Maciej Obremski
Orcid: 0000-0003-4174-0438Affiliations:
- National University of Singapore, Singapore
According to our database1,
Maciej Obremski
authored at least 41 papers
between 2013 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
IACR Cryptol. ePrint Arch., 2025
Proceedings of the 16th Innovations in Theoretical Computer Science Conference, 2025
Efficient Randomized Strong 2-Source Non-malleable Extractor for Any Linear Min-Entropy.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
2024
Proceedings of the 32nd Annual European Symposium on Algorithms, 2024
Improved Reductions from Noisy to Bounded and Probing Leakages via Hockey-Stick Divergences.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
2023
On the (Im)possibility of Distributed Samplers: Lower Bounds and Party-Dynamic Constructions.
IACR Cryptol. ePrint Arch., 2023
On the randomized complexity of range avoidance, with applications to cryptography and metacomplexity.
Electron. Colloquium Comput. Complex., 2023
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
Proceedings of the 4th Conference on Information-Theoretic Cryptography, 2023
2022
Privacy Amplification With Tamperable Memory via Non-Malleable Two-Source Extractors.
IEEE Trans. Inf. Theory, 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Theory of Cryptography - 20th International Conference, 2022
Proceedings of the STOC '22: 54th Annual ACM SIGACT Symposium on Theory of Computing, Rome, Italy, June 20, 2022
Proceedings of the 13th Innovations in Theoretical Computer Science Conference, 2022
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022
2021
Simplicity Meets Near-Optimal Rate: Non-malleable Codes and Non-malleable Two-source Extractors via Rate Boosters.
Electron. Colloquium Comput. Complex., 2021
The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
2020
Two-Source Non-Malleable Extractors and Applications to Privacy Amplification with Tamperable Memory.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the IEEE International Symposium on Information Theory, 2020
Proceedings of the 61st IEEE Annual Symposium on Foundations of Computer Science, 2020
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020
Non-malleable Secret Sharing Against Bounded Joint-Tampering Attacks in the Plain Model.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019
Stronger Leakage-Resilient and Non-Malleable Secret Sharing Schemes for General Access Structures.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
2018
Continuous NMC Secure Against Permutations and Overwrites, with Applications to CCA Secure Commitments.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018
2017
Information Theoretic Continuously Non-Malleable Codes in the Constant Split-State Model.
Electron. Colloquium Comput. Complex., 2017
Proceedings of the Theory of Cryptography - 15th International Conference, 2017
2015
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015
Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, 2015
2013
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013