His scientific interests lie mostly in Theoretical computer science, Distributed key generation, Computer security, Encryption and Secure multi-party computation. His Theoretical computer science research incorporates themes from Protocol and Schnorr signature. His work in Distributed key generation addresses issues such as Discrete logarithm, which are connected to fields such as Secrecy, Correctness and ElGamal encryption.
Key generation is the focus of his Computer security research. His Secure multi-party computation research integrates issues from Verifiable secret sharing and Oblivious transfer. His Verifiable secret sharing research is multidisciplinary, incorporating elements of Adversary, Probabilistic encryption and Secret sharing.
His main research concerns Computer security, Public-key cryptography, Theoretical computer science, Encryption and Cryptography. Password, Authentication, Key, Random oracle and Secret sharing are among the areas of Computer security where the researcher is concentrating his efforts. Stanislaw Jarecki combines subjects such as Homomorphic encryption, Schnorr signature and Secure multi-party computation, Protocol, Commitment scheme with his study of Theoretical computer science.
As part of the same scientific family, Stanislaw Jarecki usually focuses on Encryption, concentrating on Database and intersecting with Web page and Data structure. His work deals with themes such as ElGamal encryption and Discrete logarithm, which intersect with Cryptography. His Distributed key generation research is multidisciplinary, incorporating perspectives in Digital Signature Algorithm and Secrecy.
His primary areas of investigation include Password, Computer security, Dictionary attack, Key and Key exchange. His research integrates issues of Authenticated Key Exchange, Server and Authentication in his study of Password. Stanislaw Jarecki integrates many fields, such as Computer security and Sphinx, in his works.
Stanislaw Jarecki focuses mostly in the field of Key, narrowing it down to topics relating to Protocol and, in certain cases, Orders of magnitude. The Password management study which covers Cryptography that intersects with Theoretical computer science. His Theoretical computer science research incorporates themes from Secure multi-party computation and Computation.
Stanislaw Jarecki focuses on Key management, Computer security, Computation, Protocol and Secure multi-party computation. Within one scientific family, he focuses on topics pertaining to Service under Key management, and may sometimes address concerns connected to Public-key cryptography. His Computer security study focuses mostly on Dictionary attack, Key exchange, Key and Salt.
The study incorporates disciplines such as Discrete mathematics, Theoretical computer science and Orders of magnitude in addition to Computation. His Secure multi-party computation study combines topics from a wide range of disciplines, such as Round complexity, Binary logarithm, Latency, Security parameter and Oblivious ram. His Message authentication code research is multidisciplinary, incorporating elements of Password and Server.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage
Amir Herzberg;Stanislaw Jarecki;Stanislaw Jarecki;Hugo Krawczyk;Moti Yung.
international cryptology conference (1995)
Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries
David Cash;Stanislaw Jarecki;Charanjit S. Jutla;Hugo Krawczyk.
international cryptology conference (2013)
Robust threshold DSS signatures
Rosario Gennaro;Stanisław Jarecki;Hugo Krawczyk;Tal Rabin.
theory and application of cryptographic techniques (1996)
Secure distributed key generation for discrete-log based cryptosystems
Rosario Gennaro;Stanislaw Jarecki;Hugo Krawczyk;Tal Rabin.
theory and application of cryptographic techniques (1999)
Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation
David Cash;Joseph Jaeger;Stanislaw Jarecki;Charanjit S. Jutla.
network and distributed system security symposium (2014)
Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection
Stanisław Jarecki;Xiaomin Liu.
theory of cryptography conference (2009)
Robust and Efficient Sharing of RSA Functions
Rosario Gennaro;Stanislaw Jarecki;Hugo Krawczyk;Tal Rabin.
international cryptology conference (1996)
Public Key Cryptography - PKC 2009
Stanisław Jarecki;Gene Tsudik.
Lecture Notes in Computer Science (2009)
Outsourced symmetric private information retrieval
Stanislaw Jarecki;Charanjit S. Jutla;Hugo Krawczyk;Marcel-Catalin Rosu.
computer and communications security (2013)
Adaptive Security for Threshold Cryptosystems
R. Canetti;R. Gennaro;S. Jarecki;H. Krawczyk.
international cryptology conference (1999)
Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.
If you think any of the details on this page are incorrect, let us know.
Algorand Foundation
University of California, Irvine
University of Alabama at Birmingham
Intel (United States)
French Institute for Research in Computer Science and Automation - INRIA
City College of New York
IBM (United States)
Cornell University
University of Edinburgh
Seoul National University
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: