Marjan Skrobot

Orcid: 0000-0002-7132-7591

Affiliations:
  • Université du Luxembourg


According to our database1, Marjan Skrobot authored at least 16 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Verifying Artifact Authenticity with Unclonable Optical Tags.
Proceedings of the 21st International Conference on Security and Cryptography, 2024

C'est Très CHIC: A Compact Password-Authenticated Key Exchange from Lattice-Based KEM.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

SweetPAKE: Key exchange with decoy passwords.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
Wireless-Channel Key Exchange.
Proceedings of the Topics in Cryptology - CT-RSA 2023, 2023

2020
A Survey of Requirements for COVID-19 Mitigation Strategies. Part I: Newspaper Clips.
CoRR, 2020

2019
An Offline Dictionary Attack Against zkPAKE Protocol.
Proceedings of the ICT Systems Security and Privacy Protection, 2019

2018
Forward Secrecy of SPAKE2.
Proceedings of the Provable Security, 2018

On Composability of Game-Based Password Authenticated Key Exchange.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

2017
On Composability and Security of Game-based Password-Authenticated Key Exchange.
PhD thesis, 2017

An Offline Dictionary Attack against zkPAKE Protocol.
IACR Cryptol. ePrint Arch., 2017

On the Relation Between SIM and IND-RoR Security Models for PAKEs.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

On the Relation Between SIM and IND-RoR Security Models for PAKEs with Forward Secrecy.
Proceedings of the E-Business and Telecommunications - 14th International Joint Conference, 2017

Tightly-Secure PAK(E).
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

2016
Two More Efficient Variants of the J-PAKE Protocol.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
On the Provable Security of the Dragonfly Protocol.
Proceedings of the Information Security - 18th International Conference, 2015

2012
Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012


  Loading...