Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
131 Publications
2013 |Published| Report | IST-REx-ID: 2274 |
S. Dziembowski, S. Faust, V. Kolmogorov, and K. Z. Pietrzak, Proofs of Space. IST Austria, 2013.
[Published Version]
View
| Files available
2012 |Published| Conference Paper | IST-REx-ID: 2048 |
S. Faust, K. Z. Pietrzak, and J. Schipper, “Practical leakage-resilient symmetric cryptography,” in Conference proceedings CHES 2012, Leuven, Belgium, 2012, vol. 7428, pp. 213–232.
[Preprint]
View
| DOI
| Download Preprint (ext.)
2012 |Published| Conference Paper | IST-REx-ID: 2049 |
S. Heyse, E. Kiltz, V. Lyubashevsky, C. Paar, and K. Z. Pietrzak, “Lapin: An efficient authentication protocol based on ring-LPN,” in Conference proceedings FSE 2012, Washington, DC, USA, 2012, vol. 7549, pp. 346–365.
[Preprint]
View
| DOI
| Download Preprint (ext.)
2012 |Published| Conference Paper | IST-REx-ID: 2937 |
J. Almeida, M. Barbosa, E. Bangerter, G. Barthe, S. Krenn, and S. Béguelin, “Full proof cryptography: Verifiable compilation of efficient zero-knowledge protocols,” in Proceedings of the 2012 ACM conference on Computer and communications security, Raleigh, NC, USA, 2012, pp. 488–500.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2012 |Published| Conference Paper | IST-REx-ID: 2974 |
A. Jain, S. Krenn, K. Z. Pietrzak, and A. Tentes, “Commitments and efficient zero knowledge proofs from learning parity with noise,” presented at the ASIACRYPT: Theory and Application of Cryptology and Information Security, Beijing, China, 2012, vol. 7658, pp. 663–680.
[Submitted Version]
View
| Files available
| DOI
2012 |Published| Conference Paper | IST-REx-ID: 3282 |
Y. Dodis, K. Z. Pietrzak, E. Kiltz, and D. Wichs, “Message authentication, revisited,” presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Cambridge, UK, 2012, vol. 7237, pp. 355–374.
[Submitted Version]
View
| Files available
| DOI
2012 |Published| Conference Paper | IST-REx-ID: 3280 |
K. Z. Pietrzak, “Subspace LWE,” presented at the TCC: Theory of Cryptography Conference, Taormina, Sicily, Italy, 2012, vol. 7194, pp. 548–563.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2012 |Published| Conference Paper | IST-REx-ID: 3281
K. Z. Pietrzak, A. Rosen, and G. Segev, “Lossy functions do not amplify well,” presented at the TCC: Theory of Cryptography Conference, Taormina, Sicily, Italy, 2012, vol. 7194, pp. 458–475.
View
| DOI
| Download None (ext.)
2012 |Published| Conference Paper | IST-REx-ID: 3279
A. Jain, K. Z. Pietrzak, and A. Tentes, “Hardness preserving constructions of pseudorandom functions,” presented at the TCC: Theory of Cryptography Conference, Taormina, Sicily, Italy, 2012, vol. 7194, pp. 369–382.
View
| DOI
| Download None (ext.)