ETH Zürich » Computer Science » Theory » Cryptography

Peter Gaži's Publications

Grégory Demay, Peter Gaži, Ueli Maurer, and Björn Tackmann
Optimality of Non-Adaptive Strategies: The Case of Parallel Games
to appear in 2014 IEEE International Symposium on Information Theory Proceedings (ISIT), Jul 2014.
Available files: [ PDF ] [ Abstract ] [ BibTeX ]
Peter Gaži
Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers
Advances in Cryptology — CRYPTO 2013, Lecture Notes in Computer Science, Springer-Verlag, vol. 8042, pp. 551–570, Aug 2013, to appear.
Available files: [ PDF ] [ Abstract ] [ BibTeX ]
Grégory Demay, Peter Gaži, Martin Hirt, and Ueli Maurer
Resource-Restricted Indifferentiability
Advances in Cryptology — EUROCRYPT 2013, Lecture Notes in Computer Science, Springer-Verlag, vol. 7881, pp. 665–684, May 2013, this is the full version.
Available files: [ PDF ] [ Abstract ] [ BibTeX ]
Peter Gaži and Stefano Tessaro
Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading
Advances in Cryptology — EUROCRYPT 2012, Lecture Notes in Computer Science, Springer-Verlag, vol. 7237, pp. 63–80, Apr 2012, this is the full version.
Available files: [ PDF ] [ Abstract ] [ BibTeX ]
Peter Gaži and Ueli Maurer
Free-Start Distinguishing: Combining Two Types of Indistinguishability Amplification
The 4th International Conference on Information Theoretic Security - ICITS 2009, Lecture Notes in Computer Science, Springer-Verlag, vol. 5973, pp. 28–44, 2010.
Available files: [ PDF ] [ Abstract ] [ BibTeX ]
Peter Gaži and Ueli Maurer
Cascade Encryption Revisited
Advances in Cryptology — ASIACRYPT 2009, Lecture Notes in Computer Science, Springer-Verlag, vol. 5912, pp. 37–51, Dec 2009.
Available files: [ PDF ] [ Abstract ] [ BibTeX ]

© IACR | Springer | ACM | IEEE