What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Marjan Skrobot
Google Scholar
ORCID:
0000-0002-7132-7591
10
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/asiaccs
SweetPAKE: Key exchange with decoy passwords.
Afonso Arriaga
Peter Y. A. Ryan
Marjan Skrobot
2024
conf/asiacrypt
C'est Très CHIC: A Compact Password-Authenticated Key Exchange from Lattice-Based KEM.
Afonso Arriaga
Manuel Barbosa
Stanislaw Jarecki
Marjan Skrobot
2023
conf/ctrsa
Wireless-Channel Key Exchange.
Afonso Arriaga
Petra Sala
Marjan Skrobot
2019
conf/sec
An Offline Dictionary Attack Against zkPAKE Protocol.
José Becerra
Peter Y. A. Ryan
Petra Sala
Marjan Skrobot
2018
conf/eurosp
On Composability of Game-Based Password Authenticated Key Exchange.
Marjan Skrobot
Jean Lancrenon
2018
conf/provsec
Forward Secrecy of SPAKE2.
José Becerra
Dimiter Ostrev
Marjan Skrobot
2018
conf/wisec
An Offline Dictionary Attack against zkPAKE Protocol.
José Becerra
Peter Y. A. Ryan
Petra Sala
Marjan Skrobot
2017
conf/cans
Tightly-Secure PAK(E).
José Becerra
Vincenzo Iovino
Dimiter Ostrev
Petra Sala
Marjan Skrobot
2016
conf/acns
Two More Efficient Variants of the J-PAKE Protocol.
Jean Lancrenon
Marjan Skrobot
Qiang Tang
2012
conf/africacrypt
Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein.
Elena Andreeva
Bart Mennink
Bart Preneel
Marjan Skrobot
Coauthors
Afonso Arriaga
(3)
Bart Mennink
(1)
Bart Preneel
(1)
Dimiter Ostrev
(2)
Elena Andreeva
(1)
Jean Lancrenon
(2)
José Becerra
(4)
Manuel Barbosa
(1)
Marjan Skrobot
(10)
Peter Y. A. Ryan
(3)
Petra Sala
(4)
Qiang Tang
(1)
Stanislaw Jarecki
(1)
Vincenzo Iovino
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to