11 Publications

Mark all

[11]
2019 | Journal Article | IST-REx-ID: 5887 | OA
Demay, Gregory, et al. “Per-Session Security: Password-Based Cryptography Revisited.” Journal of Computer Security, vol. 27, no. 1, IOS Press, 2019, pp. 75–111, doi:10.3233/JCS-181131.
View | DOI | Download Preprint (ext.)
 
[10]
2018 | Conference Paper | IST-REx-ID: 6941 | OA
Park, Sunoo, et al. “SpaceMint: A Cryptocurrency Based on Proofs of Space.” 22nd International Conference on Financial Cryptography and Data Security, vol. 10957, Springer Nature, 2018, pp. 480–99, doi:10.1007/978-3-662-58387-6_26.
View | DOI | Download Submitted Version (ext.)
 
[9]
2017 | Journal Article | IST-REx-ID: 6196 | OA
Gazi, Peter, et al. “The Exact Security of PMAC.” IACR Transactions on Symmetric Cryptology, vol. 2016, no. 2, Ruhr University Bochum, 2017, pp. 145–61, doi:10.13154/TOSC.V2016.I2.145-161.
View | Files available | DOI
 
[8]
2016 | Conference Paper | IST-REx-ID: 1366 | OA
Gazi, Peter, and Stefano Tessaro. Provably Robust Sponge-Based PRNGs and KDFs. Vol. 9665, Springer, 2016, pp. 87–116, doi:10.1007/978-3-662-49890-3_4.
View | DOI | Download Preprint (ext.)
 
[7]
2015 | Conference Paper | IST-REx-ID: 1644 | OA
Demay, Grégory, et al. Query-Complexity Amplification for Random Oracles. Vol. 9063, Springer, 2015, pp. 159–80, doi:10.1007/978-3-319-17470-9_10.
View | DOI | Download Submitted Version (ext.)
 
[6]
2015 | Conference Paper | IST-REx-ID: 1645
Gazi, Peter, and Stefano Tessaro. “Secret-Key Cryptography from Ideal Primitives: A Systematic Verview.” 2015 IEEE Information Theory Workshop, 7133163, IEEE, 2015, doi:10.1109/ITW.2015.7133163.
View | DOI
 
[5]
2015 | Conference Paper | IST-REx-ID: 1654 | OA
Gazi, Peter, et al. Generic Security of NMAC and HMAC with Input Whitening. Vol. 9453, Springer, 2015, pp. 85–109, doi:10.1007/978-3-662-48800-3_4.
View | Files available | DOI
 
[4]
2015 | Conference Paper | IST-REx-ID: 1668 | OA
Gazi, Peter, et al. Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes. Vol. 9054, Springer, 2015, pp. 319–41, doi:10.1007/978-3-662-48116-5_16.
View | DOI | Download Submitted Version (ext.)
 
[3]
2015 | Conference Paper | IST-REx-ID: 1671 | OA
Gazi, Peter, et al. The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC. Vol. 9215, Springer, 2015, pp. 368–87, doi:10.1007/978-3-662-47989-6_18.
View | Files available | DOI
 
[2]
2014 | Conference Paper | IST-REx-ID: 2082 | OA
Gazi, Peter, et al. The Exact PRF-Security of NMAC and HMAC. Edited by Juan Garay and Rosario Gennaro, vol. 8616, no. 1, Springer, 2014, pp. 113–30, doi:10.1007/978-3-662-44371-2_7.
View | Files available | DOI
 
[1]
2014 | Conference Paper | IST-REx-ID: 1907 | OA
Demay, Grégory, et al. “Optimality of Non-Adaptive Strategies: The Case of Parallel Games.” IEEE International Symposium on Information Theory, 6875125, IEEE, 2014, doi:10.1109/ISIT.2014.6875125.
View | DOI | Download Submitted Version (ext.)
 

Search

Filter Publications

11 Publications

Mark all

[11]
2019 | Journal Article | IST-REx-ID: 5887 | OA
Demay, Gregory, et al. “Per-Session Security: Password-Based Cryptography Revisited.” Journal of Computer Security, vol. 27, no. 1, IOS Press, 2019, pp. 75–111, doi:10.3233/JCS-181131.
View | DOI | Download Preprint (ext.)
 
[10]
2018 | Conference Paper | IST-REx-ID: 6941 | OA
Park, Sunoo, et al. “SpaceMint: A Cryptocurrency Based on Proofs of Space.” 22nd International Conference on Financial Cryptography and Data Security, vol. 10957, Springer Nature, 2018, pp. 480–99, doi:10.1007/978-3-662-58387-6_26.
View | DOI | Download Submitted Version (ext.)
 
[9]
2017 | Journal Article | IST-REx-ID: 6196 | OA
Gazi, Peter, et al. “The Exact Security of PMAC.” IACR Transactions on Symmetric Cryptology, vol. 2016, no. 2, Ruhr University Bochum, 2017, pp. 145–61, doi:10.13154/TOSC.V2016.I2.145-161.
View | Files available | DOI
 
[8]
2016 | Conference Paper | IST-REx-ID: 1366 | OA
Gazi, Peter, and Stefano Tessaro. Provably Robust Sponge-Based PRNGs and KDFs. Vol. 9665, Springer, 2016, pp. 87–116, doi:10.1007/978-3-662-49890-3_4.
View | DOI | Download Preprint (ext.)
 
[7]
2015 | Conference Paper | IST-REx-ID: 1644 | OA
Demay, Grégory, et al. Query-Complexity Amplification for Random Oracles. Vol. 9063, Springer, 2015, pp. 159–80, doi:10.1007/978-3-319-17470-9_10.
View | DOI | Download Submitted Version (ext.)
 
[6]
2015 | Conference Paper | IST-REx-ID: 1645
Gazi, Peter, and Stefano Tessaro. “Secret-Key Cryptography from Ideal Primitives: A Systematic Verview.” 2015 IEEE Information Theory Workshop, 7133163, IEEE, 2015, doi:10.1109/ITW.2015.7133163.
View | DOI
 
[5]
2015 | Conference Paper | IST-REx-ID: 1654 | OA
Gazi, Peter, et al. Generic Security of NMAC and HMAC with Input Whitening. Vol. 9453, Springer, 2015, pp. 85–109, doi:10.1007/978-3-662-48800-3_4.
View | Files available | DOI
 
[4]
2015 | Conference Paper | IST-REx-ID: 1668 | OA
Gazi, Peter, et al. Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes. Vol. 9054, Springer, 2015, pp. 319–41, doi:10.1007/978-3-662-48116-5_16.
View | DOI | Download Submitted Version (ext.)
 
[3]
2015 | Conference Paper | IST-REx-ID: 1671 | OA
Gazi, Peter, et al. The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC. Vol. 9215, Springer, 2015, pp. 368–87, doi:10.1007/978-3-662-47989-6_18.
View | Files available | DOI
 
[2]
2014 | Conference Paper | IST-REx-ID: 2082 | OA
Gazi, Peter, et al. The Exact PRF-Security of NMAC and HMAC. Edited by Juan Garay and Rosario Gennaro, vol. 8616, no. 1, Springer, 2014, pp. 113–30, doi:10.1007/978-3-662-44371-2_7.
View | Files available | DOI
 
[1]
2014 | Conference Paper | IST-REx-ID: 1907 | OA
Demay, Grégory, et al. “Optimality of Non-Adaptive Strategies: The Case of Parallel Games.” IEEE International Symposium on Information Theory, 6875125, IEEE, 2014, doi:10.1109/ISIT.2014.6875125.
View | DOI | Download Submitted Version (ext.)
 

Search

Filter Publications