default search action
Stanislaw Jarecki
Person information
- affiliation: University of California, Irvine, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j14]Clemente Galdi, Stanislaw Jarecki:
Special Issue on 13th International Conference on Security and Cryptography for Networks (SCN 2022). Inf. Comput. 296: 105135 (2024) - [c71]Manuel Barbosa, Kai Gellert, Julia Hesse, Stanislaw Jarecki:
Bare PAKE: Universally Composable Key Exchange from Just Passwords. CRYPTO (2) 2024: 183-217 - [c70]Seoyeon Hwang, Stanislaw Jarecki, Zane Karl, Elina van Kempen, Gene Tsudik:
PsfIVA: Privacy-Preserving Identity Verification Methods for Accountless Users via Private List Intersection and Variants. ESORICS (3) 2024: 362-382 - [i35]Manuel Barbosa, Kai Gellert, Julia Hesse, Stanislaw Jarecki:
Bare PAKE: Universally Composable Key Exchange from just Passwords. IACR Cryptol. ePrint Arch. 2024: 234 (2024) - [i34]Afonso Arriaga, Manuel Barbosa, Stanislaw Jarecki, Marjan Skrobot:
C'est très CHIC: A compact password-authenticated key exchange from lattice-based KEM. IACR Cryptol. ePrint Arch. 2024: 308 (2024) - [i33]Manuel B. Santos, Dimitris Mouris, Mehmet Ugurbil, Stanislaw Jarecki, José Reis, Shubho Sengupta, Miguel de Vega:
Curl: Private LLMs through Wavelet-Encoded Look-Up Tables. IACR Cryptol. ePrint Arch. 2024: 1127 (2024) - [i32]Yanqi Gu, Stanislaw Jarecki, Pawel Kedzior, Phillip Nazarian, Jiayu Xu:
Threshold PAKE with Security against Compromise of all Servers. IACR Cryptol. ePrint Arch. 2024: 1455 (2024) - [i31]Stefan Dziembowski, Stanislaw Jarecki, Pawel Kedzior, Hugo Krawczyk, Chan Nam Ngo, Jiayu Xu:
Password-Protected Threshold Signatures. IACR Cryptol. ePrint Arch. 2024: 1469 (2024) - 2023
- [c69]Karim Eldefrawy, Nicholas Genise, Stanislaw Jarecki:
Short Concurrent Covert Authenticated Key Exchange (Short cAKE). ASIACRYPT (8) 2023: 75-109 - [c68]Julia Hesse, Stanislaw Jarecki, Hugo Krawczyk, Christopher Wood:
Password-Authenticated TLS via OPAQUE and Post-Handshake Authentication. EUROCRYPT (5) 2023: 98-127 - [c67]Bruno Freitas Dos Santos, Yanqi Gu, Stanislaw Jarecki:
Randomized Half-Ideal Cipher on Groups with Applications to UC (a)PAKE. EUROCRYPT (5) 2023: 128-156 - [i30]Julia Hesse, Stanislaw Jarecki, Hugo Krawczyk, Christopher Wood:
Password-Authenticated TLS via OPAQUE and Post-Handshake Authentication. IACR Cryptol. ePrint Arch. 2023: 220 (2023) - [i29]Bruno Freitas Dos Santos, Yanqi Gu, Stanislaw Jarecki:
Randomized Half-Ideal Cipher on Groups with applications to UC (a)PAKE. IACR Cryptol. ePrint Arch. 2023: 295 (2023) - [i28]Karim Eldafrawy, Nicholas Genise, Stanislaw Jarecki:
Short Concurrent Covert Authenticated Key Exchange (Short cAKE). IACR Cryptol. ePrint Arch. 2023: 1418 (2023) - [i27]Miguel de Vega, Andrei Lapets, Stanislaw Jarecki, Wicher Malten, Mehmet Ugurbil, Wyatt Howe:
Evaluation of Arithmetic Sum-of-Products Expressions in Linear Secret Sharing Schemes with a Non-Interactive Computation Phase. IACR Cryptol. ePrint Arch. 2023: 1740 (2023) - 2022
- [c66]Bruno Freitas Dos Santos, Yanqi Gu, Stanislaw Jarecki, Hugo Krawczyk:
Asymmetric PAKE with Low Computation and communication. EUROCRYPT (2) 2022: 127-156 - [e3]Clemente Galdi, Stanislaw Jarecki:
Security and Cryptography for Networks - 13th International Conference, SCN 2022, Amalfi, Italy, September 12-14, 2022, Proceedings. Lecture Notes in Computer Science 13409, Springer 2022, ISBN 978-3-031-14790-6 [contents] - 2021
- [j13]Stanislaw Jarecki, Mohammed Jubur, Hugo Krawczyk, Nitesh Saxena, Maliheh Shirvanian:
Two-factor Password-authenticated Key Exchange with End-to-end Security. ACM Trans. Priv. Secur. 24(3): 17:1-17:37 (2021) - [c65]Yanqi Gu, Stanislaw Jarecki, Hugo Krawczyk:
KHAPE: Asymmetric PAKE from Key-Hiding Key Exchange. CRYPTO (4) 2021: 701-730 - [c64]Stanislaw Jarecki, Hugo Krawczyk, Jiayu Xu:
On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding. Public Key Cryptography (2) 2021: 380-409 - [c63]Maliheh Shirvanian, Christopher Robert Price, Mohammed Jubur, Nitesh Saxena, Stanislaw Jarecki, Hugo Krawczyk:
A hidden-password online password manager. SAC 2021: 1683-1686 - [i26]Stanislaw Jarecki, Hugo Krawczyk, Jiayu Xu:
On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding. IACR Cryptol. ePrint Arch. 2021: 273 (2021) - [i25]Yanqi Gu, Stanislaw Jarecki, Hugo Krawczyk:
KHAPE: Asymmetric PAKE from Key-Hiding Key Exchange. IACR Cryptol. ePrint Arch. 2021: 873 (2021) - 2020
- [c62]Michel Abdalla, Manuel Barbosa, Tatiana Bradley, Stanislaw Jarecki, Jonathan Katz, Jiayu Xu:
Universally Composable Relaxed Password Authenticated Key Exchange. CRYPTO (1) 2020: 278-307 - [c61]Thomas Agrikola, Geoffroy Couteau, Yuval Ishai, Stanislaw Jarecki, Amit Sahai:
On Pseudorandom Encodings. TCC (3) 2020: 639-669 - [e2]Stanislaw Jarecki:
Topics in Cryptology - CT-RSA 2020 - The Cryptographers' Track at the RSA Conference 2020, San Francisco, CA, USA, February 24-28, 2020, Proceedings. Lecture Notes in Computer Science 12006, Springer 2020, ISBN 978-3-030-40185-6 [contents] - [i24]Michel Abdalla, Manuel Barbosa, Tatiana Bradley, Stanislaw Jarecki, Jonathan Katz, Jiayu Xu:
Universally Composable Relaxed Password Authenticated Key Exchange. IACR Cryptol. ePrint Arch. 2020: 320 (2020) - [i23]Thomas Agrikola, Geoffroy Couteau, Yuval Ishai, Stanislaw Jarecki, Amit Sahai:
On Pseudorandom Encodings. IACR Cryptol. ePrint Arch. 2020: 445 (2020)
2010 – 2019
- 2019
- [j12]Maliheh Shirvanian, Nitesh Saxena, Stanislaw Jarecki, Hugo Krawczyk:
Building and Studying a Password Store that Perfectly Hides Passwords from Itself. IEEE Trans. Dependable Secur. Comput. 16(5): 770-782 (2019) - [c60]Tatiana Bradley, Jan Camenisch, Stanislaw Jarecki, Anja Lehmann, Gregory Neven, Jiayu Xu:
Password-Authenticated Public-Key Encryption. ACNS 2019: 442-462 - [c59]Stanislaw Jarecki, Hugo Krawczyk, Jason K. Resch:
Updatable Oblivious Key Management for Storage Systems. CCS 2019: 379-393 - [c58]Tatiana Bradley, Stanislaw Jarecki, Jiayu Xu:
Strong Asymmetric PAKE Based on Trapdoor CKEM. CRYPTO (3) 2019: 798-825 - [i22]Tatiana Bradley, Jan Camenisch, Stanislaw Jarecki, Anja Lehmann, Gregory Neven, Jiayu Xu:
Password-Authenticated Public-Key Encryption. IACR Cryptol. ePrint Arch. 2019: 199 (2019) - [i21]Tatiana Bradley, Stanislaw Jarecki, Jiayu Xu:
Strong Asymmetric PAKE based on Trapdoor CKEM. IACR Cryptol. ePrint Arch. 2019: 647 (2019) - [i20]Stanislaw Jarecki, Hugo Krawczyk, Jason K. Resch:
Updatable Oblivious Key Management for Storage Systems. IACR Cryptol. ePrint Arch. 2019: 1275 (2019) - 2018
- [c57]Stanislaw Jarecki, Boyang Wei:
3PC ORAM with Low Latency, Low Bandwidth, and Fast Batch Retrieval. ACNS 2018: 360-378 - [c56]Stanislaw Jarecki, Hugo Krawczyk, Jiayu Xu:
OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-computation Attacks. EUROCRYPT (3) 2018: 456-486 - [c55]Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena:
Two-Factor Authentication with End-to-End Password Security. Public Key Cryptography (2) 2018: 431-461 - [c54]Stanislaw Jarecki:
Efficient Covert Two-Party Computation. Public Key Cryptography (1) 2018: 644-674 - [c53]Jung Yeon Hwang, Stanislaw Jarecki, Taekyoung Kwon, Joohee Lee, Ji Sun Shin, Jiayu Xu:
Round-Reduced Modular Construction of Asymmetric Password-Authenticated Key Exchange. SCN 2018: 485-504 - [i19]Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena:
Two-Factor Authentication with End-to-End Password Security. IACR Cryptol. ePrint Arch. 2018: 33 (2018) - [i18]Stanislaw Jarecki, Hugo Krawczyk, Jiayu Xu:
OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-Computation Attacks. IACR Cryptol. ePrint Arch. 2018: 163 (2018) - [i17]Stanislaw Jarecki, Boyang Wei:
3PC ORAM with Low Latency, Low Bandwidth, and Fast Batch Retrieval. IACR Cryptol. ePrint Arch. 2018: 347 (2018) - [i16]Maliheh Shirvanian, Stanislaw Jarecki, Hugo Krawczyk, Nitesh Saxena:
SPHINX: A Password Store that Perfectly Hides Passwords from Itself. IACR Cryptol. ePrint Arch. 2018: 695 (2018) - [i15]Stanislaw Jarecki, Hugo Krawczyk, Jason K. Resch:
Threshold Partially-Oblivious PRFs with Applications to Key Management. IACR Cryptol. ePrint Arch. 2018: 733 (2018) - 2017
- [c52]Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu:
TOPPSS: Cost-Minimal Password-Protected Secret Sharing Based on Threshold OPRF. ACNS 2017: 39-58 - [c51]Maliheh Shirvanian, Stanislaw Jarecki, Hugo Krawczyk, Nitesh Saxena:
SPHINX: A Password Store that Perfectly Hides Passwords from Itself. ICDCS 2017: 1094-1104 - [i14]Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu:
TOPPSS: Cost-minimal Password-Protected Secret Sharing based on Threshold OPRF. IACR Cryptol. ePrint Arch. 2017: 363 (2017) - 2016
- [c50]Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena:
Device-Enhanced Password Protocols with Optimal Online-Offline Protection. AsiaCCS 2016: 177-188 - [c49]Chongwon Cho, Dana Dachman-Soled, Stanislaw Jarecki:
Efficient Concurrent Covert Computation of String Equality and Set Intersection. CT-RSA 2016: 164-179 - [c48]Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu:
Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online). EuroS&P 2016: 276-291 - [i13]Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu:
Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online). IACR Cryptol. ePrint Arch. 2016: 144 (2016) - [i12]Stanislaw Jarecki:
Efficient Covert Two-Party Computation. IACR Cryptol. ePrint Arch. 2016: 1032 (2016) - 2015
- [c47]Sky Faber, Stanislaw Jarecki, Sotirios Kentros, Boyang Wei:
Three-Party ORAM for Secure Computation. ASIACRYPT (1) 2015: 360-385 - [c46]Sky Faber, Stanislaw Jarecki, Hugo Krawczyk, Quan Nguyen, Marcel-Catalin Rosu, Michael Steiner:
Rich Queries on Encrypted Data: Beyond Exact Matches. ESORICS (2) 2015: 123-145 - [i11]Sky Faber, Stanislaw Jarecki, Hugo Krawczyk, Quan Nguyen, Marcel-Catalin Rosu, Michael Steiner:
Rich Queries on Encrypted Data: Beyond Exact Matches. IACR Cryptol. ePrint Arch. 2015: 927 (2015) - [i10]Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena:
Device-Enhanced Password Protocols with Optimal Online-Offline Protection. IACR Cryptol. ePrint Arch. 2015: 1099 (2015) - 2014
- [c45]Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk:
Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model. ASIACRYPT (2) 2014: 233-253 - [c44]David Cash, Joseph Jaeger, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, Michael Steiner:
Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation. NDSS 2014 - [c43]Maliheh Shirvanian, Stanislaw Jarecki, Nitesh Saxena, Naveen Nathan:
Two-Factor Authentication Resilient to Server Compromise Using Mix-Bandwidth Devices. NDSS 2014 - [c42]Stanislaw Jarecki:
Practical Covert Authentication. Public Key Cryptography 2014: 611-629 - [i9]Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk:
Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model. IACR Cryptol. ePrint Arch. 2014: 650 (2014) - [i8]David Cash, Joseph Jaeger, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, Michael Steiner:
Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation. IACR Cryptol. ePrint Arch. 2014: 853 (2014) - 2013
- [c41]Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, Michael Steiner:
Outsourced symmetric private information retrieval. CCS 2013: 875-888 - [c40]David Cash, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, Michael Steiner:
Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries. CRYPTO (1) 2013: 353-373 - [i7]David Cash, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, Michael Steiner:
Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries. IACR Cryptol. ePrint Arch. 2013: 169 (2013) - [i6]Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, Michael Steiner:
Outsourced Symmetric Private Information Retrieval. IACR Cryptol. ePrint Arch. 2013: 720 (2013) - 2012
- [j11]Jung Hee Cheon, Stanislaw Jarecki, Jae Hong Seo:
Multi-Party Privacy-Preserving Set Intersection with Quasi-Linear Complexity. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(8): 1366-1378 (2012) - 2011
- [j10]Jung Hee Cheon, Stanislaw Jarecki, Taekyoung Kwon, Mun-Kyu Lee:
Fast Exponentiation Using Split Exponents. IEEE Trans. Inf. Theory 57(3): 1816-1826 (2011) - [j9]Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Flexible Robust Group Key Agreement. IEEE Trans. Parallel Distributed Syst. 22(5): 879-886 (2011) - [c39]Ali Bagherzandi, Stanislaw Jarecki, Nitesh Saxena, Yanbin Lu:
Password-protected secret sharing. CCS 2011: 433-444 - 2010
- [j8]Stanislaw Jarecki, Nitesh Saxena:
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol. IEEE Trans. Inf. Forensics Secur. 5(4): 739-749 (2010) - [c38]Ali Bagherzandi, Stanislaw Jarecki:
Identity-Based Aggregate and Multi-Signature Schemes Based on RSA. Public Key Cryptography 2010: 480-498 - [c37]Stanislaw Jarecki, Nitesh Saxena:
Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model. SCN 2010: 253-270 - [c36]Stanislaw Jarecki, Xiaomin Liu:
Fast Secure Computation of Set Intersection. SCN 2010: 418-435 - [i5]Jung Hee Cheon, Stanislaw Jarecki, Jae Hong Seo:
Multi-Party Privacy-Preserving Set Intersection with Quasi-Linear Complexity. IACR Cryptol. ePrint Arch. 2010: 512 (2010) - [i4]Stanislaw Jarecki, Ali Bagherzandi, Nitesh Saxena, Yanbin Lu:
Password-Protected Secret Sharing. IACR Cryptol. ePrint Arch. 2010: 561 (2010)
2000 – 2009
- 2009
- [j7]Michael Sirivianos, Xiaowei Yang, Stanislaw Jarecki:
Robust and efficient incentives for cooperative content distribution. IEEE/ACM Trans. Netw. 17(6): 1766-1779 (2009) - [c35]Stanislaw Jarecki, Xiaomin Liu:
Private Mutual Authentication and Conditional Oblivious Transfer. CRYPTO 2009: 90-107 - [c34]Emiliano De Cristofaro, Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Privacy-Preserving Policy-Based Information Transfer. Privacy Enhancing Technologies 2009: 164-184 - [c33]Stanislaw Jarecki, Xiaomin Liu:
Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection. TCC 2009: 577-594 - [e1]Stanislaw Jarecki, Gene Tsudik:
Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings. Lecture Notes in Computer Science 5443, Springer 2009, ISBN 978-3-642-00467-4 [contents] - 2008
- [c32]Ali Bagherzandi, Jung Hee Cheon, Stanislaw Jarecki:
Multisignatures secure under the discrete logarithm assumption and a generalized forking lemma. CCS 2008: 449-458 - [c31]Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange. CT-RSA 2008: 352-369 - [c30]Stanislaw Jarecki, Josh Olsen:
Proactive RSA with Non-interactive Signing. Financial Cryptography 2008: 215-230 - [c29]Stanislaw Jarecki, Xiaomin Liu:
Affiliation-Hiding Envelope and Authentication Schemes with Efficient Support for Multiple Credentials. ICALP (2) 2008: 715-726 - [c28]Ali Bagherzandi, Stanislaw Jarecki:
Multisignatures Using Proofs of Secret Key Possession, as Secure as the Diffie-Hellman Problem. SCN 2008: 218-235 - 2007
- [j6]Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. J. Cryptol. 20(1): 51-83 (2007) - [j5]Rosario Gennaro, Tal Rabin, Stanislaw Jarecki, Hugo Krawczyk:
Robust and Efficient Sharing of RSA Functions. J. Cryptol. 20(3): 393 (2007) - [j4]Eu-Jin Goh, Stanislaw Jarecki, Jonathan Katz, Nan Wang:
Efficient Signature Schemes with Tight Reductions to the Diffie-Hellman Problems. J. Cryptol. 20(4): 493-514 (2007) - [c27]Stanislaw Jarecki, Xiaomin Liu:
Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes. ACNS 2007: 270-287 - [c26]Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Robust group key agreement using short broadcasts. CCS 2007: 411-420 - [c25]Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement. CT-RSA 2007: 287-308 - [c24]Stanislaw Jarecki, Vitaly Shmatikov:
Efficient Two-Party Secure Computation on Committed Inputs. EUROCRYPT 2007: 97-114 - [c23]Michael Sirivianos, Jong Han Park, Xiaowei Yang, Stanislaw Jarecki:
Dandelion: Cooperative Content Distribution with Robust Incentives. USENIX ATC 2007: 157-170 - 2006
- [j3]Claude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Secure acknowledgment aggregation and multisignatures with limited robustness. Comput. Networks 50(10): 1639-1652 (2006) - [c22]Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Authentication for Paranoids: Multi-party Secret Handshakes. ACNS 2006: 325-339 - 2005
- [c21]Stanislaw Jarecki, Vitaly Shmatikov:
Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure. Financial Cryptography 2005: 172-187 - [c20]Stanislaw Jarecki, Nitesh Saxena:
Further Simplifications in Proactive RSA Signatures. TCC 2005: 510-528 - 2004
- [c19]Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik:
Secret Handshakes from CA-Oblivious Encryption. ASIACRYPT 2004: 293-307 - [c18]Yevgeniy Dodis, Michael J. Freedman, Stanislaw Jarecki, Shabsi Walfish:
Versatile padding schemes for joint signature and encryption. CCS 2004: 344-353 - [c17]Stanislaw Jarecki, Vitaly Shmatikov:
Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme. EUROCRYPT 2004: 590-608 - [c16]Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik:
Brief announcement: secret handshakes from CA-oblivious encryption. PODC 2004: 394 - [c15]Stanislaw Jarecki, Nitesh Saxena, Jeong Hyun Yi:
An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol. SASN 2004: 1-9 - [c14]Claude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
A Robust Multisignatures Scheme with Applications to Acknowledgment Aggregation. SCN 2004: 193-207 - [i3]Yevgeniy Dodis, Michael J. Freedman, Stanislaw Jarecki, Shabsi Walfish:
Optimal Signcryption from Any Trapdoor Permutation. IACR Cryptol. ePrint Arch. 2004: 20 (2004) - [i2]Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik:
Secret Handshakes from CA-Oblivious Encryption. IACR Cryptol. ePrint Arch. 2004: 133 (2004) - 2003
- [c13]Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Secure Applications of Pedersen's Distributed Key Generation Protocol. CT-RSA 2003: 373-390 - [c12]Eu-Jin Goh, Stanislaw Jarecki:
A Signature Scheme as Secure as the Diffie-Hellman Problem. EUROCRYPT 2003: 401-415 - 2002
- [c11]Philippe Golle, Stanislaw Jarecki, Ilya Mironov:
Cryptographic Primitives Enforcing Communication and Storage Complexity. Financial Cryptography 2002: 120-135 - [c10]Stanislaw Jarecki, Patrick Lincoln, Vitaly Shmatikov:
Negotiated Privacy: (Extended Abstract). ISSS 2002: 96-111 - 2001
- [b1]Stanislaw Jarecki:
Efficient threshold cryptosystems. Massachusetts Institute of Technology, Cambridge, MA, USA, 2001 - [j2]Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Robust Threshold DSS Signatures. Inf. Comput. 164(1): 54-84 (2001) - 2000
- [j1]Rosario Gennaro, Tal Rabin, Stanislaw Jarecki, Hugo Krawczyk:
Robust and Efficient Sharing of RSA Functions. J. Cryptol. 13(2): 273-300 (2000) - [c9]Stanislaw Jarecki, Anna Lysyanskaya:
Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures. EUROCRYPT 2000: 221-242
1990 – 1999
- 1999
- [c8]Ran Canetti, Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Adaptive Security for Threshold Cryptosystems. CRYPTO 1999: 98-115 - [c7]Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. EUROCRYPT 1999: 295-310 - 1997
- [c6]Amir Herzberg, Markus Jakobsson, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung:
Proactive Public Key and Signature Systems. CCS 1997: 100-110 - [c5]Stanislaw Jarecki, Andrew M. Odlyzko:
An Efficient Micropayment System Based on Probabilistic Polling. Financial Cryptography 1997: 173-192 - 1996