Stanislaw Jarecki
Orcid: 0000-0002-5055-2407Affiliations:
- University of California, Irvine, USA
According to our database1,
Stanislaw Jarecki
authored at least 90 papers
between 1994 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Special Issue on 13th International Conference on Security and Cryptography for Networks (SCN 2022).
Inf. Comput., January, 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
C'est très CHIC: A compact password-authenticated key exchange from lattice-based KEM.
IACR Cryptol. ePrint Arch., 2024
<i>P</i>sfIVA: Privacy-Preserving Identity Verification Methods for Accountless Users via Private List Intersection and Variants.
Proceedings of the Computer Security - ESORICS 2024, 2024
2023
Evaluation of Arithmetic Sum-of-Products Expressions in Linear Secret Sharing Schemes with a Non-Interactive Computation Phase.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023
2022
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
2021
ACM Trans. Priv. Secur., 2021
On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
2020
IACR Cryptol. ePrint Arch., 2020
2019
IEEE Trans. Dependable Secur. Comput., 2019
IACR Cryptol. ePrint Arch., 2019
2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Round-Reduced Modular Construction of Asymmetric Password-Authenticated Key Exchange.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018
2017
IACR Cryptol. ePrint Arch., 2017
2016
Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online).
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015
2014
Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model.
IACR Cryptol. ePrint Arch., 2014
Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Public-Key Cryptography - PKC 2014, 2014
Two-Factor Authentication Resilient to Server Compromise Using Mix-Bandwidth Devices.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
2013
IACR Cryptol. ePrint Arch., 2013
2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
2011
2010
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol.
IEEE Trans. Inf. Forensics Secur., 2010
Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model.
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010
Proceedings of the Public Key Cryptography, 2010
2009
IEEE/ACM Trans. Netw., 2009
Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection.
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009
Proceedings of the Advances in Cryptology, 2009
2008
Multisignatures Using Proofs of Secret Key Possession, as Secure as the Diffie-Hellman Problem.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008
Affiliation-Hiding Envelope and Authentication Schemes with Efficient Support for Multiple Credentials.
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008
Proceedings of the Topics in Cryptology, 2008
Multisignatures secure under the discrete logarithm assumption and a generalized forking lemma.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
2007
J. Cryptol., 2007
J. Cryptol., 2007
Proceedings of the 2007 USENIX Annual Technical Conference, 2007
Proceedings of the Advances in Cryptology, 2007
Proceedings of the Topics in Cryptology, 2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
2006
Comput. Networks, 2006
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006
2005
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005
Proceedings of the Financial Cryptography and Data Security, 2005
2004
Proceedings of the Security in Communication Networks, 4th International Conference, 2004
An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol.
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, 2004
Proceedings of the Twenty-Third Annual ACM Symposium on Principles of Distributed Computing, 2004
Proceedings of the Advances in Cryptology, 2004
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004
2003
Proceedings of the Advances in Cryptology, 2003
Proceedings of the Topics in Cryptology, 2003
2002
Proceedings of the Software Security -- Theories and Systems, 2002
Proceedings of the Financial Cryptography, 6th International Conference, 2002
2001
2000
Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures.
Proceedings of the Advances in Cryptology, 2000
1999
Proceedings of the Advances in Cryptology, 1999
1997
Proceedings of the Financial Cryptography, 1997
1995
Proceedings of the Advances in Cryptology, 1995
1994
Proceedings of the 15th International Conference on Computational Linguistics, 1994