Shlomi Dolev, Nisha Panwar, Michael Segal, Łukasz Krzywiecki Certificating vehicle public key
with vehicle attributes,
United States Patent: US 9,769,658 Β2. Date of Patent: Sep. 19, 2017.
Nisha Panwar, Shantanu Sharma, Sharad Mehrotra, Lukasz Krzywiecki, Nalini Venkatasubramanian. Smart Home Survey on Security and Privacy. CoRR 2019. DBLP link
Maciej Grzeskowiak, Lukasz Krzywiecki, Karol Niczyj. Cryptanalysis of Human Identification Protocol with Human-Computable Passwords. ISPEC 2023: 347‑364. DOI: 10.1007/978-981-99-7032-2_21
Lukasz Krzywiecki, Hannes Salin. How to Design Authenticated Key Exchange for Wearable Devices: Cryptanalysis of AKE for Health Monitoring and Countermeasures via Distinct SMs with Key Split and Refresh. CANS 2022: 225‑244. DOI: 10.1007/978-3-031-20974-1_11
Przemyslaw Blaskiewicz, Bartosz Drzazga, Lukasz Krzywiecki, Damian Stygar, Piotr Syga. RFID Batch Authentication - A Usable Scheme Providing Anonymity.
IEEE Access 10 (2022). DOI: 10.1109/ACCESS.2022.3197795
Łukasz Krzywiecki, Adam Bobowski, Patryk Kozieł, Marcin Słowik, Marta Słowik. Schnorr-like identification scheme resistant to malicious subliminal setting of ephemeral secret.
Computer Networks (2020). Elsevier. DOI: 10.1016/j.comnet.2020.107346
Łukasz Krzywiecki, Mirosław Kutyłowski, Jakub Pezda, Marcin Słowik. Anonymous Deniable Identification in Ephemeral Setup and Leakage Scenarios (Brief Announcement)
. CSCML 2019: 320‑323. DOI: 10.1007/978-3-030-20951-3_27
Mirosław Kutyłowski, Łukasz Krzywiecki, Xiaofeng Chen. Rethinking Identification Protocols from the Point of View of the GDPR
. CSCML 2019: 296‑315. DOI: 10.1007/978-3-030-20951-3_25
Lukasz Krzywiecki, Tomasz Wlislocki. Deniable Key Establishment Resistance against eKCI Attacks. Secur. Commun. Networks 2017: 7810352:1‑7810352:13. DOI: 10.1155/2017/7810352
Łukasz Krzywiecki, Marcin Słowik. Strongly Deniable Identification Schemes Immune to Prover's and Verifier's Ephemeral Leakage
. SECITC 2017: 115‑128. DOI: 10.1007/978-3-319-69284-5_9
Łukasz Krzywiecki, Marta Wszoła and Mirosław Kutyłowski. Brief Announcement: Anonymous Credentials Secure to Ephemeral Leakage. CSCML 2017: 96‑98. DOI: 10.1007/978-3-319-60080-2_7
Lukasz Krzywiecki, Miroslaw Kutylowski. Security of Okamoto Identification Scheme: a Defense against Ephemeral Key Leakage and Setup. SCC@AsiaCCS 2017: 43‑50. DOI: 10.1145/3055259.3055267
Przemysław Błaśkiewicz, Łukasz Krzywiecki, Piotr Syga. RFID Tags Batch Authentication Revisited - Communication Overhead and Server Computational Complexity Limits. ISPEC 2016: 209‑223. DOI: 10.1007/978-3-319-49151-6_15
Mirosław Kutyłowski, Łukasz Krzywiecki, Przemysław Kubiak, Michał Koza. Restricted Identification Scheme and Diffie-Hellman Linking Problem. INTRUST 2011: 221‑238. DOI: 10.1007/978-3-642-32298-3_15
ML Security-Privacy-Verifiability & Blockchain
Krzysztof Talalaj, Lukasz Krzywiecki, Marcin Zawada. Privacy for AI Generated Images: Conditional Generative Adversarial Networks Trained Over Obfuscated Data. TrustCom 2025: 3005‑3010. DOI: 10.1109/Trustcom66490.2025.00357
Mikolaj Pietrek, Lukasz Krzywiecki, Karol Niczyj, Witold Karas. Verifiable and Robust Distributed Deep Learning based on Blockchain Infrastructure. TrustCom 2025: 2044‑2049. DOI: 10.1109/Trustcom66490.2025.00237
Łukasz Krzywiecki, Gabriel Wechta. Proof of Training: Obtaining Verifiable ML Models by Delegating Training to a Blockchain Network. ICCS 2025: 207‑221. DOI: 10.1007/978-3-031-97629-2_15
Bartłomiej Dzikowski, Łukasz Krzywiecki, Ksawery Możdżynski, Karol Niczyj, Hannes Salin. Distributed Data Possession - Blockchain Based Scalability. TrustCom 2024: 2523‑2528. DOI: 10.1109/TrustCom63139.2024.00351
Karolina Bąk, Hannes Salin, Karol Niczyj, Łukasz Krzywiecki. Enhancing Tunnel Safety for Dangerous Goods Vehicles through Blockchain-Based Time-Stamping. TrustCom 2023: 1312‑1317DOI: 10.1109/TrustCom60117.2023.00179
Łukasz Krzywiecki, Tadeusz Kulczycki, Christian Emmanuel Nteranya, Andrzej Stos. Detectable Mislabeling - Can Faulty AI Models be Recognized from Incomplete Memory Traces?. TrustCom 2024: 2382‑2387DOI: 10.1109/TrustCom63139.2024.00329
Kewin Ignasiak, Wojciech Kowalczyk, Łukasz Krzywiecki, Mateusz Nasewicz, Hannes Salin, Marcin Zawada. Privacy-Preserving Real-Time Gesture Recognition using Cloud-Trained Neural Networks. TrustCom 2024: 2388‑2393DOI: 10.1109/TrustCom63139.2024.00330
Łukasz Krzywiecki, Krzysztof Szymaniak, Marcin Zawada. Privacy Preservation in Cloud-Based Distributed Learning through Data Encoding and Partitioning. TrustCom 2024: 2424‑2429DOI: 10.1109/TrustCom63139.2024.00335
Łukasz Krzywiecki, Grzegorz Zaborowski, Marcin Zawada. Too Noisy, or Not Too Noisy? A Private Training in Machine Learning. TrustCom 2023: 149‑156DOI: 10.1109/TrustCom60117.2023.00041
VANET Protocols
Hannes Salin, Lukasz Krzywiecki. A Source Hiding Protocol for Cooperative Intelligent Transportation Systems (C-ITS).
ISPEC 2023: 365‑379. DOI: 10.1007/978-981-99-7032-2_22
Łukasz Krzywiecki, Hannes Salin and Mateusz Jachniak. Certificateless Multi-Party Authenticated Encryption Mitigating Ephemeral Key Leakage.
NCA 2021: 1‑8. DOI: 10.1109/NCA53618.2021.9685848
Lukasz Krzywiecki, Hannes Salin, Nisha Panwar, Mykola Pavlov. Proxy Signcryption Scheme for Vehicle Infrastructure Immune to Randomness Leakage and Setup Attacks. NCA 2020: 1‑8. DOI: 10.1109/NCA51143.2020.9306703
Łukasz Krzywiecki, Patryk Kozieł, Nisha Panwar. Signature Based Authentication for Ephemeral Setup Attacks in Vehicular Sensor Networks.
NCA 2019: 1‑4. DOI: 10.1109/NCA.2019.8935058
Shlomi Dolev, Łukasz Krzywiecki, Nisha Panwar, Michael Segal. Dynamic Attribute Based Vehicle Authentication. Wireless Networks 23(4): 1045‑1062 (2017). DOI: 10.1007/s11276-016-1203-5
Shlomi Dolev, Łukasz Krzywiecki, Nisha Panwar, Michael Segal. Vehicle Authentication via Monolithically Certified Public Key and Attributes. Wireless Networks 22(3): 879‑896 (2016). DOI: 10.1007/s11276-015-1005-1
Shlomi Dolev, Łukasz Krzywiecki, Nisha Panwar, Michael Segal. Optical PUF for Non Forwardable Vehicle Authentication. NCA 2015: 204‑207. DOI: 10.1109/NCA.2015.25
Shlomi Dolev, Łukasz Krzywiecki, Nisha Panwar, Michael Segal. Dynamic Attribute Based Vehicle Authentication. NCA 2014: 1‑8. DOI: 10.1109/NCA.2014.5
Shlomi Dolev, Łukasz Krzywiecki, Nisha Panwar, Michael Segal. Certificating Vehicle Public Key with Vehicle Attributes A (periodical) Licensing Routine, Against Man-in-the-Middle Attacks and Beyond. ASCoMS@SAFECOMP 2013. DBLP link
Shlomi Dolev, Łukasz Krzywiecki, Nisha Panwar, Michael Segal. Vehicle to Vehicle Authentication. CoRR abs/1508.01324 (2015). DBLP link
Signatures and Signcryptions
Łukasz Krzywiecki, Witold Karaś, Adam Niezgoda, Karol Niczyj. Hierarchical Ring Signatures with Hidden Signature Functionality over Blockchain Infrastructure. TrustCom 2025: 2010‑2015. DOI: 10.1109/Trustcom66490.2025.00233
Łukasz Krzywiecki, Hannes Salin. Short Signatures via Multiple Hardware Security Modules with Key Splitting in Circuit Breaking Environments.
TrustCom 2022: 1528‑1533. DOI: 10.1109/TrustCom56396.2022.00218
Lukasz Krzywiecki, Adam Polubek, Hannes Salin. Multi-Signature Scheme Resistant to Randomness Injection Attacks - A Bitcoin Case. NCA 2021: 1‑4. DOI: 10.1109/NCA53618.2021.9685253
Łukasz Krzywiecki, Mirosław Kutyłowski. Coalition Resistant Anonymous Broadcast Encryption Scheme Based on PUF. TRUST 2011: 48‑62. DOI: 10.1007/978-3-642-21599-5_4
Łukasz Krzywiecki, Mirosław Kutyłowski, Maciej Nikodem. General anonymous key broadcasting via Lagrangian interpolation. IET Information Security 2(3): 79‑84 (2008). DOI: 10.1049/iet-ifs:20070122
Jacek Cichoń, Łukasz Krzywiecki, Mirosław Kutyłowski, Pawel Wlaź. Anonymous Distribution of Encryption Keys in Cellular Broadcast Systems. MADNES 2005: 96‑109. DOI: 10.1007/11801412_9
Cloud Computing
Bartosz Drzazga, Łukasz Krzywiecki, Hannes Salin. Cryptanalysis of Deterministic and Probabilistic Multi-Copy PDP Schemes For Cloud Storage - Attacks and Countermeasures. TrustCom 2021: 172‑179. DOI: 10.1109/TrustCom53373.2021.00040
Łukasz Krzywiecki, Krzysztof Majcher and Wojciech Macyna. Efficient Probabilistic Methods for Proof of Possession in Clouds. DMBD 2016: 364‑372. DOI: 10.1007/978-3-319-40973-3_36
Łukasz Krzywiecki, Mirosław Kutyłowski. Proof of Possession for Cloud Storage via Lagrangian Interpolation Techniques. NSS 2012: 305‑319. DOI: 10.1007/978-3-642-34601-9_23
Łukasz Krzywiecki, Mirosław Kutyłowski, Hubert Misztela, Tomasz Strumiński. Private Information Retrieval with a Trusted Hardware Unit - Revisited. Inscrypt 2010: 373‑386. DOI: 10.1007/978-3-642-21518-6_26
Other Topics
Łukasz Krzywiecki, Mirosław Kutyłowski. Lagrangian E-Voting: Verifiability on Demand and Strong Privacy. TRUST 2010: 109‑123. DOI: 10.1007/978-3-642-13869-0_8
Łukasz Krzywiecki, Przemysław Kubiak, Mirosław Kutyłowski. Probabilistic Admissible Encoding on Elliptic Curves - Towards PACE with Generalized Integrated Mapping. SOFSEM 2014: 395‑406. DOI: 10.1007/978-3-319-04298-5_35
Łukasz Krzywiecki, Przemysław Kubiak, Mirosław Kutyłowski. Stamp and Extend - Instant But Undeniable Timestamping Based on Lazy Trees. INTRUST 2012: 5‑24. DOI: 10.1007/978-3-642-35371-0_2
Jacek Cichon, Marek Klonowski, Lukasz Krzywiecki, Bartlomiej Rózanski, Pawel Zielinski. Random Subsets of the Interval and P2P Protocols. APPROX-RANDOM 2007: 409‑421. DOI: 10.1007/978-3-540-74208-1_30
Security Administrative and Business Model
Mirosław Kutyłowski, Lucjan Hanzlik, Kamil Kluczniak, Przemysław Kubiak, Łukasz Krzywiecki. Forbidden City Model - Towards a Practice Relevant Framework for Designing Cryptographic Protocols. ISPEC 2014: 42‑59. DOI: 10.1007/978-3-319-06320-1_5
Łukasz Krzywiecki, Przemysław Kubiak, Mirosław Kutyłowski, Michał Tabor, Daniel Wachnik. Lightweight Certificates - Towards a Practical Model for PKI. BIS 2012: 296‑307. DOI: 10.1007/978-3-642-30359-3_26
Mirosław Kutyłowski, Przemysław Blaskiewicz, Łukasz Krzywiecki, Przemysław Kubiak, Wieslaw Paluszynski, Michal Tabor. Technical and Legal Meaning of "Sole Control" - Towards Verifiability in Signing Systems. BIS (Workshops) 2011: 270‑281. DOI: 10.1007/978-3-642-25370-6_27
Papers by year
Newest publications first.
Keyword layer
Choose a keyword to see matching publications from newest to oldest.
Select a keyword such as blockchain, signatures, secure ML or privacy.