Noisy leakage revisited S Dziembowski, S Faust, M Skorski Annual International Conference on the Theory and Applications of …, 2015 | 24 | 2015 |
Renyi entropy estimation revisited M Obremski, M Skorski | 13 | 2017 |
Metric pseudoentropy: Characterizations, transformations and applications M Skorski International Conference on Information Theoretic Security, 105-122, 2015 | 12 | 2015 |
Shannon entropy versus renyi entropy from a cryptographic viewpoint M Skórski IMA International Conference on Cryptography and Coding, 257-274, 2015 | 11 | 2015 |
Condensed unpredictability M Skorski, A Golovnev, K Pietrzak International Colloquium on Automata, Languages, and Programming, 1046-1057, 2015 | 9 | 2015 |
Optimal amplification of noisy leakages S Dziembowski, S Faust, M Skórski Theory of Cryptography Conference, 291-318, 2016 | 6 | 2016 |
Privacy and secrecy with multiple measurements of physical and biometric identifiers O Günlü, G Kramer, M Skórski 2015 IEEE Conference on Communications and Network Security (CNS), 89-94, 2015 | 5 | 2015 |
The chain rule for HILL pseudoentropy, revisited K Pietrzak, M Skórski International Conference on Cryptology and Information Security in Latin …, 2015 | 5 | 2015 |
Modulus computational entropy M Skorski International Conference on Information Theoretic Security, 179-199, 2013 | 5 | 2013 |
Simulating auxiliary inputs, revisited M Skorski Theory of Cryptography Conference, 159-179, 2016 | 3 | 2016 |
A Subgradient Algorithm For Computational Distances and Applications to Cryptography. M Skórski IACR Cryptol. ePrint Arch. 2016, 158, 2016 | 3 | 2016 |
True random number generators secure in a changing environment: Improved security bounds M Skorski International Conference on Current Trends in Theory and Practice of …, 2015 | 3 | 2015 |
Chain Rules for Hessian and Higher Derivatives Made Easy by Tensor Calculus M Skorski arXiv preprint arXiv:1911.13292, 2019 | 2 | 2019 |
Kernel Density Estimation Bias under Minimal Assumptions M Skorski arXiv preprint arXiv:1901.00331, 2019 | 2 | 2019 |
Analytic formulas for renyi entropy of hidden markov models J Breitner, M Skorski arXiv preprint arXiv:1709.09699, 2017 | 2 | 2017 |
A cryptographic view of regularity lemmas: Simpler unified proofs and refined bounds M Skórski International Conference on Theory and Applications of Models of Computation …, 2017 | 2 | 2017 |
Pseudoentropy: Lower-bounds for Chain rules and Transformations K Pietrzak, M Skórski Theory of Cryptography Conference, 183-203, 2016 | 2 | 2016 |
How to smooth entropy? M Skorski International Conference on Current Trends in Theory and Practice of …, 2016 | 2 | 2016 |
Efficiently simulating high min-entropy sources in the presence of side information M Skórski International Conference on Cryptology in India, 312-325, 2015 | 2 | 2015 |
How much randomness can be extracted from memoryless Shannon entropy sources? M Skorski International Workshop on Information Security Applications, 75-86, 2015 | 2 | 2015 |