Pavel Hubácek

Orcid: 0000-0002-6850-6222

According to our database1, Pavel Hubácek authored at least 27 papers between 2013 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Foundations of Fiat-Denominated Loans Collateralized by Cryptocurrencies.
CoRR, October, 2025

Practical Batch Proofs of Exponentiation.
IACR Commun. Cryptol., 2025

On Extractability of the KZG Family of Polynomial Commitment Schemes.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
TFNP Intersections Through the Lens of Feasible Disjunction.
Proceedings of the 15th Innovations in Theoretical Computer Science Conference, 2024

One-Way Functions vs. TFNP: Simpler and Improved.
Proceedings of the 15th Innovations in Theoretical Computer Science Conference, 2024

2023
(Verifiable) Delay Functions from Lucas Sequences.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

Certifying Giant Nonprimes.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

PPP-Completeness and Extremal Combinatorics.
Proceedings of the 14th Innovations in Theoretical Computer Science Conference, 2023

2022
Practical Statistically-Sound Proofs of Exponentiation in Any Group.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

On the Distributed Discrete Logarithm Problem with Preprocessing.
Proceedings of the 3rd Conference on Information-Theoretic Cryptography, 2022

2021
On Search Complexity of Discrete Logarithm.
Proceedings of the 46th International Symposium on Mathematical Foundations of Computer Science, 2021

Tortoise and Hares Consensus: The Meshcash Framework for Incentive-Compatible, Scalable Cryptocurrencies.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021

2020
On Average-Case Hardness in TFNP from One-Way Functions.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

2019
PPAD-Hardness via Iterated Squaring Modulo a Composite.
IACR Cryptol. ePrint Arch., 2019

Stronger Lower Bounds for Online ORAM.
Proceedings of the Theory of Cryptography - 17th International Conference, 2019

Finding a Nash equilibrium is no easier than breaking Fiat-Shamir.
Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing, 2019

2018
ARRIVAL: Next Stop in CLS.
Proceedings of the 45th International Colloquium on Automata, Languages, and Programming, 2018

An Efficiency-Preserving Transformation from Honest-Verifier Statistical Zero-Knowledge to Statistical Zero-Knowledge.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

Must the Communication Graph of MPC Protocols be an Expander?
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

2017
Hardness of Continuous Local Search: Query Complexity and Cryptographic Lower Bounds.
Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms, 2017

The Journey from NP to TFNP Hardness.
Proceedings of the 8th Innovations in Theoretical Computer Science Conference, 2017

2016
Rational Sumchecks.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016

2015
When Can Limited Randomness Be Used in Repeated Games?
Proceedings of the Algorithmic Game Theory - 8th International Symposium, 2015

On the Communication Complexity of Secure Function Evaluation with Long Output.
Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, 2015

2014
Cryptographically blinded games: leveraging players' limitations for equilibria and profit.
Proceedings of the ACM Conference on Economics and Computation, 2014

Rational arguments: single round delegation with sublinear verification.
Proceedings of the Innovations in Theoretical Computer Science, 2014

2013
Limits on the Power of Cryptographic Cheap Talk.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013


  Loading...