What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Pawel Szalachowski
Google Scholar
20
publications in security and cryptology related venues
Year
Venue
Title
2024
journals/tifs
Accountable Fine-Grained Blockchain Rewriting in the Permissionless Setting.
Yangguang Tian
Bowen Liu
Yingjiu Li
Pawel Szalachowski
Jianying Zhou
2023
conf/acns
ZKBdf: A ZKBoo-Based Quantum-Secure Verifiable Delay Function with Prover-Secret.
Teik Guan Tan
Vishal Sharma
Zengpeng Li
Pawel Szalachowski
Jianying Zhou
2022
conf/asiaccs
Evaluating Blockchain Protocols with Abusive Modeling.
Vishal Sharma
Pawel Szalachowski
Jianying Zhou
2021
journals/tifs
Password-Authenticated Decentralized Identities.
Pawel Szalachowski
2021
conf/ndss
LaKSA: A Probabilistic Proof-of-Stake Protocol.
Daniël Reijsbergen
Pawel Szalachowski
Junming Ke
Zengpeng Li
Jianying Zhou
2020
journals/compsec
Exploring HTTPS security inconsistencies: A cross-regional perspective.
Eman Salem Alashwali
Pawel Szalachowski
Andrew Martin
2020
conf/ccs
Fail-safe Watchtowers and Short-lived Assertions for Payment Channels.
Bowen Liu
Pawel Szalachowski
Siwei Sun
2020
conf/dsn
SMACS: Smart Contract Access Control Service.
Bowen Liu
Siwei Sun
Pawel Szalachowski
2020
conf/acsac
Policy-based Chameleon Hash for Blockchain Rewriting with Black-box Accountability.
Yangguang Tian
Nan Li
Yingjiu Li
Pawel Szalachowski
Jianying Zhou
2019
conf/uss
StrongChain: Transparent and Collaborative Proof-of-Work Consensus.
Pawel Szalachowski
Daniël Reijsbergen
Ivan Homoliak
Siwei Sun
2019
conf/esorics
PDFS: Practical Data Feed Service for Smart Contracts.
Juan Guarnizo
Pawel Szalachowski
2019
conf/icbc2
Permission less Block chains and Secure Logging.
Chunpeng Ge
Siwei Sun
Pawel Szalachowski
2018
conf/ccs
Towards Sustainable Evolution for the TLS Public-Key Infrastructure.
Taeho Lee
Christos Pappas
Pawel Szalachowski
Adrian Perrig
2017
conf/fc
Short Paper: On Deployment of DNS-Based Security Enhancements.
Pawel Szalachowski
Adrian Perrig
2016
conf/eurosp
PKI Safety Net (PKISN): Addressing the Too-Big-to-Be-Revoked Problem of the TLS Ecosystem.
Pawel Szalachowski
Laurent Chuat
Adrian Perrig
2016
conf/ndss
SIBRA: Scalable Internet Bandwidth Reservation Architecture.
Cristina Basescu
Raphael M. Reischuk
Pawel Szalachowski
Adrian Perrig
Yao Zhang
Hsu-Chun Hsiao
Ayumu Kubota
Jumpei Urakawa
2015
conf/ccs
Lightweight Protection of Group Content Distribution.
Pawel Szalachowski
Adrian Perrig
2015
conf/cns
Efficient gossip protocols for verifying the consistency of Certificate logs.
Laurent Chuat
Pawel Szalachowski
Adrian Perrig
Ben Laurie
Eran Messeri
2014
conf/ccs
ARPKI: Attack Resilient Public-Key Infrastructure.
David A. Basin
Cas Cremers
Tiffany Hyun-Jin Kim
Adrian Perrig
Ralf Sasse
Pawel Szalachowski
2014
conf/ccs
PoliCert: Secure and Flexible TLS Certificate Management.
Pawel Szalachowski
Stephanos Matsumoto
Adrian Perrig
Coauthors
Adrian Perrig
(8)
Andrew Martin
(1)
Ayumu Kubota
(1)
Ben Laurie
(1)
Bowen Liu
(3)
Cas Cremers
(1)
Christos Pappas
(1)
Chunpeng Ge
(1)
Cristina Basescu
(1)
Daniël Reijsbergen
(2)
David A. Basin
(1)
Eman Salem Alashwali
(1)
Eran Messeri
(1)
Hsu-Chun Hsiao
(1)
Ivan Homoliak
(1)
Jianying Zhou
(5)
Juan Guarnizo
(1)
Jumpei Urakawa
(1)
Junming Ke
(1)
Laurent Chuat
(2)
Nan Li
(1)
Pawel Szalachowski
(20)
Ralf Sasse
(1)
Raphael M. Reischuk
(1)
Siwei Sun
(4)
Stephanos Matsumoto
(1)
Taeho Lee
(1)
Teik Guan Tan
(1)
Tiffany Hyun-Jin Kim
(1)
Vishal Sharma
(2)
Yangguang Tian
(2)
Yao Zhang
(1)
Yingjiu Li
(2)
Zengpeng Li
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to