Edit Profile (opens in new tab) Pietrzak, Krzysztof Compute Distance To: Compute Author ID: pietrzak.krzysztof Published as: Pietrzak, Krzysztof External Links: MGP Documents Indexed: 77 Publications since 2003 3 Contributions as Editor Co-Authors: 75 Co-Authors with 71 Joint Publications 1,625 Co-Co-Authors all top 5 Co-Authors 9 single-authored 11 Kiltz, Eike 8 Dodis, Yevgeniy 8 Wichs, Daniel 7 Fuchsbauer, Georg 6 Alwen, Joël 6 Kamath, Chethan 5 Faust, Sebastian 5 Jain, Abhishek 5 Klein, Karen 4 Abusalah, Hamza 4 Krenn, Stephan 4 Maurer, Ueli M. 4 Pass, Rafael 4 Skorski, Maciej 4 Tessaro, Stefano 3 Dziembowski, Stefan 3 Gaži, Peter 3 Sjödin, Johan 3 Venturi, Daniele 3 Wikström, Douglas 2 Blocki, Jeremiah 2 Cash, David M. 2 Chen, Binyi 2 Cohen, Bram 2 Fischlin, Marc 2 Jafargholi, Zahra 2 Kolmogorov, Vladimir 2 Lehmann, Anja 2 Reyzin, Leonid 2 Rosen, Alon 2 Rothblum, Guy N. 2 Tentes, Aris 2 Wadia, Akshay 1 Auerbach, Benedikt 1 Banerjee, Abhishek 1 Barak, Boaz 1 Bellare, Mihir 1 Brody, Joshua E. 1 Chakraborty, Suvradip 1 Choudhuri, Arka Rai 1 Golovnev, Alexander 1 Håstad, Johan Torkel 1 Heuer, Felix 1 Heyse, Stefan 1 Hubáček, Pavel 1 Jetchev, Dimitar P. 1 Khilko, Danylo 1 Komargodski, Ilan 1 Konstantinov, Momchil 1 Krawczyk, Hugo 1 Lyubashevsky, Vadim 1 Masny, Daniel 1 Okamoto, Tatsuaki 1 Oliveira, Roberto Imbuzeiro 1 Oswald, Yvonne Anne 1 Paar, Christof 1 Pascual-Perez, Guillermo 1 Peikert, Chris 1 Pereira, Olivier 1 Przydatek, Bartosz 1 Puniya, Prashant 1 Rao, Vanishree 1 Renner, Renato 1 Rogaway, Phillip 1 Rybár, Michal 1 Schipper, Joachim 1 Segev, Gil 1 Stam, Martijn 1 Standaert, Francois-Xavier 1 Stevens, Sophie 1 Szegedy, Mario 1 Waters, Brent 1 Yeo, Michelle 1 Yu, Yu 1 Yung, Moti Serials 3 Journal of Cryptology 3 Lecture Notes in Computer Science 1 Journal of Computer and System Sciences 1 Computational Complexity 1 Journal of the ACM all top 5 Fields 79 Information and communication theory, circuits (94-XX) 17 Computer science (68-XX) 3 General and overarching topics; collections (00-XX) 2 Numerical analysis (65-XX) 1 Probability theory and stochastic processes (60-XX) 1 Game theory, economics, finance, and other social and behavioral sciences (91-XX) Publications by Year all cited Publications top 5 cited Publications Citations contained in zbMATH Open 71 Publications have been cited 525 times in 359 Documents Cited by ▼ Year ▼ On the parameterized complexity of the fixed alphabet shortest common supersequence and longest common subsequence problems. Zbl 1092.68049Pietrzak, Krzysztof 51 2003 A leakage-resilient mode of operation. Zbl 1239.94062Pietrzak, Krzysztof 29 2009 A new randomness extraction paradigm for hybrid encryption. Zbl 1239.94055Kiltz, Eike; Pietrzak, Krzysztof; Stam, Martijn; Yung, Moti 26 2009 On the generic insecurity of the full domain hash. Zbl 1145.94440Dodis, Yevgeniy; Oliveira, Roberto; Pietrzak, Krzysztof 20 2005 Leakage-resilient signatures. Zbl 1274.94135Faust, Sebastian; Kiltz, Eike; Pietrzak, Krzysztof; Rothblum, Guy N. 20 2010 Non-malleable codes. Zbl 1409.94869Dziembowski, Stefan; Pietrzak, Krzysztof; Wichs, Daniel 20 2018 Learning with rounding, revisited. New reduction, properties and applications. Zbl 1310.94123Alwen, Joël; Krenn, Stephan; Pietrzak, Krzysztof; Wichs, Daniel 16 2013 Commitments and efficient zero-knowledge proofs from learning parity with noise. Zbl 1292.94082Jain, Abhishek; Krenn, Stephan; Pietrzak, Krzysztof; Tentes, Aris 15 2012 Improved security analyses for CBC MACs. Zbl 1145.94432Bellare, Mihir; Pietrzak, Krzysztof; Rogaway, Phillip 13 2005 Leftover hash lemma, revisited. Zbl 1287.94047Barak, Boaz; Dodis, Yevgeniy; Krawczyk, Hugo; Pereira, Olivier; Pietrzak, Krzysztof; Standaert, François-Xavier; Yu, Yu 12 2011 Leakage-resilient pseudorandom functions and side-channel attacks on Feistel networks. Zbl 1280.94047Dodis, Yevgeniy; Pietrzak, Krzysztof 12 2010 An efficient parallel repetition theorem. Zbl 1274.94075Håstad, Johan; Pass, Rafael; Wikström, Douglas; Pietrzak, Krzysztof 12 2010 Leakage resilient ElGamal encryption. Zbl 1290.94103Kiltz, Eike; Pietrzak, Krzysztof 12 2010 Efficient authentication from hard learning problems. Zbl 1281.94083Kiltz, Eike; Pietrzak, Krzysztof; Cash, David; Jain, Abhishek; Venturi, Daniele 12 2011 Lapin: an efficient authentication protocol based on ring-LPN. Zbl 1282.94078Heyse, Stefan; Kiltz, Eike; Lyubashevsky, Vadim; Paar, Christof; Pietrzak, Krzysztof 11 2012 Message authentication, revisited. Zbl 1297.94117Dodis, Yevgeniy; Kiltz, Eike; Pietrzak, Krzysztof; Wichs, Daniel 11 2012 Indistinguishability amplification. Zbl 1215.94062Maurer, Ueli; Pietrzak, Krzysztof; Renner, Renato 11 2007 Simple chosen-ciphertext security from low-noise LPN. Zbl 1335.94059Kiltz, Eike; Masny, Daniel; Pietrzak, Krzysztof 10 2014 The security of many-round Luby-Rackoff pseudo-random permutations. Zbl 1038.94542Maurer, Ueli; Pietrzak, Krzysztof 10 2003 Key-homomorphic constrained pseudorandom functions. Zbl 1315.94052Banerjee, Abhishek; Fuchsbauer, Georg; Peikert, Chris; Pietrzak, Krzysztof; Stevens, Sophie 9 2015 How to fake auxiliary input. Zbl 1326.94102Jetchev, Dimitar; Pietrzak, Krzysztof 9 2014 Practical leakage-resilient symmetric cryptography. Zbl 1366.94490Faust, Sebastian; Pietrzak, Krzysztof; Schipper, Joachim 9 2012 The exact PRF security of truncation: tight bounds for keyed sponges and truncated CBC. Zbl 1375.94127Gaži, Peter; Pietrzak, Krzysztof; Tessaro, Stefano 8 2015 Composition of random systems: When two weak make one strong. Zbl 1197.94195Maurer, Ueli; Pietrzak, Krzysztof 8 2004 Key derivation without entropy waste. Zbl 1326.94085Dodis, Yevgeniy; Pietrzak, Krzysztof; Wichs, Daniel 7 2014 Adaptive security of constrained PRFs. Zbl 1317.94107Fuchsbauer, Georg; Konstantinov, Momchil; Pietrzak, Krzysztof; Rao, Vanishree 7 2014 Standard security does imply security against selective opening for Markov distributions. Zbl 1348.94046Fuchsbauer, Georg; Heuer, Felix; Kiltz, Eike; Pietrzak, Krzysztof 6 2016 On the complexity of scrypt and proofs of space in the parallel random oracle model. Zbl 1369.94518Alwen, Joël; Chen, Binyi; Kamath, Chethan; Kolmogorov, Vladimir; Pietrzak, Krzysztof; Tessaro, Stefano 6 2016 New realizations of somewhere statistically binding hashing and positional accumulators. Zbl 1396.94093Okamoto, Tatsuaki; Pietrzak, Krzysztof; Waters, Brent; Wichs, Daniel 6 2015 Cryptography from learning parity with noise. Zbl 1298.94103Pietrzak, Krzysztof 6 2012 Proofs of space. Zbl 1369.94531Dziembowski, Stefan; Faust, Sebastian; Kolmogorov, Vladimir; Pietrzak, Krzysztof 6 2015 Tamper-proof circuits: how to trade leakage for tamper-resilience. Zbl 1333.94034Faust, Sebastian; Pietrzak, Krzysztof; Venturi, Daniele 6 2011 Composition does not imply adaptive security. Zbl 1143.94352Pietrzak, Krzysztof 6 2005 Parallel repetition of computationally sound protocols revisited. Zbl 1129.94035Pietrzak, Krzysztof; Wikström, Douglas 6 2007 Constrained PRFs for unbounded inputs. Zbl 1334.94053Abusalah, Hamza; Fuchsbauer, Georg; Pietrzak, Krzysztof 5 2016 Hardness preserving constructions of pseudorandom functions. Zbl 1303.94084Jain, Abhishek; Pietrzak, Krzysztof; Tentes, Aris 5 2012 Digital signatures with minimal overhead from indifferentiable random invertible functions. Zbl 1310.94156Kiltz, Eike; Pietrzak, Krzysztof; Szegedy, Mario 5 2013 Depth-robust graphs and their cumulative memory complexity. Zbl 1390.94827Alwen, Joël; Blocki, Jeremiah; Pietrzak, Krzysztof 5 2017 A new mode of operation for block ciphers and length-preserving MACs. Zbl 1149.94311Dodis, Yevgeniy; Pietrzak, Krzysztof; Puniya, Prashant 5 2008 Composition implies adaptive security in Minicrypt. Zbl 1140.94367Pietrzak, Krzysztof 5 2006 The exact PRF-security of NMAC and HMAC. Zbl 1343.94050Gaži, Peter; Pietrzak, Krzysztof; Rybár, Michal 4 2014 A counterexample to the chain rule for conditional HILL entropy. And what deniable encryption has to do with it. Zbl 1297.94083Krenn, Stephan; Pietrzak, Krzysztof; Wadia, Akshay 4 2013 Compression from collisions, or why CRHF combiners have a long output. Zbl 1183.68277Pietrzak, Krzysztof 4 2008 Be adaptive, avoid overcommitting. Zbl 1407.94123Jafargholi, Zahra; Kamath, Chethan; Klein, Karen; Komargodski, Ilan; Pietrzak, Krzysztof; Wichs, Daniel 4 2017 On the security of padding-based encryption schemes – or – why we cannot prove OAEP secure in the standard model. Zbl 1239.94054Kiltz, Eike; Pietrzak, Krzysztof 4 2009 A tight bound for EMAC. Zbl 1133.94334Pietrzak, Krzysztof 4 2006 Finding a Nash equilibrium is no easier than breaking Fiat-Shamir. Zbl 1434.94063Choudhuri, Arka Rai; Hubáček, Pavel; Kamath, Chethan; Pietrzak, Krzysztof; Rosen, Alon; Rothblum, Guy N. 3 2019 Offline witness encryption. Zbl 1348.94029Abusalah, Hamza; Fuchsbauer, Georg; Pietrzak, Krzysztof 3 2016 Lossy functions do not amplify well. Zbl 1303.94098Pietrzak, Krzysztof; Rosen, Alon; Segev, Gil 3 2012 Subspace LWE. Zbl 1296.94136Pietrzak, Krzysztof 3 2012 Scrypt is maximally memory-hard. Zbl 1394.94925Alwen, Joël; Chen, Binyi; Pietrzak, Krzysztof; Reyzin, Leonid; Tessaro, Stefano 3 2017 Robust multi-property combiners for hash functions. Zbl 1302.94046Fischlin, Marc; Lehmann, Anja; Pietrzak, Krzysztof 2 2014 The chain rule for HILL pseudoentropy, revisited. Zbl 1370.94538Pietrzak, Krzysztof; Skórski, Maciej 2 2015 Condensed unpredictability. Zbl 1447.94013Skórski, Maciej; Golovnev, Alexander; Pietrzak, Krzysztof 2 2015 A quasipolynomial reduction for generalized selective decryption on trees. Zbl 1375.94125Fuchsbauer, Georg; Jafargholi, Zahra; Pietrzak, Krzysztof 2 2015 Non-trivial black-box combiners for collision-resistant hash-functions don’t exist. Zbl 1141.94369Pietrzak, Krzysztof 2 2007 Range extension for weak PRFs; the good, the bad, and the ugly. Zbl 1141.94370Pietrzak, Krzysztof; Sjödin, Johan 2 2007 Robust multi-property combiners for hash functions revisited. Zbl 1155.94366Fischlin, Marc; Lehmann, Anja; Pietrzak, Krzysztof 2 2008 Improving the security of MACs via randomized message preprocessing. Zbl 1186.94434Dodis, Yevgeniy; Pietrzak, Krzysztof 2 2007 Adaptively secure proxy re-encryption. Zbl 07159410Fuchsbauer, Georg; Kamath, Chethan; Klein, Karen; Pietrzak, Krzysztof 1 2019 Generic security of NMAC and HMAC with input whitening. Zbl 1375.94128Gaži, Peter; Pietrzak, Krzysztof; Tessaro, Stefano 1 2015 Parallel repetition of computationally sound protocols revisited. Zbl 1272.94057Pietrzak, Krzysztof; Wikström, Douglas 1 2012 Weak pseudorandom functions in Minicrypt. Zbl 1155.94380Pietrzak, Krzysztof; Sjödin, Johan 1 2008 Parallel repetition for leakage resilience amplification revisited. Zbl 1290.94093Jain, Abhishek; Pietrzak, Krzysztof 1 2011 Non-uniform attacks against pseudoentropy. Zbl 1441.94094Pietrzak, Krzysztof; Skorski, Maciej 1 2017 Sustained space complexity. Zbl 1423.94045Alwen, Joël; Blocki, Jeremiah; Pietrzak, Krzysztof 1 2018 Simple proofs of sequential work. Zbl 1428.94067Cohen, Bram; Pietrzak, Krzysztof 1 2018 Efficient authentication from hard learning problems. Zbl 1386.94096Kiltz, Eike; Pietrzak, Krzysztof; Venturi, Daniele; Cash, David; Jain, Abhishek 1 2017 Separating sources for encryption and secret sharing. Zbl 1113.94007Dodis, Yevgeniy; Pietrzak, Krzysztof; Przydatek, Bartosz 1 2006 Beyond Hellman’s time-memory trade-offs with applications to proofs of space. Zbl 1409.94858Abusalah, Hamza; Alwen, Joël; Cohen, Bram; Khilko, Danylo; Pietrzak, Krzysztof; Reyzin, Leonid 1 2017 Inverse-Sybil attacks in automated contact tracing. Zbl 1479.94116Auerbach, Benedikt; Chakraborty, Suvradip; Klein, Karen; Pascual-Perez, Guillermo; Pietrzak, Krzysztof; Walter, Michael; Yeo, Michelle 1 2021 Inverse-Sybil attacks in automated contact tracing. Zbl 1479.94116Auerbach, Benedikt; Chakraborty, Suvradip; Klein, Karen; Pascual-Perez, Guillermo; Pietrzak, Krzysztof; Walter, Michael; Yeo, Michelle 1 2021 Finding a Nash equilibrium is no easier than breaking Fiat-Shamir. Zbl 1434.94063Choudhuri, Arka Rai; Hubáček, Pavel; Kamath, Chethan; Pietrzak, Krzysztof; Rosen, Alon; Rothblum, Guy N. 3 2019 Adaptively secure proxy re-encryption. Zbl 07159410Fuchsbauer, Georg; Kamath, Chethan; Klein, Karen; Pietrzak, Krzysztof 1 2019 Non-malleable codes. Zbl 1409.94869Dziembowski, Stefan; Pietrzak, Krzysztof; Wichs, Daniel 20 2018 Sustained space complexity. Zbl 1423.94045Alwen, Joël; Blocki, Jeremiah; Pietrzak, Krzysztof 1 2018 Simple proofs of sequential work. Zbl 1428.94067Cohen, Bram; Pietrzak, Krzysztof 1 2018 Depth-robust graphs and their cumulative memory complexity. Zbl 1390.94827Alwen, Joël; Blocki, Jeremiah; Pietrzak, Krzysztof 5 2017 Be adaptive, avoid overcommitting. Zbl 1407.94123Jafargholi, Zahra; Kamath, Chethan; Klein, Karen; Komargodski, Ilan; Pietrzak, Krzysztof; Wichs, Daniel 4 2017 Scrypt is maximally memory-hard. Zbl 1394.94925Alwen, Joël; Chen, Binyi; Pietrzak, Krzysztof; Reyzin, Leonid; Tessaro, Stefano 3 2017 Non-uniform attacks against pseudoentropy. Zbl 1441.94094Pietrzak, Krzysztof; Skorski, Maciej 1 2017 Efficient authentication from hard learning problems. Zbl 1386.94096Kiltz, Eike; Pietrzak, Krzysztof; Venturi, Daniele; Cash, David; Jain, Abhishek 1 2017 Beyond Hellman’s time-memory trade-offs with applications to proofs of space. Zbl 1409.94858Abusalah, Hamza; Alwen, Joël; Cohen, Bram; Khilko, Danylo; Pietrzak, Krzysztof; Reyzin, Leonid 1 2017 Standard security does imply security against selective opening for Markov distributions. Zbl 1348.94046Fuchsbauer, Georg; Heuer, Felix; Kiltz, Eike; Pietrzak, Krzysztof 6 2016 On the complexity of scrypt and proofs of space in the parallel random oracle model. Zbl 1369.94518Alwen, Joël; Chen, Binyi; Kamath, Chethan; Kolmogorov, Vladimir; Pietrzak, Krzysztof; Tessaro, Stefano 6 2016 Constrained PRFs for unbounded inputs. Zbl 1334.94053Abusalah, Hamza; Fuchsbauer, Georg; Pietrzak, Krzysztof 5 2016 Offline witness encryption. Zbl 1348.94029Abusalah, Hamza; Fuchsbauer, Georg; Pietrzak, Krzysztof 3 2016 Key-homomorphic constrained pseudorandom functions. Zbl 1315.94052Banerjee, Abhishek; Fuchsbauer, Georg; Peikert, Chris; Pietrzak, Krzysztof; Stevens, Sophie 9 2015 The exact PRF security of truncation: tight bounds for keyed sponges and truncated CBC. Zbl 1375.94127Gaži, Peter; Pietrzak, Krzysztof; Tessaro, Stefano 8 2015 New realizations of somewhere statistically binding hashing and positional accumulators. Zbl 1396.94093Okamoto, Tatsuaki; Pietrzak, Krzysztof; Waters, Brent; Wichs, Daniel 6 2015 Proofs of space. Zbl 1369.94531Dziembowski, Stefan; Faust, Sebastian; Kolmogorov, Vladimir; Pietrzak, Krzysztof 6 2015 The chain rule for HILL pseudoentropy, revisited. Zbl 1370.94538Pietrzak, Krzysztof; Skórski, Maciej 2 2015 Condensed unpredictability. Zbl 1447.94013Skórski, Maciej; Golovnev, Alexander; Pietrzak, Krzysztof 2 2015 A quasipolynomial reduction for generalized selective decryption on trees. Zbl 1375.94125Fuchsbauer, Georg; Jafargholi, Zahra; Pietrzak, Krzysztof 2 2015 Generic security of NMAC and HMAC with input whitening. Zbl 1375.94128Gaži, Peter; Pietrzak, Krzysztof; Tessaro, Stefano 1 2015 Simple chosen-ciphertext security from low-noise LPN. Zbl 1335.94059Kiltz, Eike; Masny, Daniel; Pietrzak, Krzysztof 10 2014 How to fake auxiliary input. Zbl 1326.94102Jetchev, Dimitar; Pietrzak, Krzysztof 9 2014 Key derivation without entropy waste. Zbl 1326.94085Dodis, Yevgeniy; Pietrzak, Krzysztof; Wichs, Daniel 7 2014 Adaptive security of constrained PRFs. Zbl 1317.94107Fuchsbauer, Georg; Konstantinov, Momchil; Pietrzak, Krzysztof; Rao, Vanishree 7 2014 The exact PRF-security of NMAC and HMAC. Zbl 1343.94050Gaži, Peter; Pietrzak, Krzysztof; Rybár, Michal 4 2014 Robust multi-property combiners for hash functions. Zbl 1302.94046Fischlin, Marc; Lehmann, Anja; Pietrzak, Krzysztof 2 2014 Learning with rounding, revisited. New reduction, properties and applications. Zbl 1310.94123Alwen, Joël; Krenn, Stephan; Pietrzak, Krzysztof; Wichs, Daniel 16 2013 Digital signatures with minimal overhead from indifferentiable random invertible functions. Zbl 1310.94156Kiltz, Eike; Pietrzak, Krzysztof; Szegedy, Mario 5 2013 A counterexample to the chain rule for conditional HILL entropy. And what deniable encryption has to do with it. Zbl 1297.94083Krenn, Stephan; Pietrzak, Krzysztof; Wadia, Akshay 4 2013 Commitments and efficient zero-knowledge proofs from learning parity with noise. Zbl 1292.94082Jain, Abhishek; Krenn, Stephan; Pietrzak, Krzysztof; Tentes, Aris 15 2012 Lapin: an efficient authentication protocol based on ring-LPN. Zbl 1282.94078Heyse, Stefan; Kiltz, Eike; Lyubashevsky, Vadim; Paar, Christof; Pietrzak, Krzysztof 11 2012 Message authentication, revisited. Zbl 1297.94117Dodis, Yevgeniy; Kiltz, Eike; Pietrzak, Krzysztof; Wichs, Daniel 11 2012 Practical leakage-resilient symmetric cryptography. Zbl 1366.94490Faust, Sebastian; Pietrzak, Krzysztof; Schipper, Joachim 9 2012 Cryptography from learning parity with noise. Zbl 1298.94103Pietrzak, Krzysztof 6 2012 Hardness preserving constructions of pseudorandom functions. Zbl 1303.94084Jain, Abhishek; Pietrzak, Krzysztof; Tentes, Aris 5 2012 Lossy functions do not amplify well. Zbl 1303.94098Pietrzak, Krzysztof; Rosen, Alon; Segev, Gil 3 2012 Subspace LWE. Zbl 1296.94136Pietrzak, Krzysztof 3 2012 Parallel repetition of computationally sound protocols revisited. Zbl 1272.94057Pietrzak, Krzysztof; Wikström, Douglas 1 2012 Leftover hash lemma, revisited. Zbl 1287.94047Barak, Boaz; Dodis, Yevgeniy; Krawczyk, Hugo; Pereira, Olivier; Pietrzak, Krzysztof; Standaert, François-Xavier; Yu, Yu 12 2011 Efficient authentication from hard learning problems. Zbl 1281.94083Kiltz, Eike; Pietrzak, Krzysztof; Cash, David; Jain, Abhishek; Venturi, Daniele 12 2011 Tamper-proof circuits: how to trade leakage for tamper-resilience. Zbl 1333.94034Faust, Sebastian; Pietrzak, Krzysztof; Venturi, Daniele 6 2011 Parallel repetition for leakage resilience amplification revisited. Zbl 1290.94093Jain, Abhishek; Pietrzak, Krzysztof 1 2011 Leakage-resilient signatures. Zbl 1274.94135Faust, Sebastian; Kiltz, Eike; Pietrzak, Krzysztof; Rothblum, Guy N. 20 2010 Leakage-resilient pseudorandom functions and side-channel attacks on Feistel networks. Zbl 1280.94047Dodis, Yevgeniy; Pietrzak, Krzysztof 12 2010 An efficient parallel repetition theorem. Zbl 1274.94075Håstad, Johan; Pass, Rafael; Wikström, Douglas; Pietrzak, Krzysztof 12 2010 Leakage resilient ElGamal encryption. Zbl 1290.94103Kiltz, Eike; Pietrzak, Krzysztof 12 2010 A leakage-resilient mode of operation. Zbl 1239.94062Pietrzak, Krzysztof 29 2009 A new randomness extraction paradigm for hybrid encryption. Zbl 1239.94055Kiltz, Eike; Pietrzak, Krzysztof; Stam, Martijn; Yung, Moti 26 2009 On the security of padding-based encryption schemes – or – why we cannot prove OAEP secure in the standard model. Zbl 1239.94054Kiltz, Eike; Pietrzak, Krzysztof 4 2009 A new mode of operation for block ciphers and length-preserving MACs. Zbl 1149.94311Dodis, Yevgeniy; Pietrzak, Krzysztof; Puniya, Prashant 5 2008 Compression from collisions, or why CRHF combiners have a long output. Zbl 1183.68277Pietrzak, Krzysztof 4 2008 Robust multi-property combiners for hash functions revisited. Zbl 1155.94366Fischlin, Marc; Lehmann, Anja; Pietrzak, Krzysztof 2 2008 Weak pseudorandom functions in Minicrypt. Zbl 1155.94380Pietrzak, Krzysztof; Sjödin, Johan 1 2008 Indistinguishability amplification. Zbl 1215.94062Maurer, Ueli; Pietrzak, Krzysztof; Renner, Renato 11 2007 Parallel repetition of computationally sound protocols revisited. Zbl 1129.94035Pietrzak, Krzysztof; Wikström, Douglas 6 2007 Non-trivial black-box combiners for collision-resistant hash-functions don’t exist. Zbl 1141.94369Pietrzak, Krzysztof 2 2007 Range extension for weak PRFs; the good, the bad, and the ugly. Zbl 1141.94370Pietrzak, Krzysztof; Sjödin, Johan 2 2007 Improving the security of MACs via randomized message preprocessing. Zbl 1186.94434Dodis, Yevgeniy; Pietrzak, Krzysztof 2 2007 Composition implies adaptive security in Minicrypt. Zbl 1140.94367Pietrzak, Krzysztof 5 2006 A tight bound for EMAC. Zbl 1133.94334Pietrzak, Krzysztof 4 2006 Separating sources for encryption and secret sharing. Zbl 1113.94007Dodis, Yevgeniy; Pietrzak, Krzysztof; Przydatek, Bartosz 1 2006 On the generic insecurity of the full domain hash. Zbl 1145.94440Dodis, Yevgeniy; Oliveira, Roberto; Pietrzak, Krzysztof 20 2005 Improved security analyses for CBC MACs. Zbl 1145.94432Bellare, Mihir; Pietrzak, Krzysztof; Rogaway, Phillip 13 2005 Composition does not imply adaptive security. Zbl 1143.94352Pietrzak, Krzysztof 6 2005 Composition of random systems: When two weak make one strong. Zbl 1197.94195Maurer, Ueli; Pietrzak, Krzysztof 8 2004 On the parameterized complexity of the fixed alphabet shortest common supersequence and longest common subsequence problems. Zbl 1092.68049Pietrzak, Krzysztof 51 2003 The security of many-round Luby-Rackoff pseudo-random permutations. Zbl 1038.94542Maurer, Ueli; Pietrzak, Krzysztof 10 2003 all cited Publications top 5 cited Publications all top 5 Cited by 635 Authors 21 Pietrzak, Krzysztof 13 Kiltz, Eike 13 Venturi, Daniele 12 Szeider, Stefan 11 Tessaro, Stefano 9 Skorski, Maciej 8 Libert, Benoît 8 Nielsen, Jesper Buus 8 Wichs, Daniel 7 Faonio, Antonio 7 Faust, Sebastian 7 Hofheinz, Dennis 7 Ordyniak, Sebastian 7 Wang, Huaxiong 6 Dodis, Yevgeniy 6 Komargodski, Ilan 6 Ling, San 6 Mennink, Bart 6 Nguyen, Khoa 6 Seurin, Yannick 5 Li, Bao 5 Lu, Xianhui 5 Maurer, Ueli M. 5 Nandi, Mridul 5 Reyzin, Leonid 5 Tanaka, Keisuke 5 Vaudenay, Serge 5 Yasuda, Kan 5 Yung, Moti 4 Alwen, Joël 4 Bellare, Mihir 4 Dachman-Soled, Dana 4 Desmedt, Yvo G. 4 Fomin, Fedor V. 4 Golovach, Petr A. 4 Haitner, Iftach 4 Hanaoka, Goichiro 4 Jager, Tibor 4 Matsuda, Takahiro 4 Mouhartem, Fabrice 4 O’Neill, Adam 4 Pass, Rafael 4 Preneel, Bart 4 Srinivasan, Akshayaram 4 Standaert, Francois-Xavier 4 Stehlé, Damien 4 Zhang, Jiang 3 Abdalla, Michel 3 Alawatugoda, Janaka 3 Blocki, Jeremiah 3 Bogos, Sonia 3 Boneh, Dan 3 Canetti, Ran 3 Chen, Yu 3 Chung, Kai-Min 3 Coretti, Sandro 3 Datta, Pratish 3 Döttling, Nico 3 Dziembowski, Stefan 3 Fellows, Michael Ralph 3 Fernau, Henning 3 Fuller, Benjamin 3 Galindo, David 3 Ganian, Robert 3 Gaspers, Serge 3 Gu, Dawu 3 Han, Shuai 3 Impagliazzo, Russell 3 Ishai, Yuval 3 Iwata, Tetsu 3 Jaffke, Lars 3 Kabanets, Valentine 3 Kim, Eun Jung 3 Kwon, Ojoung 3 Lee, Jooyoung 3 Liedloff, Mathieu 3 Liu, Shengli 3 Luykx, Atul 3 Masny, Daniel 3 Minematsu, Kazuhiko 3 Mukherjee, Pratyay 3 Nishimaki, Ryo 3 Patarin, Jacques 3 Paulusma, Daniël 3 Phan Duong Hieu 3 Qin, Baodong 3 Reingold, Omer 3 Seo, Jae Hong 3 Stam, Martijn 3 Telle, Jan Arne 3 Vaikuntanathan, Vinod 3 Wang, Lei 3 Xue, Haiyang 3 Yamada, Shota 3 Yu, Yu 3 Zhandry, Mark 2 Abusalah, Hamza 2 Aggarwal, Divesh 2 Ateniese, Giuseppe 2 Bazgan, Cristina ...and 535 more Authors all top 5 Cited in 31 Serials 48 Journal of Cryptology 31 Theoretical Computer Science 22 Designs, Codes and Cryptography 13 Algorithmica 12 SIAM Journal on Computing 8 Journal of Mathematical Cryptology 6 Information Processing Letters 5 Information Sciences 5 Theory of Computing Systems 4 Journal of Computer and System Sciences 3 Computational Complexity 3 Cryptography and Communications 2 Artificial Intelligence 2 Information and Computation 2 Informatica (Vilnius) 2 Discrete Optimization 2 Advances in Mathematics of Communications 1 Acta Informatica 1 Discrete Applied Mathematics 1 Biometrics 1 Random Structures & Algorithms 1 International Journal of Foundations of Computer Science 1 The Journal of Artificial Intelligence Research (JAIR) 1 Constraints 1 Mathematical Problems in Engineering 1 Soft Computing 1 Journal of Combinatorial Optimization 1 Journal of Discrete Algorithms 1 International Journal of Quantum Information 1 Science China. Information Sciences 1 ACM Transactions on Computation Theory all top 5 Cited in 13 Fields 284 Information and communication theory, circuits (94-XX) 131 Computer science (68-XX) 29 Combinatorics (05-XX) 10 Operations research, mathematical programming (90-XX) 8 Quantum theory (81-XX) 5 Probability theory and stochastic processes (60-XX) 5 Statistics (62-XX) 4 Number theory (11-XX) 4 Biology and other natural sciences (92-XX) 2 Mathematical logic and foundations (03-XX) 1 Algebraic geometry (14-XX) 1 Geometry (51-XX) 1 Numerical analysis (65-XX) Citations by Year