83 Publications

Mark all

[83]
2019 | Conference Paper | IST-REx-ID: 6528   OA
Pietrzak, K. Z. (2019). Simple verifiable delay functions. In 10th Innovations in Theoretical Computer Science Conference (Vol. 124, p. 60). San Diego, CA, United States: Schloss Dagstuhl - Leibniz-Zentrum für Informatik. https://doi.org/10.4230/LIPICS.ITCS.2019.60
View | Files available | DOI | Download (ext.)
 
[82]
2019 | Conference Paper | IST-REx-ID: 6430
Fuchsbauer, G., Kamath Hosdurg, C., Klein, K., & Pietrzak, K. Z. (2019). Adaptively secure proxy re-encryption (Vol. 11443, pp. 317–346). Presented at the PKC: Public-Key Cryptograhy, Beijing, China: Springer Nature. https://doi.org/10.1007/978-3-030-17259-6_11
View | DOI
 
[81]
2019 | Conference Paper | IST-REx-ID: 6677
Choudhuri, A. R., Hubáček, P., Kamath Hosdurg, C., Pietrzak, K. Z., Rosen, A., & Rothblum, G. N. (2019). Finding a Nash equilibrium is no easier than breaking Fiat-Shamir. In Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing  - STOC 2019 (pp. 1103–1114). Phoenix, AZ, United States: ACM Press. https://doi.org/10.1145/3313276.3316400
View | DOI
 
[80]
2018 | Conference Paper | IST-REx-ID: 193   OA
Alwen, J. F., Gazi, P., Kamath Hosdurg, C., Klein, K., Osang, G. F., Pietrzak, K. Z., … Rybar, M. (2018). On the memory hardness of data independent password hashing functions. In Proceedings of the 2018 on Asia Conference on Computer and Communication Security (pp. 51–65). Incheon, Republic of Korea: ACM. https://doi.org/10.1145/3196494.3196534
View | DOI | Download (ext.)
 
[79]
2018 | Conference Paper | IST-REx-ID: 302   OA
Cohen, B., & Pietrzak, K. Z. (2018). Simple proofs of sequential work (Vol. 10821, pp. 451–467). Presented at the Eurocrypt: Advances in Cryptology, Tel Aviv, Israel: Springer. https://doi.org/10.1007/978-3-319-78375-8_15
View | DOI | Download (ext.)
 
[78]
2018 | Conference Paper | IST-REx-ID: 6941   OA
Park, S., Kwon, A., Fuchsbauer, G., Gazi, P., Alwen, J. F., & Pietrzak, K. Z. (2018). SpaceMint: A cryptocurrency based on proofs of space. In 22nd International Conference on Financial Cryptography and Data Security (Vol. 10957, pp. 480–499). Nieuwpoort, Curacao: Springer Nature. https://doi.org/10.1007/978-3-662-58387-6_26
View | DOI | Download (ext.)
 
[77]
2018 | Journal Article | IST-REx-ID: 107
Dziembowski, S., Pietrzak, K. Z., & Wichs, D. (2018). Non-malleable codes. Journal of the ACM, 65(4). https://doi.org/10.1145/3178432
View | DOI
 
[76]
2018 | Conference Paper | IST-REx-ID: 298   OA
Alwen, J. F., Blocki, J., & Pietrzak, K. Z. (2018). Sustained space complexity (Vol. 10821, pp. 99–130). Presented at the Eurocrypt 2018: Advances in Cryptology, Tel Aviv, Israel: Springer. https://doi.org/10.1007/978-3-319-78375-8_4
View | DOI | Download (ext.)
 
[75]
2017 | Conference Paper | IST-REx-ID: 605   OA
Brody, J., Dziembowski, S., Faust, S., & Pietrzak, K. Z. (2017). Position based cryptography and multiparty communication complexity. In Y. Kalai & L. Reyzin (Eds.) (Vol. 10677, pp. 56–81). Presented at the TCC: Theory of Cryptography Conference, Baltimore, MD, United States: Springer. https://doi.org/10.1007/978-3-319-70500-2_3
View | DOI | Download (ext.)
 
[74]
2017 | Conference Paper | IST-REx-ID: 559
Abusalah, H. M., Alwen, J. F., Cohen, B., Khilko, D., Pietrzak, K. Z., & Reyzin, L. (2017). Beyond Hellman’s time-memory trade-offs with applications to proofs of space (Vol. 10625, pp. 357–379). Presented at the ASIACRYPT: Theory and Applications of Cryptology and Information Security, Hong Kong, China: Springer. https://doi.org/10.1007/978-3-319-70697-9_13
View | Files available | DOI | Download (ext.)
 
[73]
2017 | Conference Paper | IST-REx-ID: 637   OA
Jafargholi, Z., Kamath Hosdurg, C., Klein, K., Komargodski, I., Pietrzak, K. Z., & Wichs, D. (2017). Be adaptive avoid overcommitting. In J. Katz & H. Shacham (Eds.) (Vol. 10401, pp. 133–163). Presented at the CRYPTO: Cryptology, Santa Barbara, CA, United States: Springer. https://doi.org/10.1007/978-3-319-63688-7_5
View | DOI | Download (ext.)
 
[72]
2017 | Journal Article | IST-REx-ID: 1187
Kiltz, E., Pietrzak, K. Z., Venturi, D., Cash, D., & Jain, A. (2017). Efficient authentication from hard learning problems. Journal of Cryptology, 30(4), 1238–1275. https://doi.org/10.1007/s00145-016-9247-3
View | Files available | DOI
 
[71]
2017 | Conference Paper | IST-REx-ID: 640   OA
Alwen, J. F., Blocki, J., & Pietrzak, K. Z. (2017). Depth-robust graphs and their cumulative memory complexity. In J.-S. Coron & J. Buus Nielsen (Eds.) (Vol. 10212, pp. 3–32). Presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Paris, France: Springer. https://doi.org/10.1007/978-3-319-56617-7_1
View | DOI | Download (ext.)
 
[70]
2017 | Conference Paper | IST-REx-ID: 635   OA
Alwen, J. F., Chen, B., Pietrzak, K. Z., Reyzin, L., & Tessaro, S. (2017). Scrypt is maximally memory hard. In J.-S. Coron & J. Buus Nielsen (Eds.) (Vol. 10212, pp. 33–62). Presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Paris, France: Springer. https://doi.org/10.1007/978-3-319-56617-7_2
View | DOI | Download (ext.)
 
[69]
2017 | Conference Paper | IST-REx-ID: 697   OA
Pietrzak, K. Z., & Skórski, M. (2017). Non uniform attacks against pseudoentropy (Vol. 80). Presented at the ICALP: International Colloquium on Automata, Languages, and Programming, Warsaw, Poland: Schloss Dagstuhl - Leibniz-Zentrum für Informatik. https://doi.org/10.4230/LIPIcs.ICALP.2017.39
View | Files available | DOI
 
[68]
2017 | Journal Article | IST-REx-ID: 6196
Gazi, P., Pietrzak, K. Z., & Rybar, M. (2017). The exact security of PMAC. IACR Transactions on Symmetric Cryptology, 2016(2), 145–161. https://doi.org/10.13154/TOSC.V2016.I2.145-161
View | Files available | DOI
 
[67]
2016 | Conference Paper | IST-REx-ID: 1231   OA
Alwen, J. F., Chen, B., Kamath Hosdurg, C., Kolmogorov, V., Pietrzak, K. Z., & Tessaro, S. (2016). On the complexity of scrypt and proofs of space in the parallel random oracle model (Vol. 9666, pp. 358–387). Presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Vienna, Austria: Springer. https://doi.org/10.1007/978-3-662-49896-5_13
View | DOI | Download (ext.)
 
[66]
2016 | Conference Paper | IST-REx-ID: 1229
Abusalah, H. M., Fuchsbauer, G., & Pietrzak, K. Z. (2016). Offline witness encryption (Vol. 9696, pp. 285–303). Presented at the ACNS: Applied Cryptography and Network Security, Guildford, UK: Springer. https://doi.org/10.1007/978-3-319-39555-5_16
View | Files available | DOI
 
[65]
2016 | Conference Paper | IST-REx-ID: 1236
Abusalah, H. M., Fuchsbauer, G., & Pietrzak, K. Z. (2016). Constrained PRFs for unbounded inputs (Vol. 9610, pp. 413–428). Presented at the CT-RSA: Topics in Cryptology, San Francisco, CA, USA: Springer. https://doi.org/10.1007/978-3-319-29485-8_24
View | Files available | DOI
 
[64]
2016 | Conference Paper | IST-REx-ID: 1179   OA
Pietrzak, K. Z., & Maciej, S. (2016). Pseudoentropy: Lower-bounds for chain rules and transformations (Vol. 9985, pp. 183–203). Presented at the TCC: Theory of Cryptography Conference, Beijing, China: Springer. https://doi.org/10.1007/978-3-662-53641-4_8
View | DOI | Download (ext.)
 
[63]
2016 | Conference Paper | IST-REx-ID: 1233   OA
Fuchsbauer, G., Heuer, F., Kiltz, E., & Pietrzak, K. Z. (2016). Standard security does imply security against selective opening for markov distributions (Vol. 9562, pp. 282–305). Presented at the TCC: Theory of Cryptography Conference, Tel Aviv, Israel: Springer. https://doi.org/10.1007/978-3-662-49096-9_12
View | DOI | Download (ext.)
 
[62]
2016 | Journal Article | IST-REx-ID: 1479
Krenn, S., Pietrzak, K. Z., Wadia, A., & Wichs, D. (2016). A counterexample to the chain rule for conditional HILL entropy. Computational Complexity, 25(3), 567–605. https://doi.org/10.1007/s00037-015-0120-9
View | Files available | DOI
 
[61]
2016 | Conference Paper | IST-REx-ID: 1653   OA
Okamoto, T., Pietrzak, K. Z., Waters, B., & Wichs, D. (2016). New realizations of somewhere statistically binding hashing and positional accumulators (Vol. 9452, pp. 121–145). Presented at the ASIACRYPT: Theory and Application of Cryptology and Information Security, Auckland, New Zealand: Springer. https://doi.org/10.1007/978-3-662-48797-6_6
View | Files available | DOI
 
[60]
2015 | Conference Paper | IST-REx-ID: 1654   OA
Gazi, P., Pietrzak, K. Z., & Tessaro, S. (2015). Generic security of NMAC and HMAC with input whitening. Presented at the ASIACRYPT: Theory and Application of Cryptology and Information Security, Auckland, New Zealand: Springer. https://doi.org/10.1007/978-3-662-48800-3_4
View | Files available | DOI
 
[59]
2015 | Conference Paper | IST-REx-ID: 1648   OA
Fuchsbauer, G., Jafargholi, Z., & Pietrzak, K. Z. (2015). A quasipolynomial reduction for generalized selective decryption on trees (Vol. 9215, pp. 601–620). Presented at the CRYPTO: International Cryptology Conference, Santa Barbara, CA, USA: Springer. https://doi.org/10.1007/978-3-662-47989-6_29
View | Files available | DOI
 
[58]
2015 | Conference Paper | IST-REx-ID: 1650   OA
Skórski, M., Golovnev, A., & Pietrzak, K. Z. (2015). Condensed unpredictability (Vol. 9134, pp. 1046–1057). Presented at the ICALP: Automata, Languages and Programming, Kyoto, Japan: Springer. https://doi.org/10.1007/978-3-662-47672-7_85
View | Files available | DOI
 
[57]
2015 | Conference Paper | IST-REx-ID: 1649   OA
Benhamouda, F., Krenn, S., Lyubashevsky, V., & Pietrzak, K. Z. (2015). Efficient zero-knowledge proofs for commitments from learning with errors over rings. Presented at the ESORICS: European Symposium on Research in Computer Security, Vienna, Austria: Springer. https://doi.org/10.1007/978-3-319-24174-6_16
View | Files available | DOI
 
[56]
2015 | Conference Paper | IST-REx-ID: 1675
Dziembowski, S., Faust, S., Kolmogorov, V., & Pietrzak, K. Z. (2015). Proofs of space. Presented at the CRYPTO: International Cryptology Conference, Santa Barbara, CA, United States: Springer. https://doi.org/10.1007/978-3-662-48000-7_29
View | Files available | DOI
 
[55]
2015 | Conference Paper | IST-REx-ID: 1669   OA
Pietrzak, K. Z., & Skórski, M. (2015). The chain rule for HILL pseudoentropy, revisited. Presented at the LATINCRYPT: Cryptology and Information Security in Latin America, Guadalajara, Mexico: Springer. https://doi.org/10.1007/978-3-319-22174-8_5
View | Files available | DOI
 
[54]
2015 | Conference Paper | IST-REx-ID: 1671   OA
Gazi, P., Pietrzak, K. Z., & Tessaro, S. (2015). The exact PRF security of truncation: Tight bounds for keyed sponges and truncated CBC (Vol. 9215, pp. 368–387). Presented at the CRYPTO: International Cryptology Conference, Santa Barbara, CA, United States: Springer. https://doi.org/10.1007/978-3-662-47989-6_18
View | Files available | DOI
 
[53]
2015 | Conference Paper | IST-REx-ID: 1646   OA
Banerjee, A., Fuchsbauer, G., Peikert, C., Pietrzak, K. Z., & Stevens, S. (2015). Key-homomorphic constrained pseudorandom functions. Presented at the TCC: Theory of Cryptography Conference, Warsaw, Poland: Springer. https://doi.org/10.1007/978-3-662-46497-7_2
View | Files available | DOI
 
[52]
2014 | Conference Paper | IST-REx-ID: 2082
Gazi, P., Pietrzak, K. Z., & Rybar, M. (2014). The exact PRF-security of NMAC and HMAC. In J. Garay & R. Gennaro (Eds.) (Vol. 8616, pp. 113–130). Presented at the CRYPTO: International Cryptology Conference, Santa Barbara, USA: Springer. https://doi.org/10.1007/978-3-662-44371-2_7
View | Files available | DOI
 
[51]
2014 | Conference Paper | IST-REx-ID: 1927   OA
Fuchsbauer, G., Konstantinov, M., Pietrzak, K. Z., & Rao, V. (2014). Adaptive security of constrained PRFs (Vol. 8874, pp. 173–192). Presented at the Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer. https://doi.org/10.1145/2591796.2591825
View | DOI | Download (ext.)
 
[50]
2014 | Conference Paper | IST-REx-ID: 2236   OA
Jetchev, D., & Pietrzak, K. Z. (2014). How to fake auxiliary input. In Y. Lindell (Ed.) (Vol. 8349, pp. 566–590). Presented at the TCC: Theory of Cryptography Conference, San Diego, USA: Springer. https://doi.org/10.1007/978-3-642-54242-8_24
View | Files available | DOI | Download (ext.)
 
[49]
2014 | Conference Paper | IST-REx-ID: 2185   OA
Dodis, Y., Pietrzak, K. Z., & Wichs, D. (2014). Key derivation without entropy waste. In P. Nguyen & E. Oswald (Eds.) (Vol. 8441, pp. 93–110). Presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark: Springer. https://doi.org/10.1007/978-3-642-55220-5_6
View | Files available | DOI
 
[48]
2014 | Journal Article | IST-REx-ID: 2852
Fischlin, M., Lehmann, A., & Pietrzak, K. Z. (2014). Robust multi-property combiners for hash functions. Journal of Cryptology, 27(3), 397–428. https://doi.org/10.1007/s00145-013-9148-7
View | Files available | DOI
 
[47]
2014 | Conference Paper | IST-REx-ID: 2219   OA
Kiltz, E., Masny, D., & Pietrzak, K. Z. (2014). Simple chosen-ciphertext security from low noise LPN (Vol. 8383, pp. 1–18). Presented at the IACR: International Conference on Practice and Theory in Public-Key Cryptography, Springer. https://doi.org/10.1007/978-3-642-54631-0_1
View | DOI | Download (ext.)
 
[46]
2013 | Conference Paper | IST-REx-ID: 2258   OA
Kiltz, E., Pietrzak, K. Z., & Szegedy, M. (2013). Digital signatures with minimal overhead from indifferentiable random invertible functions. Presented at the CRYPTO: International Cryptology Conference, Santa Barbara, CA, United States: Springer. https://doi.org/10.1007/978-3-642-40041-4_31
View | Files available | DOI
 
[45]
2013 | Conference Paper | IST-REx-ID: 2259   OA
Alwen, J. F., Krenn, S., Pietrzak, K. Z., & Wichs, D. (2013). Learning with rounding, revisited: New reduction properties and applications. Presented at the CRYPTO: International Cryptology Conference, Santa Barbara, CA, United States: Springer. https://doi.org/10.1007/978-3-642-40041-4_4
View | Files available | DOI
 
[44]
2013 | Report | IST-REx-ID: 2274   OA
Dziembowski, S., Faust, S., Kolmogorov, V., & Pietrzak, K. Z. (2013). Proofs of Space. IST Austria.
View | Files available
 
[43]
2013 | Conference Paper | IST-REx-ID: 2940   OA
Krenn, S., Pietrzak, K. Z., & Wadia, A. (2013). A counterexample to the chain rule for conditional HILL entropy, and what deniable encryption has to do with it. In A. Sahai (Ed.) (Vol. 7785, pp. 23–39). Presented at the TCC: Theory of Cryptography Conference, Tokyo, Japan: Springer. https://doi.org/10.1007/978-3-642-36594-2_2
View | Files available | DOI
 
[42]
2012 | Conference Paper | IST-REx-ID: 2049   OA
Heyse, S., Kiltz, E., Lyubashevsky, V., Paar, C., & Pietrzak, K. Z. (2012). Lapin: An efficient authentication protocol based on ring-LPN. In Conference proceedings FSE 2012 (Vol. 7549, pp. 346–365). Washington, DC, USA: Springer. https://doi.org/10.1007/978-3-642-34047-5_20
View | DOI | Download (ext.)
 
[41]
2012 | Conference Paper | IST-REx-ID: 2974   OA
Jain, A., Krenn, S., Pietrzak, K. Z., & Tentes, A. (2012). Commitments and efficient zero knowledge proofs from learning parity with noise. In X. Wang & K. Sako (Eds.) (Vol. 7658, pp. 663–680). Presented at the ASIACRYPT: Theory and Application of Cryptology and Information Security, Beijing, China: Springer. https://doi.org/10.1007/978-3-642-34961-4_40
View | Files available | DOI
 
[40]
2012 | Conference Paper | IST-REx-ID: 3282   OA
Dodis, Y., Pietrzak, K. Z., Kiltz, E., & Wichs, D. (2012). Message authentication, revisited (Vol. 7237, pp. 355–374). Presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Cambridge, UK: Springer. https://doi.org/10.1007/978-3-642-29011-4_22
View | Files available | DOI
 
[39]
2012 | Journal Article | IST-REx-ID: 3241
Pietrzak, K. Z., & Wikström, D. (2012). Parallel repetition of computationally sound protocols revisited. Journal of Cryptology, 25(1), 116–135. https://doi.org/10.1007/s00145-010-9090-x
View | DOI
 
[38]
2012 | Conference Paper | IST-REx-ID: 3280   OA
Pietrzak, K. Z. (2012). Subspace LWE (Vol. 7194, pp. 548–563). Presented at the TCC: Theory of Cryptography Conference, Taormina, Sicily, Italy: Springer. https://doi.org/10.1007/978-3-642-28914-9_31
View | DOI | Download (ext.)
 
[37]
2012 | Conference Paper | IST-REx-ID: 2048   OA
Faust, S., Pietrzak, K. Z., & Schipper, J. (2012). Practical leakage-resilient symmetric cryptography. In Conference proceedings CHES 2012 (Vol. 7428, pp. 213–232). Leuven, Belgium: Springer. https://doi.org/10.1007/978-3-642-33027-8_13
View | DOI | Download (ext.)
 
[36]
2012 | Conference Paper | IST-REx-ID: 3250
Pietrzak, K. Z. (2012). Cryptography from learning parity with noise (Vol. 7147, pp. 99–114). Presented at the SOFSEM: Current Trends in Theory and Practice of Computer Science, Špindlerův Mlýn, Czech Republic: Springer. https://doi.org/10.1007/978-3-642-27660-6_9
View | DOI
 
[35]
2012 | Conference Paper | IST-REx-ID: 3279
Jain, A., Pietrzak, K. Z., & Tentes, A. (2012). Hardness preserving constructions of pseudorandom functions (Vol. 7194, pp. 369–382). Presented at the TCC: Theory of Cryptography Conference, Taormina, Sicily, Italy: Springer. https://doi.org/10.1007/978-3-642-28914-9_21
View | DOI | Download (ext.)
 
[34]
2012 | Conference Paper | IST-REx-ID: 3281
Pietrzak, K. Z., Rosen, A., & Segev, G. (2012). Lossy functions do not amplify well (Vol. 7194, pp. 458–475). Presented at the TCC: Theory of Cryptography Conference, Taormina, Sicily, Italy: Springer. https://doi.org/10.1007/978-3-642-28914-9_26
View | DOI | Download (ext.)
 
[33]
2011 | Conference Paper | IST-REx-ID: 3240
Barak, B., Dodis, Y., Krawczyk, H., Pereira, O., Pietrzak, K. Z., Standaert, F., & Yu, Y. (2011). Leftover hash lemma revisited (Vol. 6841, pp. 1–20). Presented at the CRYPTO: International Cryptology Conference, Springer. https://doi.org/ 10.1007/978-3-642-22792-9_1
View | DOI
 
[32]
2011 | Conference Paper | IST-REx-ID: 3238
Kiltz, E., Pietrzak, K. Z., Cash, D., Jain, A., & Venturi, D. (2011). Efficient authentication from hard learning problems (Vol. 6632, pp. 7–26). Presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Tallinn, Estonia: Springer. https://doi.org/10.1007/978-3-642-20465-4_3
View | Files available | DOI
 
[31]
2011 | Conference Paper | IST-REx-ID: 3239
Faust, S., Pietrzak, K. Z., & Venturi, D. (2011). Tamper proof circuits How to trade leakage for tamper resilience (Vol. 6755, pp. 391–402). Presented at the ICALP: Automata, Languages and Programming, Springer. https://doi.org/10.1007/978-3-642-22006-7_33
View | DOI
 
[30]
2011 | Conference Paper | IST-REx-ID: 3236
Jain, A., & Pietrzak, K. Z. (2011). Parallel repetition for leakage resilience amplification revisited (Vol. 6597, pp. 58–69). Presented at the TCC: Theory of Cryptography Conference, Springer. https://doi.org/10.1007/978-3-642-19571-6_5
View | DOI
 
[29]
2010 | Conference Paper | IST-REx-ID: 3237
Kiltz, E., & Pietrzak, K. Z. (2010). Leakage resilient ElGamal encryption (Vol. 6477, pp. 595–612). Presented at the ASIACRYPT: Theory and Application of Cryptology and Information Security, Springer. https://doi.org/10.1007/978-3-642-17373-8_34
View | DOI
 
[28]
2010 | Conference Paper | IST-REx-ID: 3233
Håstad, J., Pass, R., Wikström, D., & Pietrzak, K. Z. (2010). An efficient parallel repetition theorem (Vol. 5978, pp. 1–18). Presented at the TCC: Theory of Cryptography Conference, Springer. https://doi.org/10.1007/978-3-642-11799-2_1
View | DOI
 
[27]
2010 | Conference Paper | IST-REx-ID: 3234
Faust, S., Kiltz, E., Pietrzak, K. Z., & Rothblum, G. (2010). Leakage resilient signatures (Vol. 5978, pp. 343–360). Presented at the TCC: Theory of Cryptography Conference, Springer. https://doi.org/10.1007/978-3-642-11799-2_21
View | DOI
 
[26]
2010 | Conference Paper | IST-REx-ID: 3235
Dodis, Y., & Pietrzak, K. Z. (2010). Leakage resilient pseudorandom functions and side channel attacks on feistel networks (Vol. 6223, pp. 21–40). Presented at the CRYPTO: International Cryptology Conference, Springer. https://doi.org/10.1007/978-3-642-14623-7_2
View | DOI
 
[25]
2009 | Conference Paper | IST-REx-ID: 3232
Pietrzak, K. Z. (2009). A leakage resilient mode of operation (Vol. 5479, pp. 462–482). Presented at the CRYPTO: International Cryptology Conference, Springer. https://doi.org/10.1007/978-3-642-01001-9_27
View | DOI
 
[24]
2009 | Conference Paper | IST-REx-ID: 3230
Kiltz, E., Pietrzak, K. Z., Stam, M., & Yung, M. (2009). A new randomness extraction paradigm for hybrid encryption (Vol. 5479, pp. 590–609). Presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Springer. https://doi.org/10.1007/978-3-642-01001-9_34
View | DOI
 
[23]
2009 | Conference Paper | IST-REx-ID: 3231
Kiltz, E., & Pietrzak, K. Z. (2009). On the security of padding based encryption schemes Why We cannot prove OAEP secure in the standard model (Vol. 5479, pp. 389–406). Presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Springer. https://doi.org/10.1007/978-3-642-01001-9_23
View | DOI
 
[22]
2008 | Conference Paper | IST-REx-ID: 3225
Fischlin, M., Lehmann, A., & Pietrzak, K. Z. (2008). Robust multi property combiners for hash functions revisited (Vol. 5126, pp. 655–666). Presented at the ICALP: Automata, Languages and Programming, Springer. https://doi.org/10.1007/978-3-540-70583-3_53
View | Files available | DOI
 
[21]
2008 | Conference Paper | IST-REx-ID: 3226
Pietrzak, K. Z., & Sjödin, J. (2008). Weak pseudorandom functions in minicrypt (Vol. 5126, pp. 423–436). Presented at the ICALP: Automata, Languages and Programming, Springer. https://doi.org/10.1007/978-3-540-70583-3_35
View | DOI
 
[20]
2008 | Journal Article | IST-REx-ID: 3227
Zubielik, P., Nadaczny, J., Pietrzak, K. Z., & Lawenda, M. (2008). Elektrowiz – system of measurement data management. Przeglad Elektrotechniczny, 84(10), 239–242.
View | Download (ext.)
 
[19]
2008 | Conference Paper | IST-REx-ID: 3228
Pietrzak, K. Z. (2008). Compression from collisions or why CRHF combiners have a long output (Vol. 5157, pp. 413–432). Presented at the CRYPTO: International Cryptology Conference, Springer. https://doi.org/10.1007/978-3-540-85174-5_23
View | DOI
 
[18]
2008 | Conference Paper | IST-REx-ID: 3224
Dodis, Y., Pietrzak, K. Z., & Puniya, P. (2008). A new mode of operation for block ciphers and length preserving MACs (Vol. 4965, pp. 198–219). Presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Springer. https://doi.org/10.1007/978-3-540-78967-3_12
View | DOI
 
[17]
2008 | Conference Paper | IST-REx-ID: 3229
Dziembowski, S., & Pietrzak, K. Z. (2008). Leakage resilient cryptography (pp. 293–302). Presented at the FOCS: Foundations of Computer Science, IEEE. https://doi.org/10.1109/FOCS.2008.56
View | DOI
 
[16]
2007 | Conference Paper | IST-REx-ID: 3218
Pietrzak, K. Z. (2007). Non-trivial black-box combiners for collision-resistant hash-functions don’t exist (Vol. 4515, pp. 23–33). Presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Springer. https://doi.org/10.1007/978-3-540-72540-4_2
View | DOI
 
[15]
2007 | Conference Paper | IST-REx-ID: 3220
Dziembowski, S., & Pietrzak, K. Z. (2007). Intrusion resilient secret sharing (pp. 227–237). Presented at the FOCS: Foundations of Computer Science, IEEE. https://doi.org/10.1109/FOCS.2007.63
View | DOI
 
[14]
2007 | Conference Paper | IST-REx-ID: 3219
Maurer, U., Pietrzak, K. Z., & Renner, R. (2007). Indistinguishability amplification (Vol. 4622, pp. 130–149). Presented at the CRYPTO: International Cryptology Conference, Springer. https://doi.org/10.1007/978-3-540-74143-5_8
View | DOI
 
[13]
2007 | Conference Paper | IST-REx-ID: 3221
Pietrzak, K. Z., & Sjödin, J. (2007). Range extension for weak PRFs the good the bad and the ugly (Vol. 4515, pp. 517–533). Presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Springer. https://doi.org/10.1007/978-3-540-72540-4_30
View | DOI
 
[12]
2007 | Conference Paper | IST-REx-ID: 3222
Pietrzak, K. Z., & Wikström, D. (2007). Parallel repetition of computationally sound protocols revisited (Vol. 4392, pp. 86–102). Presented at the TCC: Theory of Cryptography Conference, Springer. https://doi.org/10.1007/978-3-540-70936-7_5
View | DOI
 
[11]
2007 | Conference Paper | IST-REx-ID: 3223
Dodis, Y., & Pietrzak, K. Z. (2007). Improving the security of MACs via randomized message preprocessing (Vol. 4593, pp. 414–433). Presented at the FSE: Fast Software Encryption, Springer. https://doi.org/10.1007/978-3-540-74619-5_26
View | DOI
 
[10]
2006 | Conference Paper | IST-REx-ID: 3214
Maurer, U., Oswald, Y., Pietrzak, K. Z., & Sjödin, J. (2006). Luby Rackoff ciphers from weak round functions (Vol. 4004, pp. 391–408). Presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Springer. https://doi.org/10.1007/11761679_24
View | DOI
 
[9]
2006 | Conference Paper | IST-REx-ID: 3215
Dodis, Y., Pietrzak, K. Z., & Przydatek, B. (2006). Separating sources for encryption and secret sharing (Vol. 3876, pp. 601–616). Presented at the TCC: Theory of Cryptography Conference, Springer. https://doi.org/10.1007/11681878_31
View | DOI
 
[8]
2006 | Conference Paper | IST-REx-ID: 3216
Pietrzak, K. Z. (2006). A tight bound for EMAC (Vol. 4052, pp. 168–179). Presented at the ICALP: Automata, Languages and Programming, Springer. https://doi.org/10.1007/11787006_15
View | DOI
 
[7]
2006 | Conference Paper | IST-REx-ID: 3217
Pietrzak, K. Z. (2006). Composition implies adaptive security in minicrypt (Vol. 4004, pp. 328–338). Presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Springer. https://doi.org/10.1007/11761679_20
View | DOI
 
[6]
2005 | Conference Paper | IST-REx-ID: 3213
Pietrzak, K. Z. (2005). Composition does not imply adaptive security (Vol. 3621, pp. 55–65). Presented at the CRYPTO: International Cryptology Conference, Springer. https://doi.org/10.1007/11535218_4
View | DOI
 
[5]
2005 | Conference Paper | IST-REx-ID: 3211
Bellare, M., Pietrzak, K. Z., & Rogaway, P. (2005). Improved security analyses for CBC MACs (Vol. 3621, pp. 527–545). Presented at the CRYPTO: International Cryptology Conference, Springer. https://doi.org/10.1007/11535218_32
View | DOI
 
[4]
2005 | Conference Paper | IST-REx-ID: 3212
Dodis, Y., Oliveira, R., & Pietrzak, K. Z. (2005). On the generic insecurity of the full domain hash (Vol. 3621, pp. 449–466). Presented at the CRYPTO: International Cryptology Conference, Springer. https://doi.org/10.1007/11535218_27
View | DOI
 
[3]
2004 | Conference Paper | IST-REx-ID: 3208
Maurer, U., & Pietrzak, K. Z. (2004). Composition of random systems: When two weak make one strong (Vol. 2951, pp. 410–427). Presented at the TCC: Theory of Cryptography Conference, Springer. https://doi.org/10.1007/978-3-540-24638-1_23
View | DOI
 
[2]
2003 | Conference Paper | IST-REx-ID: 3210
Maurer, U., & Pietrzak, K. Z. (2003). The security of many round Luby Rackoff pseudo random permutations (Vol. 2656, pp. 544–561). Presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Springer. https://doi.org/10.1007/3-540-39200-9_34
View | DOI
 
[1]
2003 | Journal Article | IST-REx-ID: 3209
Pietrzak, K. Z. (2003). On the parameterized complexity of the fixed alphabet shortest common supersequence and longest common subsequence problems. Journal of Computer and System Sciences, 67(4), 757–771. https://doi.org/10.1016/S0022-0000(03)00078-3
View | DOI
 

Search

Filter Publications

Display / Sort

Citation Style: APA

Export / Embed

83 Publications

Mark all

[83]
2019 | Conference Paper | IST-REx-ID: 6528   OA
Pietrzak, K. Z. (2019). Simple verifiable delay functions. In 10th Innovations in Theoretical Computer Science Conference (Vol. 124, p. 60). San Diego, CA, United States: Schloss Dagstuhl - Leibniz-Zentrum für Informatik. https://doi.org/10.4230/LIPICS.ITCS.2019.60
View | Files available | DOI | Download (ext.)
 
[82]
2019 | Conference Paper | IST-REx-ID: 6430
Fuchsbauer, G., Kamath Hosdurg, C., Klein, K., & Pietrzak, K. Z. (2019). Adaptively secure proxy re-encryption (Vol. 11443, pp. 317–346). Presented at the PKC: Public-Key Cryptograhy, Beijing, China: Springer Nature. https://doi.org/10.1007/978-3-030-17259-6_11
View | DOI
 
[81]
2019 | Conference Paper | IST-REx-ID: 6677
Choudhuri, A. R., Hubáček, P., Kamath Hosdurg, C., Pietrzak, K. Z., Rosen, A., & Rothblum, G. N. (2019). Finding a Nash equilibrium is no easier than breaking Fiat-Shamir. In Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing  - STOC 2019 (pp. 1103–1114). Phoenix, AZ, United States: ACM Press. https://doi.org/10.1145/3313276.3316400
View | DOI
 
[80]
2018 | Conference Paper | IST-REx-ID: 193   OA
Alwen, J. F., Gazi, P., Kamath Hosdurg, C., Klein, K., Osang, G. F., Pietrzak, K. Z., … Rybar, M. (2018). On the memory hardness of data independent password hashing functions. In Proceedings of the 2018 on Asia Conference on Computer and Communication Security (pp. 51–65). Incheon, Republic of Korea: ACM. https://doi.org/10.1145/3196494.3196534
View | DOI | Download (ext.)
 
[79]
2018 | Conference Paper | IST-REx-ID: 302   OA
Cohen, B., & Pietrzak, K. Z. (2018). Simple proofs of sequential work (Vol. 10821, pp. 451–467). Presented at the Eurocrypt: Advances in Cryptology, Tel Aviv, Israel: Springer. https://doi.org/10.1007/978-3-319-78375-8_15
View | DOI | Download (ext.)
 
[78]
2018 | Conference Paper | IST-REx-ID: 6941   OA
Park, S., Kwon, A., Fuchsbauer, G., Gazi, P., Alwen, J. F., & Pietrzak, K. Z. (2018). SpaceMint: A cryptocurrency based on proofs of space. In 22nd International Conference on Financial Cryptography and Data Security (Vol. 10957, pp. 480–499). Nieuwpoort, Curacao: Springer Nature. https://doi.org/10.1007/978-3-662-58387-6_26
View | DOI | Download (ext.)
 
[77]
2018 | Journal Article | IST-REx-ID: 107
Dziembowski, S., Pietrzak, K. Z., & Wichs, D. (2018). Non-malleable codes. Journal of the ACM, 65(4). https://doi.org/10.1145/3178432
View | DOI
 
[76]
2018 | Conference Paper | IST-REx-ID: 298   OA
Alwen, J. F., Blocki, J., & Pietrzak, K. Z. (2018). Sustained space complexity (Vol. 10821, pp. 99–130). Presented at the Eurocrypt 2018: Advances in Cryptology, Tel Aviv, Israel: Springer. https://doi.org/10.1007/978-3-319-78375-8_4
View | DOI | Download (ext.)
 
[75]
2017 | Conference Paper | IST-REx-ID: 605   OA
Brody, J., Dziembowski, S., Faust, S., & Pietrzak, K. Z. (2017). Position based cryptography and multiparty communication complexity. In Y. Kalai & L. Reyzin (Eds.) (Vol. 10677, pp. 56–81). Presented at the TCC: Theory of Cryptography Conference, Baltimore, MD, United States: Springer. https://doi.org/10.1007/978-3-319-70500-2_3
View | DOI | Download (ext.)
 
[74]
2017 | Conference Paper | IST-REx-ID: 559
Abusalah, H. M., Alwen, J. F., Cohen, B., Khilko, D., Pietrzak, K. Z., & Reyzin, L. (2017). Beyond Hellman’s time-memory trade-offs with applications to proofs of space (Vol. 10625, pp. 357–379). Presented at the ASIACRYPT: Theory and Applications of Cryptology and Information Security, Hong Kong, China: Springer. https://doi.org/10.1007/978-3-319-70697-9_13
View | Files available | DOI | Download (ext.)
 
[73]
2017 | Conference Paper | IST-REx-ID: 637   OA
Jafargholi, Z., Kamath Hosdurg, C., Klein, K., Komargodski, I., Pietrzak, K. Z., & Wichs, D. (2017). Be adaptive avoid overcommitting. In J. Katz & H. Shacham (Eds.) (Vol. 10401, pp. 133–163). Presented at the CRYPTO: Cryptology, Santa Barbara, CA, United States: Springer. https://doi.org/10.1007/978-3-319-63688-7_5
View | DOI | Download (ext.)
 
[72]
2017 | Journal Article | IST-REx-ID: 1187
Kiltz, E., Pietrzak, K. Z., Venturi, D., Cash, D., & Jain, A. (2017). Efficient authentication from hard learning problems. Journal of Cryptology, 30(4), 1238–1275. https://doi.org/10.1007/s00145-016-9247-3
View | Files available | DOI
 
[71]
2017 | Conference Paper | IST-REx-ID: 640   OA
Alwen, J. F., Blocki, J., & Pietrzak, K. Z. (2017). Depth-robust graphs and their cumulative memory complexity. In J.-S. Coron & J. Buus Nielsen (Eds.) (Vol. 10212, pp. 3–32). Presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Paris, France: Springer. https://doi.org/10.1007/978-3-319-56617-7_1
View | DOI | Download (ext.)
 
[70]
2017 | Conference Paper | IST-REx-ID: 635   OA
Alwen, J. F., Chen, B., Pietrzak, K. Z., Reyzin, L., & Tessaro, S. (2017). Scrypt is maximally memory hard. In J.-S. Coron & J. Buus Nielsen (Eds.) (Vol. 10212, pp. 33–62). Presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Paris, France: Springer. https://doi.org/10.1007/978-3-319-56617-7_2
View | DOI | Download (ext.)
 
[69]
2017 | Conference Paper | IST-REx-ID: 697   OA
Pietrzak, K. Z., & Skórski, M. (2017). Non uniform attacks against pseudoentropy (Vol. 80). Presented at the ICALP: International Colloquium on Automata, Languages, and Programming, Warsaw, Poland: Schloss Dagstuhl - Leibniz-Zentrum für Informatik. https://doi.org/10.4230/LIPIcs.ICALP.2017.39
View | Files available | DOI
 
[68]
2017 | Journal Article | IST-REx-ID: 6196
Gazi, P., Pietrzak, K. Z., & Rybar, M. (2017). The exact security of PMAC. IACR Transactions on Symmetric Cryptology, 2016(2), 145–161. https://doi.org/10.13154/TOSC.V2016.I2.145-161
View | Files available | DOI
 
[67]
2016 | Conference Paper | IST-REx-ID: 1231   OA
Alwen, J. F., Chen, B., Kamath Hosdurg, C., Kolmogorov, V., Pietrzak, K. Z., & Tessaro, S. (2016). On the complexity of scrypt and proofs of space in the parallel random oracle model (Vol. 9666, pp. 358–387). Presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Vienna, Austria: Springer. https://doi.org/10.1007/978-3-662-49896-5_13
View | DOI | Download (ext.)
 
[66]
2016 | Conference Paper | IST-REx-ID: 1229
Abusalah, H. M., Fuchsbauer, G., & Pietrzak, K. Z. (2016). Offline witness encryption (Vol. 9696, pp. 285–303). Presented at the ACNS: Applied Cryptography and Network Security, Guildford, UK: Springer. https://doi.org/10.1007/978-3-319-39555-5_16
View | Files available | DOI
 
[65]
2016 | Conference Paper | IST-REx-ID: 1236
Abusalah, H. M., Fuchsbauer, G., & Pietrzak, K. Z. (2016). Constrained PRFs for unbounded inputs (Vol. 9610, pp. 413–428). Presented at the CT-RSA: Topics in Cryptology, San Francisco, CA, USA: Springer. https://doi.org/10.1007/978-3-319-29485-8_24
View | Files available | DOI
 
[64]
2016 | Conference Paper | IST-REx-ID: 1179   OA
Pietrzak, K. Z., & Maciej, S. (2016). Pseudoentropy: Lower-bounds for chain rules and transformations (Vol. 9985, pp. 183–203). Presented at the TCC: Theory of Cryptography Conference, Beijing, China: Springer. https://doi.org/10.1007/978-3-662-53641-4_8
View | DOI | Download (ext.)
 
[63]
2016 | Conference Paper | IST-REx-ID: 1233   OA
Fuchsbauer, G., Heuer, F., Kiltz, E., & Pietrzak, K. Z. (2016). Standard security does imply security against selective opening for markov distributions (Vol. 9562, pp. 282–305). Presented at the TCC: Theory of Cryptography Conference, Tel Aviv, Israel: Springer. https://doi.org/10.1007/978-3-662-49096-9_12
View | DOI | Download (ext.)
 
[62]
2016 | Journal Article | IST-REx-ID: 1479
Krenn, S., Pietrzak, K. Z., Wadia, A., & Wichs, D. (2016). A counterexample to the chain rule for conditional HILL entropy. Computational Complexity, 25(3), 567–605. https://doi.org/10.1007/s00037-015-0120-9
View | Files available | DOI
 
[61]
2016 | Conference Paper | IST-REx-ID: 1653   OA
Okamoto, T., Pietrzak, K. Z., Waters, B., & Wichs, D. (2016). New realizations of somewhere statistically binding hashing and positional accumulators (Vol. 9452, pp. 121–145). Presented at the ASIACRYPT: Theory and Application of Cryptology and Information Security, Auckland, New Zealand: Springer. https://doi.org/10.1007/978-3-662-48797-6_6
View | Files available | DOI
 
[60]
2015 | Conference Paper | IST-REx-ID: 1654   OA
Gazi, P., Pietrzak, K. Z., & Tessaro, S. (2015). Generic security of NMAC and HMAC with input whitening. Presented at the ASIACRYPT: Theory and Application of Cryptology and Information Security, Auckland, New Zealand: Springer. https://doi.org/10.1007/978-3-662-48800-3_4
View | Files available | DOI
 
[59]
2015 | Conference Paper | IST-REx-ID: 1648   OA
Fuchsbauer, G., Jafargholi, Z., & Pietrzak, K. Z. (2015). A quasipolynomial reduction for generalized selective decryption on trees (Vol. 9215, pp. 601–620). Presented at the CRYPTO: International Cryptology Conference, Santa Barbara, CA, USA: Springer. https://doi.org/10.1007/978-3-662-47989-6_29
View | Files available | DOI
 
[58]
2015 | Conference Paper | IST-REx-ID: 1650   OA
Skórski, M., Golovnev, A., & Pietrzak, K. Z. (2015). Condensed unpredictability (Vol. 9134, pp. 1046–1057). Presented at the ICALP: Automata, Languages and Programming, Kyoto, Japan: Springer. https://doi.org/10.1007/978-3-662-47672-7_85
View | Files available | DOI
 
[57]
2015 | Conference Paper | IST-REx-ID: 1649   OA
Benhamouda, F., Krenn, S., Lyubashevsky, V., & Pietrzak, K. Z. (2015). Efficient zero-knowledge proofs for commitments from learning with errors over rings. Presented at the ESORICS: European Symposium on Research in Computer Security, Vienna, Austria: Springer. https://doi.org/10.1007/978-3-319-24174-6_16
View | Files available | DOI
 
[56]
2015 | Conference Paper | IST-REx-ID: 1675
Dziembowski, S., Faust, S., Kolmogorov, V., & Pietrzak, K. Z. (2015). Proofs of space. Presented at the CRYPTO: International Cryptology Conference, Santa Barbara, CA, United States: Springer. https://doi.org/10.1007/978-3-662-48000-7_29
View | Files available | DOI
 
[55]
2015 | Conference Paper | IST-REx-ID: 1669   OA
Pietrzak, K. Z., & Skórski, M. (2015). The chain rule for HILL pseudoentropy, revisited. Presented at the LATINCRYPT: Cryptology and Information Security in Latin America, Guadalajara, Mexico: Springer. https://doi.org/10.1007/978-3-319-22174-8_5
View | Files available | DOI
 
[54]
2015 | Conference Paper | IST-REx-ID: 1671   OA
Gazi, P., Pietrzak, K. Z., & Tessaro, S. (2015). The exact PRF security of truncation: Tight bounds for keyed sponges and truncated CBC (Vol. 9215, pp. 368–387). Presented at the CRYPTO: International Cryptology Conference, Santa Barbara, CA, United States: Springer. https://doi.org/10.1007/978-3-662-47989-6_18
View | Files available | DOI
 
[53]
2015 | Conference Paper | IST-REx-ID: 1646   OA
Banerjee, A., Fuchsbauer, G., Peikert, C., Pietrzak, K. Z., & Stevens, S. (2015). Key-homomorphic constrained pseudorandom functions. Presented at the TCC: Theory of Cryptography Conference, Warsaw, Poland: Springer. https://doi.org/10.1007/978-3-662-46497-7_2
View | Files available | DOI
 
[52]
2014 | Conference Paper | IST-REx-ID: 2082
Gazi, P., Pietrzak, K. Z., & Rybar, M. (2014). The exact PRF-security of NMAC and HMAC. In J. Garay & R. Gennaro (Eds.) (Vol. 8616, pp. 113–130). Presented at the CRYPTO: International Cryptology Conference, Santa Barbara, USA: Springer. https://doi.org/10.1007/978-3-662-44371-2_7
View | Files available | DOI
 
[51]
2014 | Conference Paper | IST-REx-ID: 1927   OA
Fuchsbauer, G., Konstantinov, M., Pietrzak, K. Z., & Rao, V. (2014). Adaptive security of constrained PRFs (Vol. 8874, pp. 173–192). Presented at the Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer. https://doi.org/10.1145/2591796.2591825
View | DOI | Download (ext.)
 
[50]
2014 | Conference Paper | IST-REx-ID: 2236   OA
Jetchev, D., & Pietrzak, K. Z. (2014). How to fake auxiliary input. In Y. Lindell (Ed.) (Vol. 8349, pp. 566–590). Presented at the TCC: Theory of Cryptography Conference, San Diego, USA: Springer. https://doi.org/10.1007/978-3-642-54242-8_24
View | Files available | DOI | Download (ext.)
 
[49]
2014 | Conference Paper | IST-REx-ID: 2185   OA
Dodis, Y., Pietrzak, K. Z., & Wichs, D. (2014). Key derivation without entropy waste. In P. Nguyen & E. Oswald (Eds.) (Vol. 8441, pp. 93–110). Presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark: Springer. https://doi.org/10.1007/978-3-642-55220-5_6
View | Files available | DOI
 
[48]
2014 | Journal Article | IST-REx-ID: 2852
Fischlin, M., Lehmann, A., & Pietrzak, K. Z. (2014). Robust multi-property combiners for hash functions. Journal of Cryptology, 27(3), 397–428. https://doi.org/10.1007/s00145-013-9148-7
View | Files available | DOI
 
[47]
2014 | Conference Paper | IST-REx-ID: 2219   OA
Kiltz, E., Masny, D., & Pietrzak, K. Z. (2014). Simple chosen-ciphertext security from low noise LPN (Vol. 8383, pp. 1–18). Presented at the IACR: International Conference on Practice and Theory in Public-Key Cryptography, Springer. https://doi.org/10.1007/978-3-642-54631-0_1
View | DOI | Download (ext.)
 
[46]
2013 | Conference Paper | IST-REx-ID: 2258   OA
Kiltz, E., Pietrzak, K. Z., & Szegedy, M. (2013). Digital signatures with minimal overhead from indifferentiable random invertible functions. Presented at the CRYPTO: International Cryptology Conference, Santa Barbara, CA, United States: Springer. https://doi.org/10.1007/978-3-642-40041-4_31
View | Files available | DOI
 
[45]
2013 | Conference Paper | IST-REx-ID: 2259   OA
Alwen, J. F., Krenn, S., Pietrzak, K. Z., & Wichs, D. (2013). Learning with rounding, revisited: New reduction properties and applications. Presented at the CRYPTO: International Cryptology Conference, Santa Barbara, CA, United States: Springer. https://doi.org/10.1007/978-3-642-40041-4_4
View | Files available | DOI
 
[44]
2013 | Report | IST-REx-ID: 2274   OA
Dziembowski, S., Faust, S., Kolmogorov, V., & Pietrzak, K. Z. (2013). Proofs of Space. IST Austria.
View | Files available
 
[43]
2013 | Conference Paper | IST-REx-ID: 2940   OA
Krenn, S., Pietrzak, K. Z., & Wadia, A. (2013). A counterexample to the chain rule for conditional HILL entropy, and what deniable encryption has to do with it. In A. Sahai (Ed.) (Vol. 7785, pp. 23–39). Presented at the TCC: Theory of Cryptography Conference, Tokyo, Japan: Springer. https://doi.org/10.1007/978-3-642-36594-2_2
View | Files available | DOI
 
[42]
2012 | Conference Paper | IST-REx-ID: 2049   OA
Heyse, S., Kiltz, E., Lyubashevsky, V., Paar, C., & Pietrzak, K. Z. (2012). Lapin: An efficient authentication protocol based on ring-LPN. In Conference proceedings FSE 2012 (Vol. 7549, pp. 346–365). Washington, DC, USA: Springer. https://doi.org/10.1007/978-3-642-34047-5_20
View | DOI | Download (ext.)
 
[41]
2012 | Conference Paper | IST-REx-ID: 2974   OA
Jain, A., Krenn, S., Pietrzak, K. Z., & Tentes, A. (2012). Commitments and efficient zero knowledge proofs from learning parity with noise. In X. Wang & K. Sako (Eds.) (Vol. 7658, pp. 663–680). Presented at the ASIACRYPT: Theory and Application of Cryptology and Information Security, Beijing, China: Springer. https://doi.org/10.1007/978-3-642-34961-4_40
View | Files available | DOI
 
[40]
2012 | Conference Paper | IST-REx-ID: 3282   OA
Dodis, Y., Pietrzak, K. Z., Kiltz, E., & Wichs, D. (2012). Message authentication, revisited (Vol. 7237, pp. 355–374). Presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Cambridge, UK: Springer. https://doi.org/10.1007/978-3-642-29011-4_22
View | Files available | DOI
 
[39]
2012 | Journal Article | IST-REx-ID: 3241
Pietrzak, K. Z., & Wikström, D. (2012). Parallel repetition of computationally sound protocols revisited. Journal of Cryptology, 25(1), 116–135. https://doi.org/10.1007/s00145-010-9090-x
View | DOI
 
[38]
2012 | Conference Paper | IST-REx-ID: 3280   OA
Pietrzak, K. Z. (2012). Subspace LWE (Vol. 7194, pp. 548–563). Presented at the TCC: Theory of Cryptography Conference, Taormina, Sicily, Italy: Springer. https://doi.org/10.1007/978-3-642-28914-9_31
View | DOI | Download (ext.)
 
[37]
2012 | Conference Paper | IST-REx-ID: 2048   OA
Faust, S., Pietrzak, K. Z., & Schipper, J. (2012). Practical leakage-resilient symmetric cryptography. In Conference proceedings CHES 2012 (Vol. 7428, pp. 213–232). Leuven, Belgium: Springer. https://doi.org/10.1007/978-3-642-33027-8_13
View | DOI | Download (ext.)
 
[36]
2012 | Conference Paper | IST-REx-ID: 3250
Pietrzak, K. Z. (2012). Cryptography from learning parity with noise (Vol. 7147, pp. 99–114). Presented at the SOFSEM: Current Trends in Theory and Practice of Computer Science, Špindlerův Mlýn, Czech Republic: Springer. https://doi.org/10.1007/978-3-642-27660-6_9
View | DOI
 
[35]
2012 | Conference Paper | IST-REx-ID: 3279
Jain, A., Pietrzak, K. Z., & Tentes, A. (2012). Hardness preserving constructions of pseudorandom functions (Vol. 7194, pp. 369–382). Presented at the TCC: Theory of Cryptography Conference, Taormina, Sicily, Italy: Springer. https://doi.org/10.1007/978-3-642-28914-9_21
View | DOI | Download (ext.)
 
[34]
2012 | Conference Paper | IST-REx-ID: 3281
Pietrzak, K. Z., Rosen, A., & Segev, G. (2012). Lossy functions do not amplify well (Vol. 7194, pp. 458–475). Presented at the TCC: Theory of Cryptography Conference, Taormina, Sicily, Italy: Springer. https://doi.org/10.1007/978-3-642-28914-9_26
View | DOI | Download (ext.)
 
[33]
2011 | Conference Paper | IST-REx-ID: 3240
Barak, B., Dodis, Y., Krawczyk, H., Pereira, O., Pietrzak, K. Z., Standaert, F., & Yu, Y. (2011). Leftover hash lemma revisited (Vol. 6841, pp. 1–20). Presented at the CRYPTO: International Cryptology Conference, Springer. https://doi.org/ 10.1007/978-3-642-22792-9_1
View | DOI
 
[32]
2011 | Conference Paper | IST-REx-ID: 3238
Kiltz, E., Pietrzak, K. Z., Cash, D., Jain, A., & Venturi, D. (2011). Efficient authentication from hard learning problems (Vol. 6632, pp. 7–26). Presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Tallinn, Estonia: Springer. https://doi.org/10.1007/978-3-642-20465-4_3
View | Files available | DOI
 
[31]
2011 | Conference Paper | IST-REx-ID: 3239
Faust, S., Pietrzak, K. Z., & Venturi, D. (2011). Tamper proof circuits How to trade leakage for tamper resilience (Vol. 6755, pp. 391–402). Presented at the ICALP: Automata, Languages and Programming, Springer. https://doi.org/10.1007/978-3-642-22006-7_33
View | DOI
 
[30]
2011 | Conference Paper | IST-REx-ID: 3236
Jain, A., & Pietrzak, K. Z. (2011). Parallel repetition for leakage resilience amplification revisited (Vol. 6597, pp. 58–69). Presented at the TCC: Theory of Cryptography Conference, Springer. https://doi.org/10.1007/978-3-642-19571-6_5
View | DOI
 
[29]
2010 | Conference Paper | IST-REx-ID: 3237
Kiltz, E., & Pietrzak, K. Z. (2010). Leakage resilient ElGamal encryption (Vol. 6477, pp. 595–612). Presented at the ASIACRYPT: Theory and Application of Cryptology and Information Security, Springer. https://doi.org/10.1007/978-3-642-17373-8_34
View | DOI
 
[28]
2010 | Conference Paper | IST-REx-ID: 3233
Håstad, J., Pass, R., Wikström, D., & Pietrzak, K. Z. (2010). An efficient parallel repetition theorem (Vol. 5978, pp. 1–18). Presented at the TCC: Theory of Cryptography Conference, Springer. https://doi.org/10.1007/978-3-642-11799-2_1
View | DOI
 
[27]
2010 | Conference Paper | IST-REx-ID: 3234
Faust, S., Kiltz, E., Pietrzak, K. Z., & Rothblum, G. (2010). Leakage resilient signatures (Vol. 5978, pp. 343–360). Presented at the TCC: Theory of Cryptography Conference, Springer. https://doi.org/10.1007/978-3-642-11799-2_21
View | DOI
 
[26]
2010 | Conference Paper | IST-REx-ID: 3235
Dodis, Y., & Pietrzak, K. Z. (2010). Leakage resilient pseudorandom functions and side channel attacks on feistel networks (Vol. 6223, pp. 21–40). Presented at the CRYPTO: International Cryptology Conference, Springer. https://doi.org/10.1007/978-3-642-14623-7_2
View | DOI
 
[25]
2009 | Conference Paper | IST-REx-ID: 3232
Pietrzak, K. Z. (2009). A leakage resilient mode of operation (Vol. 5479, pp. 462–482). Presented at the CRYPTO: International Cryptology Conference, Springer. https://doi.org/10.1007/978-3-642-01001-9_27
View | DOI
 
[24]
2009 | Conference Paper | IST-REx-ID: 3230
Kiltz, E., Pietrzak, K. Z., Stam, M., & Yung, M. (2009). A new randomness extraction paradigm for hybrid encryption (Vol. 5479, pp. 590–609). Presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Springer. https://doi.org/10.1007/978-3-642-01001-9_34
View | DOI
 
[23]
2009 | Conference Paper | IST-REx-ID: 3231
Kiltz, E., & Pietrzak, K. Z. (2009). On the security of padding based encryption schemes Why We cannot prove OAEP secure in the standard model (Vol. 5479, pp. 389–406). Presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Springer. https://doi.org/10.1007/978-3-642-01001-9_23
View | DOI
 
[22]
2008 | Conference Paper | IST-REx-ID: 3225
Fischlin, M., Lehmann, A., & Pietrzak, K. Z. (2008). Robust multi property combiners for hash functions revisited (Vol. 5126, pp. 655–666). Presented at the ICALP: Automata, Languages and Programming, Springer. https://doi.org/10.1007/978-3-540-70583-3_53
View | Files available | DOI
 
[21]
2008 | Conference Paper | IST-REx-ID: 3226
Pietrzak, K. Z., & Sjödin, J. (2008). Weak pseudorandom functions in minicrypt (Vol. 5126, pp. 423–436). Presented at the ICALP: Automata, Languages and Programming, Springer. https://doi.org/10.1007/978-3-540-70583-3_35
View | DOI
 
[20]
2008 | Journal Article | IST-REx-ID: 3227
Zubielik, P., Nadaczny, J., Pietrzak, K. Z., & Lawenda, M. (2008). Elektrowiz – system of measurement data management. Przeglad Elektrotechniczny, 84(10), 239–242.
View | Download (ext.)
 
[19]
2008 | Conference Paper | IST-REx-ID: 3228
Pietrzak, K. Z. (2008). Compression from collisions or why CRHF combiners have a long output (Vol. 5157, pp. 413–432). Presented at the CRYPTO: International Cryptology Conference, Springer. https://doi.org/10.1007/978-3-540-85174-5_23
View | DOI
 
[18]
2008 | Conference Paper | IST-REx-ID: 3224
Dodis, Y., Pietrzak, K. Z., & Puniya, P. (2008). A new mode of operation for block ciphers and length preserving MACs (Vol. 4965, pp. 198–219). Presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Springer. https://doi.org/10.1007/978-3-540-78967-3_12
View | DOI
 
[17]
2008 | Conference Paper | IST-REx-ID: 3229
Dziembowski, S., & Pietrzak, K. Z. (2008). Leakage resilient cryptography (pp. 293–302). Presented at the FOCS: Foundations of Computer Science, IEEE. https://doi.org/10.1109/FOCS.2008.56
View | DOI
 
[16]
2007 | Conference Paper | IST-REx-ID: 3218
Pietrzak, K. Z. (2007). Non-trivial black-box combiners for collision-resistant hash-functions don’t exist (Vol. 4515, pp. 23–33). Presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Springer. https://doi.org/10.1007/978-3-540-72540-4_2
View | DOI
 
[15]
2007 | Conference Paper | IST-REx-ID: 3220
Dziembowski, S., & Pietrzak, K. Z. (2007). Intrusion resilient secret sharing (pp. 227–237). Presented at the FOCS: Foundations of Computer Science, IEEE. https://doi.org/10.1109/FOCS.2007.63
View | DOI
 
[14]
2007 | Conference Paper | IST-REx-ID: 3219
Maurer, U., Pietrzak, K. Z., & Renner, R. (2007). Indistinguishability amplification (Vol. 4622, pp. 130–149). Presented at the CRYPTO: International Cryptology Conference, Springer. https://doi.org/10.1007/978-3-540-74143-5_8
View | DOI
 
[13]
2007 | Conference Paper | IST-REx-ID: 3221
Pietrzak, K. Z., & Sjödin, J. (2007). Range extension for weak PRFs the good the bad and the ugly (Vol. 4515, pp. 517–533). Presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Springer. https://doi.org/10.1007/978-3-540-72540-4_30
View | DOI
 
[12]
2007 | Conference Paper | IST-REx-ID: 3222
Pietrzak, K. Z., & Wikström, D. (2007). Parallel repetition of computationally sound protocols revisited (Vol. 4392, pp. 86–102). Presented at the TCC: Theory of Cryptography Conference, Springer. https://doi.org/10.1007/978-3-540-70936-7_5
View | DOI
 
[11]
2007 | Conference Paper | IST-REx-ID: 3223
Dodis, Y., & Pietrzak, K. Z. (2007). Improving the security of MACs via randomized message preprocessing (Vol. 4593, pp. 414–433). Presented at the FSE: Fast Software Encryption, Springer. https://doi.org/10.1007/978-3-540-74619-5_26
View | DOI
 
[10]
2006 | Conference Paper | IST-REx-ID: 3214
Maurer, U., Oswald, Y., Pietrzak, K. Z., & Sjödin, J. (2006). Luby Rackoff ciphers from weak round functions (Vol. 4004, pp. 391–408). Presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Springer. https://doi.org/10.1007/11761679_24
View | DOI
 
[9]
2006 | Conference Paper | IST-REx-ID: 3215
Dodis, Y., Pietrzak, K. Z., & Przydatek, B. (2006). Separating sources for encryption and secret sharing (Vol. 3876, pp. 601–616). Presented at the TCC: Theory of Cryptography Conference, Springer. https://doi.org/10.1007/11681878_31
View | DOI
 
[8]
2006 | Conference Paper | IST-REx-ID: 3216
Pietrzak, K. Z. (2006). A tight bound for EMAC (Vol. 4052, pp. 168–179). Presented at the ICALP: Automata, Languages and Programming, Springer. https://doi.org/10.1007/11787006_15
View | DOI
 
[7]
2006 | Conference Paper | IST-REx-ID: 3217
Pietrzak, K. Z. (2006). Composition implies adaptive security in minicrypt (Vol. 4004, pp. 328–338). Presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Springer. https://doi.org/10.1007/11761679_20
View | DOI
 
[6]
2005 | Conference Paper | IST-REx-ID: 3213
Pietrzak, K. Z. (2005). Composition does not imply adaptive security (Vol. 3621, pp. 55–65). Presented at the CRYPTO: International Cryptology Conference, Springer. https://doi.org/10.1007/11535218_4
View | DOI
 
[5]
2005 | Conference Paper | IST-REx-ID: 3211
Bellare, M., Pietrzak, K. Z., & Rogaway, P. (2005). Improved security analyses for CBC MACs (Vol. 3621, pp. 527–545). Presented at the CRYPTO: International Cryptology Conference, Springer. https://doi.org/10.1007/11535218_32
View | DOI
 
[4]
2005 | Conference Paper | IST-REx-ID: 3212
Dodis, Y., Oliveira, R., & Pietrzak, K. Z. (2005). On the generic insecurity of the full domain hash (Vol. 3621, pp. 449–466). Presented at the CRYPTO: International Cryptology Conference, Springer. https://doi.org/10.1007/11535218_27
View | DOI
 
[3]
2004 | Conference Paper | IST-REx-ID: 3208
Maurer, U., & Pietrzak, K. Z. (2004). Composition of random systems: When two weak make one strong (Vol. 2951, pp. 410–427). Presented at the TCC: Theory of Cryptography Conference, Springer. https://doi.org/10.1007/978-3-540-24638-1_23
View | DOI
 
[2]
2003 | Conference Paper | IST-REx-ID: 3210
Maurer, U., & Pietrzak, K. Z. (2003). The security of many round Luby Rackoff pseudo random permutations (Vol. 2656, pp. 544–561). Presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Springer. https://doi.org/10.1007/3-540-39200-9_34
View | DOI
 
[1]
2003 | Journal Article | IST-REx-ID: 3209
Pietrzak, K. Z. (2003). On the parameterized complexity of the fixed alphabet shortest common supersequence and longest common subsequence problems. Journal of Computer and System Sciences, 67(4), 757–771. https://doi.org/10.1016/S0022-0000(03)00078-3
View | DOI
 

Search

Filter Publications

Display / Sort

Citation Style: APA

Export / Embed