Kamil Kluczniak

Orcid: 0000-0002-0553-033X

According to our database1, Kamil Kluczniak authored at least 41 papers between 2012 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
FDFB: Full Domain Functional Bootstrapping Towards Practical Fully Homomorphic Encryption.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Improved Circuit Synthesis with Amortized Bootstrapping for FHEW-like Schemes.
IACR Cryptol. ePrint Arch., 2023

On Circuit Private, Multikey and Threshold Approximate Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2023

2022
Circuit Privacy for FHEW/TFHE-Style Fully Homomorphic Encryption in Practice.
IACR Cryptol. ePrint Arch., 2022

NTRU-ν-um: Secure Fully Homomorphic Encryption from NTRU with Small Modulus.
IACR Cryptol. ePrint Arch., 2022

Explainable Arguments.
Proceedings of the Financial Cryptography and Data Security, 2022

NTRU-v-um: Secure Fully Homomorphic Encryption from NTRU with Small Modulus.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Lockable Obfuscation from Circularly Insecure Fully Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2021

2020
Witness Encryption from Garbled Circuit and Multikey Fully Homomorphic Encryption Techniques.
IACR Cryptol. ePrint Arch., 2020

2019
Multi-device anonymous authentication.
Int. J. Inf. Sec., 2019

Ring Signatures: Logarithmic-Size, No Setup - from Standard Assumptions.
IACR Cryptol. ePrint Arch., 2019

CTRL-PACE: Controlled Randomness for e-Passport Password Authentication.
Fundam. Informaticae, 2019

GDPR-Compliant Reputation System Based on Self-certifying Domain Signatures.
Proceedings of the Information Security Practice and Experience, 2019

Pseudonymous Signature Schemes.
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019

2018
Efficient VLR group signatures for smart cards.
Int. J. Embed. Syst., 2018

Towards Practical Security of Pseudonymous Signature on the BSI eIDAS Token.
IACR Cryptol. ePrint Arch., 2018

Fine-Tuning Decentralized Anonymous Payment Systems based on Arguments for Arithmetic Circuit Satisfiability.
IACR Cryptol. ePrint Arch., 2018

Signatures with Flexible Public Key: A Unified Approach to Privacy-Preserving Signatures (Full Version).
IACR Cryptol. ePrint Arch., 2018

Privacy-oriented dependency via deniable SIGMA protocol.
Comput. Secur., 2018

Signatures with Flexible Public Key: Introducing Equivalence Classes for Public Keys.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
TrDup: enhancing secure data deduplication with user traceability in cloud computing.
Int. J. Web Grid Serv., 2017

Two-Move and Setup-Free Blind Signatures with Perfect Blindness.
Proceedings of the 4th ACM International Workshop on ASIA Public-Key Cryptography, 2017

2016
Domain-Specific Pseudonymous Signatures Revisited.
IACR Cryptol. ePrint Arch., 2016

Security Analysis of ePrint Report 2016/500 "Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups".
IACR Cryptol. ePrint Arch., 2016

Local Self-Organization with Strong Privacy Protection.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Computations on Private Sets and their Application to Biometric based Authentication Systems.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Protecting Electronic Signatures in Case of Key Leakage.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

Controlled Randomness - A Defense Against Backdoors in Cryptographic Devices.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

A Formal Concept of Domain Pseudonymous Signatures.
Proceedings of the Information Security Practice and Experience, 2016

A Short Paper on Blind Signatures from Knowledge Assumptions.
Proceedings of the Financial Cryptography and Data Security, 2016

Pseudonymous Signature on eIDAS Token - Implementation Based Privacy Threats.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Insecurity of Anonymous Login with German Personal Identity Cards.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015

Anonymous Evaluation System.
Proceedings of the Network and System Security - 9th International Conference, 2015

A New Secure Data Deduplication Approach Supporting User Traceability.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

2014
Attack against a Pairing Based Anonymous Authentication Protocol.
Proceedings of the SOFSEM 2014: Theory and Practice of Computer Science, 2014

Forbidden City Model - Towards a Practice Relevant Framework for Designing Cryptographic Protocols.
Proceedings of the Information Security Practice and Experience, 2014

Attack on U-Prove Revocation Scheme from FC'13 - Passing Verification by Revoked Users.
Proceedings of the Financial Cryptography and Data Security, 2014

A Short Paper on How to Improve U-Prove Using Self-Blindable Certificates.
Proceedings of the Financial Cryptography and Data Security, 2014

2013
Mutual Chip Authentication.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Mutual Restricted Identification.
Proceedings of the Public Key Infrastructures, Services and Applications, 2013

2012
Restricted Identification without Group Keys.
Proceedings of the 11th IEEE International Conference on Trust, 2012


  Loading...