Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
155 Publications
2022 |
Published |
Conference Paper |
IST-REx-ID: 12167 |
Avarikioti G, Pietrzak KZ, Salem I, Schmid S, Tiwari S, Yeo MX. Hide & Seek: Privacy-preserving rebalancing on payment channel networks. In: Financial Cryptography and Data Security. Vol 13411. Springer Nature; 2022:358-373. doi:10.1007/978-3-031-18283-9_17
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
| arXiv
2022 |
Published |
Conference Paper |
IST-REx-ID: 12176 |
Hoffmann C, Hubáček P, Kamath C, Klein K, Pietrzak KZ. Practical statistically-sound proofs of exponentiation in any group. In: Advances in Cryptology – CRYPTO 2022. Vol 13508. Springer Nature; 2022:370-399. doi:10.1007/978-3-031-15979-4_13
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
| WoS
2022 |
Published |
Conference Paper |
IST-REx-ID: 12516 |
Bogdanov A, Cueto Noval M, Hoffmann C, Rosen A. Public-Key Encryption from Homogeneous CLWE. In: Theory of Cryptography. Vol 13748. Springer Nature; 2022:565-592. doi:10.1007/978-3-031-22365-5_20
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
2022 |
Published |
Conference Paper |
IST-REx-ID: 17060 |
Tiwari S, Yeo MX, Avarikioti Z, Salem I, Pietrzak KZ, Schmid S. Wiser: Increasing throughput in payment channel networks with transaction aggregation. In: Proceedings of the 4th ACM Conference on Advances in Financial Technologies. Association for Computing Machinery; 2022:217-231. doi:10.1145/3558535.3559775
[Published Version]
View
| Files available
| DOI
| WoS
| arXiv
2021 |
Published |
Conference Paper |
IST-REx-ID: 10609 |
Chakraborty S, Ganesh C, Pancholi M, Sarkar P. Reverse firewalls for adaptively secure MPC without setup. In: 27th International Conference on the Theory and Application of Cryptology and Information Security. Vol 13091. Springer Nature; 2021:335-364. doi:10.1007/978-3-030-92075-3_12
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
2021 |
Published |
Thesis | PhD |
IST-REx-ID: 10035 |
Klein K. On the adaptive security of graph-based games. 2021. doi:10.15479/at:ista:10035
[Published Version]
View
| Files available
| DOI
2021 |
Published |
Conference Paper |
IST-REx-ID: 10041 |
Kamath Hosdurg C, Klein K, Pietrzak KZ, Wichs D. Limits on the Adaptive Security of Yao’s Garbling. In: 41st Annual International Cryptology Conference, Part II . Vol 12826. Cham: Springer Nature; 2021:486-515. doi:10.1007/978-3-030-84245-1_17
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
| WoS
2021 |
Published |
Conference Paper |
IST-REx-ID: 10044 |
Kamath Hosdurg C, Klein K, Pietrzak KZ. On treewidth, separators and Yao’s garbling. In: 19th Theory of Cryptography Conference 2021. International Association for Cryptologic Research; 2021.
[Preprint]
View
| Files available
| Download Preprint (ext.)
2021 |
Published |
Conference Paper |
IST-REx-ID: 10048 |
Kamath Hosdurg C, Klein K, Pietrzak KZ, Walter M. The cost of adaptivity in security games on graphs. In: 19th Theory of Cryptography Conference 2021. International Association for Cryptologic Research; 2021.
[Preprint]
View
| Files available
| Download Preprint (ext.)
2021 |
Published |
Conference Paper |
IST-REx-ID: 10049 |
Klein K, Pascual Perez G, Walter M, et al. Keep the dirt: tainted TreeKEM, adaptively and actively secure continuous group key agreement. In: 2021 IEEE Symposium on Security and Privacy . IEEE; 2021:268-284. doi:10.1109/sp40001.2021.00035
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
| WoS
2021 |
Published |
Conference Paper |
IST-REx-ID: 10407 |
Chakraborty S, Dziembowski S, Gałązka M, Lizurej T, Pietrzak KZ, Yeo MX. Trojan-resilience without cryptography. In: Vol 13043. Springer Nature; 2021:397-428. doi:10.1007/978-3-030-90453-1_14
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
2021 |
Published |
Conference Paper |
IST-REx-ID: 10408 |
Alwen JF, Auerbach B, Baig MA, et al. Grafting key trees: Efficient key management for overlapping groups. In: 19th International Conference. Vol 13044. Springer Nature; 2021:222-253. doi:10.1007/978-3-030-90456-2_8
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
| WoS
2021 |
Published |
Conference Paper |
IST-REx-ID: 10409 |
Kamath Hosdurg C, Klein K, Pietrzak KZ. On treewidth, separators and Yao’s garbling. In: 19th International Conference. Vol 13043. Springer Nature; 2021:486-517. doi:10.1007/978-3-030-90453-1_17
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
| WoS
2021 |
Published |
Conference Paper |
IST-REx-ID: 10410 |
Kamath Hosdurg C, Klein K, Pietrzak KZ, Walter M. The cost of adaptivity in security games on graphs. In: 19th International Conference. Vol 13043. Springer Nature; 2021:550-581. doi:10.1007/978-3-030-90453-1_19
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
| WoS
2021 |
Published |
Conference Paper |
IST-REx-ID: 9466 |
Walter M. The convergence of slide-type reductions. In: Public-Key Cryptography – PKC 2021. Vol 12710. Springer Nature; 2021:45-67. doi:10.1007/978-3-030-75245-3_3
[Published Version]
View
| Files available
| DOI
| WoS
2021 |
Published |
Conference Paper |
IST-REx-ID: 9825 |
Laarhoven T, Walter M. Dual lattice attacks for closest vector problems (with preprocessing). In: Topics in Cryptology – CT-RSA 2021. Vol 12704. Springer Nature; 2021:478-502. doi:10.1007/978-3-030-75539-3_20
[Preprint]
View
| DOI
| Download Preprint (ext.)
2021 |
Published |
Conference Paper |
IST-REx-ID: 9826 |
Auerbach B, Chakraborty S, Klein K, et al. Inverse-Sybil attacks in automated contact tracing. In: Topics in Cryptology – CT-RSA 2021. Vol 12704. Springer Nature; 2021:399-421. doi:10.1007/978-3-030-75539-3_17
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2021 |
Published |
Conference Paper |
IST-REx-ID: 9969 |
Pietrzak KZ, Salem I, Schmid S, Yeo MX. LightPIR: Privacy-preserving route discovery for payment channel networks. In: IEEE; 2021. doi:10.23919/IFIPNetworking52078.2021.9472205
[Submitted Version]
View
| Files available
| DOI
| Download Submitted Version (ext.)
| WoS
| arXiv
2020 |
Published |
Thesis | PhD |
IST-REx-ID: 7896 |
Kamath Hosdurg C. On the average-case hardness of total search problems. 2020. doi:10.15479/AT:ISTA:7896
[Published Version]
View
| Files available
| DOI
2020 |
Published |
Conference Paper |
IST-REx-ID: 7966 |
Auerbach B, Giacon F, Kiltz E. Everybody’s a target: Scalability in public-key encryption. In: Advances in Cryptology – EUROCRYPT 2020. Vol 12107. Springer Nature; 2020:475-506. doi:10.1007/978-3-030-45727-3_16
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
| WoS