Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
132 Publications
2020 | Published | Conference Paper | IST-REx-ID: 8339 |
Improved discrete Gaussian and subgaussian analysis for lattice cryptography
N. Genise, D. Micciancio, C. Peikert, M. Walter, in:, 23rd IACR International Conference on the Practice and Theory of Public-Key Cryptography, Springer Nature, 2020, pp. 623–651.
[Preprint]
View
| DOI
| Download Preprint (ext.)
N. Genise, D. Micciancio, C. Peikert, M. Walter, in:, 23rd IACR International Conference on the Practice and Theory of Public-Key Cryptography, Springer Nature, 2020, pp. 623–651.
2019 | Published | Journal Article | IST-REx-ID: 5887 |
Per-session security: Password-based cryptography revisited
G. Demay, P. Gazi, U. Maurer, B. Tackmann, Journal of Computer Security 27 (2019) 75–111.
[Preprint]
View
| DOI
| Download Preprint (ext.)
G. Demay, P. Gazi, U. Maurer, B. Tackmann, Journal of Computer Security 27 (2019) 75–111.
2019 | Published | Conference Paper | IST-REx-ID: 7411 |
Reversible proofs of sequential work
H.M. Abusalah, C. Kamath Hosdurg, K. Klein, K.Z. Pietrzak, M. Walter, in:, Advances in Cryptology – EUROCRYPT 2019, Springer International Publishing, 2019, pp. 277–291.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
| WoS
H.M. Abusalah, C. Kamath Hosdurg, K. Klein, K.Z. Pietrzak, M. Walter, in:, Advances in Cryptology – EUROCRYPT 2019, Springer International Publishing, 2019, pp. 277–291.
2019 | Published | Conference Paper | IST-REx-ID: 6430 |
Adaptively secure proxy re-encryption
G. Fuchsbauer, C. Kamath Hosdurg, K. Klein, K.Z. Pietrzak, in:, Springer Nature, 2019, pp. 317–346.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
G. Fuchsbauer, C. Kamath Hosdurg, K. Klein, K.Z. Pietrzak, in:, Springer Nature, 2019, pp. 317–346.
2019 | Published | Conference Paper | IST-REx-ID: 6528 |
Simple verifiable delay functions
K.Z. Pietrzak, in:, 10th Innovations in Theoretical Computer Science Conference, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2019.
[Published Version]
View
| Files available
| DOI
| Download Published Version (ext.)
K.Z. Pietrzak, in:, 10th Innovations in Theoretical Computer Science Conference, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2019.
2019 | Published | Conference Paper | IST-REx-ID: 6677 |
Finding a Nash equilibrium is no easier than breaking Fiat-Shamir
A.R. Choudhuri, P. Hubáček, C. Kamath Hosdurg, K.Z. Pietrzak, A. Rosen, G.N. Rothblum, in:, Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing - STOC 2019, ACM Press, 2019, pp. 1103–1114.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
| WoS
A.R. Choudhuri, P. Hubáček, C. Kamath Hosdurg, K.Z. Pietrzak, A. Rosen, G.N. Rothblum, in:, Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing - STOC 2019, ACM Press, 2019, pp. 1103–1114.
2019 | Published | Book Chapter | IST-REx-ID: 6726 |
Sampling the integers with low relative error
M. Walter, in:, J. Buchmann, A. Nitaj, T. Rachidi (Eds.), Progress in Cryptology – AFRICACRYPT 2019, Springer Nature, Cham, 2019, pp. 157–180.
[Preprint]
View
| DOI
| Download Preprint (ext.)
M. Walter, in:, J. Buchmann, A. Nitaj, T. Rachidi (Eds.), Progress in Cryptology – AFRICACRYPT 2019, Springer Nature, Cham, 2019, pp. 157–180.
2019 | Published | Conference Paper | IST-REx-ID: 7136 |
Strong chain rules for min-entropy under few bits spoiled
M. Skórski, in:, 2019 IEEE International Symposium on Information Theory, IEEE, 2019.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
| arXiv
M. Skórski, in:, 2019 IEEE International Symposium on Information Theory, IEEE, 2019.
2018 | Published | Journal Article | IST-REx-ID: 10286 |
Evaluation and monitoring of free running oscillators serving as source of randomness
E.N. Allini, M. Skórski, O. Petura, F. Bernard, M. Laban, V. Fischer, IACR Transactions on Cryptographic Hardware and Embedded Systems 2018 (2018) 214–242.
[Published Version]
View
| Files available
| DOI
E.N. Allini, M. Skórski, O. Petura, F. Bernard, M. Laban, V. Fischer, IACR Transactions on Cryptographic Hardware and Embedded Systems 2018 (2018) 214–242.
2018 | Published | Journal Article | IST-REx-ID: 107 |
Non-malleable codes
S. Dziembowski, K.Z. Pietrzak, D. Wichs, Journal of the ACM 65 (2018).
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
S. Dziembowski, K.Z. Pietrzak, D. Wichs, Journal of the ACM 65 (2018).
2018 | Published | Conference Paper | IST-REx-ID: 108 |
Inverted leftover hash lemma
M. Obremski, M. Skórski, in:, IEEE, 2018.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
| WoS
M. Obremski, M. Skórski, in:, IEEE, 2018.
2018 | Published | Conference Paper | IST-REx-ID: 298 |
Sustained space complexity
J.F. Alwen, J. Blocki, K.Z. Pietrzak, in:, Springer, 2018, pp. 99–130.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
| arXiv
J.F. Alwen, J. Blocki, K.Z. Pietrzak, in:, Springer, 2018, pp. 99–130.
2018 | Published | Conference Paper | IST-REx-ID: 300 |
On the bit security of cryptographic primitives
D. Micciancio, M. Walter, in:, Springer, 2018, pp. 3–28.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
| WoS
D. Micciancio, M. Walter, in:, Springer, 2018, pp. 3–28.
2018 | Published | Conference Paper | IST-REx-ID: 302 |
Simple proofs of sequential work
B. Cohen, K.Z. Pietrzak, in:, Springer, 2018, pp. 451–467.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
| WoS
B. Cohen, K.Z. Pietrzak, in:, Springer, 2018, pp. 451–467.
2018 | Published | Journal Article | IST-REx-ID: 5980
Private set-intersection with common set-up
S. Chatterjee, C. Kamath Hosdurg, V. Kumar, American Institute of Mathematical Sciences 12 (2018) 17–47.
View
| DOI
| WoS
S. Chatterjee, C. Kamath Hosdurg, V. Kumar, American Institute of Mathematical Sciences 12 (2018) 17–47.
2018 | Published | Conference Paper | IST-REx-ID: 7407 |
Proofs of catalytic space
K.Z. Pietrzak, in:, 10th Innovations in Theoretical Computer Science Conference (ITCS 2019), Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2018, p. 59:1-59:25.
[Published Version]
View
| Files available
| DOI
| Download Published Version (ext.)
K.Z. Pietrzak, in:, 10th Innovations in Theoretical Computer Science Conference (ITCS 2019), Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2018, p. 59:1-59:25.
2018 | Published | Thesis | IST-REx-ID: 83 |
Proof systems for sustainable decentralized cryptocurrencies
H.M. Abusalah, Proof Systems for Sustainable Decentralized Cryptocurrencies, Institute of Science and Technology Austria, 2018.
[Published Version]
View
| Files available
| DOI
H.M. Abusalah, Proof Systems for Sustainable Decentralized Cryptocurrencies, Institute of Science and Technology Austria, 2018.
2018 | Published | Conference Paper | IST-REx-ID: 193 |
On the memory hardness of data independent password hashing functions
J.F. Alwen, P. Gazi, C. Kamath Hosdurg, K. Klein, G.F. Osang, K.Z. Pietrzak, L. Reyzin, M. Rolinek, M. Rybar, in:, Proceedings of the 2018 on Asia Conference on Computer and Communication Security, ACM, 2018, pp. 51–65.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
| WoS
J.F. Alwen, P. Gazi, C. Kamath Hosdurg, K. Klein, G.F. Osang, K.Z. Pietrzak, L. Reyzin, M. Rolinek, M. Rybar, in:, Proceedings of the 2018 on Asia Conference on Computer and Communication Security, ACM, 2018, pp. 51–65.
2018 | Published | Conference Paper | IST-REx-ID: 6941 |
SpaceMint: A cryptocurrency based on proofs of space
S. Park, A. Kwon, G. Fuchsbauer, P. Gazi, J.F. Alwen, K.Z. Pietrzak, in:, 22nd International Conference on Financial Cryptography and Data Security, Springer Nature, 2018, pp. 480–499.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
| WoS
S. Park, A. Kwon, G. Fuchsbauer, P. Gazi, J.F. Alwen, K.Z. Pietrzak, in:, 22nd International Conference on Financial Cryptography and Data Security, Springer Nature, 2018, pp. 480–499.
2017 | Published | Conference Paper | IST-REx-ID: 1174 |
Lower bounds on key derivation for square-friendly applications
M. Skórski, in:, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2017.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
| WoS
M. Skórski, in:, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2017.