Krzysztof Z Pietrzak
Pietrzak Group
106 Publications
2024 | Published | Conference Paper | IST-REx-ID: 17051 |
Trapdoor memory-hard functions
B. Auerbach, C.U. Günther, K.Z. Pietrzak, in:, 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer Nature, 2024, pp. 315–344.
[Preprint]
View
| DOI
| Download Preprint (ext.)
B. Auerbach, C.U. Günther, K.Z. Pietrzak, in:, 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer Nature, 2024, pp. 315–344.
2024 | Published | Conference Paper | IST-REx-ID: 17328 |
Fully automated selfish mining analysis in efficient proof systems blockchains
K. Chatterjee, A. Ebrahimzadeh, M. Karrabi, K.Z. Pietrzak, M.X. Yeo, D. Zikelic, in:, Proceedings of the 43rd Annual ACM Symposium on Principles of Distributed Computing, Association for Computing Machinery, 2024, pp. 268–278.
[Published Version]
View
| Files available
| DOI
| arXiv
K. Chatterjee, A. Ebrahimzadeh, M. Karrabi, K.Z. Pietrzak, M.X. Yeo, D. Zikelic, in:, Proceedings of the 43rd Annual ACM Symposium on Principles of Distributed Computing, Association for Computing Machinery, 2024, pp. 268–278.
2024 | Published | Conference Paper | IST-REx-ID: 18086
DeCAF: Decentralizable CGKA with fast healing
J.F. Alwen, B. Auerbach, M. Cueto Noval, K. Klein, G. Pascual Perez, K.Z. Pietrzak, in:, C. Galdi, D.H. Phan (Eds.), Security and Cryptography for Networks: 14th International Conference, Springer Nature, Cham, 2024, pp. 294–313.
View
| Files available
| DOI
J.F. Alwen, B. Auerbach, M. Cueto Noval, K. Klein, G. Pascual Perez, K.Z. Pietrzak, in:, C. Galdi, D.H. Phan (Eds.), Security and Cryptography for Networks: 14th International Conference, Springer Nature, Cham, 2024, pp. 294–313.
2023 | Published | Conference Paper | IST-REx-ID: 13143 |
Certifying giant nonprimes
C. Hoffmann, P. Hubáček, C. Kamath, K.Z. Pietrzak, in:, Public-Key Cryptography - PKC 2023, Springer Nature, 2023, pp. 530–553.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
C. Hoffmann, P. Hubáček, C. Kamath, K.Z. Pietrzak, in:, Public-Key Cryptography - PKC 2023, Springer Nature, 2023, pp. 530–553.
2023 | Published | Conference Paper | IST-REx-ID: 14691 |
On the cost of post-compromise security in concurrent Continuous Group-Key Agreement
B. Auerbach, M. Cueto Noval, G. Pascual Perez, K.Z. Pietrzak, in:, 21st International Conference on Theory of Cryptography, Springer Nature, 2023, pp. 271–300.
[Preprint]
View
| DOI
| Download Preprint (ext.)
B. Auerbach, M. Cueto Noval, G. Pascual Perez, K.Z. Pietrzak, in:, 21st International Conference on Theory of Cryptography, Springer Nature, 2023, pp. 271–300.
2023 | Published | Conference Paper | IST-REx-ID: 14428 |
Random oracle combiners: Breaking the concatenation barrier for collision-resistance
Y. Dodis, N. Ferguson, E. Goldin, P. Hall, K.Z. Pietrzak, in:, 43rd Annual International Cryptology Conference, Springer Nature, 2023, pp. 514–546.
[Preprint]
View
| DOI
| Download Preprint (ext.)
Y. Dodis, N. Ferguson, E. Goldin, P. Hall, K.Z. Pietrzak, in:, 43rd Annual International Cryptology Conference, Springer Nature, 2023, pp. 514–546.
2022 | Published | Conference Paper | IST-REx-ID: 17060 |
Wiser: Increasing throughput in payment channel networks with transaction aggregation
S. Tiwari, M.X. Yeo, Z. Avarikioti, I. Salem, K.Z. Pietrzak, S. Schmid, in:, Proceedings of the 4th ACM Conference on Advances in Financial Technologies, Association for Computing Machinery, 2022, pp. 217–231.
[Published Version]
View
| Files available
| DOI
| WoS
| arXiv
S. Tiwari, M.X. Yeo, Z. Avarikioti, I. Salem, K.Z. Pietrzak, S. Schmid, in:, Proceedings of the 4th ACM Conference on Advances in Financial Technologies, Association for Computing Machinery, 2022, pp. 217–231.
2022 | Published | Conference Paper | IST-REx-ID: 12167 |
Hide & Seek: Privacy-preserving rebalancing on payment channel networks
G. Avarikioti, K.Z. Pietrzak, I. Salem, S. Schmid, S. Tiwari, M.X. Yeo, in:, Financial Cryptography and Data Security, Springer Nature, 2022, pp. 358–373.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| arXiv
G. Avarikioti, K.Z. Pietrzak, I. Salem, S. Schmid, S. Tiwari, M.X. Yeo, in:, Financial Cryptography and Data Security, Springer Nature, 2022, pp. 358–373.
2022 | Published | Conference Paper | IST-REx-ID: 12176 |
Practical statistically-sound proofs of exponentiation in any group
C. Hoffmann, P. Hubáček, C. Kamath, K. Klein, K.Z. Pietrzak, in:, Advances in Cryptology – CRYPTO 2022, Springer Nature, 2022, pp. 370–399.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
C. Hoffmann, P. Hubáček, C. Kamath, K. Klein, K.Z. Pietrzak, in:, Advances in Cryptology – CRYPTO 2022, Springer Nature, 2022, pp. 370–399.
2022 | Published | Conference Paper | IST-REx-ID: 11476 |
CoCoA: Concurrent continuous group key agreement
J. Alwen, B. Auerbach, M. Cueto Noval, K. Klein, G. Pascual Perez, K.Z. Pietrzak, M. Walter, in:, Advances in Cryptology – EUROCRYPT 2022, Springer Nature, Cham, 2022, pp. 815–844.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
| WoS
J. Alwen, B. Auerbach, M. Cueto Noval, K. Klein, G. Pascual Perez, K.Z. Pietrzak, M. Walter, in:, Advances in Cryptology – EUROCRYPT 2022, Springer Nature, Cham, 2022, pp. 815–844.
2021 | Published | Conference Paper | IST-REx-ID: 10044 |
On treewidth, separators and Yao's garbling
C. Kamath Hosdurg, K. Klein, K.Z. Pietrzak, in:, 19th Theory of Cryptography Conference 2021, International Association for Cryptologic Research, 2021.
[Preprint]
View
| Files available
| Download Preprint (ext.)
C. Kamath Hosdurg, K. Klein, K.Z. Pietrzak, in:, 19th Theory of Cryptography Conference 2021, International Association for Cryptologic Research, 2021.
2021 | Published | Conference Paper | IST-REx-ID: 10048 |
The cost of adaptivity in security games on graphs
C. Kamath Hosdurg, K. Klein, K.Z. Pietrzak, M. Walter, in:, 19th Theory of Cryptography Conference 2021, International Association for Cryptologic Research, 2021.
[Preprint]
View
| Files available
| Download Preprint (ext.)
C. Kamath Hosdurg, K. Klein, K.Z. Pietrzak, M. Walter, in:, 19th Theory of Cryptography Conference 2021, International Association for Cryptologic Research, 2021.
2021 | Published | Conference Paper | IST-REx-ID: 10407 |
Trojan-resilience without cryptography
S. Chakraborty, S. Dziembowski, M. Gałązka, T. Lizurej, K.Z. Pietrzak, M.X. Yeo, in:, Springer Nature, 2021, pp. 397–428.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
S. Chakraborty, S. Dziembowski, M. Gałązka, T. Lizurej, K.Z. Pietrzak, M.X. Yeo, in:, Springer Nature, 2021, pp. 397–428.
2021 | Published | Conference Paper | IST-REx-ID: 10408 |
Grafting key trees: Efficient key management for overlapping groups
J.F. Alwen, B. Auerbach, M.A. Baig, M. Cueto Noval, K. Klein, G. Pascual Perez, K.Z. Pietrzak, M. Walter, in:, 19th International Conference, Springer Nature, 2021, pp. 222–253.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
| WoS
J.F. Alwen, B. Auerbach, M.A. Baig, M. Cueto Noval, K. Klein, G. Pascual Perez, K.Z. Pietrzak, M. Walter, in:, 19th International Conference, Springer Nature, 2021, pp. 222–253.
2021 | Published | Conference Paper | IST-REx-ID: 10409 |
On treewidth, separators and Yao’s garbling
C. Kamath Hosdurg, K. Klein, K.Z. Pietrzak, in:, 19th International Conference, Springer Nature, 2021, pp. 486–517.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
| WoS
C. Kamath Hosdurg, K. Klein, K.Z. Pietrzak, in:, 19th International Conference, Springer Nature, 2021, pp. 486–517.
2021 | Published | Conference Paper | IST-REx-ID: 10410 |
The cost of adaptivity in security games on graphs
C. Kamath Hosdurg, K. Klein, K.Z. Pietrzak, M. Walter, in:, 19th International Conference, Springer Nature, 2021, pp. 550–581.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
| WoS
C. Kamath Hosdurg, K. Klein, K.Z. Pietrzak, M. Walter, in:, 19th International Conference, Springer Nature, 2021, pp. 550–581.
2021 | Published | Conference Paper | IST-REx-ID: 9969 |
LightPIR: Privacy-preserving route discovery for payment channel networks
K.Z. Pietrzak, I. Salem, S. Schmid, M.X. Yeo, in:, IEEE, 2021.
[Submitted Version]
View
| Files available
| DOI
| Download Submitted Version (ext.)
| WoS
| arXiv
K.Z. Pietrzak, I. Salem, S. Schmid, M.X. Yeo, in:, IEEE, 2021.
2021 | Published | Conference Paper | IST-REx-ID: 10041 |
Limits on the Adaptive Security of Yao’s Garbling
C. Kamath Hosdurg, K. Klein, K.Z. Pietrzak, D. Wichs, in:, 41st Annual International Cryptology Conference, Part II , Springer Nature, Cham, 2021, pp. 486–515.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
C. Kamath Hosdurg, K. Klein, K.Z. Pietrzak, D. Wichs, in:, 41st Annual International Cryptology Conference, Part II , Springer Nature, Cham, 2021, pp. 486–515.
2021 | Published | Conference Paper | IST-REx-ID: 10049 |
Keep the dirt: tainted TreeKEM, adaptively and actively secure continuous group key agreement
K. Klein, G. Pascual Perez, M. Walter, C. Kamath Hosdurg, M. Capretto, M. Cueto Noval, I. Markov, M.X. Yeo, J.F. Alwen, K.Z. Pietrzak, in:, 2021 IEEE Symposium on Security and Privacy , IEEE, 2021, pp. 268–284.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
K. Klein, G. Pascual Perez, M. Walter, C. Kamath Hosdurg, M. Capretto, M. Cueto Noval, I. Markov, M.X. Yeo, J.F. Alwen, K.Z. Pietrzak, in:, 2021 IEEE Symposium on Security and Privacy , IEEE, 2021, pp. 268–284.
2021 | Published | Conference Paper | IST-REx-ID: 9826 |
Inverse-Sybil attacks in automated contact tracing
B. Auerbach, S. Chakraborty, K. Klein, G. Pascual Perez, K.Z. Pietrzak, M. Walter, M.X. Yeo, in:, Topics in Cryptology – CT-RSA 2021, Springer Nature, 2021, pp. 399–421.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
B. Auerbach, S. Chakraborty, K. Klein, G. Pascual Perez, K.Z. Pietrzak, M. Walter, M.X. Yeo, in:, Topics in Cryptology – CT-RSA 2021, Springer Nature, 2021, pp. 399–421.
2020 | Published | Conference Paper | IST-REx-ID: 8987 |
Delayed authentication: Preventing replay and relay attacks in private contact tracing
K.Z. Pietrzak, in:, Progress in Cryptology, Springer Nature, 2020, pp. 3–15.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
K.Z. Pietrzak, in:, Progress in Cryptology, Springer Nature, 2020, pp. 3–15.
2019 | Published | Conference Paper | IST-REx-ID: 7411 |
Reversible proofs of sequential work
H.M. Abusalah, C. Kamath Hosdurg, K. Klein, K.Z. Pietrzak, M. Walter, in:, Advances in Cryptology – EUROCRYPT 2019, Springer International Publishing, 2019, pp. 277–291.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
| WoS
H.M. Abusalah, C. Kamath Hosdurg, K. Klein, K.Z. Pietrzak, M. Walter, in:, Advances in Cryptology – EUROCRYPT 2019, Springer International Publishing, 2019, pp. 277–291.
2019 | Published | Conference Paper | IST-REx-ID: 6430 |
Adaptively secure proxy re-encryption
G. Fuchsbauer, C. Kamath Hosdurg, K. Klein, K.Z. Pietrzak, in:, Springer Nature, 2019, pp. 317–346.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
G. Fuchsbauer, C. Kamath Hosdurg, K. Klein, K.Z. Pietrzak, in:, Springer Nature, 2019, pp. 317–346.
2019 | Published | Conference Paper | IST-REx-ID: 6528 |
Simple verifiable delay functions
K.Z. Pietrzak, in:, 10th Innovations in Theoretical Computer Science Conference, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2019.
[Published Version]
View
| Files available
| DOI
| Download Published Version (ext.)
K.Z. Pietrzak, in:, 10th Innovations in Theoretical Computer Science Conference, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2019.
2019 | Published | Conference Paper | IST-REx-ID: 6677 |
Finding a Nash equilibrium is no easier than breaking Fiat-Shamir
A.R. Choudhuri, P. Hubáček, C. Kamath Hosdurg, K.Z. Pietrzak, A. Rosen, G.N. Rothblum, in:, Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing - STOC 2019, ACM Press, 2019, pp. 1103–1114.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
| WoS
A.R. Choudhuri, P. Hubáček, C. Kamath Hosdurg, K.Z. Pietrzak, A. Rosen, G.N. Rothblum, in:, Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing - STOC 2019, ACM Press, 2019, pp. 1103–1114.
2018 | Published | Journal Article | IST-REx-ID: 107 |
Non-malleable codes
S. Dziembowski, K.Z. Pietrzak, D. Wichs, Journal of the ACM 65 (2018).
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
S. Dziembowski, K.Z. Pietrzak, D. Wichs, Journal of the ACM 65 (2018).
2018 | Published | Conference Paper | IST-REx-ID: 298 |
Sustained space complexity
J.F. Alwen, J. Blocki, K.Z. Pietrzak, in:, Springer, 2018, pp. 99–130.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
| arXiv
J.F. Alwen, J. Blocki, K.Z. Pietrzak, in:, Springer, 2018, pp. 99–130.
2018 | Published | Conference Paper | IST-REx-ID: 302 |
Simple proofs of sequential work
B. Cohen, K.Z. Pietrzak, in:, Springer, 2018, pp. 451–467.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
| WoS
B. Cohen, K.Z. Pietrzak, in:, Springer, 2018, pp. 451–467.
2018 | Published | Conference Paper | IST-REx-ID: 193 |
On the memory hardness of data independent password hashing functions
J.F. Alwen, P. Gazi, C. Kamath Hosdurg, K. Klein, G.F. Osang, K.Z. Pietrzak, L. Reyzin, M. Rolinek, M. Rybar, in:, Proceedings of the 2018 on Asia Conference on Computer and Communication Security, ACM, 2018, pp. 51–65.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
| WoS
J.F. Alwen, P. Gazi, C. Kamath Hosdurg, K. Klein, G.F. Osang, K.Z. Pietrzak, L. Reyzin, M. Rolinek, M. Rybar, in:, Proceedings of the 2018 on Asia Conference on Computer and Communication Security, ACM, 2018, pp. 51–65.
2018 | Published | Conference Paper | IST-REx-ID: 7407 |
Proofs of catalytic space
K.Z. Pietrzak, in:, 10th Innovations in Theoretical Computer Science Conference (ITCS 2019), Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2018, p. 59:1-59:25.
[Published Version]
View
| Files available
| DOI
| Download Published Version (ext.)
K.Z. Pietrzak, in:, 10th Innovations in Theoretical Computer Science Conference (ITCS 2019), Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2018, p. 59:1-59:25.
2018 | Published | Conference Paper | IST-REx-ID: 6941 |
SpaceMint: A cryptocurrency based on proofs of space
S. Park, A. Kwon, G. Fuchsbauer, P. Gazi, J.F. Alwen, K.Z. Pietrzak, in:, 22nd International Conference on Financial Cryptography and Data Security, Springer Nature, 2018, pp. 480–499.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
| WoS
S. Park, A. Kwon, G. Fuchsbauer, P. Gazi, J.F. Alwen, K.Z. Pietrzak, in:, 22nd International Conference on Financial Cryptography and Data Security, Springer Nature, 2018, pp. 480–499.
2017 | Published | Conference Paper | IST-REx-ID: 559 |
Beyond Hellman’s time-memory trade-offs with applications to proofs of space
H.M. Abusalah, J.F. Alwen, B. Cohen, D. Khilko, K.Z. Pietrzak, L. Reyzin, in:, Springer, 2017, pp. 357–379.
[Submitted Version]
View
| Files available
| DOI
| Download Submitted Version (ext.)
H.M. Abusalah, J.F. Alwen, B. Cohen, D. Khilko, K.Z. Pietrzak, L. Reyzin, in:, Springer, 2017, pp. 357–379.
2017 | Published | Journal Article | IST-REx-ID: 1187 |
Efficient authentication from hard learning problems
E. Kiltz, K.Z. Pietrzak, D. Venturi, D. Cash, A. Jain, Journal of Cryptology 30 (2017) 1238–1275.
[Submitted Version]
View
| Files available
| DOI
| WoS
E. Kiltz, K.Z. Pietrzak, D. Venturi, D. Cash, A. Jain, Journal of Cryptology 30 (2017) 1238–1275.
2017 | Published | Conference Paper | IST-REx-ID: 605 |
Position based cryptography and multiparty communication complexity
J. Brody, S. Dziembowski, S. Faust, K.Z. Pietrzak, in:, Y. Kalai, L. Reyzin (Eds.), Springer, 2017, pp. 56–81.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
J. Brody, S. Dziembowski, S. Faust, K.Z. Pietrzak, in:, Y. Kalai, L. Reyzin (Eds.), Springer, 2017, pp. 56–81.
2017 | Published | Journal Article | IST-REx-ID: 6196 |
The exact security of PMAC
P. Gazi, K.Z. Pietrzak, M. Rybar, IACR Transactions on Symmetric Cryptology 2016 (2017) 145–161.
[Published Version]
View
| Files available
| DOI
P. Gazi, K.Z. Pietrzak, M. Rybar, IACR Transactions on Symmetric Cryptology 2016 (2017) 145–161.
2017 | Published | Conference Paper | IST-REx-ID: 635 |
Scrypt is maximally memory hard
J.F. Alwen, B. Chen, K.Z. Pietrzak, L. Reyzin, S. Tessaro, in:, J.-S. Coron, J. Buus Nielsen (Eds.), Springer, 2017, pp. 33–62.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
J.F. Alwen, B. Chen, K.Z. Pietrzak, L. Reyzin, S. Tessaro, in:, J.-S. Coron, J. Buus Nielsen (Eds.), Springer, 2017, pp. 33–62.
2017 | Published | Conference Paper | IST-REx-ID: 637 |
Be adaptive avoid overcommitting
Z. Jafargholi, C. Kamath Hosdurg, K. Klein, I. Komargodski, K.Z. Pietrzak, D. Wichs, in:, J. Katz, H. Shacham (Eds.), Springer, 2017, pp. 133–163.
[Submitted Version]
View
| Files available
| DOI
| Download Submitted Version (ext.)
Z. Jafargholi, C. Kamath Hosdurg, K. Klein, I. Komargodski, K.Z. Pietrzak, D. Wichs, in:, J. Katz, H. Shacham (Eds.), Springer, 2017, pp. 133–163.
2017 | Published | Conference Paper | IST-REx-ID: 640 |
Depth-robust graphs and their cumulative memory complexity
J.F. Alwen, J. Blocki, K.Z. Pietrzak, in:, J.-S. Coron, J. Buus Nielsen (Eds.), Springer, 2017, pp. 3–32.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
J.F. Alwen, J. Blocki, K.Z. Pietrzak, in:, J.-S. Coron, J. Buus Nielsen (Eds.), Springer, 2017, pp. 3–32.
2017 | Published | Conference Paper | IST-REx-ID: 697 |
Non uniform attacks against pseudoentropy
K.Z. Pietrzak, M. Skórski, in:, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2017.
[Published Version]
View
| Files available
| DOI
K.Z. Pietrzak, M. Skórski, in:, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2017.
2016 | Published | Conference Paper | IST-REx-ID: 1231 |
On the complexity of scrypt and proofs of space in the parallel random oracle model
J.F. Alwen, B. Chen, C. Kamath Hosdurg, V. Kolmogorov, K.Z. Pietrzak, S. Tessaro, in:, Springer, 2016, pp. 358–387.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
J.F. Alwen, B. Chen, C. Kamath Hosdurg, V. Kolmogorov, K.Z. Pietrzak, S. Tessaro, in:, Springer, 2016, pp. 358–387.
2016 | Published | Conference Paper | IST-REx-ID: 1653 |
New realizations of somewhere statistically binding hashing and positional accumulators
T. Okamoto, K.Z. Pietrzak, B. Waters, D. Wichs, in:, Springer, 2016, pp. 121–145.
[Submitted Version]
View
| Files available
| DOI
T. Okamoto, K.Z. Pietrzak, B. Waters, D. Wichs, in:, Springer, 2016, pp. 121–145.
2016 | Published | Conference Paper | IST-REx-ID: 1229 |
Offline witness encryption
H.M. Abusalah, G. Fuchsbauer, K.Z. Pietrzak, in:, Springer, 2016, pp. 285–303.
[Submitted Version]
View
| Files available
| DOI
H.M. Abusalah, G. Fuchsbauer, K.Z. Pietrzak, in:, Springer, 2016, pp. 285–303.
2016 | Published | Conference Paper | IST-REx-ID: 1233 |
Standard security does imply security against selective opening for markov distributions
G. Fuchsbauer, F. Heuer, E. Kiltz, K.Z. Pietrzak, in:, Springer, 2016, pp. 282–305.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
G. Fuchsbauer, F. Heuer, E. Kiltz, K.Z. Pietrzak, in:, Springer, 2016, pp. 282–305.
2016 | Published | Conference Paper | IST-REx-ID: 1236 |
Constrained PRFs for unbounded inputs
H.M. Abusalah, G. Fuchsbauer, K.Z. Pietrzak, in:, Springer, 2016, pp. 413–428.
[Submitted Version]
View
| Files available
| DOI
H.M. Abusalah, G. Fuchsbauer, K.Z. Pietrzak, in:, Springer, 2016, pp. 413–428.
2016 | Published | Conference Paper | IST-REx-ID: 1179 |
Pseudoentropy: Lower-bounds for chain rules and transformations
K.Z. Pietrzak, S. Maciej, in:, Springer, 2016, pp. 183–203.
[Preprint]
View
| DOI
| Download Preprint (ext.)
K.Z. Pietrzak, S. Maciej, in:, Springer, 2016, pp. 183–203.
2016 | Published | Journal Article | IST-REx-ID: 1479 |
A counterexample to the chain rule for conditional HILL entropy
S. Krenn, K.Z. Pietrzak, A. Wadia, D. Wichs, Computational Complexity 25 (2016) 567–605.
[Submitted Version]
View
| Files available
| DOI
S. Krenn, K.Z. Pietrzak, A. Wadia, D. Wichs, Computational Complexity 25 (2016) 567–605.
2015 | Published | Conference Paper | IST-REx-ID: 1675 |
Proofs of space
S. Dziembowski, S. Faust, V. Kolmogorov, K.Z. Pietrzak, in:, 35th Annual Cryptology Conference, Springer, 2015, pp. 585–605.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
S. Dziembowski, S. Faust, V. Kolmogorov, K.Z. Pietrzak, in:, 35th Annual Cryptology Conference, Springer, 2015, pp. 585–605.
2015 | Published | Conference Paper | IST-REx-ID: 1646 |
Key-homomorphic constrained pseudorandom functions
A. Banerjee, G. Fuchsbauer, C. Peikert, K.Z. Pietrzak, S. Stevens, in:, 12th Theory of Cryptography Conference, Springer Nature, 2015, pp. 31–60.
[Submitted Version]
View
| Files available
| DOI
| Download Submitted Version (ext.)
A. Banerjee, G. Fuchsbauer, C. Peikert, K.Z. Pietrzak, S. Stevens, in:, 12th Theory of Cryptography Conference, Springer Nature, 2015, pp. 31–60.
2015 | Published | Conference Paper | IST-REx-ID: 1648 |
A quasipolynomial reduction for generalized selective decryption on trees
G. Fuchsbauer, Z. Jafargholi, K.Z. Pietrzak, in:, Springer, 2015, pp. 601–620.
[Submitted Version]
View
| Files available
| DOI
G. Fuchsbauer, Z. Jafargholi, K.Z. Pietrzak, in:, Springer, 2015, pp. 601–620.
2015 | Published | Conference Paper | IST-REx-ID: 1649 |
Efficient zero-knowledge proofs for commitments from learning with errors over rings
F. Benhamouda, S. Krenn, V. Lyubashevsky, K.Z. Pietrzak, 9326 (2015) 305–325.
[Published Version]
View
| Files available
| DOI
F. Benhamouda, S. Krenn, V. Lyubashevsky, K.Z. Pietrzak, 9326 (2015) 305–325.
2015 | Published | Conference Paper | IST-REx-ID: 1650 |
Condensed unpredictability
M. Skórski, A. Golovnev, K.Z. Pietrzak, in:, Springer, 2015, pp. 1046–1057.
[Published Version]
View
| Files available
| DOI
M. Skórski, A. Golovnev, K.Z. Pietrzak, in:, Springer, 2015, pp. 1046–1057.
2015 | Published | Conference Paper | IST-REx-ID: 1654 |
Generic security of NMAC and HMAC with input whitening
P. Gazi, K.Z. Pietrzak, S. Tessaro, 9453 (2015) 85–109.
[Submitted Version]
View
| Files available
| DOI
P. Gazi, K.Z. Pietrzak, S. Tessaro, 9453 (2015) 85–109.
2015 | Published | Conference Paper | IST-REx-ID: 1669 |
The chain rule for HILL pseudoentropy, revisited
K.Z. Pietrzak, M. Skórski, 9230 (2015) 81–98.
[Submitted Version]
View
| Files available
| DOI
K.Z. Pietrzak, M. Skórski, 9230 (2015) 81–98.
2015 | Published | Conference Paper | IST-REx-ID: 1671 |
The exact PRF security of truncation: Tight bounds for keyed sponges and truncated CBC
P. Gazi, K.Z. Pietrzak, S. Tessaro, in:, Springer, 2015, pp. 368–387.
[Submitted Version]
View
| Files available
| DOI
P. Gazi, K.Z. Pietrzak, S. Tessaro, in:, Springer, 2015, pp. 368–387.
2014 | Published | Journal Article | IST-REx-ID: 2852
Robust multi-property combiners for hash functions
M. Fischlin, A. Lehmann, K.Z. Pietrzak, Journal of Cryptology 27 (2014) 397–428.
View
| Files available
| DOI
M. Fischlin, A. Lehmann, K.Z. Pietrzak, Journal of Cryptology 27 (2014) 397–428.
2014 | Published | Conference Paper | IST-REx-ID: 2236 |
How to fake auxiliary input
D. Jetchev, K.Z. Pietrzak, in:, Y. Lindell (Ed.), Springer, 2014, pp. 566–590.
[Submitted Version]
View
| Files available
| DOI
| Download Submitted Version (ext.)
D. Jetchev, K.Z. Pietrzak, in:, Y. Lindell (Ed.), Springer, 2014, pp. 566–590.
2014 | Published | Conference Paper | IST-REx-ID: 2082 |
The exact PRF-security of NMAC and HMAC
P. Gazi, K.Z. Pietrzak, M. Rybar, in:, J. Garay, R. Gennaro (Eds.), Springer, 2014, pp. 113–130.
[Submitted Version]
View
| Files available
| DOI
P. Gazi, K.Z. Pietrzak, M. Rybar, in:, J. Garay, R. Gennaro (Eds.), Springer, 2014, pp. 113–130.
2014 | Published | Conference Paper | IST-REx-ID: 1927 |
Adaptive security of constrained PRFs
G. Fuchsbauer, M. Konstantinov, K.Z. Pietrzak, V. Rao, in:, Springer, 2014, pp. 173–192.
View
| DOI
| Download (ext.)
G. Fuchsbauer, M. Konstantinov, K.Z. Pietrzak, V. Rao, in:, Springer, 2014, pp. 173–192.
2014 | Published | Conference Paper | IST-REx-ID: 2185 |
Key derivation without entropy waste
Y. Dodis, K.Z. Pietrzak, D. Wichs, in:, P. Nguyen, E. Oswald (Eds.), Springer, 2014, pp. 93–110.
[Submitted Version]
View
| Files available
| DOI
Y. Dodis, K.Z. Pietrzak, D. Wichs, in:, P. Nguyen, E. Oswald (Eds.), Springer, 2014, pp. 93–110.
2014 | Published | Conference Paper | IST-REx-ID: 2219 |
Simple chosen-ciphertext security from low noise LPN
E. Kiltz, D. Masny, K.Z. Pietrzak, in:, Springer, 2014, pp. 1–18.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
E. Kiltz, D. Masny, K.Z. Pietrzak, in:, Springer, 2014, pp. 1–18.
2013 | Published | Conference Paper | IST-REx-ID: 2940 |
A counterexample to the chain rule for conditional HILL entropy, and what deniable encryption has to do with it
S. Krenn, K.Z. Pietrzak, A. Wadia, in:, A. Sahai (Ed.), Springer, 2013, pp. 23–39.
[Submitted Version]
View
| Files available
| DOI
S. Krenn, K.Z. Pietrzak, A. Wadia, in:, A. Sahai (Ed.), Springer, 2013, pp. 23–39.
2013 | Published | Report | IST-REx-ID: 2274 |
Proofs of Space
S. Dziembowski, S. Faust, V. Kolmogorov, K.Z. Pietrzak, Proofs of Space, IST Austria, 2013.
[Published Version]
View
| Files available
S. Dziembowski, S. Faust, V. Kolmogorov, K.Z. Pietrzak, Proofs of Space, IST Austria, 2013.
2013 | Published | Conference Paper | IST-REx-ID: 2258 |
Digital signatures with minimal overhead from indifferentiable random invertible functions
E. Kiltz, K.Z. Pietrzak, M. Szegedy, 8042 (2013) 571–588.
[Submitted Version]
View
| Files available
| DOI
E. Kiltz, K.Z. Pietrzak, M. Szegedy, 8042 (2013) 571–588.
2013 | Published | Conference Paper | IST-REx-ID: 2259 |
Learning with rounding, revisited: New reduction properties and applications
J.F. Alwen, S. Krenn, K.Z. Pietrzak, D. Wichs, 8042 (2013) 57–74.
[Published Version]
View
| Files available
| DOI
J.F. Alwen, S. Krenn, K.Z. Pietrzak, D. Wichs, 8042 (2013) 57–74.
2012 | Published | Conference Paper | IST-REx-ID: 2974 |
Commitments and efficient zero knowledge proofs from learning parity with noise
A. Jain, S. Krenn, K.Z. Pietrzak, A. Tentes, in:, X. Wang, K. Sako (Eds.), Springer, 2012, pp. 663–680.
[Submitted Version]
View
| Files available
| DOI
A. Jain, S. Krenn, K.Z. Pietrzak, A. Tentes, in:, X. Wang, K. Sako (Eds.), Springer, 2012, pp. 663–680.
2012 | Published | Journal Article | IST-REx-ID: 3241
Parallel repetition of computationally sound protocols revisited
K.Z. Pietrzak, D. Wikström, Journal of Cryptology 25 (2012) 116–135.
View
| DOI
K.Z. Pietrzak, D. Wikström, Journal of Cryptology 25 (2012) 116–135.
2012 | Published | Conference Paper | IST-REx-ID: 3250
Cryptography from learning parity with noise
K.Z. Pietrzak, in:, Springer, 2012, pp. 99–114.
View
| DOI
K.Z. Pietrzak, in:, Springer, 2012, pp. 99–114.
2012 | Published | Conference Paper | IST-REx-ID: 3279
Hardness preserving constructions of pseudorandom functions
A. Jain, K.Z. Pietrzak, A. Tentes, in:, Springer, 2012, pp. 369–382.
View
| DOI
| Download None (ext.)
A. Jain, K.Z. Pietrzak, A. Tentes, in:, Springer, 2012, pp. 369–382.
2012 | Published | Conference Paper | IST-REx-ID: 3282 |
Message authentication, revisited
Y. Dodis, K.Z. Pietrzak, E. Kiltz, D. Wichs, in:, Springer, 2012, pp. 355–374.
[Submitted Version]
View
| Files available
| DOI
Y. Dodis, K.Z. Pietrzak, E. Kiltz, D. Wichs, in:, Springer, 2012, pp. 355–374.
2012 | Published | Conference Paper | IST-REx-ID: 3280 |
Subspace LWE
K.Z. Pietrzak, in:, Springer, 2012, pp. 548–563.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
K.Z. Pietrzak, in:, Springer, 2012, pp. 548–563.
2012 | Published | Conference Paper | IST-REx-ID: 3281
Lossy functions do not amplify well
K.Z. Pietrzak, A. Rosen, G. Segev, in:, Springer, 2012, pp. 458–475.
View
| DOI
| Download None (ext.)
K.Z. Pietrzak, A. Rosen, G. Segev, in:, Springer, 2012, pp. 458–475.
2012 | Published | Conference Paper | IST-REx-ID: 2048 |
Practical leakage-resilient symmetric cryptography
S. Faust, K.Z. Pietrzak, J. Schipper, in:, Conference Proceedings CHES 2012, Springer, 2012, pp. 213–232.
[Preprint]
View
| DOI
| Download Preprint (ext.)
S. Faust, K.Z. Pietrzak, J. Schipper, in:, Conference Proceedings CHES 2012, Springer, 2012, pp. 213–232.
2012 | Published | Conference Paper | IST-REx-ID: 2049 |
Lapin: An efficient authentication protocol based on ring-LPN
S. Heyse, E. Kiltz, V. Lyubashevsky, C. Paar, K.Z. Pietrzak, in:, Conference Proceedings FSE 2012, Springer, 2012, pp. 346–365.
[Preprint]
View
| DOI
| Download Preprint (ext.)
S. Heyse, E. Kiltz, V. Lyubashevsky, C. Paar, K.Z. Pietrzak, in:, Conference Proceedings FSE 2012, Springer, 2012, pp. 346–365.
2011 | Published | Conference Paper | IST-REx-ID: 3236
Parallel repetition for leakage resilience amplification revisited
A. Jain, K.Z. Pietrzak, in:, Springer, 2011, pp. 58–69.
View
| DOI
A. Jain, K.Z. Pietrzak, in:, Springer, 2011, pp. 58–69.
2011 | Published | Conference Paper | IST-REx-ID: 3238
Efficient authentication from hard learning problems
E. Kiltz, K.Z. Pietrzak, D. Cash, A. Jain, D. Venturi, in:, Springer, 2011, pp. 7–26.
View
| Files available
| DOI
E. Kiltz, K.Z. Pietrzak, D. Cash, A. Jain, D. Venturi, in:, Springer, 2011, pp. 7–26.
2011 | Published | Conference Paper | IST-REx-ID: 3239
Tamper proof circuits How to trade leakage for tamper resilience
S. Faust, K.Z. Pietrzak, D. Venturi, in:, Springer, 2011, pp. 391–402.
View
| DOI
S. Faust, K.Z. Pietrzak, D. Venturi, in:, Springer, 2011, pp. 391–402.
2011 | Published | Conference Paper | IST-REx-ID: 3240
Leftover hash lemma revisited
B. Barak, Y. Dodis, H. Krawczyk, O. Pereira, K.Z. Pietrzak, F. Standaert, Y. Yu, in:, Springer, 2011, pp. 1–20.
View
| DOI
B. Barak, Y. Dodis, H. Krawczyk, O. Pereira, K.Z. Pietrzak, F. Standaert, Y. Yu, in:, Springer, 2011, pp. 1–20.
2010 | Published | Conference Paper | IST-REx-ID: 3233
An efficient parallel repetition theorem
J. Håstad, R. Pass, D. Wikström, K.Z. Pietrzak, in:, Springer, 2010, pp. 1–18.
View
| DOI
J. Håstad, R. Pass, D. Wikström, K.Z. Pietrzak, in:, Springer, 2010, pp. 1–18.
2010 | Published | Conference Paper | IST-REx-ID: 3234
Leakage resilient signatures
S. Faust, E. Kiltz, K.Z. Pietrzak, G. Rothblum, in:, Springer, 2010, pp. 343–360.
View
| DOI
S. Faust, E. Kiltz, K.Z. Pietrzak, G. Rothblum, in:, Springer, 2010, pp. 343–360.
2010 | Published | Conference Paper | IST-REx-ID: 3235
Leakage resilient pseudorandom functions and side channel attacks on feistel networks
Y. Dodis, K.Z. Pietrzak, in:, Springer, 2010, pp. 21–40.
View
| DOI
Y. Dodis, K.Z. Pietrzak, in:, Springer, 2010, pp. 21–40.
2010 | Published | Conference Paper | IST-REx-ID: 3237
Leakage resilient ElGamal encryption
E. Kiltz, K.Z. Pietrzak, in:, Springer, 2010, pp. 595–612.
View
| DOI
E. Kiltz, K.Z. Pietrzak, in:, Springer, 2010, pp. 595–612.
2009 | Published | Conference Paper | IST-REx-ID: 3230
A new randomness extraction paradigm for hybrid encryption
E. Kiltz, K.Z. Pietrzak, M. Stam, M. Yung, in:, Springer, 2009, pp. 590–609.
View
| DOI
E. Kiltz, K.Z. Pietrzak, M. Stam, M. Yung, in:, Springer, 2009, pp. 590–609.
2009 | Published | Conference Paper | IST-REx-ID: 3231
On the security of padding based encryption schemes Why We cannot prove OAEP secure in the standard model
E. Kiltz, K.Z. Pietrzak, in:, Springer, 2009, pp. 389–406.
View
| DOI
E. Kiltz, K.Z. Pietrzak, in:, Springer, 2009, pp. 389–406.
2009 | Published | Conference Paper | IST-REx-ID: 3232
A leakage resilient mode of operation
K.Z. Pietrzak, in:, Springer, 2009, pp. 462–482.
View
| DOI
K.Z. Pietrzak, in:, Springer, 2009, pp. 462–482.
2008 | Published | Conference Paper | IST-REx-ID: 3224
A new mode of operation for block ciphers and length preserving MACs
Y. Dodis, K.Z. Pietrzak, P. Puniya, in:, Springer, 2008, pp. 198–219.
View
| DOI
Y. Dodis, K.Z. Pietrzak, P. Puniya, in:, Springer, 2008, pp. 198–219.
2008 | Published | Conference Paper | IST-REx-ID: 3225
Robust multi property combiners for hash functions revisited
M. Fischlin, A. Lehmann, K.Z. Pietrzak, in:, Springer, 2008, pp. 655–666.
View
| Files available
| DOI
M. Fischlin, A. Lehmann, K.Z. Pietrzak, in:, Springer, 2008, pp. 655–666.
2008 | Published | Conference Paper | IST-REx-ID: 3226
Weak pseudorandom functions in minicrypt
K.Z. Pietrzak, J. Sjödin, in:, Springer, 2008, pp. 423–436.
View
| DOI
K.Z. Pietrzak, J. Sjödin, in:, Springer, 2008, pp. 423–436.
2008 | Published | Journal Article | IST-REx-ID: 3227
Elektrowiz – system of measurement data management
P. Zubielik, J. Nadaczny, K.Z. Pietrzak, M. Lawenda, Przeglad Elektrotechniczny 84 (2008) 239–242.
View
| Download (ext.)
P. Zubielik, J. Nadaczny, K.Z. Pietrzak, M. Lawenda, Przeglad Elektrotechniczny 84 (2008) 239–242.
2008 | Published | Conference Paper | IST-REx-ID: 3228
Compression from collisions or why CRHF combiners have a long output
K.Z. Pietrzak, in:, Springer, 2008, pp. 413–432.
View
| DOI
K.Z. Pietrzak, in:, Springer, 2008, pp. 413–432.
2008 | Published | Conference Paper | IST-REx-ID: 3229
Leakage resilient cryptography
S. Dziembowski, K.Z. Pietrzak, in:, IEEE, 2008, pp. 293–302.
View
| DOI
S. Dziembowski, K.Z. Pietrzak, in:, IEEE, 2008, pp. 293–302.
2007 | Published | Conference Paper | IST-REx-ID: 3218
Non-trivial black-box combiners for collision-resistant hash-functions don't exist
K.Z. Pietrzak, in:, Springer, 2007, pp. 23–33.
View
| DOI
K.Z. Pietrzak, in:, Springer, 2007, pp. 23–33.
2007 | Published | Conference Paper | IST-REx-ID: 3219
Indistinguishability amplification
U. Maurer, K.Z. Pietrzak, R. Renner, in:, Springer, 2007, pp. 130–149.
View
| DOI
U. Maurer, K.Z. Pietrzak, R. Renner, in:, Springer, 2007, pp. 130–149.
2007 | Published | Conference Paper | IST-REx-ID: 3220
Intrusion resilient secret sharing
S. Dziembowski, K.Z. Pietrzak, in:, IEEE, 2007, pp. 227–237.
View
| DOI
S. Dziembowski, K.Z. Pietrzak, in:, IEEE, 2007, pp. 227–237.
2007 | Published | Conference Paper | IST-REx-ID: 3221
Range extension for weak PRFs the good the bad and the ugly
K.Z. Pietrzak, J. Sjödin, in:, Springer, 2007, pp. 517–533.
View
| DOI
K.Z. Pietrzak, J. Sjödin, in:, Springer, 2007, pp. 517–533.
2007 | Published | Conference Paper | IST-REx-ID: 3222
Parallel repetition of computationally sound protocols revisited
K.Z. Pietrzak, D. Wikström, in:, Springer, 2007, pp. 86–102.
View
| DOI
K.Z. Pietrzak, D. Wikström, in:, Springer, 2007, pp. 86–102.
2007 | Published | Conference Paper | IST-REx-ID: 3223
Improving the security of MACs via randomized message preprocessing
Y. Dodis, K.Z. Pietrzak, in:, Springer, 2007, pp. 414–433.
View
| DOI
Y. Dodis, K.Z. Pietrzak, in:, Springer, 2007, pp. 414–433.
2006 | Published | Conference Paper | IST-REx-ID: 3214
Luby Rackoff ciphers from weak round functions
U. Maurer, Y. Oswald, K.Z. Pietrzak, J. Sjödin, in:, Springer, 2006, pp. 391–408.
View
| DOI
U. Maurer, Y. Oswald, K.Z. Pietrzak, J. Sjödin, in:, Springer, 2006, pp. 391–408.
2006 | Published | Conference Paper | IST-REx-ID: 3215
Separating sources for encryption and secret sharing
Y. Dodis, K.Z. Pietrzak, B. Przydatek, in:, Springer, 2006, pp. 601–616.
View
| DOI
Y. Dodis, K.Z. Pietrzak, B. Przydatek, in:, Springer, 2006, pp. 601–616.
2006 | Published | Conference Paper | IST-REx-ID: 3216
A tight bound for EMAC
K.Z. Pietrzak, in:, Springer, 2006, pp. 168–179.
View
| DOI
K.Z. Pietrzak, in:, Springer, 2006, pp. 168–179.
2006 | Published | Conference Paper | IST-REx-ID: 3217
Composition implies adaptive security in minicrypt
K.Z. Pietrzak, in:, Springer, 2006, pp. 328–338.
View
| DOI
K.Z. Pietrzak, in:, Springer, 2006, pp. 328–338.
2005 | Published | Conference Paper | IST-REx-ID: 3211
Improved security analyses for CBC MACs
M. Bellare, K.Z. Pietrzak, P. Rogaway, in:, Springer, 2005, pp. 527–545.
View
| DOI
M. Bellare, K.Z. Pietrzak, P. Rogaway, in:, Springer, 2005, pp. 527–545.
2005 | Published | Conference Paper | IST-REx-ID: 3212
On the generic insecurity of the full domain hash
Y. Dodis, R. Oliveira, K.Z. Pietrzak, in:, Springer, 2005, pp. 449–466.
View
| DOI
Y. Dodis, R. Oliveira, K.Z. Pietrzak, in:, Springer, 2005, pp. 449–466.
2005 | Published | Conference Paper | IST-REx-ID: 3213
Composition does not imply adaptive security
K.Z. Pietrzak, in:, Springer, 2005, pp. 55–65.
View
| DOI
K.Z. Pietrzak, in:, Springer, 2005, pp. 55–65.
2004 | Published | Conference Paper | IST-REx-ID: 3208
Composition of random systems: When two weak make one strong
U. Maurer, K.Z. Pietrzak, in:, Springer, 2004, pp. 410–427.
View
| DOI
U. Maurer, K.Z. Pietrzak, in:, Springer, 2004, pp. 410–427.
2003 | Published | Journal Article | IST-REx-ID: 3209
On the parameterized complexity of the fixed alphabet shortest common supersequence and longest common subsequence problems
K.Z. Pietrzak, Journal of Computer and System Sciences 67 (2003) 757–771.
View
| DOI
K.Z. Pietrzak, Journal of Computer and System Sciences 67 (2003) 757–771.
2003 | Published | Conference Paper | IST-REx-ID: 3210
The security of many round Luby Rackoff pseudo random permutations
U. Maurer, K.Z. Pietrzak, in:, Springer, 2003, pp. 544–561.
View
| DOI
U. Maurer, K.Z. Pietrzak, in:, Springer, 2003, pp. 544–561.
4 Grants
Teaching Old Crypto New Tricks (TOCNeT)
2016-04-01 – 2021-03-31
H2020
2011-09-01 – 2015-10-31
FP7
2023-01-01 – 2026-12-31
2019-07-01 – 2022-06-30
106 Publications
2024 | Published | Conference Paper | IST-REx-ID: 17051 |
Trapdoor memory-hard functions
B. Auerbach, C.U. Günther, K.Z. Pietrzak, in:, 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer Nature, 2024, pp. 315–344.
[Preprint]
View
| DOI
| Download Preprint (ext.)
B. Auerbach, C.U. Günther, K.Z. Pietrzak, in:, 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer Nature, 2024, pp. 315–344.
2024 | Published | Conference Paper | IST-REx-ID: 17328 |
Fully automated selfish mining analysis in efficient proof systems blockchains
K. Chatterjee, A. Ebrahimzadeh, M. Karrabi, K.Z. Pietrzak, M.X. Yeo, D. Zikelic, in:, Proceedings of the 43rd Annual ACM Symposium on Principles of Distributed Computing, Association for Computing Machinery, 2024, pp. 268–278.
[Published Version]
View
| Files available
| DOI
| arXiv
K. Chatterjee, A. Ebrahimzadeh, M. Karrabi, K.Z. Pietrzak, M.X. Yeo, D. Zikelic, in:, Proceedings of the 43rd Annual ACM Symposium on Principles of Distributed Computing, Association for Computing Machinery, 2024, pp. 268–278.
2024 | Published | Conference Paper | IST-REx-ID: 18086
DeCAF: Decentralizable CGKA with fast healing
J.F. Alwen, B. Auerbach, M. Cueto Noval, K. Klein, G. Pascual Perez, K.Z. Pietrzak, in:, C. Galdi, D.H. Phan (Eds.), Security and Cryptography for Networks: 14th International Conference, Springer Nature, Cham, 2024, pp. 294–313.
View
| Files available
| DOI
J.F. Alwen, B. Auerbach, M. Cueto Noval, K. Klein, G. Pascual Perez, K.Z. Pietrzak, in:, C. Galdi, D.H. Phan (Eds.), Security and Cryptography for Networks: 14th International Conference, Springer Nature, Cham, 2024, pp. 294–313.
2023 | Published | Conference Paper | IST-REx-ID: 13143 |
Certifying giant nonprimes
C. Hoffmann, P. Hubáček, C. Kamath, K.Z. Pietrzak, in:, Public-Key Cryptography - PKC 2023, Springer Nature, 2023, pp. 530–553.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
C. Hoffmann, P. Hubáček, C. Kamath, K.Z. Pietrzak, in:, Public-Key Cryptography - PKC 2023, Springer Nature, 2023, pp. 530–553.
2023 | Published | Conference Paper | IST-REx-ID: 14691 |
On the cost of post-compromise security in concurrent Continuous Group-Key Agreement
B. Auerbach, M. Cueto Noval, G. Pascual Perez, K.Z. Pietrzak, in:, 21st International Conference on Theory of Cryptography, Springer Nature, 2023, pp. 271–300.
[Preprint]
View
| DOI
| Download Preprint (ext.)
B. Auerbach, M. Cueto Noval, G. Pascual Perez, K.Z. Pietrzak, in:, 21st International Conference on Theory of Cryptography, Springer Nature, 2023, pp. 271–300.
2023 | Published | Conference Paper | IST-REx-ID: 14428 |
Random oracle combiners: Breaking the concatenation barrier for collision-resistance
Y. Dodis, N. Ferguson, E. Goldin, P. Hall, K.Z. Pietrzak, in:, 43rd Annual International Cryptology Conference, Springer Nature, 2023, pp. 514–546.
[Preprint]
View
| DOI
| Download Preprint (ext.)
Y. Dodis, N. Ferguson, E. Goldin, P. Hall, K.Z. Pietrzak, in:, 43rd Annual International Cryptology Conference, Springer Nature, 2023, pp. 514–546.
2022 | Published | Conference Paper | IST-REx-ID: 17060 |
Wiser: Increasing throughput in payment channel networks with transaction aggregation
S. Tiwari, M.X. Yeo, Z. Avarikioti, I. Salem, K.Z. Pietrzak, S. Schmid, in:, Proceedings of the 4th ACM Conference on Advances in Financial Technologies, Association for Computing Machinery, 2022, pp. 217–231.
[Published Version]
View
| Files available
| DOI
| WoS
| arXiv
S. Tiwari, M.X. Yeo, Z. Avarikioti, I. Salem, K.Z. Pietrzak, S. Schmid, in:, Proceedings of the 4th ACM Conference on Advances in Financial Technologies, Association for Computing Machinery, 2022, pp. 217–231.
2022 | Published | Conference Paper | IST-REx-ID: 12167 |
Hide & Seek: Privacy-preserving rebalancing on payment channel networks
G. Avarikioti, K.Z. Pietrzak, I. Salem, S. Schmid, S. Tiwari, M.X. Yeo, in:, Financial Cryptography and Data Security, Springer Nature, 2022, pp. 358–373.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| arXiv
G. Avarikioti, K.Z. Pietrzak, I. Salem, S. Schmid, S. Tiwari, M.X. Yeo, in:, Financial Cryptography and Data Security, Springer Nature, 2022, pp. 358–373.
2022 | Published | Conference Paper | IST-REx-ID: 12176 |
Practical statistically-sound proofs of exponentiation in any group
C. Hoffmann, P. Hubáček, C. Kamath, K. Klein, K.Z. Pietrzak, in:, Advances in Cryptology – CRYPTO 2022, Springer Nature, 2022, pp. 370–399.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
C. Hoffmann, P. Hubáček, C. Kamath, K. Klein, K.Z. Pietrzak, in:, Advances in Cryptology – CRYPTO 2022, Springer Nature, 2022, pp. 370–399.
2022 | Published | Conference Paper | IST-REx-ID: 11476 |
CoCoA: Concurrent continuous group key agreement
J. Alwen, B. Auerbach, M. Cueto Noval, K. Klein, G. Pascual Perez, K.Z. Pietrzak, M. Walter, in:, Advances in Cryptology – EUROCRYPT 2022, Springer Nature, Cham, 2022, pp. 815–844.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
| WoS
J. Alwen, B. Auerbach, M. Cueto Noval, K. Klein, G. Pascual Perez, K.Z. Pietrzak, M. Walter, in:, Advances in Cryptology – EUROCRYPT 2022, Springer Nature, Cham, 2022, pp. 815–844.
2021 | Published | Conference Paper | IST-REx-ID: 10044 |
On treewidth, separators and Yao's garbling
C. Kamath Hosdurg, K. Klein, K.Z. Pietrzak, in:, 19th Theory of Cryptography Conference 2021, International Association for Cryptologic Research, 2021.
[Preprint]
View
| Files available
| Download Preprint (ext.)
C. Kamath Hosdurg, K. Klein, K.Z. Pietrzak, in:, 19th Theory of Cryptography Conference 2021, International Association for Cryptologic Research, 2021.
2021 | Published | Conference Paper | IST-REx-ID: 10048 |
The cost of adaptivity in security games on graphs
C. Kamath Hosdurg, K. Klein, K.Z. Pietrzak, M. Walter, in:, 19th Theory of Cryptography Conference 2021, International Association for Cryptologic Research, 2021.
[Preprint]
View
| Files available
| Download Preprint (ext.)
C. Kamath Hosdurg, K. Klein, K.Z. Pietrzak, M. Walter, in:, 19th Theory of Cryptography Conference 2021, International Association for Cryptologic Research, 2021.
2021 | Published | Conference Paper | IST-REx-ID: 10407 |
Trojan-resilience without cryptography
S. Chakraborty, S. Dziembowski, M. Gałązka, T. Lizurej, K.Z. Pietrzak, M.X. Yeo, in:, Springer Nature, 2021, pp. 397–428.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
S. Chakraborty, S. Dziembowski, M. Gałązka, T. Lizurej, K.Z. Pietrzak, M.X. Yeo, in:, Springer Nature, 2021, pp. 397–428.
2021 | Published | Conference Paper | IST-REx-ID: 10408 |
Grafting key trees: Efficient key management for overlapping groups
J.F. Alwen, B. Auerbach, M.A. Baig, M. Cueto Noval, K. Klein, G. Pascual Perez, K.Z. Pietrzak, M. Walter, in:, 19th International Conference, Springer Nature, 2021, pp. 222–253.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
| WoS
J.F. Alwen, B. Auerbach, M.A. Baig, M. Cueto Noval, K. Klein, G. Pascual Perez, K.Z. Pietrzak, M. Walter, in:, 19th International Conference, Springer Nature, 2021, pp. 222–253.
2021 | Published | Conference Paper | IST-REx-ID: 10409 |
On treewidth, separators and Yao’s garbling
C. Kamath Hosdurg, K. Klein, K.Z. Pietrzak, in:, 19th International Conference, Springer Nature, 2021, pp. 486–517.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
| WoS
C. Kamath Hosdurg, K. Klein, K.Z. Pietrzak, in:, 19th International Conference, Springer Nature, 2021, pp. 486–517.
2021 | Published | Conference Paper | IST-REx-ID: 10410 |
The cost of adaptivity in security games on graphs
C. Kamath Hosdurg, K. Klein, K.Z. Pietrzak, M. Walter, in:, 19th International Conference, Springer Nature, 2021, pp. 550–581.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
| WoS
C. Kamath Hosdurg, K. Klein, K.Z. Pietrzak, M. Walter, in:, 19th International Conference, Springer Nature, 2021, pp. 550–581.
2021 | Published | Conference Paper | IST-REx-ID: 9969 |
LightPIR: Privacy-preserving route discovery for payment channel networks
K.Z. Pietrzak, I. Salem, S. Schmid, M.X. Yeo, in:, IEEE, 2021.
[Submitted Version]
View
| Files available
| DOI
| Download Submitted Version (ext.)
| WoS
| arXiv
K.Z. Pietrzak, I. Salem, S. Schmid, M.X. Yeo, in:, IEEE, 2021.
2021 | Published | Conference Paper | IST-REx-ID: 10041 |
Limits on the Adaptive Security of Yao’s Garbling
C. Kamath Hosdurg, K. Klein, K.Z. Pietrzak, D. Wichs, in:, 41st Annual International Cryptology Conference, Part II , Springer Nature, Cham, 2021, pp. 486–515.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
C. Kamath Hosdurg, K. Klein, K.Z. Pietrzak, D. Wichs, in:, 41st Annual International Cryptology Conference, Part II , Springer Nature, Cham, 2021, pp. 486–515.
2021 | Published | Conference Paper | IST-REx-ID: 10049 |
Keep the dirt: tainted TreeKEM, adaptively and actively secure continuous group key agreement
K. Klein, G. Pascual Perez, M. Walter, C. Kamath Hosdurg, M. Capretto, M. Cueto Noval, I. Markov, M.X. Yeo, J.F. Alwen, K.Z. Pietrzak, in:, 2021 IEEE Symposium on Security and Privacy , IEEE, 2021, pp. 268–284.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
K. Klein, G. Pascual Perez, M. Walter, C. Kamath Hosdurg, M. Capretto, M. Cueto Noval, I. Markov, M.X. Yeo, J.F. Alwen, K.Z. Pietrzak, in:, 2021 IEEE Symposium on Security and Privacy , IEEE, 2021, pp. 268–284.
2021 | Published | Conference Paper | IST-REx-ID: 9826 |
Inverse-Sybil attacks in automated contact tracing
B. Auerbach, S. Chakraborty, K. Klein, G. Pascual Perez, K.Z. Pietrzak, M. Walter, M.X. Yeo, in:, Topics in Cryptology – CT-RSA 2021, Springer Nature, 2021, pp. 399–421.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
B. Auerbach, S. Chakraborty, K. Klein, G. Pascual Perez, K.Z. Pietrzak, M. Walter, M.X. Yeo, in:, Topics in Cryptology – CT-RSA 2021, Springer Nature, 2021, pp. 399–421.
2020 | Published | Conference Paper | IST-REx-ID: 8987 |
Delayed authentication: Preventing replay and relay attacks in private contact tracing
K.Z. Pietrzak, in:, Progress in Cryptology, Springer Nature, 2020, pp. 3–15.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
K.Z. Pietrzak, in:, Progress in Cryptology, Springer Nature, 2020, pp. 3–15.
2019 | Published | Conference Paper | IST-REx-ID: 7411 |
Reversible proofs of sequential work
H.M. Abusalah, C. Kamath Hosdurg, K. Klein, K.Z. Pietrzak, M. Walter, in:, Advances in Cryptology – EUROCRYPT 2019, Springer International Publishing, 2019, pp. 277–291.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
| WoS
H.M. Abusalah, C. Kamath Hosdurg, K. Klein, K.Z. Pietrzak, M. Walter, in:, Advances in Cryptology – EUROCRYPT 2019, Springer International Publishing, 2019, pp. 277–291.
2019 | Published | Conference Paper | IST-REx-ID: 6430 |
Adaptively secure proxy re-encryption
G. Fuchsbauer, C. Kamath Hosdurg, K. Klein, K.Z. Pietrzak, in:, Springer Nature, 2019, pp. 317–346.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
G. Fuchsbauer, C. Kamath Hosdurg, K. Klein, K.Z. Pietrzak, in:, Springer Nature, 2019, pp. 317–346.
2019 | Published | Conference Paper | IST-REx-ID: 6528 |
Simple verifiable delay functions
K.Z. Pietrzak, in:, 10th Innovations in Theoretical Computer Science Conference, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2019.
[Published Version]
View
| Files available
| DOI
| Download Published Version (ext.)
K.Z. Pietrzak, in:, 10th Innovations in Theoretical Computer Science Conference, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2019.
2019 | Published | Conference Paper | IST-REx-ID: 6677 |
Finding a Nash equilibrium is no easier than breaking Fiat-Shamir
A.R. Choudhuri, P. Hubáček, C. Kamath Hosdurg, K.Z. Pietrzak, A. Rosen, G.N. Rothblum, in:, Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing - STOC 2019, ACM Press, 2019, pp. 1103–1114.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
| WoS
A.R. Choudhuri, P. Hubáček, C. Kamath Hosdurg, K.Z. Pietrzak, A. Rosen, G.N. Rothblum, in:, Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing - STOC 2019, ACM Press, 2019, pp. 1103–1114.
2018 | Published | Journal Article | IST-REx-ID: 107 |
Non-malleable codes
S. Dziembowski, K.Z. Pietrzak, D. Wichs, Journal of the ACM 65 (2018).
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
S. Dziembowski, K.Z. Pietrzak, D. Wichs, Journal of the ACM 65 (2018).
2018 | Published | Conference Paper | IST-REx-ID: 298 |
Sustained space complexity
J.F. Alwen, J. Blocki, K.Z. Pietrzak, in:, Springer, 2018, pp. 99–130.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
| arXiv
J.F. Alwen, J. Blocki, K.Z. Pietrzak, in:, Springer, 2018, pp. 99–130.
2018 | Published | Conference Paper | IST-REx-ID: 302 |
Simple proofs of sequential work
B. Cohen, K.Z. Pietrzak, in:, Springer, 2018, pp. 451–467.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
| WoS
B. Cohen, K.Z. Pietrzak, in:, Springer, 2018, pp. 451–467.
2018 | Published | Conference Paper | IST-REx-ID: 193 |
On the memory hardness of data independent password hashing functions
J.F. Alwen, P. Gazi, C. Kamath Hosdurg, K. Klein, G.F. Osang, K.Z. Pietrzak, L. Reyzin, M. Rolinek, M. Rybar, in:, Proceedings of the 2018 on Asia Conference on Computer and Communication Security, ACM, 2018, pp. 51–65.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
| WoS
J.F. Alwen, P. Gazi, C. Kamath Hosdurg, K. Klein, G.F. Osang, K.Z. Pietrzak, L. Reyzin, M. Rolinek, M. Rybar, in:, Proceedings of the 2018 on Asia Conference on Computer and Communication Security, ACM, 2018, pp. 51–65.
2018 | Published | Conference Paper | IST-REx-ID: 7407 |
Proofs of catalytic space
K.Z. Pietrzak, in:, 10th Innovations in Theoretical Computer Science Conference (ITCS 2019), Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2018, p. 59:1-59:25.
[Published Version]
View
| Files available
| DOI
| Download Published Version (ext.)
K.Z. Pietrzak, in:, 10th Innovations in Theoretical Computer Science Conference (ITCS 2019), Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2018, p. 59:1-59:25.
2018 | Published | Conference Paper | IST-REx-ID: 6941 |
SpaceMint: A cryptocurrency based on proofs of space
S. Park, A. Kwon, G. Fuchsbauer, P. Gazi, J.F. Alwen, K.Z. Pietrzak, in:, 22nd International Conference on Financial Cryptography and Data Security, Springer Nature, 2018, pp. 480–499.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
| WoS
S. Park, A. Kwon, G. Fuchsbauer, P. Gazi, J.F. Alwen, K.Z. Pietrzak, in:, 22nd International Conference on Financial Cryptography and Data Security, Springer Nature, 2018, pp. 480–499.
2017 | Published | Conference Paper | IST-REx-ID: 559 |
Beyond Hellman’s time-memory trade-offs with applications to proofs of space
H.M. Abusalah, J.F. Alwen, B. Cohen, D. Khilko, K.Z. Pietrzak, L. Reyzin, in:, Springer, 2017, pp. 357–379.
[Submitted Version]
View
| Files available
| DOI
| Download Submitted Version (ext.)
H.M. Abusalah, J.F. Alwen, B. Cohen, D. Khilko, K.Z. Pietrzak, L. Reyzin, in:, Springer, 2017, pp. 357–379.
2017 | Published | Journal Article | IST-REx-ID: 1187 |
Efficient authentication from hard learning problems
E. Kiltz, K.Z. Pietrzak, D. Venturi, D. Cash, A. Jain, Journal of Cryptology 30 (2017) 1238–1275.
[Submitted Version]
View
| Files available
| DOI
| WoS
E. Kiltz, K.Z. Pietrzak, D. Venturi, D. Cash, A. Jain, Journal of Cryptology 30 (2017) 1238–1275.
2017 | Published | Conference Paper | IST-REx-ID: 605 |
Position based cryptography and multiparty communication complexity
J. Brody, S. Dziembowski, S. Faust, K.Z. Pietrzak, in:, Y. Kalai, L. Reyzin (Eds.), Springer, 2017, pp. 56–81.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
J. Brody, S. Dziembowski, S. Faust, K.Z. Pietrzak, in:, Y. Kalai, L. Reyzin (Eds.), Springer, 2017, pp. 56–81.
2017 | Published | Journal Article | IST-REx-ID: 6196 |
The exact security of PMAC
P. Gazi, K.Z. Pietrzak, M. Rybar, IACR Transactions on Symmetric Cryptology 2016 (2017) 145–161.
[Published Version]
View
| Files available
| DOI
P. Gazi, K.Z. Pietrzak, M. Rybar, IACR Transactions on Symmetric Cryptology 2016 (2017) 145–161.
2017 | Published | Conference Paper | IST-REx-ID: 635 |
Scrypt is maximally memory hard
J.F. Alwen, B. Chen, K.Z. Pietrzak, L. Reyzin, S. Tessaro, in:, J.-S. Coron, J. Buus Nielsen (Eds.), Springer, 2017, pp. 33–62.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
J.F. Alwen, B. Chen, K.Z. Pietrzak, L. Reyzin, S. Tessaro, in:, J.-S. Coron, J. Buus Nielsen (Eds.), Springer, 2017, pp. 33–62.
2017 | Published | Conference Paper | IST-REx-ID: 637 |
Be adaptive avoid overcommitting
Z. Jafargholi, C. Kamath Hosdurg, K. Klein, I. Komargodski, K.Z. Pietrzak, D. Wichs, in:, J. Katz, H. Shacham (Eds.), Springer, 2017, pp. 133–163.
[Submitted Version]
View
| Files available
| DOI
| Download Submitted Version (ext.)
Z. Jafargholi, C. Kamath Hosdurg, K. Klein, I. Komargodski, K.Z. Pietrzak, D. Wichs, in:, J. Katz, H. Shacham (Eds.), Springer, 2017, pp. 133–163.
2017 | Published | Conference Paper | IST-REx-ID: 640 |
Depth-robust graphs and their cumulative memory complexity
J.F. Alwen, J. Blocki, K.Z. Pietrzak, in:, J.-S. Coron, J. Buus Nielsen (Eds.), Springer, 2017, pp. 3–32.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
J.F. Alwen, J. Blocki, K.Z. Pietrzak, in:, J.-S. Coron, J. Buus Nielsen (Eds.), Springer, 2017, pp. 3–32.
2017 | Published | Conference Paper | IST-REx-ID: 697 |
Non uniform attacks against pseudoentropy
K.Z. Pietrzak, M. Skórski, in:, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2017.
[Published Version]
View
| Files available
| DOI
K.Z. Pietrzak, M. Skórski, in:, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2017.
2016 | Published | Conference Paper | IST-REx-ID: 1231 |
On the complexity of scrypt and proofs of space in the parallel random oracle model
J.F. Alwen, B. Chen, C. Kamath Hosdurg, V. Kolmogorov, K.Z. Pietrzak, S. Tessaro, in:, Springer, 2016, pp. 358–387.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
J.F. Alwen, B. Chen, C. Kamath Hosdurg, V. Kolmogorov, K.Z. Pietrzak, S. Tessaro, in:, Springer, 2016, pp. 358–387.
2016 | Published | Conference Paper | IST-REx-ID: 1653 |
New realizations of somewhere statistically binding hashing and positional accumulators
T. Okamoto, K.Z. Pietrzak, B. Waters, D. Wichs, in:, Springer, 2016, pp. 121–145.
[Submitted Version]
View
| Files available
| DOI
T. Okamoto, K.Z. Pietrzak, B. Waters, D. Wichs, in:, Springer, 2016, pp. 121–145.
2016 | Published | Conference Paper | IST-REx-ID: 1229 |
Offline witness encryption
H.M. Abusalah, G. Fuchsbauer, K.Z. Pietrzak, in:, Springer, 2016, pp. 285–303.
[Submitted Version]
View
| Files available
| DOI
H.M. Abusalah, G. Fuchsbauer, K.Z. Pietrzak, in:, Springer, 2016, pp. 285–303.
2016 | Published | Conference Paper | IST-REx-ID: 1233 |
Standard security does imply security against selective opening for markov distributions
G. Fuchsbauer, F. Heuer, E. Kiltz, K.Z. Pietrzak, in:, Springer, 2016, pp. 282–305.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
G. Fuchsbauer, F. Heuer, E. Kiltz, K.Z. Pietrzak, in:, Springer, 2016, pp. 282–305.
2016 | Published | Conference Paper | IST-REx-ID: 1236 |
Constrained PRFs for unbounded inputs
H.M. Abusalah, G. Fuchsbauer, K.Z. Pietrzak, in:, Springer, 2016, pp. 413–428.
[Submitted Version]
View
| Files available
| DOI
H.M. Abusalah, G. Fuchsbauer, K.Z. Pietrzak, in:, Springer, 2016, pp. 413–428.
2016 | Published | Conference Paper | IST-REx-ID: 1179 |
Pseudoentropy: Lower-bounds for chain rules and transformations
K.Z. Pietrzak, S. Maciej, in:, Springer, 2016, pp. 183–203.
[Preprint]
View
| DOI
| Download Preprint (ext.)
K.Z. Pietrzak, S. Maciej, in:, Springer, 2016, pp. 183–203.
2016 | Published | Journal Article | IST-REx-ID: 1479 |
A counterexample to the chain rule for conditional HILL entropy
S. Krenn, K.Z. Pietrzak, A. Wadia, D. Wichs, Computational Complexity 25 (2016) 567–605.
[Submitted Version]
View
| Files available
| DOI
S. Krenn, K.Z. Pietrzak, A. Wadia, D. Wichs, Computational Complexity 25 (2016) 567–605.
2015 | Published | Conference Paper | IST-REx-ID: 1675 |
Proofs of space
S. Dziembowski, S. Faust, V. Kolmogorov, K.Z. Pietrzak, in:, 35th Annual Cryptology Conference, Springer, 2015, pp. 585–605.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
S. Dziembowski, S. Faust, V. Kolmogorov, K.Z. Pietrzak, in:, 35th Annual Cryptology Conference, Springer, 2015, pp. 585–605.
2015 | Published | Conference Paper | IST-REx-ID: 1646 |
Key-homomorphic constrained pseudorandom functions
A. Banerjee, G. Fuchsbauer, C. Peikert, K.Z. Pietrzak, S. Stevens, in:, 12th Theory of Cryptography Conference, Springer Nature, 2015, pp. 31–60.
[Submitted Version]
View
| Files available
| DOI
| Download Submitted Version (ext.)
A. Banerjee, G. Fuchsbauer, C. Peikert, K.Z. Pietrzak, S. Stevens, in:, 12th Theory of Cryptography Conference, Springer Nature, 2015, pp. 31–60.
2015 | Published | Conference Paper | IST-REx-ID: 1648 |
A quasipolynomial reduction for generalized selective decryption on trees
G. Fuchsbauer, Z. Jafargholi, K.Z. Pietrzak, in:, Springer, 2015, pp. 601–620.
[Submitted Version]
View
| Files available
| DOI
G. Fuchsbauer, Z. Jafargholi, K.Z. Pietrzak, in:, Springer, 2015, pp. 601–620.
2015 | Published | Conference Paper | IST-REx-ID: 1649 |
Efficient zero-knowledge proofs for commitments from learning with errors over rings
F. Benhamouda, S. Krenn, V. Lyubashevsky, K.Z. Pietrzak, 9326 (2015) 305–325.
[Published Version]
View
| Files available
| DOI
F. Benhamouda, S. Krenn, V. Lyubashevsky, K.Z. Pietrzak, 9326 (2015) 305–325.
2015 | Published | Conference Paper | IST-REx-ID: 1650 |
Condensed unpredictability
M. Skórski, A. Golovnev, K.Z. Pietrzak, in:, Springer, 2015, pp. 1046–1057.
[Published Version]
View
| Files available
| DOI
M. Skórski, A. Golovnev, K.Z. Pietrzak, in:, Springer, 2015, pp. 1046–1057.
2015 | Published | Conference Paper | IST-REx-ID: 1654 |
Generic security of NMAC and HMAC with input whitening
P. Gazi, K.Z. Pietrzak, S. Tessaro, 9453 (2015) 85–109.
[Submitted Version]
View
| Files available
| DOI
P. Gazi, K.Z. Pietrzak, S. Tessaro, 9453 (2015) 85–109.
2015 | Published | Conference Paper | IST-REx-ID: 1669 |
The chain rule for HILL pseudoentropy, revisited
K.Z. Pietrzak, M. Skórski, 9230 (2015) 81–98.
[Submitted Version]
View
| Files available
| DOI
K.Z. Pietrzak, M. Skórski, 9230 (2015) 81–98.
2015 | Published | Conference Paper | IST-REx-ID: 1671 |
The exact PRF security of truncation: Tight bounds for keyed sponges and truncated CBC
P. Gazi, K.Z. Pietrzak, S. Tessaro, in:, Springer, 2015, pp. 368–387.
[Submitted Version]
View
| Files available
| DOI
P. Gazi, K.Z. Pietrzak, S. Tessaro, in:, Springer, 2015, pp. 368–387.
2014 | Published | Journal Article | IST-REx-ID: 2852
Robust multi-property combiners for hash functions
M. Fischlin, A. Lehmann, K.Z. Pietrzak, Journal of Cryptology 27 (2014) 397–428.
View
| Files available
| DOI
M. Fischlin, A. Lehmann, K.Z. Pietrzak, Journal of Cryptology 27 (2014) 397–428.
2014 | Published | Conference Paper | IST-REx-ID: 2236 |
How to fake auxiliary input
D. Jetchev, K.Z. Pietrzak, in:, Y. Lindell (Ed.), Springer, 2014, pp. 566–590.
[Submitted Version]
View
| Files available
| DOI
| Download Submitted Version (ext.)
D. Jetchev, K.Z. Pietrzak, in:, Y. Lindell (Ed.), Springer, 2014, pp. 566–590.
2014 | Published | Conference Paper | IST-REx-ID: 2082 |
The exact PRF-security of NMAC and HMAC
P. Gazi, K.Z. Pietrzak, M. Rybar, in:, J. Garay, R. Gennaro (Eds.), Springer, 2014, pp. 113–130.
[Submitted Version]
View
| Files available
| DOI
P. Gazi, K.Z. Pietrzak, M. Rybar, in:, J. Garay, R. Gennaro (Eds.), Springer, 2014, pp. 113–130.
2014 | Published | Conference Paper | IST-REx-ID: 1927 |
Adaptive security of constrained PRFs
G. Fuchsbauer, M. Konstantinov, K.Z. Pietrzak, V. Rao, in:, Springer, 2014, pp. 173–192.
View
| DOI
| Download (ext.)
G. Fuchsbauer, M. Konstantinov, K.Z. Pietrzak, V. Rao, in:, Springer, 2014, pp. 173–192.
2014 | Published | Conference Paper | IST-REx-ID: 2185 |
Key derivation without entropy waste
Y. Dodis, K.Z. Pietrzak, D. Wichs, in:, P. Nguyen, E. Oswald (Eds.), Springer, 2014, pp. 93–110.
[Submitted Version]
View
| Files available
| DOI
Y. Dodis, K.Z. Pietrzak, D. Wichs, in:, P. Nguyen, E. Oswald (Eds.), Springer, 2014, pp. 93–110.
2014 | Published | Conference Paper | IST-REx-ID: 2219 |
Simple chosen-ciphertext security from low noise LPN
E. Kiltz, D. Masny, K.Z. Pietrzak, in:, Springer, 2014, pp. 1–18.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
E. Kiltz, D. Masny, K.Z. Pietrzak, in:, Springer, 2014, pp. 1–18.
2013 | Published | Conference Paper | IST-REx-ID: 2940 |
A counterexample to the chain rule for conditional HILL entropy, and what deniable encryption has to do with it
S. Krenn, K.Z. Pietrzak, A. Wadia, in:, A. Sahai (Ed.), Springer, 2013, pp. 23–39.
[Submitted Version]
View
| Files available
| DOI
S. Krenn, K.Z. Pietrzak, A. Wadia, in:, A. Sahai (Ed.), Springer, 2013, pp. 23–39.
2013 | Published | Report | IST-REx-ID: 2274 |
Proofs of Space
S. Dziembowski, S. Faust, V. Kolmogorov, K.Z. Pietrzak, Proofs of Space, IST Austria, 2013.
[Published Version]
View
| Files available
S. Dziembowski, S. Faust, V. Kolmogorov, K.Z. Pietrzak, Proofs of Space, IST Austria, 2013.
2013 | Published | Conference Paper | IST-REx-ID: 2258 |
Digital signatures with minimal overhead from indifferentiable random invertible functions
E. Kiltz, K.Z. Pietrzak, M. Szegedy, 8042 (2013) 571–588.
[Submitted Version]
View
| Files available
| DOI
E. Kiltz, K.Z. Pietrzak, M. Szegedy, 8042 (2013) 571–588.
2013 | Published | Conference Paper | IST-REx-ID: 2259 |
Learning with rounding, revisited: New reduction properties and applications
J.F. Alwen, S. Krenn, K.Z. Pietrzak, D. Wichs, 8042 (2013) 57–74.
[Published Version]
View
| Files available
| DOI
J.F. Alwen, S. Krenn, K.Z. Pietrzak, D. Wichs, 8042 (2013) 57–74.
2012 | Published | Conference Paper | IST-REx-ID: 2974 |
Commitments and efficient zero knowledge proofs from learning parity with noise
A. Jain, S. Krenn, K.Z. Pietrzak, A. Tentes, in:, X. Wang, K. Sako (Eds.), Springer, 2012, pp. 663–680.
[Submitted Version]
View
| Files available
| DOI
A. Jain, S. Krenn, K.Z. Pietrzak, A. Tentes, in:, X. Wang, K. Sako (Eds.), Springer, 2012, pp. 663–680.
2012 | Published | Journal Article | IST-REx-ID: 3241
Parallel repetition of computationally sound protocols revisited
K.Z. Pietrzak, D. Wikström, Journal of Cryptology 25 (2012) 116–135.
View
| DOI
K.Z. Pietrzak, D. Wikström, Journal of Cryptology 25 (2012) 116–135.
2012 | Published | Conference Paper | IST-REx-ID: 3250
Cryptography from learning parity with noise
K.Z. Pietrzak, in:, Springer, 2012, pp. 99–114.
View
| DOI
K.Z. Pietrzak, in:, Springer, 2012, pp. 99–114.
2012 | Published | Conference Paper | IST-REx-ID: 3279
Hardness preserving constructions of pseudorandom functions
A. Jain, K.Z. Pietrzak, A. Tentes, in:, Springer, 2012, pp. 369–382.
View
| DOI
| Download None (ext.)
A. Jain, K.Z. Pietrzak, A. Tentes, in:, Springer, 2012, pp. 369–382.
2012 | Published | Conference Paper | IST-REx-ID: 3282 |
Message authentication, revisited
Y. Dodis, K.Z. Pietrzak, E. Kiltz, D. Wichs, in:, Springer, 2012, pp. 355–374.
[Submitted Version]
View
| Files available
| DOI
Y. Dodis, K.Z. Pietrzak, E. Kiltz, D. Wichs, in:, Springer, 2012, pp. 355–374.
2012 | Published | Conference Paper | IST-REx-ID: 3280 |
Subspace LWE
K.Z. Pietrzak, in:, Springer, 2012, pp. 548–563.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
K.Z. Pietrzak, in:, Springer, 2012, pp. 548–563.
2012 | Published | Conference Paper | IST-REx-ID: 3281
Lossy functions do not amplify well
K.Z. Pietrzak, A. Rosen, G. Segev, in:, Springer, 2012, pp. 458–475.
View
| DOI
| Download None (ext.)
K.Z. Pietrzak, A. Rosen, G. Segev, in:, Springer, 2012, pp. 458–475.
2012 | Published | Conference Paper | IST-REx-ID: 2048 |
Practical leakage-resilient symmetric cryptography
S. Faust, K.Z. Pietrzak, J. Schipper, in:, Conference Proceedings CHES 2012, Springer, 2012, pp. 213–232.
[Preprint]
View
| DOI
| Download Preprint (ext.)
S. Faust, K.Z. Pietrzak, J. Schipper, in:, Conference Proceedings CHES 2012, Springer, 2012, pp. 213–232.
2012 | Published | Conference Paper | IST-REx-ID: 2049 |
Lapin: An efficient authentication protocol based on ring-LPN
S. Heyse, E. Kiltz, V. Lyubashevsky, C. Paar, K.Z. Pietrzak, in:, Conference Proceedings FSE 2012, Springer, 2012, pp. 346–365.
[Preprint]
View
| DOI
| Download Preprint (ext.)
S. Heyse, E. Kiltz, V. Lyubashevsky, C. Paar, K.Z. Pietrzak, in:, Conference Proceedings FSE 2012, Springer, 2012, pp. 346–365.
2011 | Published | Conference Paper | IST-REx-ID: 3236
Parallel repetition for leakage resilience amplification revisited
A. Jain, K.Z. Pietrzak, in:, Springer, 2011, pp. 58–69.
View
| DOI
A. Jain, K.Z. Pietrzak, in:, Springer, 2011, pp. 58–69.
2011 | Published | Conference Paper | IST-REx-ID: 3238
Efficient authentication from hard learning problems
E. Kiltz, K.Z. Pietrzak, D. Cash, A. Jain, D. Venturi, in:, Springer, 2011, pp. 7–26.
View
| Files available
| DOI
E. Kiltz, K.Z. Pietrzak, D. Cash, A. Jain, D. Venturi, in:, Springer, 2011, pp. 7–26.
2011 | Published | Conference Paper | IST-REx-ID: 3239
Tamper proof circuits How to trade leakage for tamper resilience
S. Faust, K.Z. Pietrzak, D. Venturi, in:, Springer, 2011, pp. 391–402.
View
| DOI
S. Faust, K.Z. Pietrzak, D. Venturi, in:, Springer, 2011, pp. 391–402.
2011 | Published | Conference Paper | IST-REx-ID: 3240
Leftover hash lemma revisited
B. Barak, Y. Dodis, H. Krawczyk, O. Pereira, K.Z. Pietrzak, F. Standaert, Y. Yu, in:, Springer, 2011, pp. 1–20.
View
| DOI
B. Barak, Y. Dodis, H. Krawczyk, O. Pereira, K.Z. Pietrzak, F. Standaert, Y. Yu, in:, Springer, 2011, pp. 1–20.
2010 | Published | Conference Paper | IST-REx-ID: 3233
An efficient parallel repetition theorem
J. Håstad, R. Pass, D. Wikström, K.Z. Pietrzak, in:, Springer, 2010, pp. 1–18.
View
| DOI
J. Håstad, R. Pass, D. Wikström, K.Z. Pietrzak, in:, Springer, 2010, pp. 1–18.
2010 | Published | Conference Paper | IST-REx-ID: 3234
Leakage resilient signatures
S. Faust, E. Kiltz, K.Z. Pietrzak, G. Rothblum, in:, Springer, 2010, pp. 343–360.
View
| DOI
S. Faust, E. Kiltz, K.Z. Pietrzak, G. Rothblum, in:, Springer, 2010, pp. 343–360.
2010 | Published | Conference Paper | IST-REx-ID: 3235
Leakage resilient pseudorandom functions and side channel attacks on feistel networks
Y. Dodis, K.Z. Pietrzak, in:, Springer, 2010, pp. 21–40.
View
| DOI
Y. Dodis, K.Z. Pietrzak, in:, Springer, 2010, pp. 21–40.
2010 | Published | Conference Paper | IST-REx-ID: 3237
Leakage resilient ElGamal encryption
E. Kiltz, K.Z. Pietrzak, in:, Springer, 2010, pp. 595–612.
View
| DOI
E. Kiltz, K.Z. Pietrzak, in:, Springer, 2010, pp. 595–612.
2009 | Published | Conference Paper | IST-REx-ID: 3230
A new randomness extraction paradigm for hybrid encryption
E. Kiltz, K.Z. Pietrzak, M. Stam, M. Yung, in:, Springer, 2009, pp. 590–609.
View
| DOI
E. Kiltz, K.Z. Pietrzak, M. Stam, M. Yung, in:, Springer, 2009, pp. 590–609.
2009 | Published | Conference Paper | IST-REx-ID: 3231
On the security of padding based encryption schemes Why We cannot prove OAEP secure in the standard model
E. Kiltz, K.Z. Pietrzak, in:, Springer, 2009, pp. 389–406.
View
| DOI
E. Kiltz, K.Z. Pietrzak, in:, Springer, 2009, pp. 389–406.
2009 | Published | Conference Paper | IST-REx-ID: 3232
A leakage resilient mode of operation
K.Z. Pietrzak, in:, Springer, 2009, pp. 462–482.
View
| DOI
K.Z. Pietrzak, in:, Springer, 2009, pp. 462–482.
2008 | Published | Conference Paper | IST-REx-ID: 3224
A new mode of operation for block ciphers and length preserving MACs
Y. Dodis, K.Z. Pietrzak, P. Puniya, in:, Springer, 2008, pp. 198–219.
View
| DOI
Y. Dodis, K.Z. Pietrzak, P. Puniya, in:, Springer, 2008, pp. 198–219.
2008 | Published | Conference Paper | IST-REx-ID: 3225
Robust multi property combiners for hash functions revisited
M. Fischlin, A. Lehmann, K.Z. Pietrzak, in:, Springer, 2008, pp. 655–666.
View
| Files available
| DOI
M. Fischlin, A. Lehmann, K.Z. Pietrzak, in:, Springer, 2008, pp. 655–666.
2008 | Published | Conference Paper | IST-REx-ID: 3226
Weak pseudorandom functions in minicrypt
K.Z. Pietrzak, J. Sjödin, in:, Springer, 2008, pp. 423–436.
View
| DOI
K.Z. Pietrzak, J. Sjödin, in:, Springer, 2008, pp. 423–436.
2008 | Published | Journal Article | IST-REx-ID: 3227
Elektrowiz – system of measurement data management
P. Zubielik, J. Nadaczny, K.Z. Pietrzak, M. Lawenda, Przeglad Elektrotechniczny 84 (2008) 239–242.
View
| Download (ext.)
P. Zubielik, J. Nadaczny, K.Z. Pietrzak, M. Lawenda, Przeglad Elektrotechniczny 84 (2008) 239–242.
2008 | Published | Conference Paper | IST-REx-ID: 3228
Compression from collisions or why CRHF combiners have a long output
K.Z. Pietrzak, in:, Springer, 2008, pp. 413–432.
View
| DOI
K.Z. Pietrzak, in:, Springer, 2008, pp. 413–432.
2008 | Published | Conference Paper | IST-REx-ID: 3229
Leakage resilient cryptography
S. Dziembowski, K.Z. Pietrzak, in:, IEEE, 2008, pp. 293–302.
View
| DOI
S. Dziembowski, K.Z. Pietrzak, in:, IEEE, 2008, pp. 293–302.
2007 | Published | Conference Paper | IST-REx-ID: 3218
Non-trivial black-box combiners for collision-resistant hash-functions don't exist
K.Z. Pietrzak, in:, Springer, 2007, pp. 23–33.
View
| DOI
K.Z. Pietrzak, in:, Springer, 2007, pp. 23–33.
2007 | Published | Conference Paper | IST-REx-ID: 3219
Indistinguishability amplification
U. Maurer, K.Z. Pietrzak, R. Renner, in:, Springer, 2007, pp. 130–149.
View
| DOI
U. Maurer, K.Z. Pietrzak, R. Renner, in:, Springer, 2007, pp. 130–149.
2007 | Published | Conference Paper | IST-REx-ID: 3220
Intrusion resilient secret sharing
S. Dziembowski, K.Z. Pietrzak, in:, IEEE, 2007, pp. 227–237.
View
| DOI
S. Dziembowski, K.Z. Pietrzak, in:, IEEE, 2007, pp. 227–237.
2007 | Published | Conference Paper | IST-REx-ID: 3221
Range extension for weak PRFs the good the bad and the ugly
K.Z. Pietrzak, J. Sjödin, in:, Springer, 2007, pp. 517–533.
View
| DOI
K.Z. Pietrzak, J. Sjödin, in:, Springer, 2007, pp. 517–533.
2007 | Published | Conference Paper | IST-REx-ID: 3222
Parallel repetition of computationally sound protocols revisited
K.Z. Pietrzak, D. Wikström, in:, Springer, 2007, pp. 86–102.
View
| DOI
K.Z. Pietrzak, D. Wikström, in:, Springer, 2007, pp. 86–102.
2007 | Published | Conference Paper | IST-REx-ID: 3223
Improving the security of MACs via randomized message preprocessing
Y. Dodis, K.Z. Pietrzak, in:, Springer, 2007, pp. 414–433.
View
| DOI
Y. Dodis, K.Z. Pietrzak, in:, Springer, 2007, pp. 414–433.
2006 | Published | Conference Paper | IST-REx-ID: 3214
Luby Rackoff ciphers from weak round functions
U. Maurer, Y. Oswald, K.Z. Pietrzak, J. Sjödin, in:, Springer, 2006, pp. 391–408.
View
| DOI
U. Maurer, Y. Oswald, K.Z. Pietrzak, J. Sjödin, in:, Springer, 2006, pp. 391–408.
2006 | Published | Conference Paper | IST-REx-ID: 3215
Separating sources for encryption and secret sharing
Y. Dodis, K.Z. Pietrzak, B. Przydatek, in:, Springer, 2006, pp. 601–616.
View
| DOI
Y. Dodis, K.Z. Pietrzak, B. Przydatek, in:, Springer, 2006, pp. 601–616.
2006 | Published | Conference Paper | IST-REx-ID: 3216
A tight bound for EMAC
K.Z. Pietrzak, in:, Springer, 2006, pp. 168–179.
View
| DOI
K.Z. Pietrzak, in:, Springer, 2006, pp. 168–179.
2006 | Published | Conference Paper | IST-REx-ID: 3217
Composition implies adaptive security in minicrypt
K.Z. Pietrzak, in:, Springer, 2006, pp. 328–338.
View
| DOI
K.Z. Pietrzak, in:, Springer, 2006, pp. 328–338.
2005 | Published | Conference Paper | IST-REx-ID: 3211
Improved security analyses for CBC MACs
M. Bellare, K.Z. Pietrzak, P. Rogaway, in:, Springer, 2005, pp. 527–545.
View
| DOI
M. Bellare, K.Z. Pietrzak, P. Rogaway, in:, Springer, 2005, pp. 527–545.
2005 | Published | Conference Paper | IST-REx-ID: 3212
On the generic insecurity of the full domain hash
Y. Dodis, R. Oliveira, K.Z. Pietrzak, in:, Springer, 2005, pp. 449–466.
View
| DOI
Y. Dodis, R. Oliveira, K.Z. Pietrzak, in:, Springer, 2005, pp. 449–466.
2005 | Published | Conference Paper | IST-REx-ID: 3213
Composition does not imply adaptive security
K.Z. Pietrzak, in:, Springer, 2005, pp. 55–65.
View
| DOI
K.Z. Pietrzak, in:, Springer, 2005, pp. 55–65.
2004 | Published | Conference Paper | IST-REx-ID: 3208
Composition of random systems: When two weak make one strong
U. Maurer, K.Z. Pietrzak, in:, Springer, 2004, pp. 410–427.
View
| DOI
U. Maurer, K.Z. Pietrzak, in:, Springer, 2004, pp. 410–427.
2003 | Published | Journal Article | IST-REx-ID: 3209
On the parameterized complexity of the fixed alphabet shortest common supersequence and longest common subsequence problems
K.Z. Pietrzak, Journal of Computer and System Sciences 67 (2003) 757–771.
View
| DOI
K.Z. Pietrzak, Journal of Computer and System Sciences 67 (2003) 757–771.
2003 | Published | Conference Paper | IST-REx-ID: 3210
The security of many round Luby Rackoff pseudo random permutations
U. Maurer, K.Z. Pietrzak, in:, Springer, 2003, pp. 544–561.
View
| DOI
U. Maurer, K.Z. Pietrzak, in:, Springer, 2003, pp. 544–561.