What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Stanislaw Jarecki
Google Scholar
66
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Building and Testing a Hidden-Password Online Password Manager.
Mohammed Jubur
Christopher Robert Price
Maliheh Shirvanian
Nitesh Saxena
Stanislaw Jarecki
Hugo Krawczyk
2024
conf/crypto
Bare PAKE: Universally Composable Key Exchange from Just Passwords.
Manuel Barbosa
Kai Gellert
Julia Hesse
Stanislaw Jarecki
2024
conf/esorics
sfIVA: Privacy-Preserving Identity Verification Methods for Accountless Users via Private List Intersection and Variants.
Seoyeon Hwang
Stanislaw Jarecki
Zane Karl
Elina van Kempen
Gene Tsudik
2024
conf/asiacrypt
Password-Protected Threshold Signatures.
Stefan Dziembowski
Stanislaw Jarecki
Pawel Kedzior
Hugo Krawczyk
Chan Nam Ngo
Jiayu Xu
2024
conf/asiacrypt
Threshold PAKE with Security Against Compromise of All Servers.
Yanqi Gu
Stanislaw Jarecki
Pawel Kedzior
Phillip Nazarian
Jiayu Xu
2024
conf/asiacrypt
C'est Très CHIC: A Compact Password-Authenticated Key Exchange from Lattice-Based KEM.
Afonso Arriaga
Manuel Barbosa
Stanislaw Jarecki
Marjan Skrobot
2023
conf/eurocrypt
Randomized Half-Ideal Cipher on Groups with Applications to UC (a)PAKE.
Bruno Freitas Dos Santos
Yanqi Gu
Stanislaw Jarecki
2023
conf/eurocrypt
Password-Authenticated TLS via OPAQUE and Post-Handshake Authentication.
Julia Hesse
Stanislaw Jarecki
Hugo Krawczyk
Christopher Wood
2023
conf/asiacrypt
Short Concurrent Covert Authenticated Key Exchange (Short cAKE).
Karim Eldefrawy
Nicholas Genise
Stanislaw Jarecki
2022
conf/eurocrypt
Asymmetric PAKE with Low Computation and communication.
Bruno Freitas Dos Santos
Yanqi Gu
Stanislaw Jarecki
Hugo Krawczyk
2021
conf/crypto
KHAPE: Asymmetric PAKE from Key-Hiding Key Exchange.
Yanqi Gu
Stanislaw Jarecki
Hugo Krawczyk
2021
conf/pkc
On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding.
Stanislaw Jarecki
Hugo Krawczyk
Jiayu Xu
2020
conf/crypto
Universally Composable Relaxed Password Authenticated Key Exchange.
Michel Abdalla
Manuel Barbosa
Tatiana Bradley
Stanislaw Jarecki
Jonathan Katz
Jiayu Xu
2020
conf/tcc
On Pseudorandom Encodings.
Thomas Agrikola
Geoffroy Couteau
Yuval Ishai
Stanislaw Jarecki
Amit Sahai
2019
conf/ccs
Updatable Oblivious Key Management for Storage Systems.
Stanislaw Jarecki
Hugo Krawczyk
Jason K. Resch
2019
conf/crypto
Strong Asymmetric PAKE Based on Trapdoor CKEM.
Tatiana Bradley
Stanislaw Jarecki
Jiayu Xu
2019
conf/acns
Password-Authenticated Public-Key Encryption.
Tatiana Bradley
Jan Camenisch
Stanislaw Jarecki
Anja Lehmann
Gregory Neven
Jiayu Xu
2018
conf/acns
3PC ORAM with Low Latency, Low Bandwidth, and Fast Batch Retrieval.
Stanislaw Jarecki
Boyang Wei
2018
conf/pkc
Efficient Covert Two-Party Computation.
Stanislaw Jarecki
2018
conf/pkc
Two-Factor Authentication with End-to-End Password Security.
Stanislaw Jarecki
Hugo Krawczyk
Maliheh Shirvanian
Nitesh Saxena
2018
conf/eurocrypt
OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-computation Attacks.
Stanislaw Jarecki
Hugo Krawczyk
Jiayu Xu
2017
conf/acns
TOPPSS: Cost-Minimal Password-Protected Secret Sharing Based on Threshold OPRF.
Stanislaw Jarecki
Aggelos Kiayias
Hugo Krawczyk
Jiayu Xu
2016
conf/ccs
Device-Enhanced Password Protocols with Optimal Online-Offline Protection.
Stanislaw Jarecki
Hugo Krawczyk
Maliheh Shirvanian
Nitesh Saxena
2016
conf/eurosp
Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online).
Stanislaw Jarecki
Aggelos Kiayias
Hugo Krawczyk
Jiayu Xu
2016
conf/ctrsa
Efficient Concurrent Covert Computation of String Equality and Set Intersection.
Chongwon Cho
Dana Dachman-Soled
Stanislaw Jarecki
2015
conf/esorics
Rich Queries on Encrypted Data: Beyond Exact Matches.
Sky Faber
Stanislaw Jarecki
Hugo Krawczyk
Quan Nguyen
Marcel-Catalin Rosu
Michael Steiner
2015
conf/asiacrypt
Three-Party ORAM for Secure Computation.
Sky Faber
Stanislaw Jarecki
Sotirios Kentros
Boyang Wei
2014
conf/ndss
Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation.
David Cash
Joseph Jaeger
Stanislaw Jarecki
Charanjit S. Jutla
Hugo Krawczyk
Marcel-Catalin Rosu
Michael Steiner
2014
conf/ndss
Two-Factor Authentication Resilient to Server Compromise Using Mix-Bandwidth Devices.
Maliheh Shirvanian
Stanislaw Jarecki
Nitesh Saxena
Naveen Nathan
2014
conf/pkc
Practical Covert Authentication.
Stanislaw Jarecki
2014
conf/asiacrypt
Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model.
Stanislaw Jarecki
Aggelos Kiayias
Hugo Krawczyk
2013
conf/ccs
Outsourced symmetric private information retrieval.
Stanislaw Jarecki
Charanjit S. Jutla
Hugo Krawczyk
Marcel-Catalin Rosu
Michael Steiner
2013
conf/crypto
Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries.
David Cash
Stanislaw Jarecki
Charanjit S. Jutla
Hugo Krawczyk
Marcel-Catalin Rosu
Michael Steiner
2011
conf/ccs
Password-protected secret sharing.
Ali Bagherzandi
Stanislaw Jarecki
Nitesh Saxena
Yanbin Lu
2010
journals/tifs
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol.
Stanislaw Jarecki
Nitesh Saxena
2010
conf/pkc
Identity-Based Aggregate and Multi-Signature Schemes Based on RSA.
Ali Bagherzandi
Stanislaw Jarecki
2009
conf/crypto
Private Mutual Authentication and Conditional Oblivious Transfer.
Stanislaw Jarecki
Xiaomin Liu
2009
conf/tcc
Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection.
Stanislaw Jarecki
Xiaomin Liu
2008
conf/ccs
Multisignatures secure under the discrete logarithm assumption and a generalized forking lemma.
Ali Bagherzandi
Jung Hee Cheon
Stanislaw Jarecki
2008
conf/fc
Proactive RSA with Non-interactive Signing.
Stanislaw Jarecki
Josh Olsen
2008
conf/ctrsa
Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange.
Stanislaw Jarecki
Jihye Kim
Gene Tsudik
2007
journals/joc
Robust and Efficient Sharing of RSA Functions.
Rosario Gennaro
Tal Rabin
Stanislaw Jarecki
Hugo Krawczyk
2007
journals/joc
Efficient Signature Schemes with Tight Reductions to the Diffie-Hellman Problems.
Eu-Jin Goh
Stanislaw Jarecki
Jonathan Katz
Nan Wang
2007
journals/joc
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems.
Rosario Gennaro
Stanislaw Jarecki
Hugo Krawczyk
Tal Rabin
2007
conf/ccs
Robust group key agreement using short broadcasts.
Stanislaw Jarecki
Jihye Kim
Gene Tsudik
2007
conf/acns
Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes.
Stanislaw Jarecki
Xiaomin Liu
2007
conf/ctrsa
Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement.
Stanislaw Jarecki
Jihye Kim
Gene Tsudik
2007
conf/eurocrypt
Efficient Two-Party Secure Computation on Committed Inputs.
Stanislaw Jarecki
Vitaly Shmatikov
2006
conf/acns
Authentication for Paranoids: Multi-party Secret Handshakes.
Stanislaw Jarecki
Jihye Kim
Gene Tsudik
2005
conf/fc
Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure.
Stanislaw Jarecki
Vitaly Shmatikov
2005
conf/tcc
Further Simplifications in Proactive RSA Signatures.
Stanislaw Jarecki
Nitesh Saxena
2004
conf/ccs
Versatile padding schemes for joint signature and encryption.
Yevgeniy Dodis
Michael J. Freedman
Stanislaw Jarecki
Shabsi Walfish
2004
conf/eurocrypt
Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme.
Stanislaw Jarecki
Vitaly Shmatikov
2004
conf/asiacrypt
Secret Handshakes from CA-Oblivious Encryption.
Claude Castelluccia
Stanislaw Jarecki
Gene Tsudik
2003
conf/ctrsa
Secure Applications of Pedersen's Distributed Key Generation Protocol.
Rosario Gennaro
Stanislaw Jarecki
Hugo Krawczyk
Tal Rabin
2003
conf/eurocrypt
A Signature Scheme as Secure as the Diffie-Hellman Problem.
Eu-Jin Goh
Stanislaw Jarecki
2002
conf/fc
Cryptographic Primitives Enforcing Communication and Storage Complexity.
Philippe Golle
Stanislaw Jarecki
Ilya Mironov
2000
journals/joc
Robust and Efficient Sharing of RSA Functions.
Rosario Gennaro
Tal Rabin
Stanislaw Jarecki
Hugo Krawczyk
2000
conf/eurocrypt
Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures.
Stanislaw Jarecki
Anna Lysyanskaya
1999
conf/crypto
Adaptive Security for Threshold Cryptosystems.
Ran Canetti
Rosario Gennaro
Stanislaw Jarecki
Hugo Krawczyk
Tal Rabin
1999
conf/eurocrypt
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems.
Rosario Gennaro
Stanislaw Jarecki
Hugo Krawczyk
Tal Rabin
1997
conf/ccs
Proactive Public Key and Signature Systems.
Amir Herzberg
Markus Jakobsson
Stanislaw Jarecki
Hugo Krawczyk
Moti Yung
1997
conf/fc
An Efficient Micropayment System Based on Probabilistic Polling.
Stanislaw Jarecki
Andrew M. Odlyzko
1996
conf/crypto
Robust and Efficient Sharing of RSA Functions.
Rosario Gennaro
Stanislaw Jarecki
Hugo Krawczyk
Tal Rabin
1996
conf/eurocrypt
Robust Threshold DSS Signatures.
Rosario Gennaro
Stanislaw Jarecki
Hugo Krawczyk
Tal Rabin
1995
conf/crypto
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage.
Amir Herzberg
Stanislaw Jarecki
Hugo Krawczyk
Moti Yung
Coauthors
Afonso Arriaga
(1)
Aggelos Kiayias
(3)
Ali Bagherzandi
(3)
Amir Herzberg
(2)
Amit Sahai
(1)
Andrew M. Odlyzko
(1)
Anja Lehmann
(1)
Anna Lysyanskaya
(1)
Boyang Wei
(2)
Bruno Freitas Dos Santos
(2)
Chan Nam Ngo
(1)
Charanjit S. Jutla
(3)
Chongwon Cho
(1)
Christopher Robert Price
(1)
Christopher Wood
(1)
Claude Castelluccia
(1)
Dana Dachman-Soled
(1)
David Cash
(2)
Elina van Kempen
(1)
Eu-Jin Goh
(2)
Gene Tsudik
(6)
Geoffroy Couteau
(1)
Gregory Neven
(1)
Hugo Krawczyk
(27)
Ilya Mironov
(1)
Jan Camenisch
(1)
Jason K. Resch
(1)
Jiayu Xu
(9)
Jihye Kim
(4)
Jonathan Katz
(2)
Joseph Jaeger
(1)
Josh Olsen
(1)
Julia Hesse
(2)
Jung Hee Cheon
(1)
Kai Gellert
(1)
Karim Eldefrawy
(1)
Maliheh Shirvanian
(4)
Manuel Barbosa
(3)
Marcel-Catalin Rosu
(4)
Marjan Skrobot
(1)
Markus Jakobsson
(1)
Michael J. Freedman
(1)
Michael Steiner
(4)
Michel Abdalla
(1)
Mohammed Jubur
(1)
Moti Yung
(2)
Nan Wang
(1)
Naveen Nathan
(1)
Nicholas Genise
(1)
Nitesh Saxena
(7)
Pawel Kedzior
(2)
Philippe Golle
(1)
Phillip Nazarian
(1)
Quan Nguyen
(1)
Ran Canetti
(1)
Rosario Gennaro
(8)
Seoyeon Hwang
(1)
Shabsi Walfish
(1)
Sky Faber
(2)
Sotirios Kentros
(1)
Stanislaw Jarecki
(66)
Stefan Dziembowski
(1)
Tal Rabin
(8)
Tatiana Bradley
(3)
Thomas Agrikola
(1)
Vitaly Shmatikov
(3)
Xiaomin Liu
(3)
Yanbin Lu
(1)
Yanqi Gu
(4)
Yevgeniy Dodis
(1)
Yuval Ishai
(1)
Zane Karl
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to