Miroslaw Kutylowski

According to our database1, Miroslaw Kutylowski authored at least 174 papers between 1986 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Privacy-Aware Identity Management.
Proceedings of the Encyclopedia of Big Data Technologies., 2019

Anonymous Deniable Identification in Ephemeral Setup & Leakage Scenarios.
IACR Cryptology ePrint Archive, 2019

Rethinking Identification Protocols from the Point of View of the GDPR.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019

Anonymous Deniable Identification in Ephemeral Setup and Leakage Scenarios (Brief Announcement).
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019

Pseudonymous Signature Schemes.
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019

2018
Towards Practical Security of Pseudonymous Signature on the BSI eIDAS Token.
IACR Cryptology ePrint Archive, 2018

Special issue on social network security and privacy.
Concurrency and Computation: Practice and Experience, 2018

2017
TrDup: enhancing secure data deduplication with user traceability in cloud computing.
IJWGS, 2017

Security and privacy in social networks.
Concurrency and Computation: Practice and Experience, 2017

Brief Announcement: Anonymous Credentials Secure to Ephemeral Leakage.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017

On Crossroads of Privacy Protection.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

Security of Okamoto Identification Scheme: a Defense against Ephemeral Key Leakage and Setup.
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017

Braid Chain Radio Communication.
Proceedings of the Algorithms for Sensor Systems, 2017

2016
Cyber security, crime, and forensics of wireless networks and applications.
Security and Communication Networks, 2016

Local Self-Organization with Strong Privacy Protection.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Ghost Train for Anonymous Communication.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

Multi-device Anonymous Authentication.
Proceedings of the Network and System Security - 10th International Conference, 2016

Protecting Electronic Signatures in Case of Key Leakage.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

Controlled Randomness - A Defense Against Backdoors in Cryptographic Devices.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

Chip Authentication for E-Passports: PACE with Chip Authentication Mapping v2.
Proceedings of the Information Security - 19th International Conference, 2016

A Formal Concept of Domain Pseudonymous Signatures.
Proceedings of the Information Security Practice and Experience, 2016

Pseudonymous Signature on eIDAS Token - Implementation Based Privacy Threats.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Mixing in Random Digraphs with Application to the Forward-Secure Key Evolution in Wireless Sensor Networks.
TOSN, 2015

Restricted Identification Secure in the Extended Canetti-Krawczyk Model.
J. UCS, 2015

Provable Unlinkability Against Traffic Analysis with Low Message Overhead.
J. Cryptology, 2015

Tracing Attacks on U-Prove with Revocation Mechanism.
IACR Cryptology ePrint Archive, 2015

Insecurity of Anonymous Login with German Personal Identity Cards.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015

Anonymous Evaluation System.
Proceedings of the Network and System Security - 9th International Conference, 2015

Hard Invalidation of Electronic Signatures.
Proceedings of the Information Security Practice and Experience, 2015

Tracing Attacks on U-Prove with Revocation Mechanism: Tracing Attacks for U-Prove.
Proceedings of the 10th ACM Symposium on Information, 2015

A New Secure Data Deduplication Approach Supporting User Traceability.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

On Distributed Cardinality Estimation: Random Arcs Recycled.
Proceedings of the Twelfth Workshop on Analytic Algorithmics and Combinatorics, 2015

2014
Probabilistic Admissible Encoding on Elliptic Curves - Towards PACE with Generalized Integrated Mapping.
Proceedings of the SOFSEM 2014: Theory and Practice of Computer Science, 2014

Forbidden City Model - Towards a Practice Relevant Framework for Designing Cryptographic Protocols.
Proceedings of the Information Security Practice and Experience, 2014

Lightweight Protocol for Trusted Spontaneous Communication.
Proceedings of the Trusted Systems - 6th International Conference, 2014

Attack on U-Prove Revocation Scheme from FC'13 - Passing Verification by Revoked Users.
Proceedings of the Financial Cryptography and Data Security, 2014

Stand-by Attacks on E-ID Password Authentication.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014

2013
Attack against Ibrahim's Distributed Key Generation for RSA.
I. J. Network Security, 2013

Stamp \& Extend - Instant but Undeniable Timestamping based on Lazy Trees.
IACR Cryptology ePrint Archive, 2013

Disability Parking Permit - Lightweight But Trustworthy Identity Documents.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Mutual Chip Authentication.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Efficient and robust data aggregation using untrusted infrastructure.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Chameleon RFID and Tracking Prevention.
Proceedings of the Radio Frequency Identification System Security, 2013

Simplified PACE|AA Protocol.
Proceedings of the Information Security Practice and Experience, 2013

Bit Reversal Broadcast Scheduling for Ad Hoc Systems.
Proceedings of the Internet and Distributed Computing Systems, 2013

Mutual Restricted Identification.
Proceedings of the Public Key Infrastructures, Services and Applications, 2013

Supervised Usage of Signature Creation Devices.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

2012
Optimizing Segment Based Document Protection (Corrected Version).
IACR Cryptology ePrint Archive, 2012

Restricted Identification without Group Keys.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Optimizing Segment Based Document Protection.
Proceedings of the SOFSEM 2012: Theory and Practice of Computer Science, 2012

Proof of Possession for Cloud Storage via Lagrangian Interpolation Techniques.
Proceedings of the Network and System Security - 6th International Conference, 2012

Stamp and Extend - Instant But Undeniable Timestamping Based on Lazy Trees.
Proceedings of the Trusted Systems, 4th International Conference, 2012

Extreme Propagation in an Ad-Hoc Radio Network - Revisited.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2012

Lightweight Certificates - Towards a Practical Model for PKI.
Proceedings of the Business Information Systems - 15th International Conference, 2012

2011
Security and Trust in Sensor Networks.
Proceedings of the Theoretical Aspects of Distributed Computing in Sensor Networks, 2011

Coalition Resistant Anonymous Broadcast Encryption Scheme Based on PUF.
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011

Self-keying Identification Mechanism for Small Devices.
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011

How to Transmit Messages via WSN in a Hostile Environment.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Restricted Identification Scheme and Diffie-Hellman Linking Problem.
Proceedings of the Trusted Systems - Third International Conference, 2011

1-out-of-2 signature.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Signing with multiple ID's and a single key.
Proceedings of the Consumer Communications and Networking Conference, 2011

Challenges for Electronic Identity Documents.
Proceedings of the Business Information Systems Workshops, 2011

Technical and Legal Meaning of "Sole Control" - Towards Verifiability in Signing Systems.
Proceedings of the Business Information Systems Workshops, 2011

2010
Attacking and Repairing the Improved ModOnions Protocol-Tagging Approach.
TIIS, 2010

Scratch, Click & Vote: E2E Voting over the Internet.
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010

Lagrangian E-Voting: Verifiability on Demand and Strong Privacy.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

Polish Concepts for Securing E-Government Document Flow.
Proceedings of the ISSE 2010, 2010

Two-Head Dragon Protocol: Preventing Cloning of Signature Keys - Work in Progress.
Proceedings of the Trusted Systems - Second International Conference, 2010

Digital Signatures for e-Government - A Long-Term Security Architecture.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

Private Information Retrieval with a Trusted Hardware Unit - Revisited.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

Mediated Signatures - Towards Undeniability of Digital Data in Technical and Legal Framework.
Proceedings of the Business Information Systems Workshops, 2010

From Key Predistribution to Key Redistribution.
Proceedings of the Algorithms for Sensor Systems, 2010

Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

How to Construct State Registries-Matching Undeniability with Public Security.
Proceedings of the Intelligent Information and Database Systems, 2010

2009
Security Challenges for Wireless Sensor Networks.
ERCIM News, 2009

Step-out group signatures.
Computing, 2009

Attacking and Repairing the Improved ModOnions Protocol.
Proceedings of the Information, Security and Cryptology, 2009

Energy Efficient Alert in Single-Hop Networks of Extremely Weak Devices.
Proceedings of the Algorithmic Aspects of Wireless Sensor Networks, 2009

Key Levels and Securing Key Predistribution against Node Captures.
Proceedings of the Algorithmic Aspects of Wireless Sensor Networks, 2009

Towards Fair Leader Election in Wireless Networks.
Proceedings of the Ad-Hoc, Mobile and Wireless Networks, 8th International Conference, 2009

Leader Election for Multi-channel Radio Networks - Dependent versus Independent Trials.
Proceedings of the First Asian Conference on Intelligent Information and Database Systems, 2009

2008
General anonymous key broadcasting via Lagrangian interpolation.
IET Information Security, 2008

Practical Deniable Encryption.
Proceedings of the SOFSEM 2008: Theory and Practice of Computer Science, 2008

Short Ballot Assumption and Threeballot Voting Protocol.
Proceedings of the SOFSEM 2008: Theory and Practice of Computer Science, 2008

Privacy Protection for RFID with Hidden Subset Identifiers.
Proceedings of the Pervasive Computing, 2008

Power of Discrete Nonuniformity - Optimizing Access to Shared Radio Channel in Ad Hoc Networks.
Proceedings of the MSN 2008, 2008

Step-Out Ring Signatures.
Proceedings of the Mathematical Foundations of Computer Science 2008, 2008

Self-stabilizing population of mobile agents.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

Random Fault Attack against Shrinking Generator.
Proceedings of the Algorithmic Aspects of Wireless Sensor Networks, 2008

Repelling Detour Attack Against Onions with Re-encryption.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008

Distributed Verification of Mixing - Local Forking Proofs Model.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

2007
Tagung "Frontiers of E-Voting", 29. Juli bis 3. August auf Schloss Dagstuhl.
Datenschutz und Datensicherheit, 2007

Privacy Protection in Dynamic Systems Based on RFID Tags.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007

Verifiable Internet Voting Solving Secure Platform Problem.
Proceedings of the Advances in Information and Computer Security, 2007

07311 Abstracts Collection -- Frontiers of Electronic Voting.
Proceedings of the Frontiers of Electronic Voting, 29.07. - 03.08.2007, 2007

07311 Executive Summary -- Frontiers of Electronic Voting.
Proceedings of the Frontiers of Electronic Voting, 29.07. - 03.08.2007, 2007

Anonymity and k-Choice Identities.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

Kleptographic attacks on a cascade of mix servers.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

Forward-Secure Key Evolution in Wireless Sensor Networks.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007

Algorithmic Challenges for Sensor Networks - Foreword to ALGOSENSORS 2007.
Proceedings of the Algorithmic Aspects of Wireless Sensor Networks, 2007

2006
Fault Cryptanalysis and the Shrinking Generator.
Proceedings of the Experimental Algorithms, 5th International Workshop, 2006

How to Protect a Signature from Being Shown to a Third Party.
Proceedings of the Trust and Privacy in Digital Business, Third International Conference, 2006

Adversary Immune Size Approximation of Single-Hop Radio Networks.
Proceedings of the Theory and Applications of Models of Computation, 2006

Kleptographic Weaknesses in Benaloh-Tuinstra Protocol.
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006

Kleptographic Attacks on E-Voting Schemes.
Proceedings of the Emerging Trends in Information and Communication Security, 2006

Fault Jumping Attacks against Shrinking Generator.
Proceedings of the Complexity of Boolean Functions, 12.03. - 17.03.2006, 2006

A Revocation Scheme Preserving Privacy.
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006

Stealing Secrets with SSL/TLS and SSH - Kleptographic Attacks.
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006

Adaptive Initialization Algorithm for Ad Hoc Radio Networks with Carrier Sensing.
Proceedings of the Algorithmic Aspects of Wireless Sensor Networks, 2006

Initialization for Ad Hoc Radio Networks with Carrier Sensing and Collision Detection.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference, 2006

2005
Efficient simulation of synchronous systems by multi-speed systems.
ITA, 2005

Synchronization Fault Cryptanalysis for Breaking A5/1.
Proceedings of the Experimental and Efficient Algorithms, 4th InternationalWorkshop, 2005

Conditional Digital Signatures.
Proceedings of the Trust, 2005

Anonymous Communication with On-line and Off-line Onion Encoding.
Proceedings of the SOFSEM 2005: Theory and Practice of Computer Science, 2005

Anonymous Distribution of Encryption Keys in Cellular Broadcast Systems.
Proceedings of the Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, 2005

Hiding Data Sources in P2P Networks.
Proceedings of the Applied Public Key Infrastructure, 2005

A Practical Voting Scheme with Receipts.
Proceedings of the Information Security, 8th International Conference, 2005

Provable Anonymity for Networks of Mixes.
Proceedings of the Information Hiding, 7th International Workshop, 2005

Robust Undetectable Interference Watermarks.
Proceedings of the Computational Science and Its Applications, 2005

Local View Attack on Anonymous Communication.
Proceedings of the Computer Security, 2005

2004
Onions Based on Universal Re-encryption - Anonymous Communication Immune Against Repetitive Attack.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

Optimized UTRAN Topology Planning Including Point-to-Multipoint Equipment.
Proceedings of the MMB & PGTS 2004, 2004

Provable Unlinkability Against Traffic Analysis Already After O(log(n)) Steps!
Proceedings of the Information Security, 7th International Conference, 2004

Mobile Mixing.
Proceedings of the Information Security and Cryptology, 2004

Secure Initialization in Single-Hop Radio Networks.
Proceedings of the Security in Ad-hoc and Sensor Networks, First European Workshop, 2004

Duo-Onions and Hydra-Onions - Failure and Adversary Resistant Onion Protocols.
Proceedings of the Communications and Multimedia Security, 2004

2003
Weak communication in single-hop radio networks: adjusting algorithms to industrial standards.
Concurrency and Computation: Practice and Experience, 2003

Computing Average Value in Ad Hoc Networks.
Proceedings of the Mathematical Foundations of Computer Science 2003, 2003

Rapid Mixing and Security of Chaum's Visual Electronic Voting.
Proceedings of the Computer Security, 2003

Adversary Immune Leader Election in ad hoc Radio Networks.
Proceedings of the Algorithms, 2003

2002
Efficient algorithms for leader election in radio networks.
Proceedings of the Twenty-First Annual ACM Symposium on Principles of Distributed Computing, 2002

Weak Communication in Radio Networks.
Proceedings of the Euro-Par 2002, 2002

Hamming Weight Attacks on Cryptographic Hardware - Breaking Masking Defense.
Proceedings of the Computer Security, 2002

Energy-Efficient Size Approximation of Radio Networks with No Collision Detection.
Proceedings of the Computing and Combinatorics, 8th Annual International Conference, 2002

2001
Communication Complexity for Asynchronous Systems of Finite Devices.
Proceedings of the 15th International Parallel & Distributed Processing Symposium (IPDPS-01), 2001

Communication Gap for Finite Memory Devices.
Proceedings of the Automata, Languages and Programming, 28th International Colloquium, 2001

2000
Delayed path coupling and generating random permutations.
Random Struct. Algorithms, 2000

Periodification scheme: constructing sorting networks with constant period.
J. ACM, 2000

Complexity Theory and Algorithms.
Proceedings of the Euro-Par 2000, Parallel Processing, 6th International Euro-Par Conference, Munich, Germany, August 29, 2000

1999
Delayed Path Coupling and Generating Random Permutations via Distributed Stochastic Processes.
Proceedings of the Tenth Annual ACM-SIAM Symposium on Discrete Algorithms, 1999

Correction Networks.
Proceedings of the International Conference on Parallel Processing 1999, 1999

Multi-party Finite Computations.
Proceedings of the Computing and Combinatorics, 5th Annual International Conference, 1999

1998
Communication-Optimal Parallel Minimum Spanning Tree Algorithms (Extended Abstract).
Proceedings of the Tenth Annual ACM Symposium on Parallel Algorithms and Architectures, 1998

Power of Cooperation and Multihead Finite Systems.
Proceedings of the Automata, Languages and Programming, 25th International Colloquium, 1998

1997
Fast Integer Merging on the EREW PRAM.
Algorithmica, 1997

Playing Tetris on Meshes and Multi-Dimensional SHEARSORT.
Proceedings of the Algorithms and Computation, 8th International Symposium, 1997

1996
Fast Generation of Random Permutations via Networks Simulation
Universität Trier, Mathematik/Informatik, Forschungsbericht, 1996

Feasible Time-Optimal Algorithms for Boolean Functions on Exclusive-Write Parallel Random-Access Machines.
SIAM J. Comput., 1996

Periodic Merging Networks.
Proceedings of the Algorithms and Computation, 7th International Symposium, 1996

Approximate Compaction and Padded-Sorting on Exclusive Write PRAMs.
Proceedings of IPPS '96, 1996

Limitations of the QRQW and EREW PRAM Models.
Proceedings of the Foundations of Software Technology and Theoretical Computer Science, 1996

Fast Generation of Random Permutations via Networks Simulation.
Proceedings of the Algorithms, 1996

1995
Feasible Time-Optimal Algorithms for Boolean Functions on Exclusive-Write PRAMs
Electronic Colloquium on Computational Complexity (ECCC), 1995

Retrieval of Scattered Information by EREW, CREW, and CRCW PRAMs.
Computational Complexity, 1995

1994
Information Broadcasting by Exclusive-Read Prams.
Parallel Processing Letters, 1994

Exact Lower Time Bounds for Computing Boolean Functions on CREW PRAMs.
J. Comput. Syst. Sci., 1994

Periodic Constant Depth Sorting Networks.
Proceedings of the STACS 94, 1994

Fast and Feasible Periodic Sorting Networks of Constant Depth
Proceedings of the 35th Annual Symposium on Foundations of Computer Science, 1994

1993
Stack versus Sensitivity for One-Way Automata.
Theor. Comput. Sci., 1993

Limits on the Power of Parallel Random Access Machines with Weak Forms of Write Conflict Resolution.
Proceedings of the STACS 93, 1993

1992
Periodic Sorting on Two-Dimensional Meshes.
Parallel Processing Letters, 1992

Retrieval of scattered information by EREW, CREW and CRCW PRAMs.
Proceedings of the Algorithm Theory, 1992

Complexity of Boolean Functions on PRAMs - Lower Bound Techniques.
Proceedings of the Data Structures and Efficient Algorithms, 1992

1991
Multihead One-Way Finite Automata.
Theor. Comput. Sci., 1991

Time Complexity of Boolean Functions on CREW PRAMs.
SIAM J. Comput., 1991

1990
Reversal Complexity Classes for Alternating Turing Machines.
SIAM J. Comput., 1990

One-Way Multihead Finite Automata and 2-Bounded Languages.
Mathematical Systems Theory, 1990

Remarks on Sorting and One-Way Multihead Finite Automata.
Inf. Process. Lett., 1990

Computational Power of One-Way Multihead Finite Automata.
Proceedings of the STACS 90, 1990

Exact Time Bounds for Computing Boolean Functions on PRAMs Without Simultaneous Writes.
Proceedings of the 2nd Annual ACM Symposium on Parallel Algorithms and Architectures, 1990

1988
Finite Automata, Real Time Processes and Counting Problems in Bounded Arithmetics.
J. Symb. Log., 1988

1987
A Generalized Grzegorczyk Hierarchy and Low Complexity Classes
Inf. Comput., February, 1987

A Note on "ℰ.
Math. Log. Q., 1987

1986
Restricted Collection and Comprehension Schemata in Weak Set Theories.
Math. Log. Q., 1986


  Loading...