CORDIS - Resultados de investigaciones de la UE
CORDIS

Teaching Old Crypto New Tricks

Publicaciones

Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography

Autores: Nicholas Genise, Daniele Micciancio, Chris Peikert, Michael Walter
Publicado en: Public-Key Cryptography – PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4–7, 2020, Proceedings, Part I, Edición 12110, 2020, Página(s) 623-651, ISBN 978-3-030-45373-2
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-45374-9_21

Everybody’s a Target: Scalability in Public-Key Encryption

Autores: Benedikt Auerbach, Federico Giacon, Eike Kiltz
Publicado en: Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part III, Edición 12107, 2020, Página(s) 475-506, ISBN 978-3-030-45726-6
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-45727-3_16

Reverse Firewalls for Actively Secure MPCs

Autores: Suvradip Chakraborty, Stefan Dziembowski, Jesper Buus Nielsen
Publicado en: Advances in Cryptology – CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part II, Edición 12171, 2020, Página(s) 732-762, ISBN 978-3-030-56879-5
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-56880-1_26

Scrypt Is Maximally Memory-Hard

Autores: Joël Alwen, Binyi Chen, Krzysztof Pietrzak, Leonid Reyzin, Stefano Tessaro
Publicado en: Advances in Cryptology – EUROCRYPT 2017, Edición 10212, 2017, Página(s) 33-62, ISBN 978-3-319-56616-0
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-56617-7_2

On the Complexity of Breaking Pseudoentropy

Autores: Maciej Skorski
Publicado en: Theory and Applications of Models of Computation, Edición 10185, 2017, Página(s) 600-613, ISBN 978-3-319-55910-0
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-55911-7_43

On the Bit Security of Cryptographic Primitives

Autores: Daniele Micciancio, Michael Walter
Publicado en: Advances in Cryptology – EUROCRYPT 2018, Edición 10820, 2018, Página(s) 3-28, ISBN 978-3-319-78380-2
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-78381-9_1

Adaptively Secure Proxy Re-encryption

Autores: Georg Fuchsbauer, Chethan Kamath, Karen Klein, Krzysztof Pietrzak
Publicado en: Public-Key Cryptography – PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II, Edición 11443, 2019, Página(s) 317-346, ISBN 978-3-030-17258-9
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-17259-6_11

Sampling the Integers with Low Relative Error

Autores: Michael Walter
Publicado en: Progress in Cryptology – AFRICACRYPT 2019 - 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9–11, 2019, Proceedings, Edición 11627, 2019, Página(s) 157-180, ISBN 978-3-030-23695-3
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-23696-0_9

Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact Tracing

Autores: Krzysztof Pietrzak
Publicado en: Progress in Cryptology – INDOCRYPT 2020 - 21st International Conference on Cryptology in India, Bangalore, India, December 13–16, 2020, Proceedings, Edición 12578, 2020, Página(s) 3-15, ISBN 978-3-030-65276-0
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-65277-7_1

SpaceMint: A Cryptocurrency Based on Proofs of Space

Autores: Sunoo Park, Albert Kwon, Georg Fuchsbauer, Peter Gaži, Joël Alwen, Krzysztof Pietrzak
Publicado en: Financial Cryptography and Data Security - 22nd International Conference, FC 2018, Nieuwpoort, Curaçao, February 26 – March 2, 2018, Revised Selected Papers, Edición 10957, 2018, Página(s) 480-499, ISBN 978-3-662-58386-9
Editor: Springer Berlin Heidelberg
DOI: 10.1007/978-3-662-58387-6_26

LightPIR: Privacy-Preserving Route Discovery for Payment Channel Networks

Autores: Krzysztof Pietrzak, Iosif Salem, Stefan Schmid, Michelle Yeo
Publicado en: CoRR, 2021
Editor: arXiv

Keep the Dirt: Tainted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement

Autores: Joël Alwen, Margarita Capretto, Miguel Cueto, Chethan Kamath, Karen Klein, Ilia Markov, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter, Michelle Yeo
Publicado en: IEEE Symposium on Security and Privacy 2021, 2021
Editor: IEEE Symposium on Security and Privacy 2021

Inverse-Sybil Attacks in Automated Contact Tracing

Autores: Benedikt Auerbach, Suvradip Chakraborty, Karen Klein, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter, Michelle Yeo
Publicado en: CT-RSA 2021, 2020
Editor: CT-RSA 2021
DOI: 10.1007/978-3-030-75539-3\_17

Dual Lattice Attacks for Closest Vector Problems (with Preprocessing)

Autores: Thijs Laarhoven, Michael Walter
Publicado en: Topics in Cryptology - {CT-RSA} 2021 - Cryptographers' Track at the {RSA} Conference 2021, Edición Lecture Notes in Computer Science}, 2021
Editor: Springer
DOI: 10.1007/978-3-030-75539-3\_20

Renyi Entropy Estimation Revisited

Autores: Maciej Obremski and Maciej Skorski
Publicado en: Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques (APPROX/RANDOM 2017), Edición volume 81, 2017, Página(s) 20:1--20:15, ISBN 978-3-95977-044-6
Editor: Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik
DOI: 10.4230/LIPIcs.APPROX-RANDOM.2017.20

Practical Graphs for Optimal Side-Channel Resistant Memory-Hard Functions

Autores: Joel Alwen, Jeremiah Blocki, Ben Harsha
Publicado en: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS '17, 2017, Página(s) 1001-1017, ISBN 9781-450349468
Editor: ACM Press
DOI: 10.1145/3133956.3134031

Position-Based Cryptography and Multiparty Communication Complexity

Autores: Joshua Brody, Stefan Dziembowski, Sebastian Faust, Krzysztof Pietrzak
Publicado en: 2017, Página(s) 56-81
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-70500-2_3

Non-Uniform Attacks Against Pseudoentropy

Autores: Krzysztof Pietrzak and Maciej Skorski
Publicado en: 44th International Colloquium on Automata, Languages, and Programming (ICALP 2017), 2017, Página(s) 39:1--39:13
Editor: Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik
DOI: 10.4230/LIPIcs.ICALP.2017.39

Be Adaptive, Avoid Overcommitting.

Autores: Zahra Jafargholi, Chethan Kamath, Karen Klein, Ilan Komargodski, Krzysztof Pietrzak, Daniel Wichs
Publicado en: 2017, Página(s) 133-163
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-63688-7_5

Depth-Robust Graphs and Their Cumulative Memory Complexity.

Autores: Joël Alwen, Jeremiah Blocki, Krzysztof Pietrzak
Publicado en: 2017, Página(s) 3-32
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-56617-7_1

Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions.

Autores: Georg Fuchsbauer, Christian Hanser, Chethan Kamath, Daniel Slamanig
Publicado en: 2016, Página(s) 391-408
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-44618-9_21

Lower Bounds on Key Derivation for Square-Friendly Applications

Autores: Maciej Skorski
Publicado en: 2017, ISBN 978-3-95977-028-6
Editor: Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik
DOI: 10.4230/LIPIcs.STACS.2017.57

Pseudoentropy: Lower-Bounds for Chain Rules and Transformations.

Autores: Krzysztof Pietrzak, Maciej Skórski
Publicado en: 2016, Página(s) 183-203
Editor: Springer Berlin Heidelberg
DOI: 10.1007/978-3-662-53641-4_8

Constrained PRFs for Unbounded Inputs with Short Keys

Autores: Hamza Abusalah, Georg Fuchsbauer
Publicado en: 2016, Página(s) 445-463
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-39555-5_24

Offline Witness Encryption

Autores: Hamza Abusalah, Georg Fuchsbauer, Krzysztof Pietrzak
Publicado en: 2016, Página(s) 285-303
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-39555-5_16

Sustained Space Complexity

Autores: Alwen, Joel; Blocki, Jeremiah; Pietrzak, Krzysztof
Publicado en: Edición 4, 2018
Editor: Springer

Inverted Leftover Hash Lemma

Autores: Maciej Obremski, Maciej Skórski
Publicado en: 2018
Editor: IEEE

Non-Malleable Codes

Autores: Stefan Dziembowski, Krzysztof Pietrzak, Daniel Wichs
Publicado en: 2018
Editor: ACM

On the Memory-Hardness of Data-Independent Password-Hashing Functions

Autores: Joël Alwen, Peter Gaži, Chethan Kamath, Karen Klein, Georg Osang, Krzysztof Pietrzak, Leonid Reyzin, Michal Rolínek, Michal Rybár
Publicado en: 2018
Editor: ACM

Simple Proofs of Sequential Work

Autores: Bram Cohen, Krzysztof Pietrzak
Publicado en: 2018
Editor: Springer

Beyond Hellman’s time-memory trade-offs with applications to proofs of space

Autores: Abusalah, Hamza; Alwen, Joël; Cohen, Bram; Khilko, Danylo; Pietrzak, Krzysztof; Reyzin, Leonid
Publicado en: 2017
Editor: Springer

A cryptographic view of regularity lemmas: Simpler unified proofs and refined bounds

Autores: Maciej Skórski
Publicado en: 2017
Editor: Springer

Proofs of Catalytic Space

Autores: Krzysztof Pietrzak
Publicado en: 2018, Página(s) 59:1--59:25, ISBN 978-3-95977-095-8
Editor: Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik
DOI: 10.4230/lipics.itcs.2019.59

Simple Verifiable Delay Functions

Autores: Krzysztof Pietrzak
Publicado en: 2018, Página(s) 60:1--60:15, ISBN 978-3-95977-095-8
Editor: Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik
DOI: 10.4230/lipics.itcs.2019.60

Finding a Nash Equilibrium Is No Easier Than Breaking Fiat-Shamir

Autores: Arka Rai Choudhuri, Pavel Hubacek, Chethan Kamath, Krzysztof Pietrzak and Alon Rosen and Guy N. Rothblum
Publicado en: 2019
Editor: Annual ACM Symposium on the Theory of Computing
DOI: 10.1145/3313276.3316400

Reversible Proofs of Sequential Work

Autores: Hamza Abusalah, Chethan Kamath, Karen Klein, Krzysztof Pietrzak, Michael Walter
Publicado en: 2019
Editor: Annual International Conference on the Theory and Applications of Cryptographic Techniques

Towards Practical Attacks on Argon2i and Balloon Hashing

Autores: Joel Alwen, Jeremiah Blocki
Publicado en: 2017 IEEE European Symposium on Security and Privacy (EuroS&P), 2017, Página(s) 142-157, ISBN 978-1-5090-5762-7
Editor: IEEE
DOI: 10.1109/eurosp.2017.47

Cumulative Space in Black-White Pebbling and Resolution

Autores: Alwen, Joel F; De Rezende, Susanna ; Nordstrom, Jakob ; Vinyals, Marc
Publicado en: 2017
Editor: ITCS: Innovations in Theoretical Computer Science
DOI: 10.4230/lipics.itcs.2017.38

On the average-case hardness of total search problems

Autores: C. Kamath Hosdurg,
Publicado en: 2020, ISSN 2663-337X
Editor: IST Austria
DOI: 10.15479/at:ista:7896

Proof Systems for Sustainable Decentralized Cryptocurrencies

Autores: Hamza Abusalah
Publicado en: 2018
Editor: IST Austria
DOI: 10.15479/at:ista:th_1046

Per-session security: Password-based cryptography revisited

Autores: Grégory Demay, Peter Gaži, Ueli Maurer, Björn Tackmann
Publicado en: Journal of Computer Security, Edición 27/1, 2019, Página(s) 75-111, ISSN 0926-227X
Editor: IOS Press
DOI: 10.3233/jcs-181131

Efficient Authentication from Hard Learning Problems

Autores: Eike Kiltz, Krzysztof Pietrzak, Daniele Venturi, David Cash, Abhishek Jain
Publicado en: Journal of Cryptology, Edición 30/4, 2017, Página(s) 1238-1275, ISSN 0933-2790
Editor: Springer Verlag
DOI: 10.1007/s00145-016-9247-3

The Exact Security of PMAC

Autores: Peter Gaži, Krzysztof Pietrzak, Michal Rybár
Publicado en: IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2017, ISSN 2519-173X
Editor: Ruhr-Universität Bochum
DOI: 10.13154/tosc.v2016.i2.145-161

Buscando datos de OpenAIRE...

Se ha producido un error en la búsqueda de datos de OpenAIRE

No hay resultados disponibles