Pietrzak

Results: 33



#Item
11

Mahdi Cheraghchi* (), MIT CSAIL, 32 Vassar Street, Cambridge, MACapacity and Constructions of Non-Malleable Codes. Non-malleable codes, introduced by Dziembowski, Pietrzak and Wic

Add to Reading List

Source URL: jointmathematicsmeetings.org

Language: English - Date: 2014-09-16 01:55:28
    12

    Separating Sources for Encryption and Secret Sharing Yevgeniy Dodis NYU Krzysztof Pietrzak

    Add to Reading List

    Source URL: research.ihost.com

    Language: English - Date: 2006-03-28 15:48:52
      13

      non-trivial black-box combiners for collision-resistant hash-functions don’t exist Krzysztof Pietrzak (CWI Amsterdam) Eurocrypt May

      Add to Reading List

      Source URL: www.iacr.org

      Language: English - Date: 2007-06-12 08:51:13
        14

        Commentary Will the introduction of the National Broadband Network change the face of preventive medicine? Eva Pietrzak, PhD, Stephen Pullman, RAN, Cristina Cotea, BSc (Hons), Peter Nasveld, MBBS, FACTM, Peter Warfe,

        Add to Reading List

        Source URL: jmvh.org

        Language: English - Date: 2013-09-24 04:00:31
          15

          CtrlMouse et TouchCtrl : Dupliquer les Délimiteurs de Mode sur la Souris Thomas Pietrzak Université Lille 1

          Add to Reading List

          Source URL: www.gillesbailly.fr

          Language: French - Date: 2015-05-10 18:07:52
            16Mathematics / FO / Finite model theory / Pi

            Improved Security Analyses for CBC MACs Mihir Bellare University of California, San Diego Krzysztof Pietrzak ETH Z¨urich Phillip Rogaway

            Add to Reading List

            Source URL: www.iacr.org

            Language: English - Date: 2005-08-31 11:29:11
            17Route distinguisher / Adaptive behavior

            Composition Does Not Imply Adaptive Security Krzysztof Pietrzak ETH Z¨urich atalk

            Add to Reading List

            Source URL: www.iacr.org

            Language: English - Date: 2005-08-31 11:29:14
            18Probability and statistics / Mathematical analysis / Randomness / Entropy / Kullback–Leibler divergence / Measure theory / Mutual information / Differential entropy / Information theory / Statistics / Statistical theory

            How to Fake Auxiliary Input Dimitar Jetchev and Krzysztof Pietrzak⋆ EPFL Switzerland and IST Austria Abstract. Consider a joint distribution (X, A) on a set X × {0, 1}ℓ . We show that for any family F of distinguish

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2013-12-26 04:47:12
            19Mathematics / Packaging / Security / Malleability / Tamper resistance / Noisy-channel coding theorem / Information / Telecommunications engineering / Ciphertext indistinguishability / Coding theory / Cryptography / Error detection and correction

            Non-Malleable Codes Stefan Dziembowski ∗ Krzysztof Pietrzak † Daniel Wichs ‡

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2010-01-15 11:15:53
            20Message authentication codes / Cryptography / Ciphertext indistinguishability

            Message Authentication, Revisited Yevgeniy Dodis, Eike Kiltz, Krzysztof Pietrzak, Daniel Wichs EUROCRYPT 2012, April 16th, Cambridge UK Krzysztof Pietrzak

            Add to Reading List

            Source URL: www.iacr.org

            Language: English - Date: 2012-04-20 07:04:20
            UPDATE