Cryptographers' World
 

Krzysztof Pietrzak


Author's Web Page Link

20 papers in database with 404 citations Star

H-number: 13

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Krzysztof Pietrzak,  A Leakage-Resilient Mode of Operation, pp. 462 - 482, EUROCRYPT 2009.

[Electronic Edition][Cited 40 times ]

2. Eike Kiltz,  Krzysztof Pietrzak,  On the Security of Padding-Based Encryption Schemes - or - Why We Cannot Prove OAEP Secure in the Standard Model, pp. 389 - 406, EUROCRYPT 2009.

[Electronic Edition][Cited 9 times ]

3. Eike Kiltz,  Krzysztof Pietrzak,  Martijn Stam,  Moti Yung,  A New Randomness Extraction Paradigm for Hybrid Encryption, pp. 590 - 609, EUROCRYPT 2009.

[Electronic Edition][Cited 19 times ]

4. Stefan Dziembowski,  Krzysztof Pietrzak,  Leakage-Resilient Cryptography, pp. 293 - 302, FOCS 2008.

[Electronic Edition][Cited 78 times Red Star]

5. Krzysztof Pietrzak,  Compression from Collisions, or Why CRHF Combiners Have a Long Output, pp. 413 - 432, CRYPTO 2008.

[Electronic Edition][Cited 4 times ]

6. Yevgeniy Dodis,  Krzysztof Pietrzak,  Prashant Puniya,  A New Mode of Operation for Block Ciphers and Length-Preserving MACs, pp. 198 - 219, EUROCRYPT 2008.

[Electronic Edition][Cited 21 times ]

7. Stefan Dziembowski,  Krzysztof Pietrzak,  Intrusion-Resilient Secret Sharing, pp. 227 - 237, FOCS 2007.

[Electronic Edition][Cited 22 times ]

8. Yevgeniy Dodis,  Krzysztof Pietrzak,  Improving the Security of MACs Via Randomized Message Preprocessing, pp. 414 - 433, FSE 2007.

[Electronic Edition][Cited 3 times ]

9. Krzysztof Pietrzak,  Douglas Wikstr√∂m,  Parallel Repetition of Computationally Sound Protocols Revisited, pp. 86 - 102, TCC 2007.

[Electronic Edition][Cited 18 times ]

10. Ueli M. Maurer,  Krzysztof Pietrzak,  Renato Renner,  Indistinguishability Amplification, pp. 130 - 149, CRYPTO 2007.

[Electronic Edition][Cited 13 times ]

11. Krzysztof Pietrzak,  Non-trivial Black-Box Combiners for Collision-Resistant Hash-Functions Don't Exist, pp. 23 - 33, EUROCRYPT 2007.

[Electronic Edition][Cited 15 times ]

12. Krzysztof Pietrzak,  Johan Sj√∂din,  Range Extension for Weak PRFs; The Good, the Bad, and the Ugly, pp. 517 - 533, EUROCRYPT 2007.

[Electronic Edition][Cited 8 times ]

13. Ueli M. Maurer,  Yvonne Anne Oswald,  Krzysztof Pietrzak,  Johan Sj√∂din,  Luby-Rackoff Ciphers from Weak Round Functions?, pp. 391 - 408, EUROCRYPT 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 16 times ]

14. Krzysztof Pietrzak,  Composition Implies Adaptive Security in Minicrypt, pp. 328 - 338, EUROCRYPT 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 7 times ]

15. Yevgeniy Dodis,  Krzysztof Pietrzak,  Bartosz Przydatek,  Separating Sources for Encryption and Secret Sharing, pp. 601 - 616, TCC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 1 times ]

16. Yevgeniy Dodis,  Roberto Oliveira,  Krzysztof Pietrzak,  On the Generic Insecurity of the Full Domain Hash, pp. 449 - 466, CRYPTO 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 30 times ]

17. Mihir Bellare,  Krzysztof Pietrzak,  Phillip Rogaway,  Improved Security Analyses for CBC MACs, pp. 527 - 545, CRYPTO 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 27 times ]

18. Krzysztof Pietrzak,  Composition Does Not Imply Adaptive Security, pp. 55 - 65, CRYPTO 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 13 times ]

19. Ueli M. Maurer,  Krzysztof Pietrzak,  Composition of Random Systems: When Two Weak Make One Strong, pp. 410 - 427, TCC 2004.

[Electronic Edition][Cited 25 times ]

20. Ueli M. Maurer,  Krzysztof Pietrzak,  The Security of Many-Round Luby-Rackoff Pseudo-Random Permutations, pp. 544 - 561, EUROCRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 35 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...