Noisy leakage revisited S Dziembowski, S Faust, M Skorski Advances in Cryptology-EUROCRYPT 2015: 34th Annual International Conference …, 2015 | 33 | 2015 |
Renyi entropy estimation revisited M Obremski, M Skorski Approximation, Randomization, and Combinatorial Optimization. Algorithms and …, 2017 | 20 | 2017 |
Optimal amplification of noisy leakages S Dziembowski, S Faust, M Skórski Theory of Cryptography: 13th International Conference, TCC 2016-A, Tel Aviv …, 2016 | 15 | 2016 |
Shannon entropy versus renyi entropy from a cryptographic viewpoint M Skórski Cryptography and Coding: 15th IMA International Conference, IMACC 2015 …, 2015 | 15 | 2015 |
Metric pseudoentropy: Characterizations, transformations and applications M Skorski Information Theoretic Security: 8th International Conference, ICITS 2015 …, 2015 | 12 | 2015 |
Privacy and secrecy with multiple measurements of physical and biometric identifiers O Günlü, G Kramer, M Skórski 2015 IEEE Conference on Communications and Network Security (CNS), 89-94, 2015 | 10 | 2015 |
Condensed unpredictability M Skorski, A Golovnev, K Pietrzak Automata, Languages, and Programming: 42nd International Colloquium, ICALP …, 2015 | 9 | 2015 |
Revisiting weight initialization of deep neural networks M Skorski, A Temperoni, M Theobald Asian Conference on Machine Learning, 1192-1207, 2021 | 8 | 2021 |
Evaluation and monitoring of free running oscillators serving as source of randomness EN Allini, M Skórski, O Petura, F Bernard, M Laban, V Fischer IACR Transactions on Cryptographic Hardware and Embedded Systems, 214-242, 2018 | 7 | 2018 |
Handy formulas for binomial moments M Skorski arXiv preprint arXiv:2012.06270, 2020 | 6 | 2020 |
Chain rules for hessian and higher derivatives made easy by tensor calculus M Skorski arXiv preprint arXiv:1911.13292, 2019 | 5 | 2019 |
The chain rule for HILL pseudoentropy, revisited K Pietrzak, M Skórski Progress in Cryptology--LATINCRYPT 2015: 4th International Conference on …, 2015 | 5 | 2015 |
True random number generators secure in a changing environment: Improved security bounds M Skorski SOFSEM 2015: Theory and Practice of Computer Science: 41st International …, 2015 | 5 | 2015 |
Modulus computational entropy M Skorski Information Theoretic Security: 7th International Conference, ICITS 2013 …, 2014 | 5 | 2014 |
A subgradient algorithm for computational distances and applications to cryptography M Skórski Cryptology ePrint Archive, 2016 | 4 | 2016 |
Bernstein-type bounds for beta distribution M Skorski arXiv preprint arXiv:2101.02094, 2021 | 3 | 2021 |
Analytic formulas for renyi entropy of hidden markov models J Breitner, M Skorski arXiv preprint arXiv:1709.09699, 2017 | 3 | 2017 |
Key derivation for squared-friendly applications: Lower bounds M Skorski Cryptology ePrint Archive, 2016 | 3 | 2016 |
Simulating auxiliary inputs, revisited M Skorski Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing …, 2016 | 3 | 2016 |
How much randomness can be extracted from memoryless Shannon entropy sources? M Skorski Information Security Applications: 16th International Workshop, WISA 2015 …, 2016 | 3 | 2016 |