Wybrane publikacje |
1 | Referat konferencyjny 2022
Short signatures via multiple hardware security modules with key splitting in circuit breaking environments. W: 2022 IEEE 21st International Conference on Trust, Security and Privacy in Computing and Communications : TrustCom 2022 : Wuhan, China, 9-11 December 2022 : proceedings. Danvers, MA : IEEE, cop. 2022. s. 1528-1533. ISBN: 978-1-6654-9425-0 | Zasoby:DOIURL | |
|
2 | Referat konferencyjny 2022
How to design authenticated key exchange for wearable devices: cryptanalysis of AKE for health monitoring and countermeasures via distinct SMs with key split and refresh. W: Cryptology and Network Security : 21st International Conference, CANS 2022, Dubai, United Arab Emirates, November 13-16, 2022 : proceedings / eds. Alastair R. Beresford, Arpita Patra, Emanuele Bellini. Cham : Springer, 2022. s. 225-244. ISBN: 978-3-031-20974-1; 978-3-031-20973-4 | Zasoby:DOIURLSFX | |
|
3 | Artykuł 2022
Review of chosen isogeny-based cryptographic schemes. Cryptography. 2022, vol. 6, nr 2, art. 27, s. 1-39. ISSN: 2410-387X | Zasoby:DOISFX | |
|
4 | Artykuł 2022
RFID batch authentication - a usable scheme providing anonymity. IEEE Access. 2022, vol. 10, s. 85368-85383. ISSN: 2169-3536 | Zasoby:DOIURLSFX | |
|
5 | Referat konferencyjny 2021
Multi-signature scheme resistant to randomness injection attacks - a bitcoin case. W: 2021 IEEE 20th International Symposium on Network Computing and Applications (NCA), November 23-26, 2021 / eds. Mauro Andreolini, Mirco Marchetti, Dimiter R. Avresky. Piscataway : IEEE, cop. 2021. s. [1-4]. ISBN: 978-1-6654-9550-9 | Zasoby:DOIURL | |
|
6 | Referat konferencyjny 2021
Certificateless multi-party authenticated encryption mitigating ephemeral key leakage. W: 2021 IEEE 20th International Symposium on Network Computing and Applications (NCA), November 23-26, 2021 / eds. Mauro Andreolini, Mirco Marchetti, Dimiter R. Avresky. Piscataway : IEEE, cop. 2021. s. [1-8]. ISBN: 978-1-6654-9550-9; 978-1-6654-9551-6 | Zasoby:DOIURL | |
|
7 | Referat konferencyjny 2021
Cryptanalysis of deterministic and probabilistic multi-copy PDP schemes for cloud storage - attacks and countermeasures. W: 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications : proceedings / eds. Liang Zhao [i in.]. Los Alamitos, Ca. : IEEE, cop. 2021. s. 172-179. ISBN: 978-166541658-0 | Zasoby:DOIURL | |
|
8 | Referat konferencyjny 2021
Hierarchical ring signatures immune to randomness injection attacks. W: Cyber Security Cryptography and Machine Learning : 5th International Symposium, CSCML 2021, Be'er Sheva, Israel, July 8-9, 2021 : proceedings / eds. Shlomi Dolev [i in.]. Cham : Springer, cop. 2021. s. 171-186. ISBN: 978-3-030-78085-2; 978-3-030-78086-9 | Zasoby:DOISFX | |
|
9 | Referat konferencyjny 2020
Proxy signcryption scheme for vehicle infrastructure immune to randomness leakage and setup attacks. W: 2020 IEEE 19th International Symposium on Network Computing and Applications (NCA) / eds. Aris Gkoulalas-Divanis, Mirco Marchetti, Dimiter R. Avresky. Danvers, MA : IEEE, cop. 2020. s. [1-8]. ISBN: 978-1-7281-8326-8 | Zasoby:DOIURL | |
|
10 | Artykuł 2020
Schnorr-like identification scheme resistant to malicious subliminal setting of ephemeral secret. Computer Networks. 2020, vol. 179, art. 107346, s. [1-12]. ISSN: 1389-1286; 1872-7069 | Zasoby:DOISFX | |
|