European Commission logo
italiano italiano
CORDIS - Risultati della ricerca dell’UE
CORDIS

Teaching Old Crypto New Tricks

Pubblicazioni

Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography

Autori: Nicholas Genise, Daniele Micciancio, Chris Peikert, Michael Walter
Pubblicato in: Public-Key Cryptography – PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4–7, 2020, Proceedings, Part I, Numero 12110, 2020, Pagina/e 623-651, ISBN 978-3-030-45373-2
Editore: Springer International Publishing
DOI: 10.1007/978-3-030-45374-9_21

Everybody’s a Target: Scalability in Public-Key Encryption

Autori: Benedikt Auerbach, Federico Giacon, Eike Kiltz
Pubblicato in: Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part III, Numero 12107, 2020, Pagina/e 475-506, ISBN 978-3-030-45726-6
Editore: Springer International Publishing
DOI: 10.1007/978-3-030-45727-3_16

Reverse Firewalls for Actively Secure MPCs

Autori: Suvradip Chakraborty, Stefan Dziembowski, Jesper Buus Nielsen
Pubblicato in: Advances in Cryptology – CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part II, Numero 12171, 2020, Pagina/e 732-762, ISBN 978-3-030-56879-5
Editore: Springer International Publishing
DOI: 10.1007/978-3-030-56880-1_26

Scrypt Is Maximally Memory-Hard

Autori: Joël Alwen, Binyi Chen, Krzysztof Pietrzak, Leonid Reyzin, Stefano Tessaro
Pubblicato in: Advances in Cryptology – EUROCRYPT 2017, Numero 10212, 2017, Pagina/e 33-62, ISBN 978-3-319-56616-0
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-56617-7_2

On the Complexity of Breaking Pseudoentropy

Autori: Maciej Skorski
Pubblicato in: Theory and Applications of Models of Computation, Numero 10185, 2017, Pagina/e 600-613, ISBN 978-3-319-55910-0
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-55911-7_43

On the Bit Security of Cryptographic Primitives

Autori: Daniele Micciancio, Michael Walter
Pubblicato in: Advances in Cryptology – EUROCRYPT 2018, Numero 10820, 2018, Pagina/e 3-28, ISBN 978-3-319-78380-2
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-78381-9_1

Adaptively Secure Proxy Re-encryption

Autori: Georg Fuchsbauer, Chethan Kamath, Karen Klein, Krzysztof Pietrzak
Pubblicato in: Public-Key Cryptography – PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II, Numero 11443, 2019, Pagina/e 317-346, ISBN 978-3-030-17258-9
Editore: Springer International Publishing
DOI: 10.1007/978-3-030-17259-6_11

Sampling the Integers with Low Relative Error

Autori: Michael Walter
Pubblicato in: Progress in Cryptology – AFRICACRYPT 2019 - 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9–11, 2019, Proceedings, Numero 11627, 2019, Pagina/e 157-180, ISBN 978-3-030-23695-3
Editore: Springer International Publishing
DOI: 10.1007/978-3-030-23696-0_9

Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact Tracing

Autori: Krzysztof Pietrzak
Pubblicato in: Progress in Cryptology – INDOCRYPT 2020 - 21st International Conference on Cryptology in India, Bangalore, India, December 13–16, 2020, Proceedings, Numero 12578, 2020, Pagina/e 3-15, ISBN 978-3-030-65276-0
Editore: Springer International Publishing
DOI: 10.1007/978-3-030-65277-7_1

SpaceMint: A Cryptocurrency Based on Proofs of Space

Autori: Sunoo Park, Albert Kwon, Georg Fuchsbauer, Peter Gaži, Joël Alwen, Krzysztof Pietrzak
Pubblicato in: Financial Cryptography and Data Security - 22nd International Conference, FC 2018, Nieuwpoort, Curaçao, February 26 – March 2, 2018, Revised Selected Papers, Numero 10957, 2018, Pagina/e 480-499, ISBN 978-3-662-58386-9
Editore: Springer Berlin Heidelberg
DOI: 10.1007/978-3-662-58387-6_26

LightPIR: Privacy-Preserving Route Discovery for Payment Channel Networks

Autori: Krzysztof Pietrzak, Iosif Salem, Stefan Schmid, Michelle Yeo
Pubblicato in: CoRR, 2021
Editore: arXiv

Keep the Dirt: Tainted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement

Autori: Joël Alwen, Margarita Capretto, Miguel Cueto, Chethan Kamath, Karen Klein, Ilia Markov, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter, Michelle Yeo
Pubblicato in: IEEE Symposium on Security and Privacy 2021, 2021
Editore: IEEE Symposium on Security and Privacy 2021

Inverse-Sybil Attacks in Automated Contact Tracing

Autori: Benedikt Auerbach, Suvradip Chakraborty, Karen Klein, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter, Michelle Yeo
Pubblicato in: CT-RSA 2021, 2020
Editore: CT-RSA 2021
DOI: 10.1007/978-3-030-75539-3\_17

Dual Lattice Attacks for Closest Vector Problems (with Preprocessing)

Autori: Thijs Laarhoven, Michael Walter
Pubblicato in: Topics in Cryptology - {CT-RSA} 2021 - Cryptographers' Track at the {RSA} Conference 2021, Numero Lecture Notes in Computer Science}, 2021
Editore: Springer
DOI: 10.1007/978-3-030-75539-3\_20

Renyi Entropy Estimation Revisited

Autori: Maciej Obremski and Maciej Skorski
Pubblicato in: Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques (APPROX/RANDOM 2017), Numero volume 81, 2017, Pagina/e 20:1--20:15, ISBN 978-3-95977-044-6
Editore: Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik
DOI: 10.4230/LIPIcs.APPROX-RANDOM.2017.20

Practical Graphs for Optimal Side-Channel Resistant Memory-Hard Functions

Autori: Joel Alwen, Jeremiah Blocki, Ben Harsha
Pubblicato in: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS '17, 2017, Pagina/e 1001-1017, ISBN 9781-450349468
Editore: ACM Press
DOI: 10.1145/3133956.3134031

Position-Based Cryptography and Multiparty Communication Complexity

Autori: Joshua Brody, Stefan Dziembowski, Sebastian Faust, Krzysztof Pietrzak
Pubblicato in: 2017, Pagina/e 56-81
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-70500-2_3

Non-Uniform Attacks Against Pseudoentropy

Autori: Krzysztof Pietrzak and Maciej Skorski
Pubblicato in: 44th International Colloquium on Automata, Languages, and Programming (ICALP 2017), 2017, Pagina/e 39:1--39:13
Editore: Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik
DOI: 10.4230/LIPIcs.ICALP.2017.39

Be Adaptive, Avoid Overcommitting.

Autori: Zahra Jafargholi, Chethan Kamath, Karen Klein, Ilan Komargodski, Krzysztof Pietrzak, Daniel Wichs
Pubblicato in: 2017, Pagina/e 133-163
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-63688-7_5

Depth-Robust Graphs and Their Cumulative Memory Complexity.

Autori: Joël Alwen, Jeremiah Blocki, Krzysztof Pietrzak
Pubblicato in: 2017, Pagina/e 3-32
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-56617-7_1

Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions.

Autori: Georg Fuchsbauer, Christian Hanser, Chethan Kamath, Daniel Slamanig
Pubblicato in: 2016, Pagina/e 391-408
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-44618-9_21

Lower Bounds on Key Derivation for Square-Friendly Applications

Autori: Maciej Skorski
Pubblicato in: 2017, ISBN 978-3-95977-028-6
Editore: Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik
DOI: 10.4230/LIPIcs.STACS.2017.57

Pseudoentropy: Lower-Bounds for Chain Rules and Transformations.

Autori: Krzysztof Pietrzak, Maciej Skórski
Pubblicato in: 2016, Pagina/e 183-203
Editore: Springer Berlin Heidelberg
DOI: 10.1007/978-3-662-53641-4_8

Constrained PRFs for Unbounded Inputs with Short Keys

Autori: Hamza Abusalah, Georg Fuchsbauer
Pubblicato in: 2016, Pagina/e 445-463
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-39555-5_24

Offline Witness Encryption

Autori: Hamza Abusalah, Georg Fuchsbauer, Krzysztof Pietrzak
Pubblicato in: 2016, Pagina/e 285-303
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-39555-5_16

Sustained Space Complexity

Autori: Alwen, Joel; Blocki, Jeremiah; Pietrzak, Krzysztof
Pubblicato in: Numero 4, 2018
Editore: Springer

Inverted Leftover Hash Lemma

Autori: Maciej Obremski, Maciej Skórski
Pubblicato in: 2018
Editore: IEEE

Non-Malleable Codes

Autori: Stefan Dziembowski, Krzysztof Pietrzak, Daniel Wichs
Pubblicato in: 2018
Editore: ACM

On the Memory-Hardness of Data-Independent Password-Hashing Functions

Autori: Joël Alwen, Peter Gaži, Chethan Kamath, Karen Klein, Georg Osang, Krzysztof Pietrzak, Leonid Reyzin, Michal Rolínek, Michal Rybár
Pubblicato in: 2018
Editore: ACM

Simple Proofs of Sequential Work

Autori: Bram Cohen, Krzysztof Pietrzak
Pubblicato in: 2018
Editore: Springer

Beyond Hellman’s time-memory trade-offs with applications to proofs of space

Autori: Abusalah, Hamza; Alwen, Joël; Cohen, Bram; Khilko, Danylo; Pietrzak, Krzysztof; Reyzin, Leonid
Pubblicato in: 2017
Editore: Springer

A cryptographic view of regularity lemmas: Simpler unified proofs and refined bounds

Autori: Maciej Skórski
Pubblicato in: 2017
Editore: Springer

Proofs of Catalytic Space

Autori: Krzysztof Pietrzak
Pubblicato in: 2018, Pagina/e 59:1--59:25, ISBN 978-3-95977-095-8
Editore: Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik
DOI: 10.4230/lipics.itcs.2019.59

Simple Verifiable Delay Functions

Autori: Krzysztof Pietrzak
Pubblicato in: 2018, Pagina/e 60:1--60:15, ISBN 978-3-95977-095-8
Editore: Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik
DOI: 10.4230/lipics.itcs.2019.60

Finding a Nash Equilibrium Is No Easier Than Breaking Fiat-Shamir

Autori: Arka Rai Choudhuri, Pavel Hubacek, Chethan Kamath, Krzysztof Pietrzak and Alon Rosen and Guy N. Rothblum
Pubblicato in: 2019
Editore: Annual ACM Symposium on the Theory of Computing
DOI: 10.1145/3313276.3316400

Reversible Proofs of Sequential Work

Autori: Hamza Abusalah, Chethan Kamath, Karen Klein, Krzysztof Pietrzak, Michael Walter
Pubblicato in: 2019
Editore: Annual International Conference on the Theory and Applications of Cryptographic Techniques

Towards Practical Attacks on Argon2i and Balloon Hashing

Autori: Joel Alwen, Jeremiah Blocki
Pubblicato in: 2017 IEEE European Symposium on Security and Privacy (EuroS&P), 2017, Pagina/e 142-157, ISBN 978-1-5090-5762-7
Editore: IEEE
DOI: 10.1109/eurosp.2017.47

Cumulative Space in Black-White Pebbling and Resolution

Autori: Alwen, Joel F; De Rezende, Susanna ; Nordstrom, Jakob ; Vinyals, Marc
Pubblicato in: 2017
Editore: ITCS: Innovations in Theoretical Computer Science
DOI: 10.4230/lipics.itcs.2017.38

On the average-case hardness of total search problems

Autori: C. Kamath Hosdurg,
Pubblicato in: 2020, ISSN 2663-337X
Editore: IST Austria
DOI: 10.15479/at:ista:7896

Proof Systems for Sustainable Decentralized Cryptocurrencies

Autori: Hamza Abusalah
Pubblicato in: 2018
Editore: IST Austria
DOI: 10.15479/at:ista:th_1046

Per-session security: Password-based cryptography revisited

Autori: Grégory Demay, Peter Gaži, Ueli Maurer, Björn Tackmann
Pubblicato in: Journal of Computer Security, Numero 27/1, 2019, Pagina/e 75-111, ISSN 0926-227X
Editore: IOS Press
DOI: 10.3233/jcs-181131

Efficient Authentication from Hard Learning Problems

Autori: Eike Kiltz, Krzysztof Pietrzak, Daniele Venturi, David Cash, Abhishek Jain
Pubblicato in: Journal of Cryptology, Numero 30/4, 2017, Pagina/e 1238-1275, ISSN 0933-2790
Editore: Springer Verlag
DOI: 10.1007/s00145-016-9247-3

The Exact Security of PMAC

Autori: Peter Gaži, Krzysztof Pietrzak, Michal Rybár
Pubblicato in: IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2017, ISSN 2519-173X
Editore: Ruhr-Universität Bochum
DOI: 10.13154/tosc.v2016.i2.145-161

È in corso la ricerca di dati su OpenAIRE...

Si è verificato un errore durante la ricerca dei dati su OpenAIRE

Nessun risultato disponibile