Krzysztof Pietrzak
Orcid: 0000-0002-9139-1654
According to our database1,
Krzysztof Pietrzak
authored at least 116 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proc. Priv. Enhancing Technol., 2024
Watermarkable and Zero-Knowledge Verifiable Delay Functions from any Proof of Exponentiation.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
The Cost of Maintaining Keys in Dynamic Groups with Applications to Multicast Encryption and Group Messaging.
IACR Cryptol. ePrint Arch., 2024
2023
Random Oracle Combiners: Breaking the Concatenation Barrier for Collision-Resistance.
IACR Cryptol. ePrint Arch., 2023
On the Cost of Post-Compromise Security in Concurrent Continuous Group-Key Agreement.
IACR Cryptol. ePrint Arch., 2023
2022
IACR Cryptol. ePrint Arch., 2022
Coffee: Fast Healing Concurrent Continuous Group Key Agreement for Decentralized Group Messaging.
IACR Cryptol. ePrint Arch., 2022
Wiser: Increasing Throughput in Payment Channel Networks with Transaction Aggregation.
Proceedings of the 4th ACM Conference on Advances in Financial Technologies, 2022
2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Theory of Cryptography - 19th International Conference, 2021
Keep the Dirt: Tainted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the IFIP Networking Conference, 2021
2020
Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact Tracing.
IACR Cryptol. ePrint Arch., 2020
2019
IACR Cryptol. ePrint Arch., 2019
Keep the Dirt: Tainted TreeKEM, an Efficient and Provably Secure Continuous Group Key Agreement Protocol.
IACR Cryptol. ePrint Arch., 2019
Electron. Colloquium Comput. Complex., 2019
2018
2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 44th International Colloquium on Automata, Languages, and Programming, 2017
2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Comput. Complex., 2016
Standard Security Does Imply Security Against Selective Opening for Markov Distributions.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016
2015
IACR Cryptol. ePrint Arch., 2015
New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Standard Security Does Imply Security Against Selective Opening for Markov Distributions.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
2014
Efficient Zero-Knowledge Proofs for Commitments from Learning With Errors over Rings.
IACR Cryptol. ePrint Arch., 2014
2013
IACR Cryptol. ePrint Arch., 2013
A Counterexample to the Chain Rule for Conditional HILL Entropy - And What Deniable Encryption Has to Do with It.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013
Digital Signatures with Minimal Overhead from Indifferentiable Random Invertible Functions.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012
Proceedings of the SOFSEM 2012: Theory and Practice of Computer Science, 2012
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012
2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011
2010
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010
Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks.
Proceedings of the Advances in Cryptology, 2010
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010
2009
Proceedings of the Advances in Cryptology, 2009
On the Security of Padding-Based Encryption Schemes - or - Why We Cannot Prove OAEP Secure in the Standard Model.
Proceedings of the Advances in Cryptology, 2009
2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008
Proceedings of the 49th Annual IEEE Symposium on Foundations of Computer Science, 2008
Proceedings of the Advances in Cryptology, 2008
Proceedings of the Advances in Cryptology, 2008
2007
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007
Proceedings of the Advances in Cryptology, 2007
2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Theory of Cryptography, Third Theory of Cryptography Conference, 2006
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006
2005
Proceedings of the Advances in Cryptology, 2005
Proceedings of the Advances in Cryptology, 2005
Proceedings of the Advances in Cryptology, 2005
2004
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004
2003
On the parameterized complexity of the fixed alphabet shortest common supersequence and longest common subsequence problems.
J. Comput. Syst. Sci., 2003
Proceedings of the Advances in Cryptology, 2003