Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
117 Publications
2021 | Thesis | IST-REx-ID: 10035 |

K. Klein, “On the adaptive security of graph-based games,” Institute of Science and Technology Austria, 2021.
View
| Files available
| DOI
2020 | Conference Paper | IST-REx-ID: 8322 |

S. Chakraborty, S. Dziembowski, and J. B. Nielsen, “Reverse firewalls for actively secure MPCs,” in Advances in Cryptology – CRYPTO 2020, Santa Barbara, CA, United States, 2020, vol. 12171, pp. 732–762.
View
| DOI
| Download Preprint (ext.)
2020 | Conference Paper | IST-REx-ID: 8339 |

N. Genise, D. Micciancio, C. Peikert, and M. Walter, “Improved discrete Gaussian and subgaussian analysis for lattice cryptography,” in 23rd IACR International Conference on the Practice and Theory of Public-Key Cryptography, Edinburgh, United Kingdom, 2020, vol. 12110, pp. 623–651.
View
| DOI
| Download Preprint (ext.)
2020 | Conference Paper | IST-REx-ID: 8987 |

K. Z. Pietrzak, “Delayed authentication: Preventing replay and relay attacks in private contact tracing,” in Progress in Cryptology, Bangalore, India, 2020, vol. 12578, pp. 3–15.
View
| DOI
| Download Preprint (ext.)
| WoS
2020 | Conference Paper | IST-REx-ID: 7966 |

B. Auerbach, F. Giacon, and E. Kiltz, “Everybody’s a target: Scalability in public-key encryption,” in Advances in Cryptology – EUROCRYPT 2020, 2020, vol. 12107, pp. 475–506.
View
| DOI
| Download Submitted Version (ext.)
| WoS
2020 | Thesis | IST-REx-ID: 7896 |

C. Kamath Hosdurg, “On the average-case hardness of total search problems,” Institute of Science and Technology Austria, 2020.
View
| Files available
| DOI
2019 | Journal Article | IST-REx-ID: 5887 |

G. Demay, P. Gazi, U. Maurer, and B. Tackmann, “Per-session security: Password-based cryptography revisited,” Journal of Computer Security, vol. 27, no. 1. IOS Press, pp. 75–111, 2019.
View
| DOI
| Download Preprint (ext.)
2019 | Conference Paper | IST-REx-ID: 6528 |

K. Z. Pietrzak, “Simple verifiable delay functions,” in 10th Innovations in Theoretical Computer Science Conference, San Diego, CA, United States, 2019, vol. 124.
View
| Files available
| DOI
| Download Published Version (ext.)
2019 | Book Chapter | IST-REx-ID: 6726 |

M. Walter, “Sampling the integers with low relative error,” in Progress in Cryptology – AFRICACRYPT 2019, vol. 11627, J. Buchmann, A. Nitaj, and T. Rachidi, Eds. Cham: Springer Nature, 2019, pp. 157–180.
View
| DOI
| Download Preprint (ext.)
2019 | Conference Paper | IST-REx-ID: 7136 |

M. Skórski, “Strong chain rules for min-entropy under few bits spoiled,” in 2019 IEEE International Symposium on Information Theory, Paris, France, 2019.
View
| DOI
| Download Preprint (ext.)
| WoS
| arXiv