Kamil Kluczniak
Orcid: 0000-0002-0553-033X
According to our database1,
Kamil Kluczniak
authored at least 43 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
IACR Cryptol. ePrint Arch., 2024
2023
FDFB: Full Domain Functional Bootstrapping Towards Practical Fully Homomorphic Encryption.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Financial Cryptography and Data Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
IACR Cryptol. ePrint Arch., 2021
2020
Witness Encryption from Garbled Circuit and Multikey Fully Homomorphic Encryption Techniques.
IACR Cryptol. ePrint Arch., 2020
2019
IACR Cryptol. ePrint Arch., 2019
Fundam. Informaticae, 2019
Proceedings of the Information Security Practice and Experience, 2019
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019
2018
IACR Cryptol. ePrint Arch., 2018
Fine-Tuning Decentralized Anonymous Payment Systems based on Arguments for Arithmetic Circuit Satisfiability.
IACR Cryptol. ePrint Arch., 2018
Signatures with Flexible Public Key: A Unified Approach to Privacy-Preserving Signatures (Full Version).
IACR Cryptol. ePrint Arch., 2018
Signatures with Flexible Public Key: Introducing Equivalence Classes for Public Keys.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018
2017
TrDup: enhancing secure data deduplication with user traceability in cloud computing.
Int. J. Web Grid Serv., 2017
Proceedings of the 4th ACM International Workshop on ASIA Public-Key Cryptography, 2017
2016
Security Analysis of ePrint Report 2016/500 "Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups".
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Computations on Private Sets and their Application to Biometric based Authentication Systems.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016
Proceedings of the Information Security Practice and Experience, 2016
Proceedings of the Financial Cryptography and Data Security, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015
Proceedings of the Network and System Security - 9th International Conference, 2015
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015
2014
Proceedings of the SOFSEM 2014: Theory and Practice of Computer Science, 2014
Forbidden City Model - Towards a Practice Relevant Framework for Designing Cryptographic Protocols.
Proceedings of the Information Security Practice and Experience, 2014
Attack on U-Prove Revocation Scheme from FC'13 - Passing Verification by Revoked Users.
Proceedings of the Financial Cryptography and Data Security, 2014
Proceedings of the Financial Cryptography and Data Security, 2014
2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the Public Key Infrastructures, Services and Applications, 2013
2012
Proceedings of the 11th IEEE International Conference on Trust, 2012