Stanislaw Jarecki

According to our database1, Stanislaw Jarecki authored at least 71 papers between 1994 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Building and Studying a Password Store that Perfectly Hides Passwords from Itself.
IEEE Trans. Dependable Sec. Comput., 2019

Updatable Oblivious Key Management for Storage Systems.
IACR Cryptology ePrint Archive, 2019

Strong Asymmetric PAKE based on Trapdoor CKEM.
IACR Cryptology ePrint Archive, 2019

Password-Authenticated Public-Key Encryption.
IACR Cryptology ePrint Archive, 2019

2018
SPHINX: A Password Store that Perfectly Hides Passwords from Itself.
IACR Cryptology ePrint Archive, 2018

3PC ORAM with Low Latency, Low Bandwidth, and Fast Batch Retrieval.
IACR Cryptology ePrint Archive, 2018

OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-Computation Attacks.
IACR Cryptology ePrint Archive, 2018

Two-Factor Authentication with End-to-End Password Security.
IACR Cryptology ePrint Archive, 2018

Threshold Partially-Oblivious PRFs with Applications to Key Management.
IACR Cryptology ePrint Archive, 2018

Round-Reduced Modular Construction of Asymmetric Password-Authenticated Key Exchange.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

2017
TOPPSS: Cost-minimal Password-Protected Secret Sharing based on Threshold OPRF.
IACR Cryptology ePrint Archive, 2017

2016
Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online).
IACR Cryptology ePrint Archive, 2016

Efficient Covert Two-Party Computation.
IACR Cryptology ePrint Archive, 2016

Efficient Concurrent Covert Computation of String Equality and Set Intersection.
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016

2015
Device-Enhanced Password Protocols with Optimal Online-Offline Protection.
IACR Cryptology ePrint Archive, 2015

Rich Queries on Encrypted Data: Beyond Exact Matches.
IACR Cryptology ePrint Archive, 2015

Three-Party ORAM for Secure Computation.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model.
IACR Cryptology ePrint Archive, 2014

Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation.
IACR Cryptology ePrint Archive, 2014

Practical Covert Authentication.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

Two-Factor Authentication Resilient to Server Compromise Using Mix-Bandwidth Devices.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

2013
Outsourced Symmetric Private Information Retrieval.
IACR Cryptology ePrint Archive, 2013

Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries.
IACR Cryptology ePrint Archive, 2013

2012
Multi-Party Privacy-Preserving Set Intersection with Quasi-Linear Complexity.
IEICE Transactions, 2012

2011
Flexible Robust Group Key Agreement.
IEEE Trans. Parallel Distrib. Syst., 2011

Fast Exponentiation Using Split Exponents.
IEEE Trans. Information Theory, 2011

2010
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol.
IEEE Trans. Information Forensics and Security, 2010

Password-Protected Secret Sharing.
IACR Cryptology ePrint Archive, 2010

Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model.
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010

Fast Secure Computation of Set Intersection.
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010

Identity-Based Aggregate and Multi-Signature Schemes Based on RSA.
Proceedings of the Public Key Cryptography, 2010

2009
Robust and efficient incentives for cooperative content distribution.
IEEE/ACM Trans. Netw., 2009

Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection.
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009

Privacy-Preserving Policy-Based Information Transfer.
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009

Private Mutual Authentication and Conditional Oblivious Transfer.
Proceedings of the Advances in Cryptology, 2009

2008
Multisignatures Using Proofs of Secret Key Possession, as Secure as the Diffie-Hellman Problem.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008

Affiliation-Hiding Envelope and Authentication Schemes with Efficient Support for Multiple Credentials.
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008

Proactive RSA with Non-interactive Signing.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange.
Proceedings of the Topics in Cryptology, 2008

Multisignatures secure under the discrete logarithm assumption and a generalized forking lemma.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
Efficient Signature Schemes with Tight Reductions to the Diffie-Hellman Problems.
J. Cryptology, 2007

Robust and Efficient Sharing of RSA Functions.
J. Cryptology, 2007

Secure Distributed Key Generation for Discrete-Log Based Cryptosystems.
J. Cryptology, 2007

Dandelion: Cooperative Content Distribution with Robust Incentives.
Proceedings of the 2007 USENIX Annual Technical Conference, 2007

Efficient Two-Party Secure Computation on Committed Inputs.
Proceedings of the Advances in Cryptology, 2007

Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement.
Proceedings of the Topics in Cryptology, 2007

Robust group key agreement using short broadcasts.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

2006
Secure acknowledgment aggregation and multisignatures with limited robustness.
Comput. Networks, 2006

Authentication for Paranoids: Multi-party Secret Handshakes.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
Further Simplifications in Proactive RSA Signatures.
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005

Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure.
Proceedings of the Financial Cryptography and Data Security, 2005

2004
Optimal Signcryption from Any Trapdoor Permutation.
IACR Cryptology ePrint Archive, 2004

Secret Handshakes from CA-Oblivious Encryption.
IACR Cryptology ePrint Archive, 2004

A Robust Multisignatures Scheme with Applications to Acknowledgment Aggregation.
Proceedings of the Security in Communication Networks, 4th International Conference, 2004

An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol.
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, 2004

Brief announcement: secret handshakes from CA-oblivious encryption.
Proceedings of the Twenty-Third Annual ACM Symposium on Principles of Distributed Computing, 2004

Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme.
Proceedings of the Advances in Cryptology, 2004

Versatile padding schemes for joint signature and encryption.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004

2003
A Signature Scheme as Secure as the Diffie-Hellman Problem.
Proceedings of the Advances in Cryptology, 2003

Secure Applications of Pedersen's Distributed Key Generation Protocol.
Proceedings of the Topics in Cryptology, 2003

2002
Negotiated Privacy: (Extended Abstract).
Proceedings of the Software Security -- Theories and Systems, 2002

Cryptographic Primitives Enforcing Communication and Storage Complexity.
Proceedings of the Financial Cryptography, 6th International Conference, 2002

2001
Efficient threshold cryptosystems.
PhD thesis, 2001

Robust Threshold DSS Signatures.
Inf. Comput., 2001

2000
Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures.
Proceedings of the Advances in Cryptology, 2000

1999
Adaptive Security for Threshold Cryptosystems.
Proceedings of the Advances in Cryptology, 1999

1997
An Efficient Micropayment System Based on Probabilistic Polling.
Proceedings of the Financial Cryptography, 1997

Proactive Public Key and Signature Systems.
Proceedings of the CCS '97, 1997

1995
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage.
Proceedings of the Advances in Cryptology, 1995

1994
NL Understanding with a Grammar of Constructions.
Proceedings of the 15th International Conference on Computational Linguistics, 1994


  Loading...