Miroslaw Kutylowski
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
showing all ?? records
2010 – today
- 2018
- [j38]Miroslaw Kutylowski, Yu Wang, Shouhuai Xu, Laurence T. Yang:
Special issue on social network security and privacy. Concurrency and Computation: Practice and Experience 30(5) (2018) - 2017
- [j37]Yang Xiang, Elisa Bertino, Miroslaw Kutylowski:
Security and privacy in social networks. Concurrency and Computation: Practice and Experience 29(7) (2017) - [j36]Jianfeng Wang, Xiaofeng Chen, Jin Li, Kamil Kluczniak, Miroslaw Kutylowski:
TrDup: enhancing secure data deduplication with user traceability in cloud computing. IJWGS 13(3): 270-289 (2017) - [c123]Jacek Cichon, Miroslaw Kutylowski, Kamil Wolny:
Braid Chain Radio Communication. ALGOSENSORS 2017: 223-235 - [c122]Lukasz Krzywiecki, Miroslaw Kutylowski:
Security of Okamoto Identification Scheme: a Defense against Ephemeral Key Leakage and Setup. SCC@AsiaCCS 2017: 43-50 - [c121]
- [c120]Lukasz Krzywiecki, Marta Wszola, Miroslaw Kutylowski:
Brief Announcement: Anonymous Credentials Secure to Ephemeral Leakage. CSCML 2017: 96-98 - 2016
- [j35]Xiuzhen Cheng, Miroslaw Kutylowski, Kuai Xu, Haojin Zhu:
Cyber security, crime, and forensics of wireless networks and applications. Security and Communication Networks 9(16): 3763-3764 (2016) - [c119]Miroslaw Kutylowski, Lucjan Hanzlik, Kamil Kluczniak:
Pseudonymous Signature on eIDAS Token - Implementation Based Privacy Threats. ACISP (2) 2016: 467-477 - [c118]Kamil Kluczniak, Lucjan Hanzlik, Miroslaw Kutylowski:
A Formal Concept of Domain Pseudonymous Signatures. ISPEC 2016: 238-254 - [c117]Lucjan Hanzlik, Miroslaw Kutylowski:
Chip Authentication for E-Passports: PACE with Chip Authentication Mapping v2. ISC 2016: 115-129 - [c116]Lucjan Hanzlik, Kamil Kluczniak, Miroslaw Kutylowski:
Controlled Randomness - A Defense Against Backdoors in Cryptographic Devices. Mycrypt 2016: 215-232 - [c115]Miroslaw Kutylowski, Jacek Cichon, Lucjan Hanzlik, Kamil Kluczniak, Xiaofeng Chen, Jianfeng Wang:
Protecting Electronic Signatures in Case of Key Leakage. Mycrypt 2016: 252-274 - [c114]Kamil Kluczniak, Jianfeng Wang, Xiaofeng Chen, Miroslaw Kutylowski:
Multi-device Anonymous Authentication. NSS 2016: 21-36 - [c113]Przemyslaw Blaskiewicz, Miroslaw Kutylowski, Jakub Lemiesz, Malgorzata Sulkowska:
Ghost Train for Anonymous Communication. SpaCCS 2016: 224-239 - [c112]Lucjan Hanzlik, Kamil Kluczniak, Miroslaw Kutylowski, Shlomi Dolev:
Local Self-Organization with Strong Privacy Protection. Trustcom/BigDataSE/ISPA 2016: 775-782 - [i15]Przemyslaw Blaskiewicz, Jacek Cichon, Jakub Lemiesz, Miroslaw Kutylowski, Marcin Zawada, Szymon Stefanski, Krzysztof Chrobak:
λ-persistant CSMA: a radio-channel access protocol. CoRR abs/1607.00861 (2016) - [i14]Przemyslaw Blaskiewicz, Jacek Cichon, Jakub Lemiesz, Miroslaw Kutylowski, Marcin Zawada:
One- and Multi-Pass Long-Hop Routing for Wireless Network. CoRR abs/1607.00862 (2016) - [i13]Przemyslaw Blaskiewicz, Jacek Cichon, Jakub Lemiesz, Miroslaw Kutylowski, Marcin Zawada, Krystyna Napierala, Michal Panek, Stanislaw Strzyz:
A Jamming-Resilient MAC-layer Device Identification for Internet of Things. CoRR abs/1607.00863 (2016) - 2015
- [j34]Ron Berman, Amos Fiat, Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski, Tomer Levinboim, Amnon Ta-Shma:
Provable Unlinkability Against Traffic Analysis with Low Message Overhead. J. Cryptology 28(3): 623-640 (2015) - [j33]Lucjan Hanzlik, Miroslaw Kutylowski:
Restricted Identification Secure in the Extended Canetti-Krawczyk Model. J. UCS 21(3): 419-439 (2015) - [j32]Marek Klonowski, Miroslaw Kutylowski, Michal Ren, Katarzyna Rybarczyk:
Mixing in Random Digraphs with Application to the Forward-Secure Key Evolution in Wireless Sensor Networks. TOSN 11(2): 29:1-29:27 (2015) - [c111]Marcin Kardas, Miroslaw Kutylowski, Jakub Lemiesz:
On Distributed Cardinality Estimation: Random Arcs Recycled. ANALCO 2015: 129-137 - [c110]Jianfeng Wang, Xiaofeng Chen, Jin Li, Kamil Kluczniak, Miroslaw Kutylowski:
A New Secure Data Deduplication Approach Supporting User Traceability. BWCCA 2015: 120-124 - [c109]Lucjan Hanzlik, Przemyslaw Kubiak, Miroslaw Kutylowski:
Tracing Attacks on U-Prove with Revocation Mechanism: Tracing Attacks for U-Prove. AsiaCCS 2015: 603-608 - [c108]Lucjan Hanzlik, Miroslaw Kutylowski, Moti Yung:
Hard Invalidation of Electronic Signatures. ISPEC 2015: 421-436 - [c107]Kamil Kluczniak, Lucjan Hanzlik, Przemyslaw Kubiak, Miroslaw Kutylowski:
Anonymous Evaluation System. NSS 2015: 283-299 - [i12]Lucjan Hanzlik, Przemyslaw Kubiak, Miroslaw Kutylowski:
Tracing Attacks on U-Prove with Revocation Mechanism. IACR Cryptology ePrint Archive 2015: 108 (2015) - 2014
- [c106]Lucjan Hanzlik, Przemyslaw Kubiak, Miroslaw Kutylowski:
Stand-by Attacks on E-ID Password Authentication. Inscrypt 2014: 475-495 - [c105]Lucjan Hanzlik, Kamil Kluczniak, Miroslaw Kutylowski:
Attack on U-Prove Revocation Scheme from FC'13 - Passing Verification by Revoked Users. Financial Cryptography 2014: 283-290 - [c104]Przemyslaw Blaskiewicz, Marek Klonowski, Miroslaw Kutylowski, Piotr Syga:
Lightweight Protocol for Trusted Spontaneous Communication. INTRUST 2014: 228-242 - [c103]Miroslaw Kutylowski, Lucjan Hanzlik, Kamil Kluczniak, Przemyslaw Kubiak, Lukasz Krzywiecki:
Forbidden City Model - Towards a Practice Relevant Framework for Designing Cryptographic Protocols. ISPEC 2014: 42-59 - [c102]Lukasz Krzywiecki, Przemyslaw Kubiak, Miroslaw Kutylowski:
Probabilistic Admissible Encoding on Elliptic Curves - Towards PACE with Generalized Integrated Mapping. SOFSEM 2014: 395-406 - [e8]Miroslaw Kutylowski, Jaideep Vaidya:
Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I. Lecture Notes in Computer Science 8712, Springer 2014, ISBN 978-3-319-11202-2 [contents] - [e7]Miroslaw Kutylowski, Jaideep Vaidya:
Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II. Lecture Notes in Computer Science 8713, Springer 2014, ISBN 978-3-319-11211-4 [contents] - 2013
- [j31]Blazej Brzezniak, Lucjan Hanzlik, Przemyslaw Kubiak, Miroslaw Kutylowski:
Attack against Ibrahim's Distributed Key Generation for RSA. I. J. Network Security 15(4): 313-316 (2013) - [c101]Przemyslaw Kubiak, Miroslaw Kutylowski:
Supervised Usage of Signature Creation Devices. Inscrypt 2013: 132-149 - [c100]Lucjan Hanzlik, Kamil Kluczniak, Miroslaw Kutylowski, Lukasz Krzywiecki:
Mutual Restricted Identification. EuroPKI 2013: 119-133 - [c99]Marcin Kik, Maciej Gebala, Miroslaw Kutylowski:
Bit Reversal Broadcast Scheduling for Ad Hoc Systems. IDCS 2013: 223-237 - [c98]Lucjan Hanzlik, Lukasz Krzywiecki, Miroslaw Kutylowski:
Simplified PACE|AA Protocol. ISPEC 2013: 218-232 - [c97]Marek Klonowski, Miroslaw Kutylowski, Piotr Syga:
Chameleon RFID and Tracking Prevention. RFIDSec Asia 2013: 17-29 - [c96]Marek Klonowski, Michal Koza, Miroslaw Kutylowski:
Efficient and robust data aggregation using untrusted infrastructure. SIN 2013: 123-130 - [c95]Miroslaw Kutylowski, Piotr Lipiak:
Disability Parking Permit - Lightweight But Trustworthy Identity Documents. TrustCom/ISPA/IUCC 2013: 1535-1540 - [c94]Lucjan Hanzlik, Kamil Kluczniak, Lukasz Krzywiecki, Miroslaw Kutylowski:
Mutual Chip Authentication. TrustCom/ISPA/IUCC 2013: 1683-1689 - [e6]Miroslaw Kutylowski, Moti Yung:
Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7763, Springer 2013, ISBN 978-3-642-38518-6 [contents] - [i11]Lukasz Krzywiecki, Przemyslaw Kubiak, Miroslaw Kutylowski:
Stamp \& Extend - Instant but Undeniable Timestamping based on Lazy Trees. IACR Cryptology ePrint Archive 2013: 730 (2013) - 2012
- [j30]Marek Klonowski, Miroslaw Kutylowski, Jan Zatopianski:
Energy efficient alert in single-hop networks of extremely weak devices. Theor. Comput. Sci. 453: 65-74 (2012) - [j29]Jacek Cichon, Zbigniew Golebiewski, Miroslaw Kutylowski:
From key predistribution to key redistribution. Theor. Comput. Sci. 453: 75-87 (2012) - [c93]Lukasz Krzywiecki, Przemyslaw Kubiak, Miroslaw Kutylowski, Michal Tabor, Daniel Wachnik:
Lightweight Certificates - Towards a Practical Model for PKI. BIS 2012: 296-307 - [c92]Przemyslaw Blaskiewicz, Miroslaw Kutylowski, Wojciech Wodo, Kamil Wolny:
Extreme Propagation in an Ad-Hoc Radio Network - Revisited. ICCCI (2) 2012: 142-151 - [c91]Lukasz Krzywiecki, Przemyslaw Kubiak, Miroslaw Kutylowski:
Stamp and Extend - Instant But Undeniable Timestamping Based on Lazy Trees. INTRUST 2012: 5-24 - [c90]Lukasz Krzywiecki, Miroslaw Kutylowski:
Proof of Possession for Cloud Storage via Lagrangian Interpolation Techniques. NSS 2012: 305-319 - [c89]Miroslaw Kutylowski, Maciej Gebala:
Optimizing Segment Based Document Protection. SOFSEM 2012: 566-575 - [c88]Lucjan Hanzlik, Kamil Kluczniak, Przemyslaw Kubiak, Miroslaw Kutylowski:
Restricted Identification without Group Keys. TrustCom 2012: 1194-1199 - [i10]Marcin Kik, Maciej Gebala, Miroslaw Kutylowski:
One-side Energy costs of the RBO receiver. CoRR abs/1209.4605 (2012) - [i9]Miroslaw Kutylowski, Maciej Gebala:
Optimizing Segment Based Document Protection (Corrected Version). IACR Cryptology ePrint Archive 2012: 520 (2012) - 2011
- [c87]Miroslaw Kutylowski, Anna Lauks-Dutka:
Challenges for Electronic Identity Documents. BIS (Workshops) 2011: 256-257 - [c86]Miroslaw Kutylowski, Przemyslaw Blaskiewicz, Lukasz Krzywiecki, Przemyslaw Kubiak, Wieslaw Paluszynski, Michal Tabor:
Technical and Legal Meaning of "Sole Control" - Towards Verifiability in Signing Systems. BIS (Workshops) 2011: 270-281 - [c85]
- [c84]Miroslaw Kutylowski, Lukasz Krzywiecki, Przemyslaw Kubiak, Michal Koza:
Restricted Identification Scheme and Diffie-Hellman Linking Problem. INTRUST 2011: 221-238 - [c83]Marek Klonowski, Michal Koza, Miroslaw Kutylowski:
How to Transmit Messages via WSN in a Hostile Environment. SECRYPT 2011: 387-390 - [c82]Lukasz Krzywiecki, Miroslaw Kutylowski:
Coalition Resistant Anonymous Broadcast Encryption Scheme Based on PUF. TRUST 2011: 48-62 - [p1]Przemyslaw Blaskiewicz, Miroslaw Kutylowski:
Security and Trust in Sensor Networks. Theoretical Aspects of Distributed Computing in Sensor Networks 2011: 697-739 - 2010
- [j28]Nikita Borisov, Marek Klonowski, Miroslaw Kutylowski, Anna Lauks-Dutka:
Attacking and Repairing the Improved ModOnions Protocol-Tagging Approach. TIIS 4(3): 380-399 (2010) - [c81]Przemyslaw Kubiak, Miroslaw Kutylowski, Jun Shao:
How to Construct State Registries-Matching Undeniability with Public Security. ACIIDS (1) 2010: 64-73 - [c80]Marek Klonowski, Michal Koza, Miroslaw Kutylowski:
Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems. ACISP 2010: 391-402 - [c79]Jacek Cichon, Zbigniew Golebiewski, Miroslaw Kutylowski:
From Key Predistribution to Key Redistribution. ALGOSENSORS 2010: 92-104 - [c78]Przemyslaw Kubiak, Miroslaw Kutylowski, Anna Lauks-Dutka, Michal Tabor:
Mediated Signatures - Towards Undeniability of Digital Data in Technical and Legal Framework. BIS (Workshops) 2010: 298-309 - [c77]Lukasz Krzywiecki, Miroslaw Kutylowski, Hubert Misztela, Tomasz Struminski:
Private Information Retrieval with a Trusted Hardware Unit - Revisited. Inscrypt 2010: 373-386 - [c76]Przemyslaw Blaskiewicz, Przemyslaw Kubiak, Miroslaw Kutylowski:
Digital Signatures for e-Government - A Long-Term Security Architecture. e-Forensics 2010: 256-270 - [c75]Przemyslaw Blaskiewicz, Przemyslaw Kubiak, Miroslaw Kutylowski:
Two-Head Dragon Protocol: Preventing Cloning of Signature Keys - Work in Progress. INTRUST 2010: 173-188 - [c74]Miroslaw Kutylowski, Przemyslaw Kubiak:
Polish Concepts for Securing E-Government Document Flow. ISSE 2010: 399-407 - [c73]Lukasz Krzywiecki, Miroslaw Kutylowski:
Lagrangian E-Voting: Verifiability on Demand and Strong Privacy. TRUST 2010: 109-123 - [c72]Miroslaw Kutylowski, Filip Zagórski:
Scratch, Click & Vote: E2E Voting over the Internet. Towards Trustworthy Elections 2010: 343-356 - [e5]David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida:
Towards Trustworthy Elections, New Directions in Electronic Voting. Lecture Notes in Computer Science 6000, Springer 2010, ISBN 978-3-642-12979-7 [contents]
2000 – 2009
- 2009
- [j27]Marek Klonowski, Lukasz Krzywiecki, Miroslaw Kutylowski, Anna Lauks:
Step-out group signatures. Computing 85(1-2): 137-151 (2009) - [c71]Zbigniew Golebiewski, Michal Koza, Marek Klonowski, Miroslaw Kutylowski:
Leader Election for Multi-channel Radio Networks - Dependent versus Independent Trials. ACIIDS 2009: 477-482 - [c70]Zbigniew Golebiewski, Marek Klonowski, Michal Koza, Miroslaw Kutylowski:
Towards Fair Leader Election in Wireless Networks. ADHOC-NOW 2009: 166-179 - [c69]Jacek Cichon, Jaroslaw Grzaslewicz, Miroslaw Kutylowski:
Key Levels and Securing Key Predistribution against Node Captures. ALGOSENSORS 2009: 64-75 - [c68]Marek Klonowski, Miroslaw Kutylowski, Jan Zatopianski:
Energy Efficient Alert in Single-Hop Networks of Extremely Weak Devices. ALGOSENSORS 2009: 139-150 - [c67]Nikita Borisov, Marek Klonowski, Miroslaw Kutylowski, Anna Lauks-Dutka:
Attacking and Repairing the Improved ModOnions Protocol. ICISC 2009: 258-273 - [e4]Miroslaw Kutylowski, Witold Charatonik, Maciej Gebala:
Fundamentals of Computation Theory, 17th International Symposium, FCT 2009, Wroclaw, Poland, September 2-4, 2009. Proceedings. Lecture Notes in Computer Science 5699, Springer 2009, ISBN 978-3-642-03408-4 [contents] - [i8]Marek Klonowski, Michal Koza, Miroslaw Kutylowski:
Security Challenges for Wireless Sensor Networks. ERCIM News 2009(76) (2009) - 2008
- [j26]Lukasz Krzywiecki, Miroslaw Kutylowski, Maciej Nikodem:
General anonymous key broadcasting via Lagrangian interpolation. IET Information Security 2(3): 79-84 (2008) - [j25]Jacek Cichon, Miroslaw Kutylowski, Marcin Zawada:
Adaptive initialization algorithm for ad hoc radio networks with carrier sensing. Theor. Comput. Sci. 402(1): 16-28 (2008) - [c66]Jacek Cichon, Marek Klonowski, Miroslaw Kutylowski:
Distributed Verification of Mixing - Local Forking Proofs Model. ACISP 2008: 128-140 - [c65]Marek Klonowski, Miroslaw Kutylowski, Anna Lauks:
Repelling Detour Attack Against Onions with Re-encryption. ACNS 2008: 296-308 - [c64]Marcin Gomulkiewicz, Miroslaw Kutylowski, Pawel Wlaz:
Random Fault Attack against Shrinking Generator. ALGOSENSORS 2008: 87-99 - [c63]Zbigniew Golebiewski, Miroslaw Kutylowski, Tomasz Luczak, Filip Zagórski:
Self-stabilizing population of mobile agents. IPDPS 2008: 1-8 - [c62]Marek Klonowski, Lukasz Krzywiecki, Miroslaw Kutylowski, Anna Lauks:
Step-Out Ring Signatures. MFCS 2008: 431-442 - [c61]Jacek Cichon, Miroslaw Kutylowski, Marcin Zawada:
Power of Discrete Nonuniformity - Optimizing Access to Shared Radio Channel in Ad Hoc Networks. MSN 2008: 9-15 - [c60]Jacek Cichon, Marek Klonowski, Miroslaw Kutylowski:
Privacy Protection for RFID with Hidden Subset Identifiers. Pervasive 2008: 298-314 - [c59]Jacek Cichon, Miroslaw Kutylowski, Bogdan Weglorz:
Short Ballot Assumption and Threeballot Voting Protocol. SOFSEM 2008: 585-598 - [c58]Marek Klonowski, Przemyslaw Kubiak, Miroslaw Kutylowski:
Practical Deniable Encryption. SOFSEM 2008: 599-609 - [e3]Miroslaw Kutylowski, Jacek Cichon, Przemyslaw Kubiak:
Algorithmic Aspects of Wireless Sensor Networks, Third International Workshop, ALGOSENSORS 2007, Wroclaw, Poland, July 14, 2007, Revised Selected Papers. Lecture Notes in Computer Science 4837, Springer 2008, ISBN 978-3-540-77870-7 [contents] - [e2]David Chaum, Miroslaw Kutylowski, Ronald L. Rivest, Peter Y. A. Ryan:
Frontiers of Electronic Voting, 29.07. - 03.08.2007. Dagstuhl Seminar Proceedings 07311, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2008 [contents] - [i7]Miroslaw Kutylowski, Filip Zagórski:
Scratch, Click & Vote: E2E voting over the Internet. IACR Cryptology ePrint Archive 2008: 314 (2008) - 2007
- [j24]Miroslaw Kutylowski:
Tagung "Frontiers of E-Voting", 29. Juli bis 3. August auf Schloss Dagstuhl. Datenschutz und Datensicherheit 31(9): 718 (2007) - [c57]Miroslaw Kutylowski:
Algorithmic Challenges for Sensor Networks - Foreword to ALGOSENSORS 2007. ALGOSENSORS 2007: 1-5 - [c56]Marek Klonowski, Miroslaw Kutylowski, Michal Ren, Katarzyna Rybarczyk:
Forward-Secure Key Evolution in Wireless Sensor Networks. CANS 2007: 102-120 - [c55]Przemyslaw Kubiak, Miroslaw Kutylowski, Filip Zagórski:
Kleptographic attacks on a cascade of mix servers. AsiaCCS 2007: 57-62 - [c54]
- [c53]Miroslaw Kutylowski, Filip Zagórski:
Verifiable Internet Voting Solving Secure Platform Problem. IWSEC 2007: 199-213 - [c52]Jacek Cichon, Marek Klonowski, Miroslaw Kutylowski:
Privacy Protection in Dynamic Systems Based on RFID Tags. PerCom Workshops 2007: 235-240 - [i6]David Chaum, Miroslaw Kutylowski, Ronald L. Rivest, Peter Y. A. Ryan:
07311 Executive Summary -- Frontiers of Electronic Voting. Frontiers of Electronic Voting 2007 - [i5]David Chaum, Miroslaw Kutylowski, Ronald L. Rivest, Peter Y. A. Ryan:
07311 Abstracts Collection -- Frontiers of Electronic Voting. Frontiers of Electronic Voting 2007 - [i4]Marek Klonowski, Miroslaw Kutylowski, Michal Ren, Katarzyna Rybarczyk:
Forward-secure Key Evolution in Wireless Sensor Networks. IACR Cryptology ePrint Archive 2007: 237 (2007) - 2006
- [c51]Jacek Cichon, Miroslaw Kutylowski, Marcin Zawada:
Initialization for Ad Hoc Radio Networks with Carrier Sensing and Collision Detection. ADHOC-NOW 2006: 308-320 - [c50]Jacek Cichon, Miroslaw Kutylowski, Marcin Zawada:
Adaptive Initialization Algorithm for Ad Hoc Radio Networks with Carrier Sensing. ALGOSENSORS 2006: 35-46 - [c49]Zbigniew Golebiewski, Miroslaw Kutylowski, Filip Zagórski:
Stealing Secrets with SSL/TLS and SSH - Kleptographic Attacks. CANS 2006: 191-202 - [c48]Lukasz Krzywiecki, Przemyslaw Kubiak, Miroslaw Kutylowski:
A Revocation Scheme Preserving Privacy. Inscrypt 2006: 130-143 - [c47]Marcin Gogolewski, Marek Klonowski, Przemyslaw Kubiak, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski:
Kleptographic Attacks on E-Voting Schemes. ETRICS 2006: 494-508 - [c46]Piotr Borzecki, Jedrzej Kabarowski, Przemyslaw Kubiak, Miroslaw Kutylowski, Filip Zagórski:
Kleptographic Weaknesses in Benaloh-Tuinstra Protocol. ICSNC 2006: 26 - [c45]Jedrzej Kabarowski, Miroslaw Kutylowski, Wojciech Rutkowski:
Adversary Immune Size Approximation of Single-Hop Radio Networks. TAMC 2006: 148-158 - [c44]Marek Klonowski, Przemyslaw Kubiak, Miroslaw Kutylowski, Anna Lauks:
How to Protect a Signature from Being Shown to a Third Party. TrustBus 2006: 192-202 - [c43]Marcin Gomulkiewicz, Miroslaw Kutylowski, Pawel Wlaz:
Fault Cryptanalysis and the Shrinking Generator. WEA 2006: 61-72 - [i3]Marcin Gomulkiewicz, Miroslaw Kutylowski, Pawel Wlaz:
Fault Jumping Attacks against Shrinking Generator. Complexity of Boolean Functions 2006 - 2005
- [j23]Tomasz Jurdzinski, Miroslaw Kutylowski, Jan Zatopianski:
Efficient simulation of synchronous systems by multi-speed systems. ITA 39(2): 403-419 (2005) - [c42]Marcin Gogolewski, Marek Klonowski, Miroslaw Kutylowski:
Local View Attack on Anonymous Communication. ESORICS 2005: 475-488 - [c41]Ryszard Grzaslewicz, Jaroslaw Kutylowski, Miroslaw Kutylowski, Wojciech Pietkiewicz:
Robust Undetectable Interference Watermarks. ICCSA (2) 2005: 517-526 - [c40]Marek Klonowski, Miroslaw Kutylowski:
Provable Anonymity for Networks of Mixes. Information Hiding 2005: 26-38 - [c39]Marek Klonowski, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski:
A Practical Voting Scheme with Receipts. ISC 2005: 490-497 - [c38]Marek Klonowski, Miroslaw Kutylowski, Bartlomiej Rózanski:
Hiding Data Sources in P2P Networks. IWAP 2005: 225-239 - [c37]Jacek Cichon, Lukasz Krzywiecki, Miroslaw Kutylowski, Pawel Wlaz:
Anonymous Distribution of Encryption Keys in Cellular Broadcast Systems. MADNES 2005: 96-109 - [c36]Marek Klonowski, Miroslaw Kutylowski, Filip Zagórski:
Anonymous Communication with On-line and Off-line Onion Encoding. SOFSEM 2005: 229-238 - [c35]Marek Klonowski, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski:
Conditional Digital Signatures. TrustBus 2005: 206-215 - [c34]Marcin Gomulkiewicz, Miroslaw Kutylowski, Heinrich Theodor Vierhaus, Pawel Wlaz:
Synchronization Fault Cryptanalysis for Breaking A5/1. WEA 2005: 415-427 - 2004
- [c33]Jan Iwanik, Marek Klonowski, Miroslaw Kutylowski:
Duo-Onions and Hydra-Onions - Failure and Adversary Resistant Onion Protocols. Communications and Multimedia Security 2004: 1-15 - [c32]