7
View | Files available | DOI
 
[51]
2014 | Conference Paper | IST-REx-ID: 1927   OA
Fuchsbauer G, Konstantinov M, Pietrzak KZ, Rao V. Adaptive security of constrained PRFs. In: Vol 8874. Springer; 2014:173-192. doi:10.1145/2591796.2591825
View | DOI | Download (ext.)
 
[50]
2014 | Conference Paper | IST-REx-ID: 2185   OA
Dodis Y, Pietrzak KZ, Wichs D. Key derivation without entropy waste. In: Nguyen P, Oswald E, eds. Vol 8441. Springer; 2014:93-110. doi:10.1007/978-3-642-55220-5_6
View | Files available | DOI
 
[49]
2014 | Conference Paper | IST-REx-ID: 2236   OA
Jetchev D, Pietrzak KZ. How to fake auxiliary input. In: Lindell Y, ed. Vol 8349. Springer; 2014:566-590. doi:10.1007/978-3-642-54242-8_24
View | Files available | DOI | Download (ext.)
 
[48]
2014 | Journal Article | IST-REx-ID: 2852
Fischlin M, Lehmann A, Pietrzak KZ. Robust multi-property combiners for hash functions. Journal of Cryptology. 2014;27(3):397-428. doi:10.1007/s00145-013-9148-7
View | Files available | DOI
 
[47]
2014 | Conference Paper | IST-REx-ID: 2219   OA
Kiltz E, Masny D, Pietrzak KZ. Simple chosen-ciphertext security from low noise LPN. In: Vol 8383. Springer; 2014:1-18. doi:10.1007/978-3-642-54631-0_1
View | DOI | Download (ext.)
 
[46]
2013 | Conference Paper | IST-REx-ID: 2258   OA
Kiltz E, Pietrzak KZ, Szegedy M. Digital signatures with minimal overhead from indifferentiable random invertible functions. 2013;8042:571-588. doi:10.1007/978-3-642-40041-4_31
View | Files available | DOI
 
[45]
2013 | Conference Paper | IST-REx-ID: 2259   OA
Alwen JF, Krenn S, Pietrzak KZ, Wichs D. Learning with rounding, revisited: New reduction properties and applications. 2013;8042(1):57-74. doi:10.1007/978-3-642-40041-4_4
View | Files available | DOI
 
[44]
2013 | Conference Paper | IST-REx-ID: 2940   OA
Krenn S, Pietrzak KZ, Wadia A. A counterexample to the chain rule for conditional HILL entropy, and what deniable encryption has to do with it. In: Sahai A, ed. Vol 7785. Springer; 2013:23-39. doi:10.1007/978-3-642-36594-2_2
View | Files available | DOI
 
[43]
2013 | Report | IST-REx-ID: 2274   OA
Dziembowski S, Faust S, Kolmogorov V, Pietrzak KZ. Proofs of Space. IST Austria; 2013.
View | Files available
 
[42]
2012 | Conference Paper | IST-REx-ID: 2049   OA
Heyse S, Kiltz E, Lyubashevsky V, Paar C, Pietrzak KZ. Lapin: An efficient authentication protocol based on ring-LPN. In: Conference Proceedings FSE 2012. Vol 7549. Springer; 2012:346-365. doi:10.1007/978-3-642-34047-5_20
View | DOI | Download (ext.)
 
[41]
2012 | Conference Paper | IST-REx-ID: 2974   OA
Jain A, Krenn S, Pietrzak KZ, Tentes A. Commitments and efficient zero knowledge proofs from learning parity with noise. In: Wang X, Sako K, eds. Vol 7658. Springer; 2012:663-680. doi:10.1007/978-3-642-34961-4_40
View | Files available | DOI
 
[40]
2012 | Conference Paper | IST-REx-ID: 3282   OA
Dodis Y, Pietrzak KZ, Kiltz E, Wichs D. Message authentication, revisited. In: Vol 7237. Springer; 2012:355-374. doi:10.1007/978-3-642-29011-4_22
View | Files available | DOI
 
[39]
2012 | Journal Article | IST-REx-ID: 3241
Pietrzak KZ, Wikström D. Parallel repetition of computationally sound protocols revisited. Journal of Cryptology. 2012;25(1):116-135. doi:10.1007/s00145-010-9090-x
View | DOI
 
[38]
2012 | Conference Paper | IST-REx-ID: 3280   OA
Pietrzak KZ. Subspace LWE. In: Vol 7194. Springer; 2012:548-563. doi:10.1007/978-3-642-28914-9_31
View | DOI | Download (ext.)
 
[37]
2012 | Conference Paper | IST-REx-ID: 3279
Jain A, Pietrzak KZ, Tentes A. Hardness preserving constructions of pseudorandom functions. In: Vol 7194. Springer; 2012:369-382. doi:10.1007/978-3-642-28914-9_21
View | DOI | Download (ext.)
 
[36]
2012 | Conference Paper | IST-REx-ID: 3281
Pietrzak KZ, Rosen A, Segev G. Lossy functions do not amplify well. In: Vol 7194. Springer; 2012:458-475. doi:10.1007/978-3-642-28914-9_26
View | DOI | Download (ext.)
 
[35]
2012 | Conference Paper | IST-REx-ID: 3250
Pietrzak KZ. Cryptography from learning parity with noise. In: Vol 7147. Springer; 2012:99-114. doi:10.1007/978-3-642-27660-6_9
View | DOI
 
[34]
2012 | Conference Paper | IST-REx-ID: 2048   OA
Faust S, Pietrzak KZ, Schipper J. Practical leakage-resilient symmetric cryptography. In: Conference Proceedings CHES 2012. Vol 7428. Springer; 2012:213-232. doi:10.1007/978-3-642-33027-8_13
View | DOI | Download (ext.)
 
[33]
2011 | Conference Paper | IST-REx-ID: 3240
Barak B, Dodis Y, Krawczyk H, et al. Leftover hash lemma revisited. In: Vol 6841. Springer; 2011:1-20. doi: 10.1007/978-3-642-22792-9_1
View | DOI
 
[32]
2011 | Conference Paper | IST-REx-ID: 3238
Kiltz E, Pietrzak KZ, Cash D, Jain A, Venturi D. Efficient authentication from hard learning problems. In: Vol 6632. Springer; 2011:7-26. doi:10.1007/978-3-642-20465-4_3
View | Files available | DOI
 
[31]
2011 | Conference Paper | IST-REx-ID: 3239
Faust S, Pietrzak KZ, Venturi D. Tamper proof circuits How to trade leakage for tamper resilience. In: Vol 6755. Springer; 2011:391-402. doi:10.1007/978-3-642-22006-7_33
View | DOI
 
[30]
2011 | Conference Paper | IST-REx-ID: 3236
Jain A, Pietrzak KZ. Parallel repetition for leakage resilience amplification revisited. In: Vol 6597. Springer; 2011:58-69. doi:10.1007/978-3-642-19571-6_5
View | DOI
 
[29]
2010 | Conference Paper | IST-REx-ID: 3237
Kiltz E, Pietrzak KZ. Leakage resilient ElGamal encryption. In: Vol 6477. Springer; 2010:595-612. doi:10.1007/978-3-642-17373-8_34
View | DOI
 
[28]
2010 | Conference Paper | IST-REx-ID: 3233
Håstad J, Pass R, Wikström D, Pietrzak KZ. An efficient parallel repetition theorem. In: Vol 5978. Springer; 2010:1-18. doi:10.1007/978-3-642-11799-2_1
View | DOI
 
[27]
2010 | Conference Paper | IST-REx-ID: 3234
Faust S, Kiltz E, Pietrzak KZ, Rothblum G. Leakage resilient signatures. In: Vol 5978. Springer; 2010:343-360. doi:10.1007/978-3-642-11799-2_21
View | DOI
 
[26]
2010 | Conference Paper | IST-REx-ID: 3235
Dodis Y, Pietrzak KZ. Leakage resilient pseudorandom functions and side channel attacks on feistel networks. In: Vol 6223. Springer; 2010:21-40. doi:10.1007/978-3-642-14623-7_2
View | DOI
 
[25]
2009 | Conference Paper | IST-REx-ID: 3232
Pietrzak KZ. A leakage resilient mode of operation. In: Vol 5479. Springer; 2009:462-482. doi:10.1007/978-3-642-01001-9_27
View | DOI
 
[24]
2009 | Conference Paper | IST-REx-ID: 3230
Kiltz E, Pietrzak KZ, Stam M, Yung M. A new randomness extraction paradigm for hybrid encryption. In: Vol 5479. Springer; 2009:590-609. doi:10.1007/978-3-642-01001-9_34
View | DOI
 
[23]
2009 | Conference Paper | IST-REx-ID: 3231
Kiltz E, Pietrzak KZ. On the security of padding based encryption schemes Why We cannot prove OAEP secure in the standard model. In: Vol 5479. Springer; 2009:389-406. doi:10.1007/978-3-642-01001-9_23
View | DOI
 
[22]
2008 | Conference Paper | IST-REx-ID: 3225
Fischlin M, Lehmann A, Pietrzak KZ. Robust multi property combiners for hash functions revisited. In: Vol 5126. Springer; 2008:655-666. doi:10.1007/978-3-540-70583-3_53
View | Files available | DOI
 
[21]
2008 | Conference Paper | IST-REx-ID: 3226
Pietrzak KZ, Sjödin J. Weak pseudorandom functions in minicrypt. In: Vol 5126. Springer; 2008:423-436. doi:10.1007/978-3-540-70583-3_35
View | DOI
 
[20]
2008 | Journal Article | IST-REx-ID: 3227
Zubielik P, Nadaczny J, Pietrzak KZ, Lawenda M. Elektrowiz – system of measurement data management. Przeglad Elektrotechniczny. 2008;84(10):239-242.
View | Download (ext.)
 
[19]
2008 | Conference Paper | IST-REx-ID: 3228
Pietrzak KZ. Compression from collisions or why CRHF combiners have a long output. In: Vol 5157. Springer; 2008:413-432. doi:10.1007/978-3-540-85174-5_23
View | DOI
 
[18]
2008 | Conference Paper | IST-REx-ID: 3224
Dodis Y, Pietrzak KZ, Puniya P. A new mode of operation for block ciphers and length preserving MACs. In: Vol 4965. Springer; 2008:198-219. doi:10.1007/978-3-540-78967-3_12
View | DOI
 
[17]
2008 | Conference Paper | IST-REx-ID: 3229
Dziembowski S, Pietrzak KZ. Leakage resilient cryptography. In: IEEE; 2008:293-302. doi:10.1109/FOCS.2008.56
View | DOI
 
[16]
2007 | Conference Paper | IST-REx-ID: 3218
Pietrzak KZ. Non-trivial black-box combiners for collision-resistant hash-functions don’t exist. In: Vol 4515. Springer; 2007:23-33. doi:10.1007/978-3-540-72540-4_2
View | DOI
 
[15]
2007 | Conference Paper | IST-REx-ID: 3220
Dziembowski S, Pietrzak KZ. Intrusion resilient secret sharing. In: IEEE; 2007:227-237. doi:10.1109/FOCS.2007.63
View | DOI
 
[14]
2007 | Conference Paper | IST-REx-ID: 3219
Maurer U, Pietrzak KZ, Renner R. Indistinguishability amplification. In: Vol 4622. Springer; 2007:130-149. doi:10.1007/978-3-540-74143-5_8
View | DOI
 
[13]
2007 | Conference Paper | IST-REx-ID: 3221
Pietrzak KZ, Sjödin J. Range extension for weak PRFs the good the bad and the ugly. In: Vol 4515. Springer; 2007:517-533. doi:10.1007/978-3-540-72540-4_30
View | DOI
 
[12]
2007 | Conference Paper | IST-REx-ID: 3222
Pietrzak KZ, Wikström D. Parallel repetition of computationally sound protocols revisited. In: Vol 4392. Springer; 2007:86-102. doi:10.1007/978-3-540-70936-7_5
View | DOI
 
[11]
2007 | Conference Paper | IST-REx-ID: 3223
Dodis Y, Pietrzak KZ. Improving the security of MACs via randomized message preprocessing. In: Vol 4593. Springer; 2007:414-433. doi:10.1007/978-3-540-74619-5_26
View | DOI
 
[10]
2006 | Conference Paper | IST-REx-ID: 3214
Maurer U, Oswald Y, Pietrzak KZ, Sjödin J. Luby Rackoff ciphers from weak round functions . In: Vol 4004. Springer; 2006:391-408. doi:10.1007/11761679_24
View | DOI
 
[9]
2006 | Conference Paper | IST-REx-ID: 3215
Dodis Y, Pietrzak KZ, Przydatek B. Separating sources for encryption and secret sharing. In: Vol 3876. Springer; 2006:601-616. doi:10.1007/11681878_31
View | DOI
 
[8]
2006 | Conference Paper | IST-REx-ID: 3216
Pietrzak KZ. A tight bound for EMAC. In: Vol 4052. Springer; 2006:168-179. doi:10.1007/11787006_15
View | DOI
 
[7]
2006 | Conference Paper | IST-REx-ID: 3217
Pietrzak KZ. Composition implies adaptive security in minicrypt. In: Vol 4004. Springer; 2006:328-338. doi:10.1007/11761679_20
View | DOI
 
[6]
2005 | Conference Paper | IST-REx-ID: 3213
Pietrzak KZ. Composition does not imply adaptive security. In: Vol 3621. Springer; 2005:55-65. doi:10.1007/11535218_4
View | DOI
 
[5]
2005 | Conference Paper | IST-REx-ID: 3211
Bellare M, Pietrzak KZ, Rogaway P. Improved security analyses for CBC MACs. In: Vol 3621. Springer; 2005:527-545. doi:10.1007/11535218_32
View | DOI
 
[4]
2005 | Conference Paper | IST-REx-ID: 3212
Dodis Y, Oliveira R, Pietrzak KZ. On the generic insecurity of the full domain hash. In: Vol 3621. Springer; 2005:449-466. doi:10.1007/11535218_27
View | DOI
 
[3]
2004 | Conference Paper | IST-REx-ID: 3208
Maurer U, Pietrzak KZ. Composition of random systems: When two weak make one strong. In: Vol 2951. Springer; 2004:410-427. doi:10.1007/978-3-540-24638-1_23
View | DOI
 
[2]
2003 | Conference Paper | IST-REx-ID: 3210
Maurer U, Pietrzak KZ. The security of many round Luby Rackoff pseudo random permutations. In: Vol 2656. Springer; 2003:544-561. doi:10.1007/3-540-39200-9_34
View | DOI
 
[1]
2003 | Journal Article | IST-REx-ID: 3209
Pietrzak KZ. On the parameterized complexity of the fixed alphabet shortest common supersequence and longest common subsequence problems. Journal of Computer and System Sciences. 2003;67(4):757-771. doi:10.1016/S0022-0000(03)00078-3
View | DOI
 

Search

Filter Publications

Display / Sort

Citation Style: AMA

Export / Embed