Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

126 Publications


2012 | Published | Conference Paper | IST-REx-ID: 3279
Jain A, Pietrzak KZ, Tentes A. Hardness preserving constructions of pseudorandom functions. In: Vol 7194. Springer; 2012:369-382. doi:10.1007/978-3-642-28914-9_21
View | DOI | Download None (ext.)
 

2012 | Published | Conference Paper | IST-REx-ID: 3280 | OA
Pietrzak KZ. Subspace LWE. In: Vol 7194. Springer; 2012:548-563. doi:10.1007/978-3-642-28914-9_31
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

2012 | Published | Conference Paper | IST-REx-ID: 3281
Pietrzak KZ, Rosen A, Segev G. Lossy functions do not amplify well. In: Vol 7194. Springer; 2012:458-475. doi:10.1007/978-3-642-28914-9_26
View | DOI | Download None (ext.)
 

2012 | Published | Conference Paper | IST-REx-ID: 3282 | OA
Dodis Y, Pietrzak KZ, Kiltz E, Wichs D. Message authentication, revisited. In: Vol 7237. Springer; 2012:355-374. doi:10.1007/978-3-642-29011-4_22
[Submitted Version] View | Files available | DOI
 

2012 | Published | Conference Paper | IST-REx-ID: 2048 | OA
Faust S, Pietrzak KZ, Schipper J. Practical leakage-resilient symmetric cryptography. In: Conference Proceedings CHES 2012. Vol 7428. Springer; 2012:213-232. doi:10.1007/978-3-642-33027-8_13
[Preprint] View | DOI | Download Preprint (ext.)
 

2012 | Published | Conference Paper | IST-REx-ID: 2049 | OA
Heyse S, Kiltz E, Lyubashevsky V, Paar C, Pietrzak KZ. Lapin: An efficient authentication protocol based on ring-LPN. In: Conference Proceedings FSE 2012. Vol 7549. Springer; 2012:346-365. doi:10.1007/978-3-642-34047-5_20
[Preprint] View | DOI | Download Preprint (ext.)
 

Filters and Search Terms

department=KrPi

Search

Filter Publications

Display / Sort

Citation Style: AMA

Export / Embed