![]() ![]() | DELERUE ARRIAGA, A., Barbosa, M., Jarecki, S., & SKROBOT, M. (2024). C'est Très CHIC: A Compact Password-Authenticated Key Exchange from Lattice-Based KEM. In Lecture Notes in Computer Science. Springer Nature Singapore. doi:10.1007/978-981-96-0935-2_1 ![]() |
![]() ![]() | DELERUE ARRIAGA, A., RYAN, P. Y. A., & SKROBOT, M. (2024). SweetPAKE: Key exchange with decoy passwords. In SweetPAKE: Key exchange with decoy passwords (pp. 1017–1033). United States: Association for Computing Machinery, Inc. doi:10.1145/3634737.3645009 ![]() |
![]() ![]() | Arenas, M. P., LENZINI, G., RAKEEI, M., RYAN, P. Y. A., SKROBOT, M., & ZHEKOVA, M. (2024). Verifying Artifact Authenticity with Unclonable Optical Tags. In S. D. C. Di Vimercati (Ed.), Proceedings of the 21st International Conference on Security and Cryptography, SECRYPT 2024. Science and Technology Publications, Lda. doi:10.5220/0012746500003767 ![]() |
![]() ![]() | DELERUE ARRIAGA, A., SALA, P., & SKROBOT, M. (2023). Wireless-Channel Key Exchange. In M. Rosulek (Ed.), Wireless-Channel Key Exchange (pp. 672--699). Cham, Switzerland: Springer International Publishing. doi:10.1007/978-3-031-30872-7_26 ![]() |
![]() ![]() | JAMROGA, W., MESTEL, D., ROENNE, P., RYAN, P. Y. A., & SKROBOT, M. (2021). A Survey of Requirements for COVID-19 Mitigation Strategies. Bulletin of the Polish Academy of Sciences: Technical Sciences, 69 (4), 137724. doi:10.24425/bpasts.2021.137724 ![]() |
![]() ![]() | JAMROGA, W., MESTEL, D., ROENNE, P., RYAN, P. Y. A., & SKROBOT, M. (2020). A Survey of Requirements for COVID-19 Mitigation Strategies. Part I: Newspaper Clips. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/46104. |
![]() ![]() | SKROBOT, M., & LANCRENON, J. (2018). On Composability of Game-based Password Authenticated Key Exchange. In M. SKROBOT & J. Lancrenon, 2018 IEEE European Symposium on Security and Privacy (EuroS&P) (pp. 443-457). London, United Kingdom: IEEE. doi:10.1109/EuroSP.2018.00038 ![]() |
![]() ![]() | LOPEZ BECERRA, J. M., IOVINO, V., OSTREV, D., SALA, P., & SKROBOT, M. (2017). Tightly-Secure PAK(E). In Cryptology and Network Security. Springer. ![]() |
![]() ![]() | LOPEZ BECERRA, J. M., IOVINO, V., & SKROBOT, M. (09 March 2017). On the Relation Between SIM and IND-RoR Security Models for PAKEs [Paper presentation]. Grande Region Security and Reliability Day 2017, Luxembourg Ville, Luxembourg. |
![]() ![]() | SKROBOT, M. (2017). On Composability and Security of Game-based Password-Authenticated Key Exchange [Doctoral thesis, Unilu - University of Luxembourg]. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/30745 |
![]() ![]() | LOPEZ BECERRA, J. M., IOVINO, V., OSTREV, D., & SKROBOT, M. (2017). On the Relation Between SIM and IND-RoR Security Models for PAKEs. In Proceedings of the International Conference on Security and Cryptography (pp. 12). SCITEPRESS. ![]() |
![]() ![]() | SKROBOT, M., LANCRENON, J., & TANG, Q. (2016). Two More Efficient Variants of the J-PAKE Protocol. In ACNS 2016. doi:10.1007/978-3-319-39555-5_4 ![]() |
![]() ![]() | SKROBOT, M., & LANCRENON, J. (2015). On the Provable Security of the Dragonfly Protocol. In J. Lopez & C. J. Mitchell (Eds.), Information Security - 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015 (pp. 244--261). Springer. doi:10.1007/978-3-319-23318-5_14 ![]() |