Main Content

List of Publications

2017

Zahra Jafargholi, Chethan Kamath, Karen Klein, Ilan Komargodski, Krzysztof Pietrzak, Daniel Wichs
Be Adaptive, Avoid Overcommitting
Crypto 2017

Joël Alwen and Jeremiah Blocki and Krzysztof Pietrzak
Depth-Robust Graphs and Their Cumulative Memory Complexity
Eurocrypt 2017

Joël Alwen and Binyi Chen and Krzysztof Pietrzak and Leonid Reyzin and Stefano Tessaro
Scrypt is Maximally Memory-Hard
Eurocrypt 2017

Peter Gaži, Krzysztof Pietrzak and Michal Rybár
The Exact Security of PMAC
ToSC 2017, volume 1, and FSE 2017

Joël Alwen, Jeremiah Blocki
Towards Practical Attacks on Argon2i and Balloon Hashing
Euro S&P 2017
[full version]

Joël Alwen, Susanna F. de Rezende, Jakob Nordström and Marc Vinyals
Cumulative Space in Black-White Pebbling and Resolution
ITCS 2017

Maciej Skorski
Key Derivation for Squared-Friendly Applications: Lower Bounds
STACS 2017
[full version]

2016

Krzysztof Pietrzak, Maciej Skorski
Pseudoentropy: Lower-Bounds for Chain Rules and Transformations
TCC (B1) 2016
[full version]

Maciej Skorski
Simulating Auxiliary Inputs, Revisited
TCC (B1) 2016
[full version]

Stephan Krenn, Krzysztof Pietrzak, Akshay Wadia, Daniel Wichs
A counterexample to the chain rule for conditional HILL entropy
Computational Complexity 25(3): 567-605 (2016)
[full version]

Georg Fuchsbauer, Felix Heuer, Eike Kiltz, Krzysztof Pietrzak
Standard Security Does Imply Security Against Selective Opening for Markov Distributions
TCC (A1) 2016: 282-305
[full version]

Georg Fuchsbauer, Christian Hanser, Chethan Kamath and Daniel Slamanig
Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions
SCN 2016
[full version]

Chethan Kamath and  Sanjit Chatterjee
A Closer Look at Multiple-Forking: Leveraging (In)dependence for a Tighter Bound
Algorithmica, April 2016, Volume 74, Issue 4, pp 1321–1362
[full version]

Joël Alwen, Binyi Chen, Chethan Kamath, Vladimir Kolmogorov, Krzysztof Pietrzak and Stefano Tessaro
On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model
Eurocrypt 2016
[full version]

Joël Alwen, Jeremiah Blocki
Efficiently Computing Data-Independent Memory-Hard Functions
CRYPTO (2) 2016: 241-271
[full version]

Peter Gaži, Stefano Tessaro
Provably Robust Sponge-Based PRNGs and KDFs
Advances in Cryptology — Eurocrypt 2016, Lecture Notes in Computer Science, Springer-Verlag, 2016
[full version]

Hamza Abusalah, Georg Fuchsbauer, Krzysztof Pietrzak
Constrained PRFs for Unbounded Inputs
CT-RSA 2016: 413-428
[full version]

Hamza Abusalah, Georg Fuchsbauer
Constrained PRFs for Unbounded Inputs with Short Keys
ACNS 2016: 445-463
[full version]

Hamza Abusalah, Georg Fuchsbauer, Krzysztof Pietrzak
Offline Witness Encryption
ACNS 2016: 285-303
[full version]

2015

Tatsuaki Okamoto, Krzysztof Pietrzak, Brent Waters and Daniel Wichs
New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators
Advances in Cryptology — Asiacrypt 2015, Lecture Notes in Computer Science, Springer-Verlag, 2015

Peter Gaži, Krzysztof Pietrzak, Stefano Tessaro
Generic Security of NMAC and HMAC with Input Whitening
Advances in Cryptology — Asiacrypt 2015, Lecture Notes in Computer Science, Springer-Verlag, 2015

Joël Alwen, Vladimir Serbinenko
High Parallel Complexity Graphs and Memory-Hard Functions
Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, STOC 2015, Portland, OR, USA, June 14-17, 2015.

Foteini Baldimtsi, Melissa Chase, Georg Fuchsbauer, Markulf Kohlweiss
Anonymous Transferable E-Cash
Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015

Maciej Skorski, Alexander Golovnev and Krzysztof Pietrzak
Condensed Unpredictability
The 42nd International Colloquium on Automata, Languages, and Programming ICALP 2015
[full version]

Fabrice Benhamouda, Stephan Krenn, Vadim Lyubashevsky and Krzysztof Pietrzak
Efficient Zero-Knowledge Proofs for Commitments from Learning With Errors over Rings
20th European Symposium on Research in Computer Security, ESORICS 2015
[full version]

Stefan Dziembowski, Sebastian Faust, Vladimir Kolmogorov, Krzysztof Pietrzak
Proofs of Space
Advances in Cryptology — CRYPTO 2015, Lecture Notes in Computer Science, Springer-Verlag, Aug 2015
[full version]

Peter Gaži, Krzysztof Pietrzak, Stefano Tessaro
The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC
Advances in Cryptology — CRYPTO 2015, Lecture Notes in Computer Science, Springer-Verlag, Aug 2015
[full version]

Georg Fuchsbauer, Zahra Jafargholi, Krzysztof Pietrzak
A Quasipolynomial Reduction for Generalized Selective Decryption on Trees
Advances in Cryptology — CRYPTO 2015, Lecture Notes in Computer Science, Springer-Verlag, Aug 2015
[pdf]

Georg Fuchsbauer, Christian Hanser, Daniel Slamanig
Practical Round-Optimal Blind Signatures in the Standard Model
Advances in Cryptology — CRYPTO 2015, Lecture Notes in Computer Science, Springer-Verlag, Aug 2015
[pdf]

Joël Alwen, Rafail Ostrovsky, Hong-Sheng Zhou, Vassilis Zikas
Incoercible Multi-Party Computation and Universally Composable Receipt-Free Voting
Advances in Cryptology — CRYPTO 2015, Lecture Notes in Computer Science, Springer-Verlag, Aug 2015

Abhishek Banerjee, Georg Fuchsbauer, Chris Peikert, Krzysztof Pietrzak, Sophie Stevens
Key-Homomorphic Constrained Pseudorandom Functions.
Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015

Peter Gaži, Stefano Tessaro
Secret-key Cryptography from Ideal Primitives: A Systematic Overview
Invited paper at IEEE Information Theory Workshop (ITW 2015).

Grégory Demay, Peter Gaži, Ueli Maurer, and Björn Tackmann
Query-Complexity Amplification for Random Oracles
The 8th International Conference on Information Theoretic Security - ICITS 2015.

Peter Gaži, Jooyoung Lee, Yannick Seurin, John Steinberger, Stefano Tessaro
Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes
To appear in Proceedings of 22nd International Workshop on Fast Software Encryption FSE 2015

2014

Fei Yu, Michal Rybar, Caroline Uhler, Stephen E. Fienberg
Differentially-Private Logistic Regression for Detecting Multiple-SNP Association in GWAS Databases
To appear in Proceedings of the 2014 International Conference on Privacy in Statistical Databases
[pdf]

Georg Fuchsbauer
Constrained Verifiable Random Functions
9th Conference on Security and Cryptography for Networks (SCN'14), Sep 14.

Peter Gaži, Krzysztof Pietrzak, Michal Rybár
The Exact PRF-Security of NMAC and HMAC
Advances in Cryptology — CRYPTO 2014, Lecture Notes in Computer Science, Springer-Verlag, Aug 2014. This is the full version.
[pdf]

Grégory Demay, Peter Gaži, Ueli Maurer, and Björn Tackmann
Optimality of Non-Adaptive Strategies: The Case of Parallel Games
IEEE International Symposium on Information Theory (ISIT), Jul 2014.
[pdf]

Yevgeniy Dodis, Krzysztof Pietrzak, Daniel Wichs
Key Derivation without Entropy Waste
Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014
[full version]

Eike Kiltz, Daniel Masny, Krzysztof Pietrzak
Simple Chosen-Ciphertext Security from Low-Noise LPN
17th IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC'14), Mar 2014.
[pdf]

Mihir Bellare, Georg Fuchsbauer
Policy-Based Signatures
17th IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC'14), Mar 2014.
[full version]

Dana Dachman-Soled, Georg Fuchsbauer, Payman Mohassel, Adam O'Neill
Enhanced Chosen-Ciphertext Security and Applications
17th IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC'14), Mar 2014.
[full version]

Dimitar Jetchev, Krzysztof Pietrzak
How to Fake Auxiliary Input
Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014.
[full version]

Marc Fischlin, Anja Lehmann, Krzysztof Pietrzak
Robust Multi-Property Combiners for Hash Functions
J. Cryptology 27(3): 397-428 (2014)
[pdf]

2013

Olivier Blazy, Georg Fuchsbauer, David Pointcheval, Damien Vergnaud
Short Blind Signatures
Journal of Computer Security: Volume 21, no. 5, 2013
[pdf]

Anna Lisa Ferrara, Georg Fuchsbauer, Bogdan Warinschi
Cryptographically Enforced RBAC
IEEE 26th Computer Security Foundations Symposium (CSF'13), Jun 2013
[full version]

David Bernhard, Georg Fuchsbauer, Essam Ghadafi
Efficient Signatures of Knowledge and DAA in the Standard Model
11th International Conference on Applied Cryptography and Network Security (ACNS'13), Jun 2013
[full version]


Last updated in June 2014.