Krzysztof Pietrzak

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

24EEEike Kiltz, Krzysztof Pietrzak: On the Security of Padding-Based Encryption Schemes - or - Why We Cannot Prove OAEP Secure in the Standard Model. EUROCRYPT 2009: 389-406
23EEKrzysztof Pietrzak: A Leakage-Resilient Mode of Operation. EUROCRYPT 2009: 462-482
22EEEike Kiltz, Krzysztof Pietrzak, Martijn Stam, Moti Yung: A New Randomness Extraction Paradigm for Hybrid Encryption. EUROCRYPT 2009: 590-609
21EEKrzysztof Pietrzak: Compression from Collisions, or Why CRHF Combiners Have a Long Output. CRYPTO 2008: 413-432
20EEYevgeniy Dodis, Krzysztof Pietrzak, Prashant Puniya: A New Mode of Operation for Block Ciphers and Length-Preserving MACs. EUROCRYPT 2008: 198-219
19EEStefan Dziembowski, Krzysztof Pietrzak: Leakage-Resilient Cryptography. FOCS 2008: 293-302
18EEKrzysztof Pietrzak, Johan Sjödin: Weak Pseudorandom Functions in Minicrypt. ICALP (2) 2008: 423-436
17EEMarc Fischlin, Anja Lehmann, Krzysztof Pietrzak: Robust Multi-property Combiners for Hash Functions Revisited. ICALP (2) 2008: 655-666
16EEUeli M. Maurer, Krzysztof Pietrzak, Renato Renner: Indistinguishability Amplification. CRYPTO 2007: 130-149
15EEKrzysztof Pietrzak: Non-trivial Black-Box Combiners for Collision-Resistant Hash-Functions Don't Exist. EUROCRYPT 2007: 23-33
14EEKrzysztof Pietrzak, Johan Sjödin: Range Extension for Weak PRFs; The Good, the Bad, and the Ugly. EUROCRYPT 2007: 517-533
13EEStefan Dziembowski, Krzysztof Pietrzak: Intrusion-Resilient Secret Sharing. FOCS 2007: 227-237
12EEYevgeniy Dodis, Krzysztof Pietrzak: Improving the Security of MACs Via Randomized Message Preprocessing. FSE 2007: 414-433
11EEKrzysztof Pietrzak, Douglas Wikström: Parallel Repetition of Computationally Sound Protocols Revisited. TCC 2007: 86-102
10EEKrzysztof Pietrzak: Composition Implies Adaptive Security in Minicrypt. EUROCRYPT 2006: 328-338
9EEUeli M. Maurer, Yvonne Anne Oswald, Krzysztof Pietrzak, Johan Sjödin: Luby-Rackoff Ciphers from Weak Round Functions? EUROCRYPT 2006: 391-408
8EEKrzysztof Pietrzak: A Tight Bound for EMAC. ICALP (2) 2006: 168-179
7EEYevgeniy Dodis, Krzysztof Pietrzak, Bartosz Przydatek: Separating Sources for Encryption and Secret Sharing. TCC 2006: 601-616
6EEYevgeniy Dodis, Roberto Oliveira, Krzysztof Pietrzak: On the Generic Insecurity of the Full Domain Hash. CRYPTO 2005: 449-466
5EEMihir Bellare, Krzysztof Pietrzak, Phillip Rogaway: Improved Security Analyses for CBC MACs. CRYPTO 2005: 527-545
4EEKrzysztof Pietrzak: Composition Does Not Imply Adaptive Security. CRYPTO 2005: 55-65
3EEUeli M. Maurer, Krzysztof Pietrzak: Composition of Random Systems: When Two Weak Make One Strong. TCC 2004: 410-427
2EEUeli M. Maurer, Krzysztof Pietrzak: The Security of Many-Round Luby-Rackoff Pseudo-Random Permutations. EUROCRYPT 2003: 544-561
1EEKrzysztof Pietrzak: On the parameterized complexity of the fixed alphabet shortest common supersequence and longest common subsequence problems. J. Comput. Syst. Sci. 67(4): 757-771 (2003)

Coauthor Index

1Mihir Bellare [5]
2Yevgeniy Dodis [6] [7] [12] [20]
3Stefan Dziembowski [13] [19]
4Marc Fischlin [17]
5Eike Kiltz [22] [24]
6Anja Lehmann [17]
7Ueli M. Maurer [2] [3] [9] [16]
8Roberto Oliveira [6]
9Yvonne Anne Oswald [9]
10Bartosz Przydatek [7]
11Prashant Puniya [20]
12Renato Renner [16]
13Phillip Rogaway [5]
14Johan Sjödin [9] [14] [18]
15Martijn Stam [22]
16Douglas Wikström [11]
17Moti Yung (Mordechai M. Yung) [22]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)