# Maciej Skorski

According to our database

Collaborative distances:

^{1}, Maciej Skorski authored at least 70 papers between 2013 and 2021.Collaborative distances:

## Timeline

#### Legend:

Book In proceedings Article PhD thesis Other## Links

#### On csauthors.net:

## Bibliography

2021

CoRR, 2021

CoRR, 2021

CoRR, 2021

Proceedings of the IEEE International Symposium on Information Theory, 2021

Proceedings of the Fundamentals of Computation Theory - 23rd International Symposium, 2021

Proceedings of the Conference on Learning Theory, 2021

Proceedings of the 55th Annual Conference on Information Sciences and Systems, 2021

2020

The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free.

IACR Cryptol. ePrint Arch., 2020

Simple Analysis of Johnson-Lindenstrauss Transform under Neuroscience Constraints.

CoRR, 2020

CoRR, 2020

CoRR, 2020

CoRR, 2020

CoRR, 2020

CoRR, 2020

Proceedings of the IEEE International Symposium on Information Theory, 2020

2019

IACR Cryptol. ePrint Arch., 2019

CoRR, 2019

CoRR, 2019

CoRR, 2019

Proceedings of the SOFSEM 2019: Theory and Practice of Computer Science, 2019

Proceedings of the IEEE International Symposium on Information Theory, 2019

Proceedings of the 8th International Conference on Data Science, 2019

2018

Evaluation and Monitoring of Free Running Oscillators Serving as Source of Randomness.

IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

IACR Cryptol. ePrint Arch., 2018

CoRR, 2018

2017

IACR Cryptol. ePrint Arch., 2017

IACR Cryptol. ePrint Arch., 2017

CoRR, 2017

CoRR, 2017

A Cryptographic View of Regularity Lemmas: Simpler Unified Proofs and Refined Bounds.

Proceedings of the Theory and Applications of Models of Computation, 2017

Proceedings of the 34th Symposium on Theoretical Aspects of Computer Science, 2017

Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Proceedings of the 44th International Colloquium on Automata, Languages, and Programming, 2017

2016

IACR Cryptol. ePrint Arch., 2016

IACR Cryptol. ePrint Arch., 2016

Improved Estimation of Collision Entropy in High and Low-Entropy Regimes and Applications to Anomaly Detection.

IACR Cryptol. ePrint Arch., 2016

IACR Cryptol. ePrint Arch., 2016

IACR Cryptol. ePrint Arch., 2016

A Subgradient Algorithm For Computational Distances and Applications to Cryptography.

IACR Cryptol. ePrint Arch., 2016

IACR Cryptol. ePrint Arch., 2016

IACR Cryptol. ePrint Arch., 2016

Proceedings of the Information Security Applications - 17th International Workshop, 2016

Proceedings of the Theory of Cryptography - 13th International Conference, 2016

Proceedings of the SOFSEM 2016: Theory and Practice of Computer Science, 2016

Proceedings of the Information Theoretic Security - 9th International Conference, 2016

Evaluating Entropy for True Random Number Generators: Efficient, Robust and Provably Secure.

Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

Evaluating Entropy Sources for True Random Number Generators by Collision Counting.

Proceedings of the Applications and Techniques in Information Security, 2016

2015

IACR Cryptol. ePrint Arch., 2015

IACR Cryptol. ePrint Arch., 2015

Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications to Pseudoentropy.

IACR Cryptol. ePrint Arch., 2015

IACR Cryptol. ePrint Arch., 2015

CoRR, 2015

Lower bounds on $q$-wise independence tails and applications to min-entropy condensers.

CoRR, 2015

Simulating Side Information: Better Provable Security for Leakage Resilient Stream Ciphers.

CoRR, 2015

Proceedings of Student Research Forum Papers and Posters at SOFSEM 2015, 2015

Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs with Applications to Pseudoentropy.

Proceedings of Student Research Forum Papers and Posters at SOFSEM 2015, 2015

Proceedings of the Provable Security, 2015

Proceedings of the Algorithms and Computation - 26th International Symposium, 2015

Efficiently Simulating High Min-entropy Sources in the Presence of Side Information.

Proceedings of the Progress in Cryptology - INDOCRYPT 2015, 2015

Proceedings of the Cryptography and Coding - 15th IMA International Conference, 2015

Proceedings of the Information Theoretic Security - 8th International Conference, 2015

Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Privacy and secrecy with multiple measurements of physical and biometric identifiers.

Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Proceedings of the Cryptography and Information Security in the Balkans, 2015

2014

IACR Cryptol. ePrint Arch., 2014

True Random Number Generators Secure in a Changing Environment: Improved Security Bounds.

IACR Cryptol. ePrint Arch., 2014

IACR Cryptol. ePrint Arch., 2014

Proceedings of the 2014 Imperial College Computing Student Workshop, 2014

2013

CoRR, 2013

Proceedings of the Information Theoretic Security - 7th International Conference, 2013