Please note that IST Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

104 Publications


2021 | Conference Paper | IST-REx-ID: 9466
The convergence of slide-type reductions
M. Walter, in:, Public-Key Cryptography – PKC 2021, Springer Nature, 2021, pp. 45–67.
View | DOI
 

2021 | Conference Paper | IST-REx-ID: 9825 | OA
Dual lattice attacks for closest vector problems (with preprocessing)
T. Laarhoven, M. Walter, in:, Topics in Cryptology – CT-RSA 2021, Springer Nature, 2021, pp. 478–502.
View | DOI | Download Preprint (ext.)
 

2021 | Conference Paper | IST-REx-ID: 9826
Inverse-Sybil attacks in automated contact tracing
B. Auerbach, S. Chakraborty, K. Klein, G. Pascual Perez, K.Z. Pietrzak, M. Walter, M.X. Yeo, in:, Topics in Cryptology – CT-RSA 2021, Springer Nature, 2021, pp. 399–421.
View | DOI
 

2021 | Conference Paper | IST-REx-ID: 9969 | OA
LightPIR: Privacy-preserving route discovery for payment channel networks
K.Z. Pietrzak, I. Salem, S. Schmid, M.X. Yeo, in:, IEEE, 2021.
View | DOI | Download Submitted Version (ext.) | arXiv
 

2021 | Conference Paper | IST-REx-ID: 10044 | OA
On treewidth, separators and Yao's garbling
C. Kamath Hosdurg, K. Klein, K.Z. Pietrzak, in:, 19th Theory of Cryptography Conference 2021, International Association for Cryptologic Research, n.d.
View | Download Preprint (ext.)
 

2021 | Thesis | IST-REx-ID: 10035 | OA
On the adaptive security of graph-based games
K. Klein, On the Adaptive Security of Graph-Based Games, IST Austria, 2021.
View | Files available | DOI
 

2021 | Conference Paper | IST-REx-ID: 10041 | OA
Limits on the Adaptive Security of Yao’s Garbling
C. Kamath Hosdurg, K. Klein, K.Z. Pietrzak, D. Wichs, in:, 41st Annual International Cryptology Conference, Part II , Springer Nature, Cham, 2021, pp. 486–515.
View | Files available | DOI | Download Preprint (ext.)
 

2021 | Conference Paper | IST-REx-ID: 10049 | OA
Keep the dirt: tainted TreeKEM, adaptively and actively secure continuous group key agreement
K. Klein, G. Pascual Perez, M. Walter, C. Kamath Hosdurg, M. Capretto, M. Cueto Noval, I. Markov, M.X. Yeo, J.F. Alwen, K.Z. Pietrzak, in:, 2021 IEEE Symposium on Security and Privacy , IEEE, 2021, pp. 268–284.
View | Files available | DOI | Download Preprint (ext.)
 

2021 | Conference Paper | IST-REx-ID: 10048 | OA
The cost of adaptivity in security games on graphs
C. Kamath Hosdurg, K. Klein, K.Z. Pietrzak, M. Walter, in:, 19th Theory of Cryptography Conference 2021, International Association for Cryptologic Research, n.d.
View | Files available | Download Preprint (ext.)
 

2020 | Conference Paper | IST-REx-ID: 7966 | OA
Everybody’s a target: Scalability in public-key encryption
B. Auerbach, F. Giacon, E. Kiltz, in:, Advances in Cryptology – EUROCRYPT 2020, Springer Nature, 2020, pp. 475–506.
View | DOI | Download Submitted Version (ext.)
 

2020 | Conference Paper | IST-REx-ID: 8322 | OA
Reverse firewalls for actively secure MPCs
S. Chakraborty, S. Dziembowski, J.B. Nielsen, in:, Advances in Cryptology – CRYPTO 2020, Springer Nature, 2020, pp. 732–762.
View | DOI | Download Preprint (ext.)
 

2020 | Conference Paper | IST-REx-ID: 8339 | OA
Improved discrete Gaussian and subgaussian analysis for lattice cryptography
N. Genise, D. Micciancio, C. Peikert, M. Walter, in:, 23rd IACR International Conference on the Practice and Theory of Public-Key Cryptography, Springer Nature, 2020, pp. 623–651.
View | DOI | Download Preprint (ext.)
 

2020 | Thesis | IST-REx-ID: 7896 | OA
On the average-case hardness of total search problems
C. Kamath Hosdurg, On the Average-Case Hardness of Total Search Problems, IST Austria, 2020.
View | Files available | DOI
 

2020 | Conference Paper | IST-REx-ID: 8987 | OA
Delayed authentication: Preventing replay and relay attacks in private contact tracing
K.Z. Pietrzak, in:, Progress in Cryptology, Springer Nature, 2020, pp. 3–15.
View | DOI | Download Preprint (ext.)
 

2019 | Conference Paper | IST-REx-ID: 7411 | OA
Reversible proofs of sequential work
H.M. Abusalah, C. Kamath Hosdurg, K. Klein, K.Z. Pietrzak, M. Walter, in:, Advances in Cryptology – EUROCRYPT 2019, Springer International Publishing, 2019, pp. 277–291.
View | DOI | Download Submitted Version (ext.)
 

2019 | Journal Article | IST-REx-ID: 5887 | OA
Per-session security: Password-based cryptography revisited
G. Demay, P. Gazi, U. Maurer, B. Tackmann, Journal of Computer Security 27 (2019) 75–111.
View | DOI | Download Preprint (ext.)
 

2019 | Conference Paper | IST-REx-ID: 6528 | OA
Simple verifiable delay functions
K.Z. Pietrzak, in:, 10th Innovations in Theoretical Computer Science Conference, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2019.
View | Files available | DOI | Download Published Version (ext.)
 

2019 | Conference Paper | IST-REx-ID: 6677 | OA
Finding a Nash equilibrium is no easier than breaking Fiat-Shamir
A.R. Choudhuri, P. Hubáček, C. Kamath Hosdurg, K.Z. Pietrzak, A. Rosen, G.N. Rothblum, in:, Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing  - STOC 2019, ACM Press, 2019, pp. 1103–1114.
View | Files available | DOI | Download Preprint (ext.)
 

2019 | Book Chapter | IST-REx-ID: 6726 | OA
Sampling the integers with low relative error
M. Walter, in:, J. Buchmann, A. Nitaj, T. Rachidi (Eds.), Progress in Cryptology – AFRICACRYPT 2019, Springer Nature, Cham, 2019, pp. 157–180.
View | DOI | Download Preprint (ext.)
 

2019 | Conference Paper | IST-REx-ID: 7136 | OA
Strong chain rules for min-entropy under few bits spoiled
M. Skórski, in:, 2019 IEEE International Symposium on Information Theory, IEEE, 2019.
View | DOI | Download Preprint (ext.) | arXiv
 

Filters and Search Terms

department=KrPi

Search

Filter Publications