Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

Teaching Old Crypto New Tricks

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Publications

Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography (opens in new window)

Author(s): Nicholas Genise, Daniele Micciancio, Chris Peikert, Michael Walter
Published in: Public-Key Cryptography – PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4–7, 2020, Proceedings, Part I, Issue 12110, 2020, Page(s) 623-651, ISBN 978-3-030-45373-2
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-45374-9_21

Everybody’s a Target: Scalability in Public-Key Encryption (opens in new window)

Author(s): Benedikt Auerbach, Federico Giacon, Eike Kiltz
Published in: Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part III, Issue 12107, 2020, Page(s) 475-506, ISBN 978-3-030-45726-6
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-45727-3_16

Reverse Firewalls for Actively Secure MPCs (opens in new window)

Author(s): Suvradip Chakraborty, Stefan Dziembowski, Jesper Buus Nielsen
Published in: Advances in Cryptology – CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part II, Issue 12171, 2020, Page(s) 732-762, ISBN 978-3-030-56879-5
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-56880-1_26

Scrypt Is Maximally Memory-Hard (opens in new window)

Author(s): Joël Alwen, Binyi Chen, Krzysztof Pietrzak, Leonid Reyzin, Stefano Tessaro
Published in: Advances in Cryptology – EUROCRYPT 2017, Issue 10212, 2017, Page(s) 33-62, ISBN 978-3-319-56616-0
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-56617-7_2

On the Complexity of Breaking Pseudoentropy (opens in new window)

Author(s): Maciej Skorski
Published in: Theory and Applications of Models of Computation, Issue 10185, 2017, Page(s) 600-613, ISBN 978-3-319-55910-0
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-55911-7_43

On the Bit Security of Cryptographic Primitives (opens in new window)

Author(s): Daniele Micciancio, Michael Walter
Published in: Advances in Cryptology – EUROCRYPT 2018, Issue 10820, 2018, Page(s) 3-28, ISBN 978-3-319-78380-2
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-78381-9_1

Adaptively Secure Proxy Re-encryption (opens in new window)

Author(s): Georg Fuchsbauer, Chethan Kamath, Karen Klein, Krzysztof Pietrzak
Published in: Public-Key Cryptography – PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II, Issue 11443, 2019, Page(s) 317-346, ISBN 978-3-030-17258-9
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-17259-6_11

Sampling the Integers with Low Relative Error (opens in new window)

Author(s): Michael Walter
Published in: Progress in Cryptology – AFRICACRYPT 2019 - 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9–11, 2019, Proceedings, Issue 11627, 2019, Page(s) 157-180, ISBN 978-3-030-23695-3
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-23696-0_9

Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact Tracing (opens in new window)

Author(s): Krzysztof Pietrzak
Published in: Progress in Cryptology – INDOCRYPT 2020 - 21st International Conference on Cryptology in India, Bangalore, India, December 13–16, 2020, Proceedings, Issue 12578, 2020, Page(s) 3-15, ISBN 978-3-030-65276-0
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-65277-7_1

SpaceMint: A Cryptocurrency Based on Proofs of Space (opens in new window)

Author(s): Sunoo Park, Albert Kwon, Georg Fuchsbauer, Peter Gaži, Joël Alwen, Krzysztof Pietrzak
Published in: Financial Cryptography and Data Security - 22nd International Conference, FC 2018, Nieuwpoort, Curaçao, February 26 – March 2, 2018, Revised Selected Papers, Issue 10957, 2018, Page(s) 480-499, ISBN 978-3-662-58386-9
Publisher: Springer Berlin Heidelberg
DOI: 10.1007/978-3-662-58387-6_26

LightPIR: Privacy-Preserving Route Discovery for Payment Channel Networks

Author(s): Krzysztof Pietrzak, Iosif Salem, Stefan Schmid, Michelle Yeo
Published in: CoRR, 2021
Publisher: arXiv

Keep the Dirt: Tainted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement

Author(s): Joël Alwen, Margarita Capretto, Miguel Cueto, Chethan Kamath, Karen Klein, Ilia Markov, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter, Michelle Yeo
Published in: IEEE Symposium on Security and Privacy 2021, 2021
Publisher: IEEE Symposium on Security and Privacy 2021

Inverse-Sybil Attacks in Automated Contact Tracing (opens in new window)

Author(s): Benedikt Auerbach, Suvradip Chakraborty, Karen Klein, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter, Michelle Yeo
Published in: CT-RSA 2021, 2020
Publisher: CT-RSA 2021
DOI: 10.1007/978-3-030-75539-3\_17

Dual Lattice Attacks for Closest Vector Problems (with Preprocessing) (opens in new window)

Author(s): Thijs Laarhoven, Michael Walter
Published in: Topics in Cryptology - {CT-RSA} 2021 - Cryptographers' Track at the {RSA} Conference 2021, Issue Lecture Notes in Computer Science}, 2021
Publisher: Springer
DOI: 10.1007/978-3-030-75539-3\_20

Renyi Entropy Estimation Revisited (opens in new window)

Author(s): Maciej Obremski and Maciej Skorski
Published in: Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques (APPROX/RANDOM 2017), Issue volume 81, 2017, Page(s) 20:1--20:15, ISBN 978-3-95977-044-6
Publisher: Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik
DOI: 10.4230/LIPIcs.APPROX-RANDOM.2017.20

Practical Graphs for Optimal Side-Channel Resistant Memory-Hard Functions (opens in new window)

Author(s): Joel Alwen, Jeremiah Blocki, Ben Harsha
Published in: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS '17, 2017, Page(s) 1001-1017, ISBN 9781-450349468
Publisher: ACM Press
DOI: 10.1145/3133956.3134031

Position-Based Cryptography and Multiparty Communication Complexity (opens in new window)

Author(s): Joshua Brody, Stefan Dziembowski, Sebastian Faust, Krzysztof Pietrzak
Published in: 2017, Page(s) 56-81
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-70500-2_3

Non-Uniform Attacks Against Pseudoentropy (opens in new window)

Author(s): Krzysztof Pietrzak and Maciej Skorski
Published in: 44th International Colloquium on Automata, Languages, and Programming (ICALP 2017), 2017, Page(s) 39:1--39:13
Publisher: Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik
DOI: 10.4230/LIPIcs.ICALP.2017.39

Be Adaptive, Avoid Overcommitting. (opens in new window)

Author(s): Zahra Jafargholi, Chethan Kamath, Karen Klein, Ilan Komargodski, Krzysztof Pietrzak, Daniel Wichs
Published in: 2017, Page(s) 133-163
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-63688-7_5

Depth-Robust Graphs and Their Cumulative Memory Complexity. (opens in new window)

Author(s): Joël Alwen, Jeremiah Blocki, Krzysztof Pietrzak
Published in: 2017, Page(s) 3-32
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-56617-7_1

Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions. (opens in new window)

Author(s): Georg Fuchsbauer, Christian Hanser, Chethan Kamath, Daniel Slamanig
Published in: 2016, Page(s) 391-408
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-44618-9_21

Lower Bounds on Key Derivation for Square-Friendly Applications (opens in new window)

Author(s): Maciej Skorski
Published in: 2017, ISBN 978-3-95977-028-6
Publisher: Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik
DOI: 10.4230/LIPIcs.STACS.2017.57

Pseudoentropy: Lower-Bounds for Chain Rules and Transformations. (opens in new window)

Author(s): Krzysztof Pietrzak, Maciej Skórski
Published in: 2016, Page(s) 183-203
Publisher: Springer Berlin Heidelberg
DOI: 10.1007/978-3-662-53641-4_8

Constrained PRFs for Unbounded Inputs with Short Keys (opens in new window)

Author(s): Hamza Abusalah, Georg Fuchsbauer
Published in: 2016, Page(s) 445-463
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-39555-5_24

Offline Witness Encryption (opens in new window)

Author(s): Hamza Abusalah, Georg Fuchsbauer, Krzysztof Pietrzak
Published in: 2016, Page(s) 285-303
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-39555-5_16

Sustained Space Complexity

Author(s): Alwen, Joel; Blocki, Jeremiah; Pietrzak, Krzysztof
Published in: Issue 4, 2018
Publisher: Springer

Inverted Leftover Hash Lemma

Author(s): Maciej Obremski, Maciej Skórski
Published in: 2018
Publisher: IEEE

Non-Malleable Codes

Author(s): Stefan Dziembowski, Krzysztof Pietrzak, Daniel Wichs
Published in: 2018
Publisher: ACM

On the Memory-Hardness of Data-Independent Password-Hashing Functions

Author(s): Joël Alwen, Peter Gaži, Chethan Kamath, Karen Klein, Georg Osang, Krzysztof Pietrzak, Leonid Reyzin, Michal Rolínek, Michal Rybár
Published in: 2018
Publisher: ACM

Simple Proofs of Sequential Work

Author(s): Bram Cohen, Krzysztof Pietrzak
Published in: 2018
Publisher: Springer

Beyond Hellman’s time-memory trade-offs with applications to proofs of space

Author(s): Abusalah, Hamza; Alwen, Joël; Cohen, Bram; Khilko, Danylo; Pietrzak, Krzysztof; Reyzin, Leonid
Published in: 2017
Publisher: Springer

A cryptographic view of regularity lemmas: Simpler unified proofs and refined bounds

Author(s): Maciej Skórski
Published in: 2017
Publisher: Springer

Proofs of Catalytic Space (opens in new window)

Author(s): Krzysztof Pietrzak
Published in: 2018, Page(s) 59:1--59:25, ISBN 978-3-95977-095-8
Publisher: Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik
DOI: 10.4230/lipics.itcs.2019.59

Simple Verifiable Delay Functions (opens in new window)

Author(s): Krzysztof Pietrzak
Published in: 2018, Page(s) 60:1--60:15, ISBN 978-3-95977-095-8
Publisher: Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik
DOI: 10.4230/lipics.itcs.2019.60

Finding a Nash Equilibrium Is No Easier Than Breaking Fiat-Shamir (opens in new window)

Author(s): Arka Rai Choudhuri, Pavel Hubacek, Chethan Kamath, Krzysztof Pietrzak and Alon Rosen and Guy N. Rothblum
Published in: 2019
Publisher: Annual ACM Symposium on the Theory of Computing
DOI: 10.1145/3313276.3316400

Reversible Proofs of Sequential Work

Author(s): Hamza Abusalah, Chethan Kamath, Karen Klein, Krzysztof Pietrzak, Michael Walter
Published in: 2019
Publisher: Annual International Conference on the Theory and Applications of Cryptographic Techniques

Towards Practical Attacks on Argon2i and Balloon Hashing (opens in new window)

Author(s): Joel Alwen, Jeremiah Blocki
Published in: 2017 IEEE European Symposium on Security and Privacy (EuroS&P), 2017, Page(s) 142-157, ISBN 978-1-5090-5762-7
Publisher: IEEE
DOI: 10.1109/eurosp.2017.47

Cumulative Space in Black-White Pebbling and Resolution (opens in new window)

Author(s): Alwen, Joel F; De Rezende, Susanna ; Nordstrom, Jakob ; Vinyals, Marc
Published in: 2017
Publisher: ITCS: Innovations in Theoretical Computer Science
DOI: 10.4230/lipics.itcs.2017.38

On the average-case hardness of total search problems (opens in new window)

Author(s): C. Kamath Hosdurg,
Published in: 2020, ISSN 2663-337X
Publisher: IST Austria
DOI: 10.15479/at:ista:7896

Proof Systems for Sustainable Decentralized Cryptocurrencies (opens in new window)

Author(s): Hamza Abusalah
Published in: 2018
Publisher: IST Austria
DOI: 10.15479/at:ista:th_1046

Per-session security: Password-based cryptography revisited (opens in new window)

Author(s): Grégory Demay, Peter Gaži, Ueli Maurer, Björn Tackmann
Published in: Journal of Computer Security, Issue 27/1, 2019, Page(s) 75-111, ISSN 0926-227X
Publisher: IOS Press
DOI: 10.3233/jcs-181131

Efficient Authentication from Hard Learning Problems (opens in new window)

Author(s): Eike Kiltz, Krzysztof Pietrzak, Daniele Venturi, David Cash, Abhishek Jain
Published in: Journal of Cryptology, Issue 30/4, 2017, Page(s) 1238-1275, ISSN 0933-2790
Publisher: Springer Verlag
DOI: 10.1007/s00145-016-9247-3

The Exact Security of PMAC (opens in new window)

Author(s): Peter Gaži, Krzysztof Pietrzak, Michal Rybár
Published in: IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2017, ISSN 2519-173X
Publisher: Ruhr-Universität Bochum
DOI: 10.13154/tosc.v2016.i2.145-161

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0