Dodis, Yevgeniy; Ferguson, Niels; Goldin, Eli; Hall, Peter; Pietrzak, Krzysztof Random oracle combiners: breaking the concatenation barrier for collision-resistance. (English) Zbl 07799232 Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 14082, 514-546 (2023). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{Y. Dodis} et al., Lect. Notes Comput. Sci. 14082, 514--546 (2023; Zbl 07799232) Full Text: DOI
Hoffmann, Charlotte; Hubáček, Pavel; Kamath, Chethan; Pietrzak, Krzysztof Certifying giant nonprimes. (English) Zbl 07770267 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13940, 530-553 (2023). Reviewer: Kostantinos Draziotis (Thessaloniki) MSC: 11Y11 94A60 PDFBibTeX XMLCite \textit{C. Hoffmann} et al., Lect. Notes Comput. Sci. 13940, 530--553 (2023; Zbl 07770267) Full Text: DOI
Hoffmann, Charlotte; Hubáček, Pavel; Kamath, Chethan; Klein, Karen; Pietrzak, Krzysztof Practical statistically-sound proofs of exponentiation in any group. (English) Zbl 1517.94109 Dodis, Yevgeniy (ed.) et al., Advances in cryptology – CRYPTO 2022. 42nd annual international cryptology conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15–18, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13508, 370-399 (2022). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Hoffmann} et al., Lect. Notes Comput. Sci. 13508, 370--399 (2022; Zbl 1517.94109) Full Text: DOI
Alwen, Joël; Auerbach, Benedikt; Baig, Mirza Ahad; Cueto Noval, Miguel; Klein, Karen; Pascual-Perez, Guillermo; Pietrzak, Krzysztof; Walter, Michael Grafting key trees: efficient key management for overlapping groups. (English) Zbl 1511.94042 Nissim, Kobbi (ed.) et al., Theory of cryptography. 19th international conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13044, 222-253 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Alwen} et al., Lect. Notes Comput. Sci. 13044, 222--253 (2021; Zbl 1511.94042) Full Text: DOI
Kamath, Chethan; Klein, Karen; Pietrzak, Krzysztof; Walter, Michael The cost of adaptivity in security games on graphs. (English) Zbl 1511.94115 Nissim, Kobbi (ed.) et al., Theory of cryptography. 19th international conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13043, 550-581 (2021). MSC: 94A60 05C57 91A43 PDFBibTeX XMLCite \textit{C. Kamath} et al., Lect. Notes Comput. Sci. 13043, 550--581 (2021; Zbl 1511.94115) Full Text: DOI
Kamath, Chethan; Klein, Karen; Pietrzak, Krzysztof On treewidth, separators and Yao’s garbling. (English) Zbl 1520.94059 Nissim, Kobbi (ed.) et al., Theory of cryptography. 19th international conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13043, 486-517 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Kamath} et al., Lect. Notes Comput. Sci. 13043, 486--517 (2021; Zbl 1520.94059) Full Text: DOI
Chakraborty, Suvradip; Dziembowski, Stefan; Gałązka, Małgorzata; Lizurej, Tomasz; Pietrzak, Krzysztof; Yeo, Michelle Trojan-resilience without cryptography. (English) Zbl 07674385 Nissim, Kobbi (ed.) et al., Theory of cryptography. 19th international conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13043, 397-428 (2021). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{S. Chakraborty} et al., Lect. Notes Comput. Sci. 13043, 397--428 (2021; Zbl 07674385) Full Text: DOI
Kamath, Chethan; Klein, Karen; Pietrzak, Krzysztof; Wichs, Daniel Limits on the adaptive security of Yao’s garbling. (English) Zbl 1486.94113 Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12826, 486-515 (2021). MSC: 94A60 94D10 PDFBibTeX XMLCite \textit{C. Kamath} et al., Lect. Notes Comput. Sci. 12826, 486--515 (2021; Zbl 1486.94113) Full Text: DOI
Auerbach, Benedikt; Chakraborty, Suvradip; Klein, Karen; Pascual-Perez, Guillermo; Pietrzak, Krzysztof; Walter, Michael; Yeo, Michelle Inverse-Sybil attacks in automated contact tracing. (English) Zbl 1479.94116 Paterson, Kenneth G. (ed.), Topics in cryptology – CT-RSA 2021. Cryptographers’ track at the RSA conference 2021, virtual event, May 17–20, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12704, 399-421 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Auerbach} et al., Lect. Notes Comput. Sci. 12704, 399--421 (2021; Zbl 1479.94116) Full Text: DOI
Pietrzak, Krzysztof Delayed authentication: preventing replay and relay attacks in private contact tracing. (English) Zbl 1492.94158 Bhargavan, Karthikeyan (ed.) et al., Progress in cryptology – INDOCRYPT 2020. 21st international conference on cryptology in India, Bangalore, India, December 13–16, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12578, 3-15 (2020). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{K. Pietrzak}, Lect. Notes Comput. Sci. 12578, 3--15 (2020; Zbl 1492.94158) Full Text: DOI
Pass, Rafael (ed.); Pietrzak, Krzysztof (ed.) Theory of cryptography. 18th international conference, TCC 2020, Durham, NC, USA, November 16–19, 2020. Proceedings. Part III. (English) Zbl 1482.94009 Lecture Notes in Computer Science 12552. Cham: Springer (ISBN 978-3-030-64380-5/pbk; 978-3-030-64381-2/ebook). xii, 273 p. (2020). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{R. Pass} (ed.) and \textit{K. Pietrzak} (ed.), Theory of cryptography. 18th international conference, TCC 2020, Durham, NC, USA, November 16--19, 2020. Proceedings. Part III. Cham: Springer (2020; Zbl 1482.94009) Full Text: DOI
Pass, Rafael (ed.); Pietrzak, Krzysztof (ed.) Theory of cryptography. 18th international conference, TCC 2020, Durham, NC, USA, November 16–19, 2020. Proceedings. Part II. (English) Zbl 1482.94008 Lecture Notes in Computer Science 12551. Cham: Springer (ISBN 978-3-030-64377-5/pbk; 978-3-030-64378-2/ebook). xii, 260 p. (2020). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{R. Pass} (ed.) and \textit{K. Pietrzak} (ed.), Theory of cryptography. 18th international conference, TCC 2020, Durham, NC, USA, November 16--19, 2020. Proceedings. Part II. Cham: Springer (2020; Zbl 1482.94008) Full Text: DOI
Pass, Rafael (ed.); Pietrzak, Krzysztof (ed.) Theory of cryptography. 18th international conference, TCC 2020, Durham, NC, USA, November 16–19, 2020. Proceedings. Part I. (English) Zbl 1475.94013 Lecture Notes in Computer Science 12550. Cham: Springer (ISBN 978-3-030-64374-4/pbk; 978-3-030-64375-1/ebook). xvi, 707 p. (2020). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{R. Pass} (ed.) and \textit{K. Pietrzak} (ed.), Theory of cryptography. 18th international conference, TCC 2020, Durham, NC, USA, November 16--19, 2020. Proceedings. Part I. Cham: Springer (2020; Zbl 1475.94013) Full Text: DOI
Abusalah, Hamza; Kamath, Chethan; Klein, Karen; Pietrzak, Krzysztof; Walter, Michael Reversible proofs of sequential work. (English) Zbl 1428.94050 Ishai, Yuval (ed.) et al., Advances in cryptology – EUROCRYPT 2019. 38th annual international conference on the theory and applications of cryptographic techniques, Darmstadt, Germany, May 19–23, 2019. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11477, 277-291 (2019). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{H. Abusalah} et al., Lect. Notes Comput. Sci. 11477, 277--291 (2019; Zbl 1428.94050) Full Text: DOI
Choudhuri, Arka Rai; Hubáček, Pavel; Kamath, Chethan; Pietrzak, Krzysztof; Rosen, Alon; Rothblum, Guy N. Finding a Nash equilibrium is no easier than breaking Fiat-Shamir. (English) Zbl 1434.94063 Charikar, Moses (ed.) et al., Proceedings of the 51st annual ACM SIGACT symposium on theory of computing, STOC ’19, Phoenix, AZ, USA, June 23–26, 2019. New York, NY: Association for Computing Machinery (ACM). 1103-1114 (2019). MSC: 94A60 91A80 68Q25 PDFBibTeX XMLCite \textit{A. R. Choudhuri} et al., in: Proceedings of the 51st annual ACM SIGACT symposium on theory of computing, STOC '19, Phoenix, AZ, USA, June 23--26, 2019. New York, NY: Association for Computing Machinery (ACM). 1103--1114 (2019; Zbl 1434.94063) Full Text: DOI
Fuchsbauer, Georg; Kamath, Chethan; Klein, Karen; Pietrzak, Krzysztof Adaptively secure proxy re-encryption. (English) Zbl 1509.94087 Lin, Dongdai (ed.) et al., Public-key cryptography – PKC 2019. 22nd IACR international conference on practice and theory of public-key cryptography, Beijing, China, April 14–17, 2019. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11443, 317-346 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{G. Fuchsbauer} et al., Lect. Notes Comput. Sci. 11443, 317--346 (2019; Zbl 1509.94087) Full Text: DOI
Dziembowski, Stefan; Pietrzak, Krzysztof; Wichs, Daniel Non-malleable codes. (English) Zbl 1409.94869 J. ACM 65, No. 4, Article No. 20, 32 p. (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Dziembowski} et al., J. ACM 65, No. 4, Article No. 20, 32 p. (2018; Zbl 1409.94869) Full Text: DOI
Cohen, Bram; Pietrzak, Krzysztof Simple proofs of sequential work. (English) Zbl 1428.94067 Nielsen, Jesper Buus (ed.) et al., Advances in cryptology – EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 – May 3, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10821, 451-467 (2018). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{B. Cohen} and \textit{K. Pietrzak}, Lect. Notes Comput. Sci. 10821, 451--467 (2018; Zbl 1428.94067) Full Text: DOI
Alwen, Joël; Blocki, Jeremiah; Pietrzak, Krzysztof Sustained space complexity. (English) Zbl 1423.94045 Nielsen, Jesper Buus (ed.) et al., Advances in cryptology – EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 – May 3, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10821, 99-130 (2018). MSC: 94A60 68Q25 PDFBibTeX XMLCite \textit{J. Alwen} et al., Lect. Notes Comput. Sci. 10821, 99--130 (2018; Zbl 1423.94045) Full Text: DOI arXiv
Pietrzak, Krzysztof; Skorski, Maciej Non-uniform attacks against pseudoentropy. (English) Zbl 1441.94094 Chatzigiannakis, Ioannis (ed.) et al., 44th international colloquium on automata, languages, and programming, ICALP 2017, Warsaw, Poland July 10–14, 2017. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 80, Article 39, 13 p. (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Pietrzak} and \textit{M. Skorski}, LIPIcs -- Leibniz Int. Proc. Inform. 80, Article 39, 13 p. (2017; Zbl 1441.94094) Full Text: DOI arXiv
Abusalah, Hamza; Alwen, Joël; Cohen, Bram; Khilko, Danylo; Pietrzak, Krzysztof; Reyzin, Leonid Beyond Hellman’s time-memory trade-offs with applications to proofs of space. (English) Zbl 1409.94858 Takagi, Tsuyoshi (ed.) et al., Advances in cryptology – ASIACRYPT 2017. 23rd international conference on the theory and applications of cryptology and information security, Hong Kong, China, December 3–7, 2017. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10625, 357-379 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Abusalah} et al., Lect. Notes Comput. Sci. 10625, 357--379 (2017; Zbl 1409.94858) Full Text: DOI
Brody, Joshua; Dziembowski, Stefan; Faust, Sebastian; Pietrzak, Krzysztof Position-based cryptography and multiparty communication complexity. (English) Zbl 1410.94054 Kalai, Yael (ed.) et al., Theory of cryptography. 15th international conference, TCC 2017, Baltimore, MD, USA, November 12–15, 2017. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10677, 56-81 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Brody} et al., Lect. Notes Comput. Sci. 10677, 56--81 (2017; Zbl 1410.94054) Full Text: DOI Link
Jafargholi, Zahra; Kamath, Chethan; Klein, Karen; Komargodski, Ilan; Pietrzak, Krzysztof; Wichs, Daniel Be adaptive, avoid overcommitting. (English) Zbl 1407.94123 Katz, Jonathan (ed.) et al., Advances in cryptology – CRYPTO 2017. 37th annual international cryptology conference, Santa Barbara, CA, USA, August 20–24, 2017. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10401, 133-163 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{Z. Jafargholi} et al., Lect. Notes Comput. Sci. 10401, 133--163 (2017; Zbl 1407.94123) Full Text: DOI
Alwen, Joël; Chen, Binyi; Pietrzak, Krzysztof; Reyzin, Leonid; Tessaro, Stefano Scrypt is maximally memory-hard. (English) Zbl 1394.94925 Coron, Jean-Sébastien (ed.) et al., Advances in cryptology – EUROCRYPT 2017. 36th annual international conference on the theory and applications of cryptographic techniques, Paris, France, April 30 – May 4, 2017. Proceedings. Part III. Cham: Springer (ISBN 978-3-319-56616-0/pbk; 978-3-319-56617-7/ebook). Lecture Notes in Computer Science 10212, 33-62 (2017). MSC: 94A60 68Q10 PDFBibTeX XMLCite \textit{J. Alwen} et al., Lect. Notes Comput. Sci. 10212, 33--62 (2017; Zbl 1394.94925) Full Text: DOI
Alwen, Joël; Blocki, Jeremiah; Pietrzak, Krzysztof Depth-robust graphs and their cumulative memory complexity. (English) Zbl 1390.94827 Coron, Jean-Sébastien (ed.) et al., Advances in cryptology – EUROCRYPT 2017. 36th annual international conference on the theory and applications of cryptographic techniques, Paris, France, April 30 – May 4, 2017. Proceedings. Part III. Cham: Springer (ISBN 978-3-319-56616-0/pbk; 978-3-319-56617-7/ebook). Lecture Notes in Computer Science 10212, 3-32 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Alwen} et al., Lect. Notes Comput. Sci. 10212, 3--32 (2017; Zbl 1390.94827) Full Text: DOI
Pietrzak, Krzysztof; Skórski, Maciej Pseudoentropy: lower-bounds for chain rules and transformations. (English) Zbl 1369.94563 Hirt, Martin (ed.) et al., Theory of cryptography. 14th international conference, TCC 2016-B, Beijing, China, October 31 – November 3, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53640-7/pbk; 978-3-662-53641-4/ebook). Lecture Notes in Computer Science 9985, 183-203 (2016). MSC: 94A60 94A17 PDFBibTeX XMLCite \textit{K. Pietrzak} and \textit{M. Skórski}, Lect. Notes Comput. Sci. 9985, 183--203 (2016; Zbl 1369.94563) Full Text: DOI
Krenn, Stephan; Pietrzak, Krzysztof; Wadia, Akshay; Wichs, Daniel A counterexample to the chain rule for conditional HILL entropy. (English) Zbl 1369.94550 Comput. Complexity 25, No. 3, 567-605 (2016). MSC: 94A60 68Q17 94A17 PDFBibTeX XMLCite \textit{S. Krenn} et al., Comput. Complexity 25, No. 3, 567--605 (2016; Zbl 1369.94550) Full Text: DOI
Abusalah, Hamza; Fuchsbauer, Georg; Pietrzak, Krzysztof Offline witness encryption. (English) Zbl 1348.94029 Manulis, Mark (ed.) et al., Applied cryptography and network security. 14th international conference, ACNS 2016, Guildford, UK, June 19–22, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-39554-8/pbk; 978-3-319-39555-5/ebook). Lecture Notes in Computer Science 9696, 285-303 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Abusalah} et al., Lect. Notes Comput. Sci. 9696, 285--303 (2016; Zbl 1348.94029) Full Text: DOI
Alwen, Joël; Chen, Binyi; Kamath, Chethan; Kolmogorov, Vladimir; Pietrzak, Krzysztof; Tessaro, Stefano On the complexity of scrypt and proofs of space in the parallel random oracle model. (English) Zbl 1369.94518 Fischlin, Marc (ed.) et al., Advances in cryptology – EUROCRYPT 2016. 35th annual international conference on the theory and applications of cryptographic techniques, Vienna, Austria, May 8–12, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-49895-8/pbk; 978-3-662-49896-5/ebook). Lecture Notes in Computer Science 9666, 358-387 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Alwen} et al., Lect. Notes Comput. Sci. 9666, 358--387 (2016; Zbl 1369.94518) Full Text: DOI
Abusalah, Hamza; Fuchsbauer, Georg; Pietrzak, Krzysztof Constrained PRFs for unbounded inputs. (English) Zbl 1334.94053 Sako, Kazue (ed.), Topics in cryptology – CT-RSA 2016. The cryptographers’ track at the RSA conference 2016, San Francisco, CA, USA, February 29 – March 4, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-29484-1/pbk; 978-3-319-29485-8/ebook). Lecture Notes in Computer Science 9610, 413-428 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Abusalah} et al., Lect. Notes Comput. Sci. 9610, 413--428 (2016; Zbl 1334.94053) Full Text: DOI Link
Fuchsbauer, Georg; Heuer, Felix; Kiltz, Eike; Pietrzak, Krzysztof Standard security does imply security against selective opening for Markov distributions. (English) Zbl 1348.94046 Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49095-2/pbk; 978-3-662-49096-9/ebook). Lecture Notes in Computer Science 9562, 282-305 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{G. Fuchsbauer} et al., Lect. Notes Comput. Sci. 9562, 282--305 (2016; Zbl 1348.94046) Full Text: DOI
Benhamouda, Fabrice; Krenn, Stephan; Lyubashevsky, Vadim; Pietrzak, Krzysztof Efficient zero-knowledge proofs for commitments from learning with errors over rings. (English) Zbl 1499.68113 Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9326, 305-325 (2015). MSC: 68Q10 68Q11 94A60 PDFBibTeX XMLCite \textit{F. Benhamouda} et al., Lect. Notes Comput. Sci. 9326, 305--325 (2015; Zbl 1499.68113) Full Text: DOI
Okamoto, Tatsuaki; Pietrzak, Krzysztof; Waters, Brent; Wichs, Daniel New realizations of somewhere statistically binding hashing and positional accumulators. (English) Zbl 1396.94093 Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-48796-9/pbk; 978-3-662-48797-6/ebook). Lecture Notes in Computer Science 9452, 121-145 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{T. Okamoto} et al., Lect. Notes Comput. Sci. 9452, 121--145 (2015; Zbl 1396.94093) Full Text: DOI
Gaži, Peter; Pietrzak, Krzysztof; Tessaro, Stefano Generic security of NMAC and HMAC with input whitening. (English) Zbl 1375.94128 Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-48799-0/pbk; 978-3-662-48800-3/ebook). Lecture Notes in Computer Science 9453, 85-109 (2015). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{P. Gaži} et al., Lect. Notes Comput. Sci. 9453, 85--109 (2015; Zbl 1375.94128) Full Text: DOI
Fuchsbauer, Georg; Jafargholi, Zahra; Pietrzak, Krzysztof A quasipolynomial reduction for generalized selective decryption on trees. (English) Zbl 1375.94125 Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 601-620 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{G. Fuchsbauer} et al., Lect. Notes Comput. Sci. 9215, 601--620 (2015; Zbl 1375.94125) Full Text: DOI
Gaži, Peter; Pietrzak, Krzysztof; Tessaro, Stefano The exact PRF security of truncation: tight bounds for keyed sponges and truncated CBC. (English) Zbl 1375.94127 Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 368-387 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{P. Gaži} et al., Lect. Notes Comput. Sci. 9215, 368--387 (2015; Zbl 1375.94127) Full Text: DOI Link
Dziembowski, Stefan; Faust, Sebastian; Kolmogorov, Vladimir; Pietrzak, Krzysztof Proofs of space. (English) Zbl 1369.94531 Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 585-605 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Dziembowski} et al., Lect. Notes Comput. Sci. 9216, 585--605 (2015; Zbl 1369.94531) Full Text: DOI Link
Pietrzak, Krzysztof; Skórski, Maciej The chain rule for HILL pseudoentropy, revisited. (English) Zbl 1370.94538 Lauter, Kristin (ed.) et al., Progress in cryptology – LATINCRYPT 2015. 4th international conference on cryptology and information security in Latin America, Guadalajara, Mexico, August 23–26, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22173-1/pbk; 978-3-319-22174-8/ebook). Lecture Notes in Computer Science 9230, 81-98 (2015). MSC: 94A60 94A17 PDFBibTeX XMLCite \textit{K. Pietrzak} and \textit{M. Skórski}, Lect. Notes Comput. Sci. 9230, 81--98 (2015; Zbl 1370.94538) Full Text: DOI
Banerjee, Abhishek; Fuchsbauer, Georg; Peikert, Chris; Pietrzak, Krzysztof; Stevens, Sophie Key-homomorphic constrained pseudorandom functions. (English) Zbl 1315.94052 Dodis, Yevgeniy (ed.) et al., Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-46496-0/pbk). Lecture Notes in Computer Science 9015, 31-60 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Banerjee} et al., Lect. Notes Comput. Sci. 9015, 31--60 (2015; Zbl 1315.94052) Full Text: DOI Link
Fuchsbauer, Georg; Konstantinov, Momchil; Pietrzak, Krzysztof; Rao, Vanishree Adaptive security of constrained PRFs. (English) Zbl 1317.94107 Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014, Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-45607-1/pbk). Lecture Notes in Computer Science 8874, 82-101 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{G. Fuchsbauer} et al., Lect. Notes Comput. Sci. 8874, 82--101 (2014; Zbl 1317.94107) Full Text: DOI
Fischlin, Marc; Lehmann, Anja; Pietrzak, Krzysztof Robust multi-property combiners for hash functions. (English) Zbl 1302.94046 J. Cryptology 27, No. 3, 397-428 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Fischlin} et al., J. Cryptology 27, No. 3, 397--428 (2014; Zbl 1302.94046) Full Text: DOI
Gaži, Peter; Pietrzak, Krzysztof; Rybár, Michal The exact PRF-security of NMAC and HMAC. (English) Zbl 1343.94050 Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 113-130 (2014). MSC: 94A60 65C10 PDFBibTeX XMLCite \textit{P. Gaži} et al., Lect. Notes Comput. Sci. 8616, 113--130 (2014; Zbl 1343.94050) Full Text: DOI
Dodis, Yevgeniy; Pietrzak, Krzysztof; Wichs, Daniel Key derivation without entropy waste. (English) Zbl 1326.94085 Nguyen, Phong Q. (ed.) et al., Advances in cryptology – EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11–15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 93-110 (2014). MSC: 94A60 94A15 68Q87 68P25 PDFBibTeX XMLCite \textit{Y. Dodis} et al., Lect. Notes Comput. Sci. 8441, 93--110 (2014; Zbl 1326.94085) Full Text: DOI
Kiltz, Eike; Masny, Daniel; Pietrzak, Krzysztof Simple chosen-ciphertext security from low-noise LPN. (English) Zbl 1335.94059 Krawczyk, Hugo (ed.), Public-key cryptography – PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 1-18 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{E. Kiltz} et al., Lect. Notes Comput. Sci. 8383, 1--18 (2014; Zbl 1335.94059) Full Text: DOI
Jetchev, Dimitar; Pietrzak, Krzysztof How to fake auxiliary input. (English) Zbl 1326.94102 Lindell, Yehuda (ed.), Theory of cryptography. 11th theory of cryptography conference, TCC 2014, San Diego, CA, USA, February 24–26, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54241-1/pbk). Lecture Notes in Computer Science 8349, 566-590 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Jetchev} and \textit{K. Pietrzak}, Lect. Notes Comput. Sci. 8349, 566--590 (2014; Zbl 1326.94102) Full Text: DOI
Kiltz, Eike; Pietrzak, Krzysztof; Szegedy, Mario Digital signatures with minimal overhead from indifferentiable random invertible functions. (English) Zbl 1310.94156 Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 571-588 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{E. Kiltz} et al., Lect. Notes Comput. Sci. 8042, 571--588 (2013; Zbl 1310.94156) Full Text: DOI
Alwen, Joël; Krenn, Stephan; Pietrzak, Krzysztof; Wichs, Daniel Learning with rounding, revisited. New reduction, properties and applications. (English) Zbl 1310.94123 Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 57-74 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Alwen} et al., Lect. Notes Comput. Sci. 8042, 57--74 (2013; Zbl 1310.94123) Full Text: DOI
Krenn, Stephan; Pietrzak, Krzysztof; Wadia, Akshay A counterexample to the chain rule for conditional HILL entropy. And what deniable encryption has to do with it. (English) Zbl 1297.94083 Sahai, Amit (ed.), Theory of cryptography. 10th theory of cryptography conference, TCC 2013, Tokyo, Japan, March 3–6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36593-5/pbk). Lecture Notes in Computer Science 7785, 23-39 (2013). MSC: 94A60 94A17 PDFBibTeX XMLCite \textit{S. Krenn} et al., Lect. Notes Comput. Sci. 7785, 23--39 (2013; Zbl 1297.94083) Full Text: DOI
Jain, Abhishek; Krenn, Stephan; Pietrzak, Krzysztof; Tentes, Aris Commitments and efficient zero-knowledge proofs from learning parity with noise. (English) Zbl 1292.94082 Wang, Xiaoyun (ed.) et al., Advances in cryptology – ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 663-680 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Jain} et al., Lect. Notes Comput. Sci. 7658, 663--680 (2012; Zbl 1292.94082) Full Text: DOI
Faust, Sebastian; Pietrzak, Krzysztof; Schipper, Joachim Practical leakage-resilient symmetric cryptography. (English) Zbl 1366.94490 Prouff, Emmanuel (ed.) et al., Cryptographic hardware and embedded systems - CHES 2012. 14th international workshop, Leuven, Belgium, September 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33026-1/pbk). Lecture Notes in Computer Science 7428, 213-232 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Faust} et al., Lect. Notes Comput. Sci. 7428, 213--232 (2012; Zbl 1366.94490) Full Text: DOI
Pietrzak, Krzysztof Subspace LWE. (English) Zbl 1296.94136 Cramer, Ronald (ed.), Theory of cryptography. 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19–21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-28913-2/pbk). Lecture Notes in Computer Science 7194, 548-563 (2012). MSC: 94A60 68Q25 68P25 PDFBibTeX XMLCite \textit{K. Pietrzak}, Lect. Notes Comput. Sci. 7194, 548--563 (2012; Zbl 1296.94136) Full Text: DOI
Pietrzak, Krzysztof; Rosen, Alon; Segev, Gil Lossy functions do not amplify well. (English) Zbl 1303.94098 Cramer, Ronald (ed.), Theory of cryptography. 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19–21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-28913-2/pbk). Lecture Notes in Computer Science 7194, 458-475 (2012). MSC: 94A60 94C10 PDFBibTeX XMLCite \textit{K. Pietrzak} et al., Lect. Notes Comput. Sci. 7194, 458--475 (2012; Zbl 1303.94098) Full Text: DOI
Jain, Abhishek; Pietrzak, Krzysztof; Tentes, Aris Hardness preserving constructions of pseudorandom functions. (English) Zbl 1303.94084 Cramer, Ronald (ed.), Theory of cryptography. 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19–21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-28913-2/pbk). Lecture Notes in Computer Science 7194, 369-382 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Jain} et al., Lect. Notes Comput. Sci. 7194, 369--382 (2012; Zbl 1303.94084) Full Text: DOI
Pietrzak, Krzysztof Cryptography from learning parity with noise. (English) Zbl 1298.94103 Bieliková, Mária (ed.) et al., SOFSEM 2012: Theory and practice of computer science. 38th conference on current trends in theory and practice of computer science, Špindlerův Mlýn, Czech Republic, January 21–27, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-27659-0/pbk). Lecture Notes in Computer Science 7147, 99-114 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Pietrzak}, Lect. Notes Comput. Sci. 7147, 99--114 (2012; Zbl 1298.94103) Full Text: DOI
Pietrzak, Krzysztof; Wikström, Douglas Parallel repetition of computationally sound protocols revisited. (English) Zbl 1272.94057 J. Cryptology 25, No. 1, 116-135 (2012). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{K. Pietrzak} and \textit{D. Wikström}, J. Cryptology 25, No. 1, 116--135 (2012; Zbl 1272.94057) Full Text: DOI
Barak, Boaz; Dodis, Yevgeniy; Krawczyk, Hugo; Pereira, Olivier; Pietrzak, Krzysztof; Standaert, François-Xavier; Yu, Yu Leftover hash lemma, revisited. (English) Zbl 1287.94047 Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 1-20 (2011). MSC: 94A60 94A15 94A17 PDFBibTeX XMLCite \textit{B. Barak} et al., Lect. Notes Comput. Sci. 6841, 1--20 (2011; Zbl 1287.94047) Full Text: DOI
Faust, Sebastian; Pietrzak, Krzysztof; Venturi, Daniele Tamper-proof circuits: how to trade leakage for tamper-resilience. (English) Zbl 1333.94034 Aceto, Luca (ed.) et al., Automata, languages and programming. 38th international colloquium, ICALP 2011, Zurich, Switzerland, July 4–8, 2011. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-22005-0/pbk). Lecture Notes in Computer Science 6755, 391-402 (2011). MSC: 94A60 94C10 PDFBibTeX XMLCite \textit{S. Faust} et al., Lect. Notes Comput. Sci. 6755, 391--402 (2011; Zbl 1333.94034) Full Text: DOI
Jain, Abhishek; Pietrzak, Krzysztof Parallel repetition for leakage resilience amplification revisited. (English) Zbl 1290.94093 Ishai, Yuval (ed.), Theory of cryptography. 8th theory of cryptography conference, TCC 2011, Providence, RI, USA, March 28–30, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19570-9/pbk). Lecture Notes in Computer Science 6597, 58-69 (2011). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{A. Jain} and \textit{K. Pietrzak}, Lect. Notes Comput. Sci. 6597, 58--69 (2011; Zbl 1290.94093) Full Text: DOI
Kiltz, Eike; Pietrzak, Krzysztof Leakage resilient ElGamal encryption. (English) Zbl 1290.94103 Abe, Masayuki (ed.), Advances in cryptology – ASIACRYPT 2010. 16th international conference on the theory and application of cryptology and information security, Singapore, December 5–9, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17372-1/pbk). Lecture Notes in Computer Science 6477, 595-612 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{E. Kiltz} and \textit{K. Pietrzak}, Lect. Notes Comput. Sci. 6477, 595--612 (2010; Zbl 1290.94103) Full Text: DOI
Dodis, Yevgeniy; Pietrzak, Krzysztof Leakage-resilient pseudorandom functions and side-channel attacks on Feistel networks. (English) Zbl 1280.94047 Rabin, Tal (ed.), Advances in cryptology - CRYPTO 2010. 30th annual cryptology conference, Santa Barbara, CA, USA, August 15–19, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14622-0/pbk). Lecture Notes in Computer Science 6223, 21-40 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Dodis} and \textit{K. Pietrzak}, Lect. Notes Comput. Sci. 6223, 21--40 (2010; Zbl 1280.94047) Full Text: DOI
Håstad, Johan; Pass, Rafael; Wikström, Douglas; Pietrzak, Krzysztof An efficient parallel repetition theorem. (English) Zbl 1274.94075 Micciancio, Daniele (ed.), Theory of cryptography. 7th theory of cryptography conference, TCC 2010, Zurich, Switzerland, February 9–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11798-5/pbk). Lecture Notes in Computer Science 5978, 1-18 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Håstad} et al., Lect. Notes Comput. Sci. 5978, 1--18 (2010; Zbl 1274.94075) Full Text: DOI
Kiltz, Eike; Pietrzak, Krzysztof; Stam, Martijn; Yung, Moti A new randomness extraction paradigm for hybrid encryption. (English) Zbl 1239.94055 Joux, Antoine (ed.), Advances in cryptology – EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 590-609 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{E. Kiltz} et al., Lect. Notes Comput. Sci. 5479, 590--609 (2009; Zbl 1239.94055) Full Text: DOI
Pietrzak, Krzysztof A leakage-resilient mode of operation. (English) Zbl 1239.94062 Joux, Antoine (ed.), Advances in cryptology – EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 462-482 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Pietrzak}, Lect. Notes Comput. Sci. 5479, 462--482 (2009; Zbl 1239.94062) Full Text: DOI
Kiltz, Eike; Pietrzak, Krzysztof On the security of padding-based encryption schemes – or – why we cannot prove OAEP secure in the standard model. (English) Zbl 1239.94054 Joux, Antoine (ed.), Advances in cryptology – EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 389-406 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{E. Kiltz} and \textit{K. Pietrzak}, Lect. Notes Comput. Sci. 5479, 389--406 (2009; Zbl 1239.94054) Full Text: DOI
Pietrzak, Krzysztof Compression from collisions, or why CRHF combiners have a long output. (English) Zbl 1183.68277 Wagner, David (ed.), Advances in cryptology – CRYPTO 2008. 28th annual international cryptology conference, Santa Barbara, CA, USA, August 17–21, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85173-8/pbk). Lecture Notes in Computer Science 5157, 413-432 (2008). MSC: 68P30 94A60 PDFBibTeX XMLCite \textit{K. Pietrzak}, Lect. Notes Comput. Sci. 5157, 413--432 (2008; Zbl 1183.68277) Full Text: DOI
Fischlin, Marc; Lehmann, Anja; Pietrzak, Krzysztof Robust multi-property combiners for hash functions revisited. (English) Zbl 1155.94366 Aceto, Luca (ed.) et al., Automata, languages and programming. 35th international colloquium, ICALP 2008, Reykjavik, Iceland, July 7–11, 2008. Proceedings, Part II. Berlin: Springer (ISBN 978-3-540-70582-6/pbk). Lecture Notes in Computer Science 5126, 655-666 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Fischlin} et al., Lect. Notes Comput. Sci. 5126, 655--666 (2008; Zbl 1155.94366) Full Text: DOI Link
Pietrzak, Krzysztof; Sjödin, Johan Weak pseudorandom functions in Minicrypt. (English) Zbl 1155.94380 Aceto, Luca (ed.) et al., Automata, languages and programming. 35th international colloquium, ICALP 2008, Reykjavik, Iceland, July 7–11, 2008. Proceedings, Part II. Berlin: Springer (ISBN 978-3-540-70582-6/pbk). Lecture Notes in Computer Science 5126, 423-436 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Pietrzak} and \textit{J. Sjödin}, Lect. Notes Comput. Sci. 5126, 423--436 (2008; Zbl 1155.94380) Full Text: DOI Link
Dodis, Yevgeniy; Pietrzak, Krzysztof; Puniya, Prashant A new mode of operation for block ciphers and length-preserving MACs. (English) Zbl 1149.94311 Smart, Nigel (ed.), Advances in cryptology – EUROCRYPT 2008. 27th annual international conference on the theory and applications of cryptographic techniques, Istanbul, Turkey, April 13–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78966-6/pbk). Lecture Notes in Computer Science 4965, 198-219 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Dodis} et al., Lect. Notes Comput. Sci. 4965, 198--219 (2008; Zbl 1149.94311) Full Text: DOI
Maurer, Ueli; Pietrzak, Krzysztof; Renner, Renato Indistinguishability amplification. (English) Zbl 1215.94062 Menezes, Alfred (ed.), Advances in cryptology – CRYPTO 2007. 27th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-74142-8/pbk). Lecture Notes in Computer Science 4622, 130-149 (2007). MSC: 94A60 PDFBibTeX XMLCite \textit{U. Maurer} et al., Lect. Notes Comput. Sci. 4622, 130--149 (2007; Zbl 1215.94062) Full Text: DOI Link
Dodis, Yevgeniy; Pietrzak, Krzysztof Improving the security of MACs via randomized message preprocessing. (English) Zbl 1186.94434 Biryukov, Alex (ed.), Fast software encryption. 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26–28, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-74617-1/pbk). Lecture Notes in Computer Science 4593, 414-433 (2007). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{Y. Dodis} and \textit{K. Pietrzak}, Lect. Notes Comput. Sci. 4593, 414--433 (2007; Zbl 1186.94434) Full Text: DOI
Pietrzak, Krzysztof; Sjödin, Johan Range extension for weak PRFs; the good, the bad, and the ugly. (English) Zbl 1141.94370 Naor, Moni (ed.), Advances in cryptology – EUROCRYPT 2007. 26th annual international conference on the theory and applications of cryptographic techniques, Barcelona, Spain, May 20–24, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-72539-8/pbk). Lecture Notes in Computer Science 4515, 517-533 (2007). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{K. Pietrzak} and \textit{J. Sjödin}, Lect. Notes Comput. Sci. 4515, 517--533 (2007; Zbl 1141.94370) Full Text: DOI
Pietrzak, Krzysztof Non-trivial black-box combiners for collision-resistant hash-functions don’t exist. (English) Zbl 1141.94369 Naor, Moni (ed.), Advances in cryptology – EUROCRYPT 2007. 26th annual international conference on the theory and applications of cryptographic techniques, Barcelona, Spain, May 20–24, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-72539-8/pbk). Lecture Notes in Computer Science 4515, 23-33 (2007). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Pietrzak}, Lect. Notes Comput. Sci. 4515, 23--33 (2007; Zbl 1141.94369) Full Text: DOI
Pietrzak, Krzysztof; Wikström, Douglas Parallel repetition of computationally sound protocols revisited. (English) Zbl 1129.94035 Vadhan, Salil P. (ed.), Theory of cryptography. 4th theory of cryptography conference, TCC 2007, Amsterdam, The Netherlands, February 21–24, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-70935-0/pbk). Lecture Notes in Computer Science 4392, 86-102 (2007). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{K. Pietrzak} and \textit{D. Wikström}, Lect. Notes Comput. Sci. 4392, 86--102 (2007; Zbl 1129.94035) Full Text: DOI
Maurer, Ueli; Oswald, Yvonne Anne; Pietrzak, Krzysztof; Sjödin, Johan Luby-Rackoff ciphers from weak round functions? (English) Zbl 1140.94360 Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 391-408 (2006). MSC: 94A60 PDFBibTeX XMLCite \textit{U. Maurer} et al., Lect. Notes Comput. Sci. 4004, 391--408 (2006; Zbl 1140.94360) Full Text: DOI
Pietrzak, Krzysztof Composition implies adaptive security in Minicrypt. (English) Zbl 1140.94367 Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 328-338 (2006). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{K. Pietrzak}, Lect. Notes Comput. Sci. 4004, 328--338 (2006; Zbl 1140.94367) Full Text: DOI
Pietrzak, Krzysztof A tight bound for EMAC. (English) Zbl 1133.94334 Bugliesi, Michele (ed.) et al., Automata, languages and programming. 33rd international colloquium, ICALP 2006, Venice, Italy, July 10–14, 2006. Proceedings, Part II. Berlin: Springer (ISBN 978-3-540-35907-4/pbk). Lecture Notes in Computer Science 4052, 168-179 (2006). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Pietrzak}, Lect. Notes Comput. Sci. 4052, 168--179 (2006; Zbl 1133.94334) Full Text: DOI
Bellare, Mihir; Pietrzak, Krzysztof; Rogaway, Phillip Improved security analyses for CBC MACs. (English) Zbl 1145.94432 Shoup, Victor (ed.), Advances in cryptology – CRYPTO 2005. 25th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28114-2/pbk). Lecture Notes in Computer Science 3621, 527-545 (2005). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Bellare} et al., Lect. Notes Comput. Sci. 3621, 527--545 (2005; Zbl 1145.94432) Full Text: DOI
Dodis, Yevgeniy; Oliveira, Roberto; Pietrzak, Krzysztof On the generic insecurity of the full domain hash. (English) Zbl 1145.94440 Shoup, Victor (ed.), Advances in cryptology – CRYPTO 2005. 25th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28114-2/pbk). Lecture Notes in Computer Science 3621, 449-466 (2005). MSC: 94A60 68P25 94A62 PDFBibTeX XMLCite \textit{Y. Dodis} et al., Lect. Notes Comput. Sci. 3621, 449--466 (2005; Zbl 1145.94440) Full Text: DOI
Pietrzak, Krzysztof Composition does not imply adaptive security. (English) Zbl 1143.94352 Shoup, Victor (ed.), Advances in cryptology – CRYPTO 2005. 25th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28114-2/pbk). Lecture Notes in Computer Science 3621, 55-65 (2005). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Pietrzak}, Lect. Notes Comput. Sci. 3621, 55--65 (2005; Zbl 1143.94352) Full Text: DOI
Maurer, Ueli; Pietrzak, Krzysztof Composition of random systems: When two weak make one strong. (English) Zbl 1197.94195 Naor, Moni (ed.), Theory of cryptography. First theory of cryptography conference, TCC 2004, Cambridge, MA, USA, February 19–21, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21000-8/pbk). Lecture Notes in Computer Science 2951, 410-427 (2004). MSC: 94A60 60C05 PDFBibTeX XMLCite \textit{U. Maurer} and \textit{K. Pietrzak}, Lect. Notes Comput. Sci. 2951, 410--427 (2004; Zbl 1197.94195) Full Text: DOI
Maurer, Ueli; Pietrzak, Krzysztof The security of many-round Luby-Rackoff pseudo-random permutations. (English) Zbl 1038.94542 Biham, Eli (ed.), Advances in cryptology – EUROCRYPT 2003. International conference on the theory and applications of cryptographic techniques, Warsaw, Poland, May 4–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-14039-5/pbk). Lect. Notes Comput. Sci. 2656, 544-561 (2003). MSC: 94A60 68Q25 65C10 PDFBibTeX XMLCite \textit{U. Maurer} and \textit{K. Pietrzak}, Lect. Notes Comput. Sci. 2656, 544--561 (2003; Zbl 1038.94542) Full Text: Link