Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Maciej Skórski - MaRDI portal

Maciej Skórski

From MaRDI portal
Person:2056740

Available identifiers

zbMath Open skorski.maciejMaRDI QIDQ2056740

List of research outcomes

PublicationDate of PublicationType
The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free2024-03-14Paper
Bernstein-type bounds for beta distribution2023-06-22Paper
Hypercontractivity via tensor calculus2023-03-30Paper
Tight Chernoff-Like Bounds Under Limited Independence2022-09-04Paper
Concentration of the collision estimator2022-05-20Paper
The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free2021-12-08Paper
https://portal.mardi4nfdi.de/entity/Q50026232021-07-28Paper
Random Embeddings with Optimal Accuracy2020-12-31Paper
Bayesian root cause analysis by separable likelihoods2020-10-22Paper
Concentration Bounds for the Collision Estimator2020-06-12Paper
Non-Uniform Attacks Against Pseudoentropy2020-05-27Paper
Revisiting Concentration of Missing Mass2020-05-19Paper
Missing Mass Concentration for Markov Chains2020-01-10Paper
https://portal.mardi4nfdi.de/entity/Q52401072019-10-24Paper
https://portal.mardi4nfdi.de/entity/Q46366582018-04-19Paper
A Cryptographic View of Regularity Lemmas: Simpler Unified Proofs and Refined Bounds2017-05-19Paper
On the Complexity of Breaking Pseudoentropy2017-05-19Paper
Evaluating Entropy for True Random Number Generators: Efficient, Robust and Provably Secure2017-05-05Paper
A Better Chain Rule for HILL Pseudoentropy - Beyond Bounded Leakage2017-01-06Paper
Simulating Auxiliary Inputs, Revisited2016-12-21Paper
Pseudoentropy: Lower-Bounds for Chain Rules and Transformations2016-12-21Paper
Time-Advantage Ratios Under Simple Transformations: Applications in Cryptography2016-04-26Paper
Optimal Amplification of Noisy Leakages2016-04-08Paper
How to Smooth Entropy?2016-03-10Paper
On Provable Security of wPRF-Based Leakage-Resilient Stream Ciphers2016-01-27Paper
Shannon Entropy Versus Renyi Entropy from a Cryptographic Viewpoint2016-01-12Paper
Efficiently Simulating High Min-entropy Sources in the Presence of Side Information2016-01-12Paper
A New Approximate Min-Max Theorem with Applications in Cryptography2016-01-11Paper
Condensed Unpredictability2015-10-27Paper
Modulus Computational Entropy2015-09-30Paper
Noisy Leakage Revisited2015-09-30Paper
Metric Pseudoentropy: Characterizations, Transformations and Applications2015-09-24Paper
Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications to Pseudoentropy2015-09-24Paper
The Chain Rule for HILL Pseudoentropy, Revisited2015-09-17Paper
Lower bounds on $q$-wise independence tails and applications to min-entropy condensers2015-04-09Paper
True Random Number Generators Secure in a Changing Environment: Improved Security Bounds2015-02-20Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Maciej Skórski