Filip Zagórski

Orcid: 0000-0001-9151-7096

Affiliations:
  • University of Wroclaw, Poland


According to our database1, Filip Zagórski authored at least 34 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Mirrored Commitment: Fixing "Randomized Partial Checking" and Applications.
IACR Cryptol. ePrint Arch., 2024

2023
PROVIDENCE: a Flexible Round-by-Round Risk-Limiting Audit.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
VoteXX: A Solution to Improper Influence in Voter-Verifiable Elections.
IACR Cryptol. ePrint Arch., 2022

Simulations of Ballot Polling Risk-Limiting Audits.
Proceedings of the Financial Cryptography and Data Security. FC 2022 International Workshops, 2022

2021
Minerva- An Efficient Risk-Limiting Ballot Polling Audit.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
On testing pseudorandom generators via statistical tests based on the arcsine law.
J. Comput. Appl. Math., 2020

The Athena Class of Risk-Limiting Ballot Polling Audits.
CoRR, 2020

A Note on Risk-Limiting Bayesian Polling Audits for Two-Candidate Elections.
Proceedings of the Financial Cryptography and Data Security, 2020

2019
Strong Stationary Times and its use in Cryptography.
IEEE Trans. Dependable Secur. Comput., 2019

PrivApollo - Secret Ballot E2E-V Internet Voting.
Proceedings of the Financial Cryptography and Data Security, 2019

2018
RiffleScrambler - A Memory-Hard Password Storing Function.
Proceedings of the Computer Security, 2018

2017
Statistical Testing of PRNG: Generalized Gambler's Ruin Problem.
Proceedings of the Mathematical Aspects of Computer and Information Sciences, 2017

Leakage-Resilient Riffle Shuffle.
Proceedings of the Mathematical Aspects of Computer and Information Sciences, 2017

2016
Randomized stopping times and provably secure pseudorandom permutation generators.
IACR Cryptol. ePrint Arch., 2016

Apollo - End-to-end Verifiable Internet Voting with Recovery from Vote Manipulation.
IACR Cryptol. ePrint Arch., 2016

On spreading rumor in heterogeneous systems.
CoRR, 2016

2015
Hierarchical Ring Signatures Revisited - Unconditionally and Perfectly Anonymous Schnorr Version.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015

2013
Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting System.
IACR Cryptol. ePrint Arch., 2013

Dispute Resolution in Accessible Voting Systems: The Design and Use of Audiotegrity.
Proceedings of the E-Voting and Identify - 4th International Conference, 2013

2012
Hidden Bits Approach for Authentication in RFID Systems.
Proceedings of the Radio Frequency Identification. Security and Privacy Issues, 2012

2011
Paperless Independently-Verifiable Voting.
Proceedings of the E-Voting and Identity - Third International Conference, 2011

2008
Scratch, Click & Vote: E2E voting over the Internet.
IACR Cryptol. ePrint Arch., 2008

Practical Attacks on HB and HB+ Protocols.
IACR Cryptol. ePrint Arch., 2008

Self-stabilizing population of mobile agents.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

Attacks on CKK Family of RFID Authentication Protocols.
Proceedings of the Ad-hoc, Mobile and Wireless Networks, 7th International Conference, 2008

2007
Verifiable Internet Voting Solving Secure Platform Problem.
Proceedings of the Advances in Information and Computer Security, 2007

Kleptographic attacks on a cascade of mix servers.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

2006
Reliable Broadcasting Without Collision Detection.
Proceedings of the SOFSEM 2006: Theory and Practice of Computer Science, 2006

Kleptographic Weaknesses in Benaloh-Tuinstra Protocol.
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006

Kleptographic Attacks on E-Voting Schemes.
Proceedings of the Emerging Trends in Information and Communication Security, 2006

Stealing Secrets with SSL/TLS and SSH - Kleptographic Attacks.
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006

2005
Conditional Digital Signatures.
Proceedings of the Trust, 2005

Anonymous Communication with On-line and Off-line Onion Encoding.
Proceedings of the SOFSEM 2005: Theory and Practice of Computer Science, 2005

A Practical Voting Scheme with Receipts.
Proceedings of the Information Security, 8th International Conference, 2005


  Loading...