Profil

SKROBOT Marjan

University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > APSIA

Main Referenced Co-authors
RYAN, Peter Y A  (4)
IOVINO, Vincenzo  (3)
LANCRENON, Jean  (3)
LOPEZ BECERRA, Jose Miguel  (3)
DELERUE ARRIAGA, Afonso  (2)
Main Referenced Keywords
Authentication (3); PAKE (3); Password-authenticated key exchange (3); Composability (2); Computer Networks and Communications (2);
Main Referenced Unit & Research Centers
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > Applied Security and Information Assurance Group (APSIA) (4)
Interdisciplinary Centre for Security, Reliability and Trust (2)
Interdisciplinary Centre for Security, Reliability and Trust (SNT) (1)
Main Referenced Disciplines
Computer science (12)

Publications (total 12)

The most downloaded
1641 downloads
SKROBOT, M., & LANCRENON, J. (2015). On the Provable Security of the Dragonfly Protocol. In J. Lopez & C. J. Mitchell (Eds.), Information Security - 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015 (pp. 244--261). Springer. doi:10.1007/978-3-319-23318-5_14 https://hdl.handle.net/10993/24767

The most cited

10 citations (OpenAlex)

SKROBOT, M., & LANCRENON, J. (2015). On the Provable Security of the Dragonfly Protocol. In J. Lopez & C. J. Mitchell (Eds.), Information Security - 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015 (pp. 244--261). Springer. doi:10.1007/978-3-319-23318-5_14 https://hdl.handle.net/10993/24767

DELERUE ARRIAGA, A., RYAN, P. Y. A., & SKROBOT, M. (2024). SweetPAKE: Key exchange with decoy passwords. In SweetPAKE: Key exchange with decoy passwords (pp. 1017–1033). United States: Association for Computing Machinery, Inc. doi:10.1145/3634737.3645009
Peer reviewed

Arenas, M. P., LENZINI, G., RAKEEI, M., RYAN, P. Y. A., SKROBOT, M., & ZHEKOVA, M. (2024). Verifying Artifact Authenticity with Unclonable Optical Tags. In S. D. C. Di Vimercati (Ed.), Proceedings of the 21st International Conference on Security and Cryptography, SECRYPT 2024. Science and Technology Publications, Lda. doi:10.5220/0012746500003767
Peer reviewed

DELERUE ARRIAGA, A., SALA, P., & SKROBOT, M. (2023). Wireless-Channel Key Exchange. In M. Rosulek (Ed.), Wireless-Channel Key Exchange (pp. 672--699). Cham, Switzerland: Springer International Publishing. doi:10.1007/978-3-031-30872-7_26
Peer reviewed

JAMROGA, W., MESTEL, D., ROENNE, P., RYAN, P. Y. A., & SKROBOT, M. (2021). A Survey of Requirements for COVID-19 Mitigation Strategies. Bulletin of The Polish Academy of Sciences: Technical Science, 69 (4), 137724. doi:10.24425/bpasts.2021.137724
Peer reviewed

JAMROGA, W., MESTEL, D., ROENNE, P., RYAN, P. Y. A., & SKROBOT, M. (2020). A Survey of Requirements for COVID-19 Mitigation Strategies. Part I: Newspaper Clips. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/46104.

SKROBOT, M., & LANCRENON, J. (2018). On Composability of Game-based Password Authenticated Key Exchange. In M. SKROBOT & J. Lancrenon, 2018 IEEE European Symposium on Security and Privacy (EuroS&P) (pp. 443-457). London, United Kingdom: IEEE. doi:10.1109/EuroSP.2018.00038
Peer reviewed

LOPEZ BECERRA, J. M., IOVINO, V., OSTREV, D., SALA, P., & SKROBOT, M. (2017). Tightly-Secure PAK(E). In Cryptology and Network Security. Springer.
Peer reviewed

LOPEZ BECERRA, J. M., IOVINO, V., & SKROBOT, M. (09 March 2017). On the Relation Between SIM and IND-RoR Security Models for PAKEs [Paper presentation]. Grande Region Security and Reliability Day 2017, Luxembourg Ville, Luxembourg.

SKROBOT, M. (2017). On Composability and Security of Game-based Password-Authenticated Key Exchange [Doctoral thesis, Unilu - University of Luxembourg]. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/30745

LOPEZ BECERRA, J. M., IOVINO, V., OSTREV, D., & SKROBOT, M. (2017). On the Relation Between SIM and IND-RoR Security Models for PAKEs. In Proceedings of the International Conference on Security and Cryptography (pp. 12). SCITEPRESS.
Peer reviewed

SKROBOT, M., LANCRENON, J., & TANG, Q. (2016). Two More Efficient Variants of the J-PAKE Protocol. In ACNS 2016. doi:10.1007/978-3-319-39555-5_4
Peer reviewed

SKROBOT, M., & LANCRENON, J. (2015). On the Provable Security of the Dragonfly Protocol. In J. Lopez & C. J. Mitchell (Eds.), Information Security - 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015 (pp. 244--261). Springer. doi:10.1007/978-3-319-23318-5_14
Peer reviewed

Contact ORBilu