Stanislaw Jarecki

Orcid: 0000-0002-5055-2407

Affiliations:
  • University of California, Irvine, USA


According to our database1, Stanislaw Jarecki authored at least 90 papers between 1994 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Special Issue on 13th International Conference on Security and Cryptography for Networks (SCN 2022).
Inf. Comput., January, 2024

Curl: Private LLMs through Wavelet-Encoded Look-Up Tables.
IACR Cryptol. ePrint Arch., 2024

Threshold PAKE with Security against Compromise of all Servers.
IACR Cryptol. ePrint Arch., 2024

Password-Protected Threshold Signatures.
IACR Cryptol. ePrint Arch., 2024

Bare PAKE: Universally Composable Key Exchange from just Passwords.
IACR Cryptol. ePrint Arch., 2024

C'est très CHIC: A compact password-authenticated key exchange from lattice-based KEM.
IACR Cryptol. ePrint Arch., 2024

<i>P</i>sfIVA: Privacy-Preserving Identity Verification Methods for Accountless Users via Private List Intersection and Variants.
Proceedings of the Computer Security - ESORICS 2024, 2024

2023
Evaluation of Arithmetic Sum-of-Products Expressions in Linear Secret Sharing Schemes with a Non-Interactive Computation Phase.
IACR Cryptol. ePrint Arch., 2023

Randomized Half-Ideal Cipher on Groups with applications to UC (a)PAKE.
IACR Cryptol. ePrint Arch., 2023

Password-Authenticated TLS via OPAQUE and Post-Handshake Authentication.
IACR Cryptol. ePrint Arch., 2023

Short Concurrent Covert Authenticated Key Exchange (Short cAKE).
IACR Cryptol. ePrint Arch., 2023

Short Concurrent Covert Authenticated Key Exchange (Short cAKE).
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Asymmetric PAKE with Low Computation and communication.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

2021
Two-factor Password-authenticated Key Exchange with End-to-end Security.
ACM Trans. Priv. Secur., 2021

On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding.
IACR Cryptol. ePrint Arch., 2021

KHAPE: Asymmetric PAKE from Key-Hiding Key Exchange.
IACR Cryptol. ePrint Arch., 2021

A hidden-password online password manager.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

2020
On Pseudorandom Encodings.
IACR Cryptol. ePrint Arch., 2020

Universally Composable Relaxed Password Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2020

2019
Building and Studying a Password Store that Perfectly Hides Passwords from Itself.
IEEE Trans. Dependable Secur. Comput., 2019

Updatable Oblivious Key Management for Storage Systems.
IACR Cryptol. ePrint Arch., 2019

Strong Asymmetric PAKE based on Trapdoor CKEM.
IACR Cryptol. ePrint Arch., 2019

Password-Authenticated Public-Key Encryption.
IACR Cryptol. ePrint Arch., 2019

2018
SPHINX: A Password Store that Perfectly Hides Passwords from Itself.
IACR Cryptol. ePrint Arch., 2018

3PC ORAM with Low Latency, Low Bandwidth, and Fast Batch Retrieval.
IACR Cryptol. ePrint Arch., 2018

OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-Computation Attacks.
IACR Cryptol. ePrint Arch., 2018

Two-Factor Authentication with End-to-End Password Security.
IACR Cryptol. ePrint Arch., 2018

Threshold Partially-Oblivious PRFs with Applications to Key Management.
IACR Cryptol. ePrint Arch., 2018

Round-Reduced Modular Construction of Asymmetric Password-Authenticated Key Exchange.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

2017
TOPPSS: Cost-minimal Password-Protected Secret Sharing based on Threshold OPRF.
IACR Cryptol. ePrint Arch., 2017

2016
Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online).
IACR Cryptol. ePrint Arch., 2016

Efficient Covert Two-Party Computation.
IACR Cryptol. ePrint Arch., 2016

Efficient Concurrent Covert Computation of String Equality and Set Intersection.
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016

2015
Device-Enhanced Password Protocols with Optimal Online-Offline Protection.
IACR Cryptol. ePrint Arch., 2015

Rich Queries on Encrypted Data: Beyond Exact Matches.
IACR Cryptol. ePrint Arch., 2015

Three-Party ORAM for Secure Computation.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model.
IACR Cryptol. ePrint Arch., 2014

Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation.
IACR Cryptol. ePrint Arch., 2014

Practical Covert Authentication.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

Two-Factor Authentication Resilient to Server Compromise Using Mix-Bandwidth Devices.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

2013
Outsourced Symmetric Private Information Retrieval.
IACR Cryptol. ePrint Arch., 2013

Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries.
IACR Cryptol. ePrint Arch., 2013

2012
Multi-Party Privacy-Preserving Set Intersection with Quasi-Linear Complexity.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

2011
Flexible Robust Group Key Agreement.
IEEE Trans. Parallel Distributed Syst., 2011

Fast Exponentiation Using Split Exponents.
IEEE Trans. Inf. Theory, 2011

2010
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol.
IEEE Trans. Inf. Forensics Secur., 2010

Password-Protected Secret Sharing.
IACR Cryptol. ePrint Arch., 2010

Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model.
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010

Fast Secure Computation of Set Intersection.
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010

Identity-Based Aggregate and Multi-Signature Schemes Based on RSA.
Proceedings of the Public Key Cryptography, 2010

2009
Robust and efficient incentives for cooperative content distribution.
IEEE/ACM Trans. Netw., 2009

Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection.
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009

Privacy-Preserving Policy-Based Information Transfer.
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009

Private Mutual Authentication and Conditional Oblivious Transfer.
Proceedings of the Advances in Cryptology, 2009

2008
Multisignatures Using Proofs of Secret Key Possession, as Secure as the Diffie-Hellman Problem.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008

Affiliation-Hiding Envelope and Authentication Schemes with Efficient Support for Multiple Credentials.
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008

Proactive RSA with Non-interactive Signing.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange.
Proceedings of the Topics in Cryptology, 2008

Multisignatures secure under the discrete logarithm assumption and a generalized forking lemma.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
Efficient Signature Schemes with Tight Reductions to the Diffie-Hellman Problems.
J. Cryptol., 2007

Robust and Efficient Sharing of RSA Functions.
J. Cryptol., 2007

Secure Distributed Key Generation for Discrete-Log Based Cryptosystems.
J. Cryptol., 2007

Dandelion: Cooperative Content Distribution with Robust Incentives.
Proceedings of the 2007 USENIX Annual Technical Conference, 2007

Efficient Two-Party Secure Computation on Committed Inputs.
Proceedings of the Advances in Cryptology, 2007

Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement.
Proceedings of the Topics in Cryptology, 2007

Robust group key agreement using short broadcasts.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

2006
Secure acknowledgment aggregation and multisignatures with limited robustness.
Comput. Networks, 2006

Authentication for Paranoids: Multi-party Secret Handshakes.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
Further Simplifications in Proactive RSA Signatures.
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005

Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure.
Proceedings of the Financial Cryptography and Data Security, 2005

2004
Optimal Signcryption from Any Trapdoor Permutation.
IACR Cryptol. ePrint Arch., 2004

Secret Handshakes from CA-Oblivious Encryption.
IACR Cryptol. ePrint Arch., 2004

A Robust Multisignatures Scheme with Applications to Acknowledgment Aggregation.
Proceedings of the Security in Communication Networks, 4th International Conference, 2004

An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol.
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, 2004

Brief announcement: secret handshakes from CA-oblivious encryption.
Proceedings of the Twenty-Third Annual ACM Symposium on Principles of Distributed Computing, 2004

Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme.
Proceedings of the Advances in Cryptology, 2004

Versatile padding schemes for joint signature and encryption.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004

2003
A Signature Scheme as Secure as the Diffie-Hellman Problem.
Proceedings of the Advances in Cryptology, 2003

Secure Applications of Pedersen's Distributed Key Generation Protocol.
Proceedings of the Topics in Cryptology, 2003

2002
Negotiated Privacy: (Extended Abstract).
Proceedings of the Software Security -- Theories and Systems, 2002

Cryptographic Primitives Enforcing Communication and Storage Complexity.
Proceedings of the Financial Cryptography, 6th International Conference, 2002

2001
Efficient threshold cryptosystems.
PhD thesis, 2001

Robust Threshold DSS Signatures.
Inf. Comput., 2001

2000
Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures.
Proceedings of the Advances in Cryptology, 2000

1999
Adaptive Security for Threshold Cryptosystems.
Proceedings of the Advances in Cryptology, 1999

1997
An Efficient Micropayment System Based on Probabilistic Polling.
Proceedings of the Financial Cryptography, 1997

Proactive Public Key and Signature Systems.
Proceedings of the CCS '97, 1997

1995
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage.
Proceedings of the Advances in Cryptology, 1995

1994
NL Understanding with a Grammar of Constructions.
Proceedings of the 15th International Conference on Computational Linguistics, 1994


  Loading...