Lukasz Krzywiecki
Orcid: 0000-0002-5326-3627
According to our database1,
Lukasz Krzywiecki
authored at least 58 papers
between 2005 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Enhancing Tunnel Safety for Dangerous Goods Vehicles through Blockchain-Based Time-Stamping.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the Information Security Practice and Experience, 2023
Proceedings of the Information Security Practice and Experience, 2023
2022
Short Signatures via Multiple Hardware Security Modules with Key Splitting in Circuit Breaking Environments.
Proceedings of the IEEE International Conference on Trust, 2022
How to Design Authenticated Key Exchange for Wearable Devices: Cryptanalysis of AKE for Health Monitoring and Countermeasures via Distinct SMs with Key Split and Refresh.
Proceedings of the Cryptology and Network Security - 21st International Conference, 2022
2021
Cryptanalysis of Deterministic and Probabilistic Multi-Copy PDP Schemes For Cloud Storage - Attacks and Countermeasures.
Proceedings of the 20th IEEE International Conference on Trust, 2021
Certificateless Multi-Party Authenticated Encryption Mitigating Ephemeral Key Leakage.
Proceedings of the 20th IEEE International Symposium on Network Computing and Applications, 2021
Proceedings of the 20th IEEE International Symposium on Network Computing and Applications, 2021
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021
2020
Schnorr-like identification scheme resistant to malicious subliminal setting of ephemeral secret.
Comput. Networks, 2020
Proxy Signcryption Scheme for Vehicle Infrastructure Immune to Randomness Leakage and Setup Attacks.
Proceedings of the 19th IEEE International Symposium on Network Computing and Applications, 2020
2019
IACR Cryptol. ePrint Arch., 2019
Signature Based Authentication for Ephemeral Setup Attacks in Vehicular Sensor Networks.
Proceedings of the 18th IEEE International Symposium on Network Computing and Applications, 2019
Proceedings of the Information Security Practice and Experience, 2019
Identity-based Conditional Privacy-Preserving Authentication Scheme Resistant to Malicious Subliminal Setting of Ephemeral Secret.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019
Anonymous Deniable Identification in Ephemeral Setup and Leakage Scenarios (Brief Announcement).
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019
2018
2017
Secur. Commun. Networks, 2017
Strongly Deniable Identification Schemes Immune to Prover's and Verifier's Ephemeral Leakage.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2017
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017
Security of Okamoto Identification Scheme: a Defense against Ephemeral Key Leakage and Setup.
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017
2016
Wirel. Networks, 2016
Schnorr-Like Identification Scheme Resistant to Malicious Subliminal Setting of Ephemeral Secret.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2016
RFID Tags Batch Authentication Revisited - Communication Overhead and Server Computational Complexity Limits.
Proceedings of the Information Security Practice and Experience, 2016
Proceedings of the Data Mining and Big Data, First International Conference, 2016
2015
Hierarchical Ring Signatures Revisited - Unconditionally and Perfectly Anonymous Schnorr Version.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015
2014
Probabilistic Admissible Encoding on Elliptic Curves - Towards PACE with Generalized Integrated Mapping.
Proceedings of the SOFSEM 2014: Theory and Practice of Computer Science, 2014
Proceedings of the Provable Security - 8th International Conference, 2014
Forbidden City Model - Towards a Practice Relevant Framework for Designing Cryptographic Protocols.
Proceedings of the Information Security Practice and Experience, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Certificating Vehicle Public Key with Vehicle Attributes A (periodical) Licensing Routine, Against Man-in-the-Middle Attacks and Beyond.
Proceedings of the SAFECOMP 2013, 2013
Proceedings of the Information Security Practice and Experience, 2013
Proceedings of the Public Key Infrastructures, Services and Applications, 2013
2012
Proceedings of the Network and System Security - 6th International Conference, 2012
Proceedings of the Trusted Systems, 4th International Conference, 2012
Proceedings of the Business Information Systems - 15th International Conference, 2012
2011
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011
Proceedings of the Trusted Systems - Third International Conference, 2011
Technical and Legal Meaning of "Sole Control" - Towards Verifiability in Signing Systems.
Proceedings of the Business Information Systems Workshops, 2011
2010
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
2009
2008
IET Inf. Secur., 2008
Proceedings of the Mathematical Foundations of Computer Science 2008, 2008
2007
Proceedings of the Approximation, 2007
2006
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006
2005
Proceedings of the Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, 2005