Papers
2020
- Przemyslaw Kubiak, Miroslaw Kutylowski Preventing a Fork in a Blockchain - David Fighting Goliath. TrustCom 2020: pages 1044-1051
2015
- Lucjan Hanzlik, Kamil Kluczniak, Mirosław Kutyłowski, Przemysław Kubiak Anonymous Evaluation System. NSS'2015
- Lucjan Hanzlik, Przemysław Kubiak, Mirosław Kutyłowski Tracing Attacks on U-Prove with Revocation Mechanism. ACM ASIACCS 2015
(full version of the paper available as Cryptology ePrint Archive Report 2015/108)
2014
- Lucjan Hanzlik, Przemysław Kubiak, Mirosław Kutyłowski Stand-by Attacks on E-ID Password Authentication. INSCRYPT 2014, to appear in LNCS --- (Springer-Verlag, 2015)
- Mirosław Kutyłowski, Lucjan Hanzlik, Kamil Kluczniak, Przemysław Kubiak, Łukasz Krzywiecki: Forbidden City Model - Towards a Practice Relevant Framework for Designing Cryptographic Protocols. ISPEC 2014, volume 8434 of Lecture Notes in Science, Springer (2014), pages 42-59
- Łukasz Krzywiecki, Przemysław Kubiak, Mirosław Kutyłowski: Probabilistic Admissible Encoding on Elliptic Curves - Towards PACE with Generalized Integrated Mapping. SOFSEM 2014, volume 8327 of Lecture Notes in Computer Science, Springer (2014), pages 395-406
2013
- Mirosław Kutyłowski, Przemysław Kubiak: Lightweight Digital Signature with Secretly Embedded Warning. Control and Cybernetics. vol. 42 (2013) No. 4
- Przemysław Kubiak, Mirosław Kutyłowski: Supervised Usage of Signature Creation Devices. INSCRYPT 2013, to appear in Lecture Notes in Computer Science, Springer
- Przemysław Kubiak, Mirosław Kutyłowski, Wojciech Wodo: Protection of data groups from personal identity documents. Infocommunications Journal (Special Issue on Cryptology) V(3) (2013) 2-7.
- Błażej Brzeźniak, Lucjan Hanzlik, Przemysław Kubiak, Mirosław Kutyłowski: Attack against Ibrahim's Distributed Key Generation for RSA. International Journal of Network , Vol. 15, No. 1, 2013, pages 237-240
2012
- Przemysław Błaśkiewicz, Przemysław Kubiak, Mirosław Kutyłowski: How to Make Operating Systems for Smart Cards Open. Bulgarian Cryptography Days 2012 Proceedings, ISBN 978-954-2946-22-9, pages 129-140
- Łukasz Krzywiecki, Przemysław Kubiak, Mirosław Kutyłowski, Michał Tabor, Daniel Wachnik: Lightweight Certificates - Towards a Practical Model for PKI. Business Information Systems (Workshops), Lecture Notes in Business Information Processing, Volume 117, Springer (2012), pages 296-307
- Łukasz Krzywiecki, Przemysław Kubiak, Mirosław Kutyłowski: Stamp and Extend - Instant But Undeniable Timestamping Based on Lazy Trees. INTRUST, volume 7711 of Lecture Notes in Computer Science, Springer (2012), pages 5–24
(see also Cryptology ePrint Archive Report 2013/730)
- Lucjan Hanzlik, Kamil Kluczniak, Przemysław Kubiak, Mirosław Kutyłowski: Restricted Identification without Group Keys. 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, ISBN: 978-1-4673-2172-3, pages 1194-1199
2011
- Mirosław Kutyłowski, Przemysław Błaśkiewicz, Łukasz Krzywiecki, Przemysław Kubiak, Wiesław Paluszyński, Michał Tabor: Technical and Legal Meaning of "Sole Control" - Towards Verifiability in Signing Systems. Business Information Systems (Workshops) 2011, volume 97 of Lecture Notes in Business Information Processing, Springer, pages 270-281
- Mirosław Kutyłowski, Łukasz Krzywiecki, Przemysław Kubiak, Michał Koza: Restricted Identification Scheme and Diffie-Hellman Linking Problem. INTRUST 2011, volume 7222 of Lecture Notes in Computer Science, Springer (2012), pages 221-238
- Mirosław Kutyłowski, Przemysław Kubiak: Polish Concepts for Securing E-Government Document Flow. ISSE 2010. Securing Electronic Business Processes, Vieweg+Teubner (2011), ISBN 978-3-8348-1438-8, pages 399-407
2010
- Przemysław Kubiak, Mirosław Kutyłowski, Jun Shao: How to Construct State Registries-Matching Undeniability with Public Security. ACIIDS (1) 2010: 64-73
- Przemysław Kubiak, Mirosław Kutyłowski, Anna Lauks-Dutka, Michał Tabor: Mediated Signatures - Towards Undeniability of Digital Data in Technical and Legal Framework. Business Information Systems (Workshops) 2010: 298-309
- Przemysław Błaśkiewicz, Przemysław Kubiak, Mirosław Kutyłowski: Digital Signatures for e-Government - A Long-Term Security Architecture. e-Forensics 2010: 256-270
- Przemysław Błaśkiewicz, Przemysław Kubiak, Mirosław Kutyłowski: Digital Signatures for e-Government - A Long-Term Security Architecture (journal version). China Communications, vol. 7.6, 2010, pp. 64-70
- Przemysław Błaśkiewicz, Przemysław Kubiak, Mirosław Kutyłowski: Two-Head Dragon Protocol: Preventing Cloning of Signature Keys - Work in Progress. INTRUST 2010: 173-188
2008
- Marcin Gogolewski, Marcin Gomułkiewicz, Jarosław Grząślewicz, Przemysław Kubiak, Mirosław Kutyłowski, Anna Lauks: Kleptographic Attacks on E-Auction Schemes. TATRACRYPT '07, Tatra Mountains Mathematical Publications 41 (2008), 47–64
- Marek Klonowski, Przemysław Kubiak, Mirosław Kutyłowski: Practical Deniable Encryption. SOFSEM 2008: 599-609
2007
- Przemysław Kubiak, Mirosław Kutyłowski, Filip Zagórski: Kleptographic attacks on a cascade of mix servers. ASIACCS 2007: 57-62
2006
- Łukasz Krzywiecki, Przemysław Kubiak, Mirosław Kutyłowski: A Revocation Scheme Preserving Privacy. Inscrypt 2006: 130-143
- Piotr Borzęcki, Jędrzej Kabarowski, Przemysław Kubiak, Mirosław Kutyłowski, Filip Zagórski: Kleptographic Weaknesses in Benaloh-Tuinstra Protocol.
International Conference on Systems and Networks Communications, 2006. ICSNC '06. IEEE: 26
- Marek Klonowski, Przemysław Kubiak, Mirosław Kutyłowski, Anna Lauks: How to Protect a Signature from Being Shown to a Third Party.
3rd International Conference on Trust, Privacy in Digital Business 2006: 192-202
- Marcin Gogolewski, Marek Klonowski, PrzemysŁaw Kubiak, Mirosław Kutyłowski, Anna Lauks, Filip Zagórski: Kleptographic Attacks on E-Voting Schemes. ETRICS 2006: 494-508
2001
- Przemysław Kubiak: Extending the binary gcd algorithms. Public-Key Cryptography and Number Theory. Proceedings of the International Conference organized by the Stefan Banach International Mathematical Center Warsaw, Poland, September 11-15, 2000. Berlin, Boston: De Gruyter, 2001. pp. 113-136.
Other:
2006