11 Publications

Mark all

[11]
2019 | Journal Article | IST-REx-ID: 5887 | OA
Demay, Gregory, Peter Gazi, Ueli Maurer, and Bjorn Tackmann. “Per-Session Security: Password-Based Cryptography Revisited.” Journal of Computer Security. IOS Press, 2019. https://doi.org/10.3233/JCS-181131.
[Preprint] View | DOI | Download Preprint (ext.)
 
[10]
2018 | Conference Paper | IST-REx-ID: 6941 | OA
Park, Sunoo, Albert Kwon, Georg Fuchsbauer, Peter Gazi, Joel F Alwen, and Krzysztof Z Pietrzak. “SpaceMint: A Cryptocurrency Based on Proofs of Space.” In 22nd International Conference on Financial Cryptography and Data Security, 10957:480–99. Springer Nature, 2018. https://doi.org/10.1007/978-3-662-58387-6_26.
[Submitted Version] View | DOI | Download Submitted Version (ext.) | WoS
 
[9]
2017 | Journal Article | IST-REx-ID: 6196 | OA
Gazi, Peter, Krzysztof Z Pietrzak, and Michal Rybar. “The Exact Security of PMAC.” IACR Transactions on Symmetric Cryptology. Ruhr University Bochum, 2017. https://doi.org/10.13154/TOSC.V2016.I2.145-161.
[Published Version] View | Files available | DOI
 
[8]
2016 | Conference Paper | IST-REx-ID: 1366 | OA
Gazi, Peter, and Stefano Tessaro. “Provably Robust Sponge-Based PRNGs and KDFs,” 9665:87–116. Springer, 2016. https://doi.org/10.1007/978-3-662-49890-3_4.
[Preprint] View | DOI | Download Preprint (ext.)
 
[7]
2015 | Conference Paper | IST-REx-ID: 1644 | OA
Demay, Grégory, Peter Gazi, Ueli Maurer, and Björn Tackmann. “Query-Complexity Amplification for Random Oracles,” 9063:159–80. Springer, 2015. https://doi.org/10.1007/978-3-319-17470-9_10.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 
[6]
2015 | Conference Paper | IST-REx-ID: 1645
Gazi, Peter, and Stefano Tessaro. “Secret-Key Cryptography from Ideal Primitives: A Systematic Verview.” In 2015 IEEE Information Theory Workshop. IEEE, 2015. https://doi.org/10.1109/ITW.2015.7133163.
View | DOI
 
[5]
2015 | Conference Paper | IST-REx-ID: 1654 | OA
Gazi, Peter, Krzysztof Z Pietrzak, and Stefano Tessaro. “Generic Security of NMAC and HMAC with Input Whitening.” Lecture Notes in Computer Science. Springer, 2015. https://doi.org/10.1007/978-3-662-48800-3_4.
[Submitted Version] View | Files available | DOI
 
[4]
2015 | Conference Paper | IST-REx-ID: 1671 | OA
Gazi, Peter, Krzysztof Z Pietrzak, and Stefano Tessaro. “The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC,” 9215:368–87. Springer, 2015. https://doi.org/10.1007/978-3-662-47989-6_18.
[Submitted Version] View | Files available | DOI
 
[3]
2015 | Conference Paper | IST-REx-ID: 1668 | OA
Gazi, Peter, Jooyoung Lee, Yannick Seurin, John Steinberger, and Stefano Tessaro. “Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes.” Lecture Notes in Computer Science. Springer, 2015. https://doi.org/10.1007/978-3-662-48116-5_16.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 
[2]
2014 | Conference Paper | IST-REx-ID: 1907 | OA
Demay, Grégory, Peter Gazi, Ueli Maurer, and Björn Tackmann. “Optimality of Non-Adaptive Strategies: The Case of Parallel Games.” In IEEE International Symposium on Information Theory. IEEE, 2014. https://doi.org/10.1109/ISIT.2014.6875125.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 
[1]
2014 | Conference Paper | IST-REx-ID: 2082 | OA
Gazi, Peter, Krzysztof Z Pietrzak, and Michal Rybar. “The Exact PRF-Security of NMAC and HMAC.” edited by Juan Garay and Rosario Gennaro, 8616:113–30. Springer, 2014. https://doi.org/10.1007/978-3-662-44371-2_7.
[Submitted Version] View | Files available | DOI
 

Search

Filter Publications

11 Publications

Mark all

[11]
2019 | Journal Article | IST-REx-ID: 5887 | OA
Demay, Gregory, Peter Gazi, Ueli Maurer, and Bjorn Tackmann. “Per-Session Security: Password-Based Cryptography Revisited.” Journal of Computer Security. IOS Press, 2019. https://doi.org/10.3233/JCS-181131.
[Preprint] View | DOI | Download Preprint (ext.)
 
[10]
2018 | Conference Paper | IST-REx-ID: 6941 | OA
Park, Sunoo, Albert Kwon, Georg Fuchsbauer, Peter Gazi, Joel F Alwen, and Krzysztof Z Pietrzak. “SpaceMint: A Cryptocurrency Based on Proofs of Space.” In 22nd International Conference on Financial Cryptography and Data Security, 10957:480–99. Springer Nature, 2018. https://doi.org/10.1007/978-3-662-58387-6_26.
[Submitted Version] View | DOI | Download Submitted Version (ext.) | WoS
 
[9]
2017 | Journal Article | IST-REx-ID: 6196 | OA
Gazi, Peter, Krzysztof Z Pietrzak, and Michal Rybar. “The Exact Security of PMAC.” IACR Transactions on Symmetric Cryptology. Ruhr University Bochum, 2017. https://doi.org/10.13154/TOSC.V2016.I2.145-161.
[Published Version] View | Files available | DOI
 
[8]
2016 | Conference Paper | IST-REx-ID: 1366 | OA
Gazi, Peter, and Stefano Tessaro. “Provably Robust Sponge-Based PRNGs and KDFs,” 9665:87–116. Springer, 2016. https://doi.org/10.1007/978-3-662-49890-3_4.
[Preprint] View | DOI | Download Preprint (ext.)
 
[7]
2015 | Conference Paper | IST-REx-ID: 1644 | OA
Demay, Grégory, Peter Gazi, Ueli Maurer, and Björn Tackmann. “Query-Complexity Amplification for Random Oracles,” 9063:159–80. Springer, 2015. https://doi.org/10.1007/978-3-319-17470-9_10.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 
[6]
2015 | Conference Paper | IST-REx-ID: 1645
Gazi, Peter, and Stefano Tessaro. “Secret-Key Cryptography from Ideal Primitives: A Systematic Verview.” In 2015 IEEE Information Theory Workshop. IEEE, 2015. https://doi.org/10.1109/ITW.2015.7133163.
View | DOI
 
[5]
2015 | Conference Paper | IST-REx-ID: 1654 | OA
Gazi, Peter, Krzysztof Z Pietrzak, and Stefano Tessaro. “Generic Security of NMAC and HMAC with Input Whitening.” Lecture Notes in Computer Science. Springer, 2015. https://doi.org/10.1007/978-3-662-48800-3_4.
[Submitted Version] View | Files available | DOI
 
[4]
2015 | Conference Paper | IST-REx-ID: 1671 | OA
Gazi, Peter, Krzysztof Z Pietrzak, and Stefano Tessaro. “The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC,” 9215:368–87. Springer, 2015. https://doi.org/10.1007/978-3-662-47989-6_18.
[Submitted Version] View | Files available | DOI
 
[3]
2015 | Conference Paper | IST-REx-ID: 1668 | OA
Gazi, Peter, Jooyoung Lee, Yannick Seurin, John Steinberger, and Stefano Tessaro. “Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes.” Lecture Notes in Computer Science. Springer, 2015. https://doi.org/10.1007/978-3-662-48116-5_16.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 
[2]
2014 | Conference Paper | IST-REx-ID: 1907 | OA
Demay, Grégory, Peter Gazi, Ueli Maurer, and Björn Tackmann. “Optimality of Non-Adaptive Strategies: The Case of Parallel Games.” In IEEE International Symposium on Information Theory. IEEE, 2014. https://doi.org/10.1109/ISIT.2014.6875125.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 
[1]
2014 | Conference Paper | IST-REx-ID: 2082 | OA
Gazi, Peter, Krzysztof Z Pietrzak, and Michal Rybar. “The Exact PRF-Security of NMAC and HMAC.” edited by Juan Garay and Rosario Gennaro, 8616:113–30. Springer, 2014. https://doi.org/10.1007/978-3-662-44371-2_7.
[Submitted Version] View | Files available | DOI
 

Search

Filter Publications