default search action
Filip Zagórski
Person information
- affiliation: University of Wroclaw, Poland
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c29]Pawel Lorek, Moti Yung, Filip Zagórski:
Mirrored Commitment: Fixing "Randomized Partial Checking" and Applications. ACNS (3) 2024: 3-27 - [i14]Pawel Lorek, Moti Yung, Filip Zagórski:
Mirrored Commitment: Fixing "Randomized Partial Checking" and Applications. IACR Cryptol. ePrint Arch. 2024: 285 (2024) - [i13]David Chaum, Richard Carback, Mario Yaksetig, Jeremy Clark, Mahdi Nejadgholi, Bart Preneel, Alan T. Sherman, Filip Zagórski, Bingsheng Zhang, Zeyuan Yin:
Votexx: Extreme Coercion Resistance. IACR Cryptol. ePrint Arch. 2024: 1354 (2024) - 2023
- [c28]Oliver Broadrick, Poorvi L. Vora, Filip Zagórski:
PROVIDENCE: a Flexible Round-by-Round Risk-Limiting Audit. USENIX Security Symposium 2023: 6753-6770 - 2022
- [c27]Oliver Broadrick, Sarah Morin, Grant McClearn, Neal McBurnett, Poorvi L. Vora, Filip Zagórski:
Simulations of Ballot Polling Risk-Limiting Audits. Financial Cryptography Workshops 2022: 351-365 - [i12]Oliver Broadrick, Poorvi L. Vora, Filip Zagórski:
PROVIDENCE: a Flexible Round-by-Round Risk-Limiting Audit. CoRR abs/2210.08717 (2022) - [i11]David Chaum, Richard Carback, Jeremy Clark, Chao Liu, Mahdi Nejadgholi, Bart Preneel, Alan T. Sherman, Mario Yaksetig, Zeyuan Yin, Filip Zagórski, Bingsheng Zhang:
VoteXX: A Solution to Improper Influence in Voter-Verifiable Elections. IACR Cryptol. ePrint Arch. 2022: 1212 (2022) - 2021
- [c26]Filip Zagórski, Grant McClearn, Sarah Morin, Neal McBurnett, Poorvi L. Vora:
Minerva- An Efficient Risk-Limiting Ballot Polling Audit. USENIX Security Symposium 2021: 3059-3076 - 2020
- [j2]Pawel Lorek, Grzegorz Los, Karol Gotfryd, Filip Zagórski:
On testing pseudorandom generators via statistical tests based on the arcsine law. J. Comput. Appl. Math. 380: 112968 (2020) - [c25]Sarah Morin, Grant McClearn, Neal McBurnett, Poorvi L. Vora, Filip Zagórski:
A Note on Risk-Limiting Bayesian Polling Audits for Two-Candidate Elections. Financial Cryptography Workshops 2020: 337-344 - [i10]Filip Zagórski, Grant McClearn, Sarah Morin, Neal McBurnett, Poorvi L. Vora:
The Athena Class of Risk-Limiting Ballot Polling Audits. CoRR abs/2008.02315 (2020)
2010 – 2019
- 2019
- [j1]Pawel Lorek, Filip Zagórski, Michal Kulis:
Strong Stationary Times and its use in Cryptography. IEEE Trans. Dependable Secur. Comput. 16(5): 805-818 (2019) - [c24]Hua Wu, Poorvi L. Vora, Filip Zagórski:
PrivApollo - Secret Ballot E2E-V Internet Voting. Financial Cryptography Workshops 2019: 299-313 - [i9]Pawel Lorek, Grzegorz Los, Karol Gotfryd, Filip Zagórski:
On testing pseudorandom generators via statistical tests based on the arcsine law. CoRR abs/1903.09805 (2019) - 2018
- [c23]Karol Gotfryd, Pawel Lorek, Filip Zagórski:
RiffleScrambler - A Memory-Hard Password Storing Function. ESORICS (2) 2018: 309-328 - [i8]Karol Gotfryd, Pawel Lorek, Filip Zagórski:
RiffleScrambler - a memory-hard password storing function. CoRR abs/1807.06443 (2018) - 2017
- [c22]Pawel Lorek, Michal Kulis, Filip Zagórski:
Leakage-Resilient Riffle Shuffle. MACIS 2017: 395-408 - [c21]Pawel Lorek, Marcin Slowik, Filip Zagórski:
Statistical Testing of PRNG: Generalized Gambler's Ruin Problem. MACIS 2017: 425-437 - [i7]Pawel Lorek, Filip Zagórski, Michal Kulis:
Strong stationary times and its use in cryptography. CoRR abs/1709.02631 (2017) - 2016
- [c20]Michal Kulis, Pawel Lorek, Filip Zagórski:
Randomized Stopping Times and Provably Secure Pseudorandom Permutation Generators. Mycrypt 2016: 145-167 - [c19]Dawid Gawel, Maciej Kosarzecki, Poorvi L. Vora, Hua Wu, Filip Zagórski:
Apollo - End-to-End Verifiable Internet Voting with Recovery from Vote Manipulation. E-VOTE-ID 2016: 125-143 - [i6]Jacek Cichon, Zbigniew Golebiewski, Marcin Kardas, Marek Klonowski, Filip Zagórski:
On spreading rumor in heterogeneous systems. CoRR abs/1612.01061 (2016) - [i5]Dawid Gawel, Maciej Kosarzecki, Poorvi L. Vora, Hua Wu, Filip Zagórski:
Apollo - End-to-end Verifiable Internet Voting with Recovery from Vote Manipulation. IACR Cryptol. ePrint Arch. 2016: 1037 (2016) - [i4]Michal Kulis, Pawel Lorek, Filip Zagórski:
Randomized stopping times and provably secure pseudorandom permutation generators. IACR Cryptol. ePrint Arch. 2016: 1049 (2016) - 2015
- [c18]Lukasz Krzywiecki, Malgorzata Sulkowska, Filip Zagórski:
Hierarchical Ring Signatures Revisited - Unconditionally and Perfectly Anonymous Schnorr Version. SPACE 2015: 329-346 - 2013
- [c17]Filip Zagórski, Richard Carback, David Chaum, Jeremy Clark, Aleksander Essex, Poorvi L. Vora:
Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting System. ACNS 2013: 441-457 - [c16]Tyler Kaczmarek, John Wittrock, Richard Carback, Alex Florescu, Jan Rubio, Noel Runyan, Poorvi L. Vora, Filip Zagórski:
Dispute Resolution in Accessible Voting Systems: The Design and Use of Audiotegrity. VoteID 2013: 127-141 - [i3]Filip Zagórski, Richard Carback, David Chaum, Jeremy Clark, Aleksander Essex, Poorvi L. Vora:
Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting System. IACR Cryptol. ePrint Arch. 2013: 214 (2013) - 2012
- [c15]Marek Klonowski, Krzysztof Majcher, Wojciech Macyna, Filip Zagórski:
Hidden Bits Approach for Authentication in RFID Systems. RFIDSec 2012: 48-58 - 2011
- [c14]David Chaum, Alex Florescu, Mridul Nandi, Stefan Popoveniuc, Jan Rubio, Poorvi L. Vora, Filip Zagórski:
Paperless Independently-Verifiable Voting. VoteID 2011: 140-157 - [c13]Zbigniew Golebiewski, Krzysztof Majcher, Filip Zagórski, Marcin Zawada:
Practical Attacks on HB and HB+ Protocols. WISTP 2011: 244-253 - 2010
- [c12]Miroslaw Kutylowski, Filip Zagórski:
Scratch, Click & Vote: E2E Voting over the Internet. Towards Trustworthy Elections 2010: 343-356
2000 – 2009
- 2008
- [c11]Zbigniew Golebiewski, Krzysztof Majcher, Filip Zagórski:
Attacks on CKK Family of RFID Authentication Protocols. ADHOC-NOW 2008: 241-250 - [c10]Zbigniew Golebiewski, Miroslaw Kutylowski, Tomasz Luczak, Filip Zagórski:
Self-stabilizing population of mobile agents. IPDPS 2008: 1-8 - [i2]Zbigniew Golebiewski, Krzysztof Majcher, Filip Zagórski, Marcin Zawada:
Practical Attacks on HB and HB+ Protocols. IACR Cryptol. ePrint Arch. 2008: 241 (2008) - [i1]Miroslaw Kutylowski, Filip Zagórski:
Scratch, Click & Vote: E2E voting over the Internet. IACR Cryptol. ePrint Arch. 2008: 314 (2008) - 2007
- [c9]Przemyslaw Kubiak, Miroslaw Kutylowski, Filip Zagórski:
Kleptographic attacks on a cascade of mix servers. AsiaCCS 2007: 57-62 - [c8]Miroslaw Kutylowski, Filip Zagórski:
Verifiable Internet Voting Solving Secure Platform Problem. IWSEC 2007: 199-213 - 2006
- [c7]Zbigniew Golebiewski, Miroslaw Kutylowski, Filip Zagórski:
Stealing Secrets with SSL/TLS and SSH - Kleptographic Attacks. CANS 2006: 191-202 - [c6]Marcin Gogolewski, Marek Klonowski, Przemyslaw Kubiak, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski:
Kleptographic Attacks on E-Voting Schemes. ETRICS 2006: 494-508 - [c5]Piotr Borzecki, Jedrzej Kabarowski, Przemyslaw Kubiak, Miroslaw Kutylowski, Filip Zagórski:
Kleptographic Weaknesses in Benaloh-Tuinstra Protocol. ICSNC 2006: 26 - [c4]Jaroslaw Kutylowski, Filip Zagórski:
Reliable Broadcasting Without Collision Detection. SOFSEM 2006: 389-398 - 2005
- [c3]Marek Klonowski, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski:
A Practical Voting Scheme with Receipts. ISC 2005: 490-497 - [c2]Marek Klonowski, Miroslaw Kutylowski, Filip Zagórski:
Anonymous Communication with On-line and Off-line Onion Encoding. SOFSEM 2005: 229-238 - [c1]Marek Klonowski, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski:
Conditional Digital Signatures. TrustBus 2005: 206-215
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 01:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint