European Commission logo
English English
CORDIS - EU research results
CORDIS

Teaching Old Crypto New Tricks

Publications

Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography

Author(s): Nicholas Genise, Daniele Micciancio, Chris Peikert, Michael Walter
Published in: Public-Key Cryptography – PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4–7, 2020, Proceedings, Part I, Issue 12110, 2020, Page(s) 623-651, ISBN 978-3-030-45373-2
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-45374-9_21

Everybody’s a Target: Scalability in Public-Key Encryption

Author(s): Benedikt Auerbach, Federico Giacon, Eike Kiltz
Published in: Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part III, Issue 12107, 2020, Page(s) 475-506, ISBN 978-3-030-45726-6
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-45727-3_16

Reverse Firewalls for Actively Secure MPCs

Author(s): Suvradip Chakraborty, Stefan Dziembowski, Jesper Buus Nielsen
Published in: Advances in Cryptology – CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part II, Issue 12171, 2020, Page(s) 732-762, ISBN 978-3-030-56879-5
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-56880-1_26

Scrypt Is Maximally Memory-Hard

Author(s): Joël Alwen, Binyi Chen, Krzysztof Pietrzak, Leonid Reyzin, Stefano Tessaro
Published in: Advances in Cryptology – EUROCRYPT 2017, Issue 10212, 2017, Page(s) 33-62, ISBN 978-3-319-56616-0
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-56617-7_2

On the Complexity of Breaking Pseudoentropy

Author(s): Maciej Skorski
Published in: Theory and Applications of Models of Computation, Issue 10185, 2017, Page(s) 600-613, ISBN 978-3-319-55910-0
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-55911-7_43

On the Bit Security of Cryptographic Primitives

Author(s): Daniele Micciancio, Michael Walter
Published in: Advances in Cryptology – EUROCRYPT 2018, Issue 10820, 2018, Page(s) 3-28, ISBN 978-3-319-78380-2
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-78381-9_1

Adaptively Secure Proxy Re-encryption

Author(s): Georg Fuchsbauer, Chethan Kamath, Karen Klein, Krzysztof Pietrzak
Published in: Public-Key Cryptography – PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II, Issue 11443, 2019, Page(s) 317-346, ISBN 978-3-030-17258-9
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-17259-6_11

Sampling the Integers with Low Relative Error

Author(s): Michael Walter
Published in: Progress in Cryptology – AFRICACRYPT 2019 - 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9–11, 2019, Proceedings, Issue 11627, 2019, Page(s) 157-180, ISBN 978-3-030-23695-3
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-23696-0_9

Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact Tracing

Author(s): Krzysztof Pietrzak
Published in: Progress in Cryptology – INDOCRYPT 2020 - 21st International Conference on Cryptology in India, Bangalore, India, December 13–16, 2020, Proceedings, Issue 12578, 2020, Page(s) 3-15, ISBN 978-3-030-65276-0
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-65277-7_1

SpaceMint: A Cryptocurrency Based on Proofs of Space

Author(s): Sunoo Park, Albert Kwon, Georg Fuchsbauer, Peter Gaži, Joël Alwen, Krzysztof Pietrzak
Published in: Financial Cryptography and Data Security - 22nd International Conference, FC 2018, Nieuwpoort, Curaçao, February 26 – March 2, 2018, Revised Selected Papers, Issue 10957, 2018, Page(s) 480-499, ISBN 978-3-662-58386-9
Publisher: Springer Berlin Heidelberg
DOI: 10.1007/978-3-662-58387-6_26

LightPIR: Privacy-Preserving Route Discovery for Payment Channel Networks

Author(s): Krzysztof Pietrzak, Iosif Salem, Stefan Schmid, Michelle Yeo
Published in: CoRR, 2021
Publisher: arXiv

Keep the Dirt: Tainted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement

Author(s): Joël Alwen, Margarita Capretto, Miguel Cueto, Chethan Kamath, Karen Klein, Ilia Markov, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter, Michelle Yeo
Published in: IEEE Symposium on Security and Privacy 2021, 2021
Publisher: IEEE Symposium on Security and Privacy 2021

Inverse-Sybil Attacks in Automated Contact Tracing

Author(s): Benedikt Auerbach, Suvradip Chakraborty, Karen Klein, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter, Michelle Yeo
Published in: CT-RSA 2021, 2020
Publisher: CT-RSA 2021
DOI: 10.1007/978-3-030-75539-3\_17

Dual Lattice Attacks for Closest Vector Problems (with Preprocessing)

Author(s): Thijs Laarhoven, Michael Walter
Published in: Topics in Cryptology - {CT-RSA} 2021 - Cryptographers' Track at the {RSA} Conference 2021, Issue Lecture Notes in Computer Science}, 2021
Publisher: Springer
DOI: 10.1007/978-3-030-75539-3\_20

Renyi Entropy Estimation Revisited

Author(s): Maciej Obremski and Maciej Skorski
Published in: Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques (APPROX/RANDOM 2017), Issue volume 81, 2017, Page(s) 20:1--20:15, ISBN 978-3-95977-044-6
Publisher: Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik
DOI: 10.4230/LIPIcs.APPROX-RANDOM.2017.20

Practical Graphs for Optimal Side-Channel Resistant Memory-Hard Functions

Author(s): Joel Alwen, Jeremiah Blocki, Ben Harsha
Published in: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS '17, 2017, Page(s) 1001-1017, ISBN 9781-450349468
Publisher: ACM Press
DOI: 10.1145/3133956.3134031

Position-Based Cryptography and Multiparty Communication Complexity

Author(s): Joshua Brody, Stefan Dziembowski, Sebastian Faust, Krzysztof Pietrzak
Published in: 2017, Page(s) 56-81
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-70500-2_3

Non-Uniform Attacks Against Pseudoentropy

Author(s): Krzysztof Pietrzak and Maciej Skorski
Published in: 44th International Colloquium on Automata, Languages, and Programming (ICALP 2017), 2017, Page(s) 39:1--39:13
Publisher: Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik
DOI: 10.4230/LIPIcs.ICALP.2017.39

Be Adaptive, Avoid Overcommitting.

Author(s): Zahra Jafargholi, Chethan Kamath, Karen Klein, Ilan Komargodski, Krzysztof Pietrzak, Daniel Wichs
Published in: 2017, Page(s) 133-163
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-63688-7_5

Depth-Robust Graphs and Their Cumulative Memory Complexity.

Author(s): Joël Alwen, Jeremiah Blocki, Krzysztof Pietrzak
Published in: 2017, Page(s) 3-32
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-56617-7_1

Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions.

Author(s): Georg Fuchsbauer, Christian Hanser, Chethan Kamath, Daniel Slamanig
Published in: 2016, Page(s) 391-408
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-44618-9_21

Lower Bounds on Key Derivation for Square-Friendly Applications

Author(s): Maciej Skorski
Published in: 2017, ISBN 978-3-95977-028-6
Publisher: Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik
DOI: 10.4230/LIPIcs.STACS.2017.57

Pseudoentropy: Lower-Bounds for Chain Rules and Transformations.

Author(s): Krzysztof Pietrzak, Maciej Skórski
Published in: 2016, Page(s) 183-203
Publisher: Springer Berlin Heidelberg
DOI: 10.1007/978-3-662-53641-4_8

Constrained PRFs for Unbounded Inputs with Short Keys

Author(s): Hamza Abusalah, Georg Fuchsbauer
Published in: 2016, Page(s) 445-463
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-39555-5_24

Offline Witness Encryption

Author(s): Hamza Abusalah, Georg Fuchsbauer, Krzysztof Pietrzak
Published in: 2016, Page(s) 285-303
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-39555-5_16

Sustained Space Complexity

Author(s): Alwen, Joel; Blocki, Jeremiah; Pietrzak, Krzysztof
Published in: Issue 4, 2018
Publisher: Springer

Inverted Leftover Hash Lemma

Author(s): Maciej Obremski, Maciej Skórski
Published in: 2018
Publisher: IEEE

Non-Malleable Codes

Author(s): Stefan Dziembowski, Krzysztof Pietrzak, Daniel Wichs
Published in: 2018
Publisher: ACM

On the Memory-Hardness of Data-Independent Password-Hashing Functions

Author(s): Joël Alwen, Peter Gaži, Chethan Kamath, Karen Klein, Georg Osang, Krzysztof Pietrzak, Leonid Reyzin, Michal Rolínek, Michal Rybár
Published in: 2018
Publisher: ACM

Simple Proofs of Sequential Work

Author(s): Bram Cohen, Krzysztof Pietrzak
Published in: 2018
Publisher: Springer

Beyond Hellman’s time-memory trade-offs with applications to proofs of space

Author(s): Abusalah, Hamza; Alwen, Joël; Cohen, Bram; Khilko, Danylo; Pietrzak, Krzysztof; Reyzin, Leonid
Published in: 2017
Publisher: Springer

A cryptographic view of regularity lemmas: Simpler unified proofs and refined bounds

Author(s): Maciej Skórski
Published in: 2017
Publisher: Springer

Proofs of Catalytic Space

Author(s): Krzysztof Pietrzak
Published in: 2018, Page(s) 59:1--59:25, ISBN 978-3-95977-095-8
Publisher: Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik
DOI: 10.4230/lipics.itcs.2019.59

Simple Verifiable Delay Functions

Author(s): Krzysztof Pietrzak
Published in: 2018, Page(s) 60:1--60:15, ISBN 978-3-95977-095-8
Publisher: Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik
DOI: 10.4230/lipics.itcs.2019.60

Finding a Nash Equilibrium Is No Easier Than Breaking Fiat-Shamir

Author(s): Arka Rai Choudhuri, Pavel Hubacek, Chethan Kamath, Krzysztof Pietrzak and Alon Rosen and Guy N. Rothblum
Published in: 2019
Publisher: Annual ACM Symposium on the Theory of Computing
DOI: 10.1145/3313276.3316400

Reversible Proofs of Sequential Work

Author(s): Hamza Abusalah, Chethan Kamath, Karen Klein, Krzysztof Pietrzak, Michael Walter
Published in: 2019
Publisher: Annual International Conference on the Theory and Applications of Cryptographic Techniques

Towards Practical Attacks on Argon2i and Balloon Hashing

Author(s): Joel Alwen, Jeremiah Blocki
Published in: 2017 IEEE European Symposium on Security and Privacy (EuroS&P), 2017, Page(s) 142-157, ISBN 978-1-5090-5762-7
Publisher: IEEE
DOI: 10.1109/eurosp.2017.47

Cumulative Space in Black-White Pebbling and Resolution

Author(s): Alwen, Joel F; De Rezende, Susanna ; Nordstrom, Jakob ; Vinyals, Marc
Published in: 2017
Publisher: ITCS: Innovations in Theoretical Computer Science
DOI: 10.4230/lipics.itcs.2017.38

On the average-case hardness of total search problems

Author(s): C. Kamath Hosdurg,
Published in: 2020, ISSN 2663-337X
Publisher: IST Austria
DOI: 10.15479/at:ista:7896

Proof Systems for Sustainable Decentralized Cryptocurrencies

Author(s): Hamza Abusalah
Published in: 2018
Publisher: IST Austria
DOI: 10.15479/at:ista:th_1046

Per-session security: Password-based cryptography revisited

Author(s): Grégory Demay, Peter Gaži, Ueli Maurer, Björn Tackmann
Published in: Journal of Computer Security, Issue 27/1, 2019, Page(s) 75-111, ISSN 0926-227X
Publisher: IOS Press
DOI: 10.3233/jcs-181131

Efficient Authentication from Hard Learning Problems

Author(s): Eike Kiltz, Krzysztof Pietrzak, Daniele Venturi, David Cash, Abhishek Jain
Published in: Journal of Cryptology, Issue 30/4, 2017, Page(s) 1238-1275, ISSN 0933-2790
Publisher: Springer Verlag
DOI: 10.1007/s00145-016-9247-3

The Exact Security of PMAC

Author(s): Peter Gaži, Krzysztof Pietrzak, Michal Rybár
Published in: IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2017, ISSN 2519-173X
Publisher: Ruhr-Universität Bochum
DOI: 10.13154/tosc.v2016.i2.145-161

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available