Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
129 Publications
2015 |Published| Conference Paper | IST-REx-ID: 1671 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
The exact PRF security of truncation: Tight bounds for keyed sponges and truncated CBC
P. Gazi, K.Z. Pietrzak, S. Tessaro, in:, Springer, 2015, pp. 368–387.
[Submitted Version]
View
| Files available
| DOI
P. Gazi, K.Z. Pietrzak, S. Tessaro, in:, Springer, 2015, pp. 368–387.
2015 |Published| Conference Paper | IST-REx-ID: 1668 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Relaxing full-codebook security: A refined analysis of key-length extension schemes
P. Gazi, J. Lee, Y. Seurin, J. Steinberger, S. Tessaro, 9054 (2015) 319–341.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
P. Gazi, J. Lee, Y. Seurin, J. Steinberger, S. Tessaro, 9054 (2015) 319–341.
2015 |Published| Conference Paper | IST-REx-ID: 1675 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Proofs of space
S. Dziembowski, S. Faust, V. Kolmogorov, K.Z. Pietrzak, in:, 35th Annual Cryptology Conference, Springer, 2015, pp. 585–605.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
S. Dziembowski, S. Faust, V. Kolmogorov, K.Z. Pietrzak, in:, 35th Annual Cryptology Conference, Springer, 2015, pp. 585–605.
2014 |Published| Conference Paper | IST-REx-ID: 1643 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Constrained Verifiable Random Functions
G. Fuchsbauer, in:, M. Abdalla, R. De Prisco (Eds.), SCN 2014, Springer, 2014, pp. 95–114.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
G. Fuchsbauer, in:, M. Abdalla, R. De Prisco (Eds.), SCN 2014, Springer, 2014, pp. 95–114.
2014 |Published| Conference Paper | IST-REx-ID: 1907 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Optimality of non-adaptive strategies: The case of parallel games
G. Demay, P. Gazi, U. Maurer, B. Tackmann, in:, IEEE International Symposium on Information Theory, IEEE, 2014.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
G. Demay, P. Gazi, U. Maurer, B. Tackmann, in:, IEEE International Symposium on Information Theory, IEEE, 2014.
2014 |Published| Conference Paper | IST-REx-ID: 2045 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Enhanced chosen-ciphertext security and applications
D. Dachman Soled, G. Fuchsbauer, P. Mohassel, A. O’Neill, in:, H. Krawczyk (Ed.), Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer, 2014, pp. 329–344.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
D. Dachman Soled, G. Fuchsbauer, P. Mohassel, A. O’Neill, in:, H. Krawczyk (Ed.), Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer, 2014, pp. 329–344.
2014 |Published| Conference Paper | IST-REx-ID: 2047 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Differentially-private logistic regression for detecting multiple-SNP association in GWAS databases
F. Yu, M. Rybar, C. Uhler, S. Fienberg, in:, J. Domingo Ferrer (Ed.), Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer, 2014, pp. 170–184.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
| arXiv
F. Yu, M. Rybar, C. Uhler, S. Fienberg, in:, J. Domingo Ferrer (Ed.), Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer, 2014, pp. 170–184.
2014 |Published| Conference Paper | IST-REx-ID: 2046 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Policy-based signatures
M. Bellare, G. Fuchsbauer, in:, H. Krawczyk (Ed.), Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer, 2014, pp. 520–537.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
M. Bellare, G. Fuchsbauer, in:, H. Krawczyk (Ed.), Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer, 2014, pp. 520–537.
2014 |Published| Conference Paper | IST-REx-ID: 2185 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Key derivation without entropy waste
Y. Dodis, K.Z. Pietrzak, D. Wichs, in:, P. Nguyen, E. Oswald (Eds.), Springer, 2014, pp. 93–110.
[Submitted Version]
View
| Files available
| DOI
Y. Dodis, K.Z. Pietrzak, D. Wichs, in:, P. Nguyen, E. Oswald (Eds.), Springer, 2014, pp. 93–110.
2014 |Published| Conference Paper | IST-REx-ID: 2219 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Simple chosen-ciphertext security from low noise LPN
E. Kiltz, D. Masny, K.Z. Pietrzak, in:, Springer, 2014, pp. 1–18.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
E. Kiltz, D. Masny, K.Z. Pietrzak, in:, Springer, 2014, pp. 1–18.
2014 |Published| Conference Paper | IST-REx-ID: 2236 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
How to fake auxiliary input
D. Jetchev, K.Z. Pietrzak, in:, Y. Lindell (Ed.), Springer, 2014, pp. 566–590.
[Submitted Version]
View
| Files available
| DOI
| Download Submitted Version (ext.)
D. Jetchev, K.Z. Pietrzak, in:, Y. Lindell (Ed.), Springer, 2014, pp. 566–590.
2014 |Published| Journal Article | IST-REx-ID: 2852
Robust multi-property combiners for hash functions
M. Fischlin, A. Lehmann, K.Z. Pietrzak, Journal of Cryptology 27 (2014) 397–428.
View
| Files available
| DOI
M. Fischlin, A. Lehmann, K.Z. Pietrzak, Journal of Cryptology 27 (2014) 397–428.
2014 |Published| Conference Paper | IST-REx-ID: 2082 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
The exact PRF-security of NMAC and HMAC
P. Gazi, K.Z. Pietrzak, M. Rybar, in:, J. Garay, R. Gennaro (Eds.), Springer, 2014, pp. 113–130.
[Submitted Version]
View
| Files available
| DOI
P. Gazi, K.Z. Pietrzak, M. Rybar, in:, J. Garay, R. Gennaro (Eds.), Springer, 2014, pp. 113–130.
2013 |Published| Conference Paper | IST-REx-ID: 2259 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Learning with rounding, revisited: New reduction properties and applications
J.F. Alwen, S. Krenn, K.Z. Pietrzak, D. Wichs, 8042 (2013) 57–74.
[Published Version]
View
| Files available
| DOI
J.F. Alwen, S. Krenn, K.Z. Pietrzak, D. Wichs, 8042 (2013) 57–74.
2013 |Published| Conference Paper | IST-REx-ID: 2258 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Digital signatures with minimal overhead from indifferentiable random invertible functions
E. Kiltz, K.Z. Pietrzak, M. Szegedy, 8042 (2013) 571–588.
[Submitted Version]
View
| Files available
| DOI
E. Kiltz, K.Z. Pietrzak, M. Szegedy, 8042 (2013) 571–588.
2013 |Published| Conference Paper | IST-REx-ID: 2260 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Efficient signatures of knowledge and DAA in the standard model
D. Bernhard, G. Fuchsbauer, E. Ghadafi, 7954 (2013) 518–533.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
D. Bernhard, G. Fuchsbauer, E. Ghadafi, 7954 (2013) 518–533.
2013 |Published| Conference Paper | IST-REx-ID: 2291 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Cryptographically enforced RBAC
A. Ferrara, G. Fuchsbauer, B. Warinschi, in:, IEEE, 2013, pp. 115–129.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
A. Ferrara, G. Fuchsbauer, B. Warinschi, in:, IEEE, 2013, pp. 115–129.
2013 |Published| Conference Paper | IST-REx-ID: 2940 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
A counterexample to the chain rule for conditional HILL entropy, and what deniable encryption has to do with it
S. Krenn, K.Z. Pietrzak, A. Wadia, in:, A. Sahai (Ed.), Springer, 2013, pp. 23–39.
[Submitted Version]
View
| Files available
| DOI
S. Krenn, K.Z. Pietrzak, A. Wadia, in:, A. Sahai (Ed.), Springer, 2013, pp. 23–39.
2013 |Published| Journal Article | IST-REx-ID: 502
Short blind signatures
O. Blazy, G. Fuchsbauer, D. Pointcheval, D. Vergnaud, Journal of Computer Security 21 (2013) 627–661.
View
| DOI
O. Blazy, G. Fuchsbauer, D. Pointcheval, D. Vergnaud, Journal of Computer Security 21 (2013) 627–661.
2013 |Published| Report | IST-REx-ID: 2274 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Proofs of Space
S. Dziembowski, S. Faust, V. Kolmogorov, K.Z. Pietrzak, Proofs of Space, IST Austria, 2013.
[Published Version]
View
| Files available
S. Dziembowski, S. Faust, V. Kolmogorov, K.Z. Pietrzak, Proofs of Space, IST Austria, 2013.