Obserwuj
Maciej Skórski
Maciej Skórski
University of Luxembourg
Zweryfikowany adres z mimuw.edu.pl - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
Noisy leakage revisited
S Dziembowski, S Faust, M Skorski
Advances in Cryptology-EUROCRYPT 2015: 34th Annual International Conference …, 2015
332015
Renyi entropy estimation revisited
M Obremski, M Skorski
Approximation, Randomization, and Combinatorial Optimization. Algorithms and …, 2017
202017
Optimal amplification of noisy leakages
S Dziembowski, S Faust, M Skórski
Theory of Cryptography: 13th International Conference, TCC 2016-A, Tel Aviv …, 2016
152016
Shannon entropy versus renyi entropy from a cryptographic viewpoint
M Skórski
Cryptography and Coding: 15th IMA International Conference, IMACC 2015 …, 2015
152015
Metric pseudoentropy: Characterizations, transformations and applications
M Skorski
Information Theoretic Security: 8th International Conference, ICITS 2015 …, 2015
122015
Privacy and secrecy with multiple measurements of physical and biometric identifiers
O Günlü, G Kramer, M Skórski
2015 IEEE Conference on Communications and Network Security (CNS), 89-94, 2015
102015
Condensed unpredictability
M Skorski, A Golovnev, K Pietrzak
Automata, Languages, and Programming: 42nd International Colloquium, ICALP …, 2015
92015
Revisiting weight initialization of deep neural networks
M Skorski, A Temperoni, M Theobald
Asian Conference on Machine Learning, 1192-1207, 2021
82021
Evaluation and monitoring of free running oscillators serving as source of randomness
EN Allini, M Skórski, O Petura, F Bernard, M Laban, V Fischer
IACR Transactions on Cryptographic Hardware and Embedded Systems, 214-242, 2018
72018
Handy formulas for binomial moments
M Skorski
arXiv preprint arXiv:2012.06270, 2020
62020
Chain rules for hessian and higher derivatives made easy by tensor calculus
M Skorski
arXiv preprint arXiv:1911.13292, 2019
52019
The chain rule for HILL pseudoentropy, revisited
K Pietrzak, M Skórski
Progress in Cryptology--LATINCRYPT 2015: 4th International Conference on …, 2015
52015
True random number generators secure in a changing environment: Improved security bounds
M Skorski
SOFSEM 2015: Theory and Practice of Computer Science: 41st International …, 2015
52015
Modulus computational entropy
M Skorski
Information Theoretic Security: 7th International Conference, ICITS 2013 …, 2014
52014
A subgradient algorithm for computational distances and applications to cryptography
M Skórski
Cryptology ePrint Archive, 2016
42016
Bernstein-type bounds for beta distribution
M Skorski
arXiv preprint arXiv:2101.02094, 2021
32021
Analytic formulas for renyi entropy of hidden markov models
J Breitner, M Skorski
arXiv preprint arXiv:1709.09699, 2017
32017
Key derivation for squared-friendly applications: Lower bounds
M Skorski
Cryptology ePrint Archive, 2016
32016
Simulating auxiliary inputs, revisited
M Skorski
Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing …, 2016
32016
How much randomness can be extracted from memoryless Shannon entropy sources?
M Skorski
Information Security Applications: 16th International Workshop, WISA 2015 …, 2016
32016
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20