Krzysztof Pietrzak

Orcid: 0000-0002-9139-1654

According to our database1, Krzysztof Pietrzak authored at least 123 papers between 2003 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Putting Sybils on a Diet: Securing Distributed Hash Tables using Proofs of Space.
IACR Cryptol. ePrint Arch., 2025

Beholder Signatures.
IACR Cryptol. ePrint Arch., 2025

Space-Deniable Proofs.
IACR Cryptol. ePrint Arch., 2025

On the (in)security of Proofs-of-Space based Longest-Chain Blockchains.
IACR Cryptol. ePrint Arch., 2025

Watermarkable and Zero-Knowledge Verifiable Delay Functions from Any Proof of Exponentiation.
Proceedings of the Public-Key Cryptography - PKC 2025, 2025

Continuous Group-Key Agreement: Concurrent Updates Without Pruning.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

Time-Space Tradeoffs of Truncation with Preprocessing.
Proceedings of the 6th Conference on Information-Theoretic Cryptography, 2025

Nakamoto Consensus from Multiple Resources.
Proceedings of the 7th Conference on Advances in Financial Technologies, 2025

2024
Deniability in Automated Contact Tracing: Impossibilities and Possibilities.
Proc. Priv. Enhancing Technol., 2024

The Cost of Maintaining Keys in Dynamic Groups with Applications to Multicast Encryption and Group Messaging.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

Fully Automated Selfish Mining Analysis in Efficient Proof Systems Blockchains.
Proceedings of the 43rd ACM Symposium on Principles of Distributed Computing, 2024

Trapdoor Memory-Hard Functions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

Route Discovery in Private Payment Channel Networks.
Proceedings of the Computer Security. ESORICS 2024 International Workshops, 2024

2023
Efficiently Testable Circuits Without Conductivity.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

On the Cost of Post-compromise Security in Concurrent Continuous Group-Key Agreement.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

Certifying Giant Nonprimes.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

Efficiently Testable Circuits.
Proceedings of the 14th Innovations in Theoretical Computer Science Conference, 2023

Random Oracle Combiners: Breaking the Concatenation Barrier for Collision-Resistance.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

2022
Coffee: Fast Healing Concurrent Continuous Group Key Agreement for Decentralized Group Messaging.
IACR Cryptol. ePrint Arch., 2022

Hide & Seek: Privacy-Preserving Rebalancing on Payment Channel Networks.
Proceedings of the Financial Cryptography and Data Security, 2022

CoCoA: Concurrent Continuous Group Key Agreement.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Practical Statistically-Sound Proofs of Exponentiation in Any Group.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Wiser: Increasing Throughput in Payment Channel Networks with Transaction Aggregation.
Proceedings of the 4th ACM Conference on Advances in Financial Technologies, 2022

2021
On the Cost of Adaptivity in Graph-Based Games.
IACR Cryptol. ePrint Arch., 2021

On Treewidth, Separators and Yao's Garbling.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

The Cost of Adaptivity in Security Games on Graphs.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Trojan-Resilience Without Cryptography.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Grafting Key Trees: Efficient Key Management for Overlapping Groups.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Keep the Dirt: Tainted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

LightPIR: Privacy-Preserving Route Discovery for Payment Channel Networks.
Proceedings of the IFIP Networking Conference, 2021

Inverse-Sybil Attacks in Automated Contact Tracing.
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021

Limits on the Adaptive Security of Yao's Garbling.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact Tracing.
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020

2019
PPAD-Hardness via Iterated Squaring Modulo a Composite.
IACR Cryptol. ePrint Arch., 2019

Keep the Dirt: Tainted TreeKEM, an Efficient and Provably Secure Continuous Group Key Agreement Protocol.
IACR Cryptol. ePrint Arch., 2019

Finding a Nash equilibrium is no easier than breaking Fiat-Shamir.
Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing, 2019

Adaptively Secure Proxy Re-encryption.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019

Simple Verifiable Delay Functions.
Proceedings of the 10th Innovations in Theoretical Computer Science Conference, 2019

Proofs of Catalytic Space.
Proceedings of the 10th Innovations in Theoretical Computer Science Conference, 2019

Reversible Proofs of Sequential Work.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

2018
SpaceMint: A Cryptocurrency Based on Proofs of Space.
Proceedings of the Financial Cryptography and Data Security, 2018

Simple Proofs of Sequential Work.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

Sustained Space Complexity.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

On the Memory-Hardness of Data-Independent Password-Hashing Functions.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
The Exact Security of PMAC.
IACR Cryptol. ePrint Arch., 2017

Position-Based Cryptography and Multiparty Communication Complexity.
Proceedings of the Theory of Cryptography - 15th International Conference, 2017

Non-Uniform Attacks Against Pseudoentropy.
Proceedings of the 44th International Colloquium on Automata, Languages, and Programming, 2017

Scrypt Is Maximally Memory-Hard.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Depth-Robust Graphs and Their Cumulative Memory Complexity.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Be Adaptive, Avoid Overcommitting.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

Beyond Hellman's Time-Memory Trade-Offs with Applications to Proofs of Space.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
Robust Multi-Property Combiners for Hash Functions.
IACR Cryptol. ePrint Arch., 2016

A counterexample to the chain rule for conditional HILL entropy.
Comput. Complex., 2016

Pseudoentropy: Lower-Bounds for Chain Rules and Transformations.
Proceedings of the Theory of Cryptography - 14th International Conference, 2016

Standard Security Does Imply Security Against Selective Opening for Markov Distributions.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016

On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

Constrained PRFs for Unbounded Inputs.
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016

Offline Witness Encryption.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
Standard Security Does Imply Security Against Selective Opening for Markov Distributions.
IACR Cryptol. ePrint Arch., 2015

Tight Bounds for Keyed Sponges and Truncated CBC.
IACR Cryptol. ePrint Arch., 2015

Key-Homomorphic Constrained Pseudorandom Functions.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

The Chain Rule for HILL Pseudoentropy, Revisited.
Proceedings of the Progress in Cryptology - LATINCRYPT 2015, 2015

Condensed Unpredictability.
Proceedings of the Automata, Languages, and Programming - 42nd International Colloquium, 2015

Efficient Zero-Knowledge Proofs for Commitments from Learning with Errors over Rings.
Proceedings of the Computer Security - ESORICS 2015, 2015

The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

A Quasipolynomial Reduction for Generalized Selective Decryption on Trees.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

Proofs of Space.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

Generic Security of NMAC and HMAC with Input Whitening.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
How to Fake Auxiliary Input.
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014

Simple Chosen-Ciphertext Security from Low-Noise LPN.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

Key Derivation without Entropy Waste.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

The Exact PRF-Security of NMAC and HMAC.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

Adaptive Security of Constrained PRFs.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
A Closer Look at HMAC.
IACR Cryptol. ePrint Arch., 2013

A Counterexample to the Chain Rule for Conditional HILL Entropy - And What Deniable Encryption Has to Do with It.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

Digital Signatures with Minimal Overhead from Indifferentiable Random Invertible Functions.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

Learning with Rounding, Revisited - New Reduction, Properties and Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

2012
Digital Signatures with Minimal Overhead.
IACR Cryptol. ePrint Arch., 2012

Commitments and Efficient Zero-Knowledge Proofs from Hard Learning Problems.
IACR Cryptol. ePrint Arch., 2012

Lossy Functions Do Not Amplify Well.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012

Subspace LWE.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012

Hardness Preserving Constructions of Pseudorandom Functions.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012

Cryptography from Learning Parity with Noise.
Proceedings of the SOFSEM 2012: Theory and Practice of Computer Science, 2012

Lapin: An Efficient Authentication Protocol Based on Ring-LPN.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

Message Authentication, Revisited.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

Practical Leakage-Resilient Symmetric Cryptography.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
Parallel Repetition for Leakage Resilience Amplification Revisited.
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011

Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience.
Proceedings of the Automata, Languages and Programming - 38th International Colloquium, 2011

Efficient Authentication from Hard Learning Problems.
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011

Leftover Hash Lemma, Revisited.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

2010
An Efficient Parallel Repetition Theorem.
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010

Leakage-Resilient Signatures.
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010

Non-Malleable Codes.
Proceedings of the Innovations in Computer Science, 2010

Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks.
Proceedings of the Advances in Cryptology, 2010

Leakage Resilient ElGamal Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

2009
A Leakage-Resilient Mode of Operation.
Proceedings of the Advances in Cryptology, 2009

A New Randomness Extraction Paradigm for Hybrid Encryption.
Proceedings of the Advances in Cryptology, 2009

On the Security of Padding-Based Encryption Schemes - or - Why We Cannot Prove OAEP Secure in the Standard Model.
Proceedings of the Advances in Cryptology, 2009

2008
Leakage-Resilient Cryptography in the Standard Model.
IACR Cryptol. ePrint Arch., 2008

Weak Pseudorandom Functions in Minicrypt.
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008

Robust Multi-property Combiners for Hash Functions Revisited.
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008

Leakage-Resilient Cryptography.
Proceedings of the 49th Annual IEEE Symposium on Foundations of Computer Science, 2008

A New Mode of Operation for Block Ciphers and Length-Preserving MACs.
Proceedings of the Advances in Cryptology, 2008

Compression from Collisions, or Why CRHF Combiners Have a Long Output.
Proceedings of the Advances in Cryptology, 2008

2007
Parallel Repetition of Computationally Sound Protocols Revisited.
Proceedings of the Theory of Cryptography, 4th Theory of Cryptography Conference, 2007

Improving the Security of MACs Via Randomized Message Preprocessing.
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

Intrusion-Resilient Secret Sharing.
Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science, 2007

Range Extension for Weak PRFs; The Good, the Bad, and the Ugly.
Proceedings of the Advances in Cryptology, 2007

Non-trivial Black-Box Combiners for Collision-Resistant Hash-Functions Don't Exist.
Proceedings of the Advances in Cryptology, 2007

Indistinguishability Amplification.
Proceedings of the Advances in Cryptology, 2007

2006
Indistinguishability and composition of random systems.
PhD thesis, 2006

Separating Sources for Encryption and Secret Sharing.
Proceedings of the Theory of Cryptography, Third Theory of Cryptography Conference, 2006

A Tight Bound for EMAC.
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006

Composition Implies Adaptive Security in Minicrypt.
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006

Luby-Rackoff Ciphers from Weak Round Functions?
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006

2005
Composition Does Not Imply Adaptive Security.
Proceedings of the Advances in Cryptology, 2005

On the Generic Insecurity of the Full Domain Hash.
Proceedings of the Advances in Cryptology, 2005

Improved Security Analyses for CBC MACs.
Proceedings of the Advances in Cryptology, 2005

2004
Composition of Random Systems: When Two Weak Make One Strong.
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004

2003
On the parameterized complexity of the fixed alphabet shortest common supersequence and longest common subsequence problems.
J. Comput. Syst. Sci., 2003

The Security of Many-Round Luby-Rackoff Pseudo-Random Permutations.
Proceedings of the Advances in Cryptology, 2003


  Loading...