Maciej Skorski
Orcid: 0000-0003-2997-7539
According to our database1,
Maciej Skorski
authored at least 83 papers
between 2013 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Quantifying Jitter Transfer for Differential Measurement: Enhancing Security of Oscillator-Based TRNGs.
CoRR, 2024
Mapping the Technological Future: A Topic, Sentiment, and Emotion Analysis in Social Media Discourse.
CoRR, 2024
2023
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
2022
The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free.
IEEE Trans. Inf. Theory, 2022
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2022
Proceedings of the 33rd International Symposium on Algorithms and Computation, 2022
Proceedings of the Approximation, 2022
2021
Proceedings of the IEEE International Symposium on Information Theory, 2021
Proceedings of the Fundamentals of Computation Theory - 23rd International Symposium, 2021
Proceedings of the Conference on Learning Theory, 2021
Proceedings of the Computing and Combinatorics - 27th International Conference, 2021
Proceedings of the 55th Annual Conference on Information Sciences and Systems, 2021
Proceedings of the Asian Conference on Machine Learning, 2021
2020
CoRR, 2020
Proceedings of the IEEE International Symposium on Information Theory, 2020
2019
IACR Cryptol. ePrint Arch., 2019
CoRR, 2019
Proceedings of the SOFSEM 2019: Theory and Practice of Computer Science, 2019
Proceedings of the IEEE International Symposium on Information Theory, 2019
Proceedings of the 8th International Conference on Data Science, 2019
2018
Evaluation and Monitoring of Free Running Oscillators Serving as Source of Randomness.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018
IACR Cryptol. ePrint Arch., 2018
2017
A Cryptographic View of Regularity Lemmas: Simpler Unified Proofs and Refined Bounds.
Proceedings of the Theory and Applications of Models of Computation, 2017
Proceedings of the 34th Symposium on Theoretical Aspects of Computer Science, 2017
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017
Proceedings of the 44th International Colloquium on Automata, Languages, and Programming, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Improved Estimation of Collision Entropy in High and Low-Entropy Regimes and Applications to Anomaly Detection.
IACR Cryptol. ePrint Arch., 2016
A Subgradient Algorithm For Computational Distances and Applications to Cryptography.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Information Security Applications - 17th International Workshop, 2016
Proceedings of the Theory of Cryptography - 13th International Conference, 2016
Proceedings of the SOFSEM 2016: Theory and Practice of Computer Science, 2016
Proceedings of the Information Theoretic Security - 9th International Conference, 2016
Evaluating Entropy for True Random Number Generators: Efficient, Robust and Provably Secure.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016
Proceedings of the Applications and Techniques in Information Security, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications to Pseudoentropy.
IACR Cryptol. ePrint Arch., 2015
CoRR, 2015
Lower bounds on $q$-wise independence tails and applications to min-entropy condensers.
CoRR, 2015
Simulating Side Information: Better Provable Security for Leakage Resilient Stream Ciphers.
CoRR, 2015
Proceedings of Student Research Forum Papers and Posters at SOFSEM 2015, 2015
Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs with Applications to Pseudoentropy.
Proceedings of Student Research Forum Papers and Posters at SOFSEM 2015, 2015
Proceedings of the Provable Security, 2015
Proceedings of the Algorithms and Computation - 26th International Symposium, 2015
Proceedings of the Progress in Cryptology - INDOCRYPT 2015, 2015
Proceedings of the Cryptography and Coding - 15th IMA International Conference, 2015
Proceedings of the Information Theoretic Security - 8th International Conference, 2015
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015
Privacy and secrecy with multiple measurements of physical and biometric identifiers.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
Proceedings of the Cryptography and Information Security in the Balkans, 2015
2014
IACR Cryptol. ePrint Arch., 2014
True Random Number Generators Secure in a Changing Environment: Improved Security Bounds.
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 2014 Imperial College Computing Student Workshop, 2014
2013
Proceedings of the Information Theoretic Security - 7th International Conference, 2013