default search action
Lukasz Krzywiecki
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c45]Maciej Grzeskowiak, Lukasz Krzywiecki, Karol Niczyj:
Cryptanalysis of Human Identification Protocol with Human-Computable Passwords. ISPEC 2023: 347-364 - [c44]Hannes Salin, Lukasz Krzywiecki:
A Source Hiding Protocol for Cooperative Intelligent Transportation Systems (C-ITS). ISPEC 2023: 365-379 - [c43]Lukasz Krzywiecki, Grzegorz Zaborowski, Marcin Zawada:
Too Noisy, or Not Too Noisy? A Private Training in Machine Learning. TrustCom 2023: 149-156 - [c42]Karolina Bak, Hannes Salin, Karol Niczyj, Lukasz Krzywiecki:
Enhancing Tunnel Safety for Dangerous Goods Vehicles through Blockchain-Based Time-Stamping. TrustCom 2023: 1312-1317 - 2022
- [j10]Przemyslaw Blaskiewicz, Bartosz Drzazga, Lukasz Krzywiecki, Damian Stygar, Piotr Syga:
RFID Batch Authentication - A Usable Scheme Providing Anonymity. IEEE Access 10: 85368-85383 (2022) - [j9]Bartosz Drzazga, Lukasz Krzywiecki:
Review of Chosen Isogeny-Based Cryptographic Schemes. Cryptogr. 6(2): 27 (2022) - [c41]Lukasz Krzywiecki, Hannes Salin:
How to Design Authenticated Key Exchange for Wearable Devices: Cryptanalysis of AKE for Health Monitoring and Countermeasures via Distinct SMs with Key Split and Refresh. CANS 2022: 225-244 - [c40]Lukasz Krzywiecki, Hannes Salin:
Short Signatures via Multiple Hardware Security Modules with Key Splitting in Circuit Breaking Environments. TrustCom 2022: 1528-1533 - 2021
- [c39]Lukasz Krzywiecki, Miroslaw Kutylowski, Rafal Rothenberger, Bartosz Drzazga:
Hierarchical Ring Signatures Immune to Randomness Injection Attacks. CSCML 2021: 171-186 - [c38]Lukasz Krzywiecki, Adam Polubek, Hannes Salin:
Multi-Signature Scheme Resistant to Randomness Injection Attacks - A Bitcoin Case. NCA 2021: 1-4 - [c37]Lukasz Krzywiecki, Hannes Salin, Mateusz Jachniak:
Certificateless Multi-Party Authenticated Encryption Mitigating Ephemeral Key Leakage. NCA 2021: 1-8 - [c36]Bartosz Drzazga, Lukasz Krzywiecki, Hannes Salin:
Cryptanalysis of Deterministic and Probabilistic Multi-Copy PDP Schemes For Cloud Storage - Attacks and Countermeasures. TrustCom 2021: 172-179 - 2020
- [j8]Lukasz Krzywiecki, Adam Bobowski, Marta Slowik, Marcin Slowik, Patryk Koziel:
Schnorr-like identification scheme resistant to malicious subliminal setting of ephemeral secret. Comput. Networks 179: 107346 (2020) - [c35]Lukasz Krzywiecki, Hannes Salin, Nisha Panwar, Mykola Pavlov:
Proxy Signcryption Scheme for Vehicle Infrastructure Immune to Randomness Leakage and Setup Attacks. NCA 2020: 1-8
2010 – 2019
- 2019
- [c34]Miroslaw Kutylowski, Lukasz Krzywiecki, Xiaofeng Chen:
Rethinking Identification Protocols from the Point of View of the GDPR. CSCML 2019: 296-315 - [c33]Lukasz Krzywiecki, Miroslaw Kutylowski, Jakub Pezda, Marcin Slowik:
Anonymous Deniable Identification in Ephemeral Setup and Leakage Scenarios (Brief Announcement). CSCML 2019: 320-323 - [c32]Patryk Koziel, Lukasz Krzywiecki, Damian Stygar:
Identity-based Conditional Privacy-Preserving Authentication Scheme Resistant to Malicious Subliminal Setting of Ephemeral Secret. ICETE (2) 2019: 492-497 - [c31]Lukasz Krzywiecki, Marta Slowik, Michal Szala:
Identity-Based Signature Scheme Secure in Ephemeral Setup and Leakage Scenarios. ISPEC 2019: 310-324 - [c30]Lukasz Krzywiecki, Patryk Koziel, Nisha Panwar:
Signature Based Authentication for Ephemeral Setup Attacks in Vehicular Sensor Networks. NCA 2019: 1-4 - [p1]Przemyslaw Blaskiewicz, Lucjan Hanzlik, Kamil Kluczniak, Lukasz Krzywiecki, Miroslaw Kutylowski, Marcin Slowik, Marta Wszola:
Pseudonymous Signature Schemes. Advances in Cyber Security 2019: 185-255 - [i5]Nisha Panwar, Shantanu Sharma, Sharad Mehrotra, Lukasz Krzywiecki, Nalini Venkatasubramanian:
Smart Home Survey on Security and Privacy. CoRR abs/1904.05476 (2019) - [i4]Lukasz Krzywiecki, Miroslaw Kutylowski, Jakub Pezda, Marcin Slowik:
Anonymous Deniable Identification in Ephemeral Setup & Leakage Scenarios. IACR Cryptol. ePrint Arch. 2019: 337 (2019) - 2018
- [j7]Lukasz Krzywiecki, Kamil Kluczniak, Patryk Koziel, Nisha Panwar:
Privacy-oriented dependency via deniable SIGMA protocol. Comput. Secur. 79: 53-67 (2018) - 2017
- [j6]Lukasz Krzywiecki, Tomasz Wlislocki:
Deniable Key Establishment Resistance against eKCI Attacks. Secur. Commun. Networks 2017: 7810352:1-7810352:13 (2017) - [j5]Shlomi Dolev, Lukasz Krzywiecki, Nisha Panwar, Michael Segal:
Dynamic attribute based vehicle authentication. Wirel. Networks 23(4): 1045-1062 (2017) - [c29]Lukasz Krzywiecki, Miroslaw Kutylowski:
Security of Okamoto Identification Scheme: a Defense against Ephemeral Key Leakage and Setup. SCC@AsiaCCS 2017: 43-50 - [c28]Lukasz Krzywiecki, Marta Wszola, Miroslaw Kutylowski:
Brief Announcement: Anonymous Credentials Secure to Ephemeral Leakage. CSCML 2017: 96-98 - [c27]Lukasz Krzywiecki, Marcin Slowik:
Strongly Deniable Identification Schemes Immune to Prover's and Verifier's Ephemeral Leakage. SECITC 2017: 115-128 - 2016
- [j4]Shlomi Dolev, Lukasz Krzywiecki, Nisha Panwar, Michael Segal:
Optical PUF for Non-Forwardable Vehicle Authentication. Comput. Commun. 93: 52-67 (2016) - [j3]Shlomi Dolev, Lukasz Krzywiecki, Nisha Panwar, Michael Segal:
Vehicle authentication via monolithically certified public key and attributes. Wirel. Networks 22(3): 879-896 (2016) - [c26]Lukasz Krzywiecki, Krzysztof Majcher, Wojciech Macyna:
Efficient Probabilistic Methods for Proof of Possession in Clouds. DMBD 2016: 364-372 - [c25]Przemyslaw Blaskiewicz, Lukasz Krzywiecki, Piotr Syga:
RFID Tags Batch Authentication Revisited - Communication Overhead and Server Computational Complexity Limits. ISPEC 2016: 209-223 - [c24]Lukasz Krzywiecki:
Schnorr-Like Identification Scheme Resistant to Malicious Subliminal Setting of Ephemeral Secret. SECITC 2016: 137-148 - 2015
- [c23]Lukasz Krzywiecki:
Anonymous Authentication Scheme Based on PUF. ICISC 2015: 359-372 - [c22]Shlomi Dolev, Lukasz Krzywiecki, Nisha Panwar, Michael Segal:
Optical PUF for Non Forwardable Vehicle Authentication. NCA 2015: 204-207 - [c21]Lukasz Krzywiecki, Malgorzata Sulkowska, Filip Zagórski:
Hierarchical Ring Signatures Revisited - Unconditionally and Perfectly Anonymous Schnorr Version. SPACE 2015: 329-346 - [i3]Shlomi Dolev, Lukasz Krzywiecki, Nisha Panwar, Michael Segal:
Vehicle Authentication via Monolithically Certified Public Key and Attributes. CoRR abs/1507.04491 (2015) - [i2]Shlomi Dolev, Lukasz Krzywiecki, Nisha Panwar, Michael Segal:
Vehicle to Vehicle Authentication. CoRR abs/1508.01324 (2015) - 2014
- [c20]Miroslaw Kutylowski, Lucjan Hanzlik, Kamil Kluczniak, Przemyslaw Kubiak, Lukasz Krzywiecki:
Forbidden City Model - Towards a Practice Relevant Framework for Designing Cryptographic Protocols. ISPEC 2014: 42-59 - [c19]Shlomi Dolev, Lukasz Krzywiecki, Nisha Panwar, Michael Segal:
Dynamic Attribute Based Vehicle Authentication. NCA 2014: 1-8 - [c18]Lukasz Krzywiecki:
Deniable Version of SIGMA Key Exchange Protocol Resilient to Ephemeral Key Leakage. ProvSec 2014: 334-341 - [c17]Lukasz Krzywiecki, Przemyslaw Kubiak, Miroslaw Kutylowski:
Probabilistic Admissible Encoding on Elliptic Curves - Towards PACE with Generalized Integrated Mapping. SOFSEM 2014: 395-406 - 2013
- [c16]Lucjan Hanzlik, Kamil Kluczniak, Miroslaw Kutylowski, Lukasz Krzywiecki:
Mutual Restricted Identification. EuroPKI 2013: 119-133 - [c15]Lucjan Hanzlik, Lukasz Krzywiecki, Miroslaw Kutylowski:
Simplified PACE|AA Protocol. ISPEC 2013: 218-232 - [c14]Shlomi Dolev, Lukasz Krzywiecki, Nisha Panwar, Michael Segal:
Certificating Vehicle Public Key with Vehicle Attributes A (periodical) Licensing Routine, Against Man-in-the-Middle Attacks and Beyond. ASCoMS@SAFECOMP 2013 - [c13]Lucjan Hanzlik, Kamil Kluczniak, Lukasz Krzywiecki, Miroslaw Kutylowski:
Mutual Chip Authentication. TrustCom/ISPA/IUCC 2013: 1683-1689 - [i1]Lukasz Krzywiecki, Przemyslaw Kubiak, Miroslaw Kutylowski:
Stamp \& Extend - Instant but Undeniable Timestamping based on Lazy Trees. IACR Cryptol. ePrint Arch. 2013: 730 (2013) - 2012
- [c12]Lukasz Krzywiecki, Przemyslaw Kubiak, Miroslaw Kutylowski, Michal Tabor, Daniel Wachnik:
Lightweight Certificates - Towards a Practical Model for PKI. BIS 2012: 296-307 - [c11]Lukasz Krzywiecki, Przemyslaw Kubiak, Miroslaw Kutylowski:
Stamp and Extend - Instant But Undeniable Timestamping Based on Lazy Trees. INTRUST 2012: 5-24 - [c10]Lukasz Krzywiecki, Miroslaw Kutylowski:
Proof of Possession for Cloud Storage via Lagrangian Interpolation Techniques. NSS 2012: 305-319 - 2011
- [c9]Miroslaw Kutylowski, Przemyslaw Blaskiewicz, Lukasz Krzywiecki, Przemyslaw Kubiak, Wieslaw Paluszynski, Michal Tabor:
Technical and Legal Meaning of "Sole Control" - Towards Verifiability in Signing Systems. BIS (Workshops) 2011: 270-281 - [c8]Miroslaw Kutylowski, Lukasz Krzywiecki, Przemyslaw Kubiak, Michal Koza:
Restricted Identification Scheme and Diffie-Hellman Linking Problem. INTRUST 2011: 221-238 - [c7]Lukasz Krzywiecki, Miroslaw Kutylowski:
Coalition Resistant Anonymous Broadcast Encryption Scheme Based on PUF. TRUST 2011: 48-62 - 2010
- [c6]Lukasz Krzywiecki, Miroslaw Kutylowski, Hubert Misztela, Tomasz Struminski:
Private Information Retrieval with a Trusted Hardware Unit - Revisited. Inscrypt 2010: 373-386 - [c5]Lukasz Krzywiecki, Miroslaw Kutylowski:
Lagrangian E-Voting: Verifiability on Demand and Strong Privacy. TRUST 2010: 109-123
2000 – 2009
- 2009
- [j2]Marek Klonowski, Lukasz Krzywiecki, Miroslaw Kutylowski, Anna Lauks:
Step-out group signatures. Computing 85(1-2): 137-151 (2009) - 2008
- [j1]Lukasz Krzywiecki, Miroslaw Kutylowski, Maciej Nikodem:
General anonymous key broadcasting via Lagrangian interpolation. IET Inf. Secur. 2(3): 79-84 (2008) - [c4]Marek Klonowski, Lukasz Krzywiecki, Miroslaw Kutylowski, Anna Lauks:
Step-Out Ring Signatures. MFCS 2008: 431-442 - 2007
- [c3]Jacek Cichon, Marek Klonowski, Lukasz Krzywiecki, Bartlomiej Rózanski, Pawel Zielinski:
Random Subsets of the Interval and P2P Protocols. APPROX-RANDOM 2007: 409-421 - 2006
- [c2]Lukasz Krzywiecki, Przemyslaw Kubiak, Miroslaw Kutylowski:
A Revocation Scheme Preserving Privacy. Inscrypt 2006: 130-143 - 2005
- [c1]Jacek Cichon, Lukasz Krzywiecki, Miroslaw Kutylowski, Pawel Wlaz:
Anonymous Distribution of Encryption Keys in Cellular Broadcast Systems. MADNES 2005: 96-109
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint