Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Krzysztof Pietrzak
Search web for home page
Program Committees
1
2013
TCC
pc
2
2012
Eurocrypt
pc
3
2012
CHES
pc
4
2012
PKC
pc
5
2011
TCC
pc
6
2010
Eurocrypt
pc
7
2009
Crypto
pc
Publications
year
title
booktitle
pages
1
2012
Practical Leakage-Resilient Symmetric Cryptography
ches
213-232
2
2012
Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise
asiacrypt
663-680
3
2012
Lapin: An Efficient Authentication Protocol Based on Ring-LPN
fse
346-365
4
2012
Lossy Functions Do Not Amplify Well
tcc
458-475
5
2012
Hardness Preserving Constructions of Pseudorandom Functions
tcc
369-382
6
2012
Subspace LWE
tcc
548-563
7
2012
Message Authentication, Revisited
eurocrypt
355-374
8
2011
Leftover Hash Lemma, Revisited
crypto
1
9
2011
Efficient Authentication from Hard Learning Problems
eurocrypt
7
10
2011
Parallel Repetition for Leakage Resilience Amplification Revisited
tcc
58
11
2010
Leakage Resilient ElGamal Encryption
asiacrypt
595-612
12
2010
An Efficient Parallel Repetition Theorem
tcc
1-18
13
2010
Leakage-Resilient Signatures
tcc
343-360
14
2010
Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks
crypto
21-40
15
2009
A Leakage-Resilient Mode of Operation
eurocrypt
462-482
16
2009
On the Security of Padding-Based Encryption Schemes - or - Why We Cannot Prove OAEP Secure in the Standard Model
eurocrypt
389-406
17
2009
A New Randomness Extraction Paradigm for Hybrid Encryption
eurocrypt
590-609
18
2008
The CCA2-Security of Hybrid Damgård's ElGamal
eprint
online
19
2008
Compression from Collisions, or Why CRHF Combiners Have a Long Output
crypto
413-432
20
2008
A New Randomness Extraction Paradigm for Hybrid Encryption
eprint
online
21
2008
A New Mode of Operation for Block Ciphers and Length-Preserving MACs
eurocrypt
198-219
22
2008
Leakage-Resilient Cryptography in the Standard Model
eprint
online
23
2007
Intrusion-Resilient Secret Sharing
eprint
online
24
2007
Parallel Repetition of Computationally Sound Protocols Revisited
tcc
86-102
25
2007
Range Extension for Weak PRFs; The Good, the Bad, and the Ugly
eurocrypt
517-533
26
2007
Non-trivial Black-Box Combiners for Collision-Resistant Hash-Functions Don't Exist
eurocrypt
23-33
27
2007
Indistinguishability Amplification
crypto
130-149
28
2007
Improving the Security of MACs Via Randomized Message Preprocessing
fse
414-433
29
2006
Separating Sources for Encryption and Secret Sharing
tcc
online
30
2006
Luby-Rackoff Ciphers from Weak Round Functions?
eurocrypt
online
31
2006
Non-Trivial Black-Box Combiners for Collision-Resistant Hash-Functions don't Exist
eprint
online
32
2006
Composition Implies Adaptive Security in Minicrypt
eurocrypt
online
33
2006
Indistinguishability Amplification
eprint
online
34
2006
Luby-Rackoff Ciphers from Weak Round Functions?
eprint
online
35
2005
Composition Does Not Imply Adaptive Security
crypto
online
36
2005
Improved Security Analyses for CBC MACs
crypto
online
37
2005
On the Generic Insecurity of the Full Domain Hash
crypto
online
38
2004
Composition of Random Systems: When Two Weak Make One Strong
tcc
410-427
39
2003
The Security of Many-Round Luby-Rackoff Pseudo-Random Permutations
eurocrypt
online
Coauthors of Krzysztof Pietrzak
Abhishek Jain 0002
Boaz Barak
Mihir Bellare
David Cash
Yevgeniy Dodis
Stefan Dziembowski
Sebastian Faust
Johan Håstad
Stefan Heyse
Abhishek Jain
Eike Kiltz
Hugo Krawczyk
Stephan Krenn
Vadim Lyubashevsky
Ueli M. Maurer
Roberto Oliveira
Yvonne Anne Oswald
Christof Paar
Rafael Pass
Olivier Pereira
Bartosz Przydatek
Prashant Puniya
Renato Renner
Phillip Rogaway
Alon Rosen
Guy N. Rothblum
Joachim Schipper
Gil Segev
Johan Sjödin
Martijn Stam
François-Xavier Standaert
Aris Tentes
Daniele Venturi
Daniel Wichs
Douglas Wikström
Yu Yu
Moti Yung