Maciej Obremski

Orcid: 0000-0003-4174-0438

Affiliations:
  • National University of Singapore, Singapore


According to our database1, Maciej Obremski authored at least 41 papers between 2013 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Minicrypt PIR for Big Batches.
IACR Cryptol. ePrint Arch., 2025

On the Impossibility of Actively Secure Distributed Samplers.
IACR Cryptol. ePrint Arch., 2025

Improved Lower Bounds for 3-Query Matching Vector Codes.
Proceedings of the 16th Innovations in Theoretical Computer Science Conference, 2025

Efficient Randomized Strong 2-Source Non-malleable Extractor for Any Linear Min-Entropy.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
Quantum Measurement Adversary.
IEEE Trans. Inf. Theory, January, 2024

Engineering an Efficient Approximate DNF-Counter.
CoRR, 2024

Invertible Bloom Lookup Tables with Less Memory and Randomness.
Proceedings of the 32nd Annual European Symposium on Algorithms, 2024

Improved Reductions from Noisy to Bounded and Probing Leakages via Hockey-Stick Divergences.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

2023
On the (Im)possibility of Distributed Samplers: Lower Bounds and Party-Dynamic Constructions.
IACR Cryptol. ePrint Arch., 2023

On the randomized complexity of range avoidance, with applications to cryptography and metacomplexity.
Electron. Colloquium Comput. Complex., 2023

Engineering an Efficient Approximate DNF-Counter.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

Extractors: Low Entropy Requirements Colliding with Non-malleability.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Distributed Shuffling in Adversarial Environments.
Proceedings of the 4th Conference on Information-Theoretic Cryptography, 2023

2022
Privacy Amplification With Tamperable Memory via Non-Malleable Two-Source Extractors.
IEEE Trans. Inf. Theory, 2022

Survey: Non-malleable code in the split-state model.
IACR Cryptol. ePrint Arch., 2022

Non-Malleable Code in the Split-State Model.
Entropy, 2022

On Secret Sharing, Randomness, and Random-less Reductions for Secret Sharing.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Rate one-third non-malleable codes.
Proceedings of the STOC '22: 54th Annual ACM SIGACT Symposium on Theory of Computing, Rome, Italy, June 20, 2022

Algebraic Restriction Codes and Their Applications.
Proceedings of the 13th Innovations in Theoretical Computer Science Conference, 2022

Public Randomness Extraction with Ephemeral Roles and Worst-Case Corruptions.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

2021
Simplicity Meets Near-Optimal Rate: Non-malleable Codes and Non-malleable Two-source Extractors via Rate Boosters.
Electron. Colloquium Comput. Complex., 2021

The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

2020
Two-Source Non-Malleable Extractors and Applications to Privacy Amplification with Tamperable Memory.
IACR Cryptol. ePrint Arch., 2020

Computational and Information-Theoretic Two-Source (Non-Malleable) Extractors.
IACR Cryptol. ePrint Arch., 2020

Complexity of Estimating Rényi Entropy of Markov Chains.
Proceedings of the IEEE International Symposium on Information Theory, 2020

A constant rate non-malleable code in the split-state model.
Proceedings of the 61st IEEE Annual Symposium on Foundations of Computer Science, 2020

How to Extract Useful Randomness from Unreliable Sources.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Non-malleable Secret Sharing Against Bounded Joint-Tampering Attacks in the Plain Model.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

Extractor Lower Bounds, Revisited.
Proceedings of the Approximation, 2020

2019
Inception makes non-malleable codes shorter as well!
IACR Cryptol. ePrint Arch., 2019

Continuous Non-Malleable Codes in the 8-Split-State Model.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

Stronger Leakage-Resilient and Non-Malleable Secret Sharing Schemes for General Access Structures.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
Continuous NMC Secure Against Permutations and Overwrites, with Applications to CCA Secure Commitments.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

Inverted Leftover Hash Lemma.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

Leakage-Resilient Algebraic Manipulation Detection Codes with Optimal Parameters.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

2017
Information Theoretic Continuously Non-Malleable Codes in the Constant Split-State Model.
Electron. Colloquium Comput. Complex., 2017

Inception Makes Non-malleable Codes Stronger.
Proceedings of the Theory of Cryptography - 15th International Conference, 2017

Renyi Entropy Estimation Revisited.
Proceedings of the Approximation, 2017

2015
Leakage-Resilient Non-malleable Codes.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

Non-malleable Reductions and Applications.
Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, 2015

2013
Non-malleable Codes from Two-Source Extractors.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013


  Loading...