Follow
Marjan Škrobot
Marjan Škrobot
Research Scientist at University of Luxembourg
Verified email at uni.lu
Title
Cited by
Cited by
Year
Security analysis and comparison of the SHA-3 finalists BLAKE, Grøstl, JH, Keccak, and Skein
E Andreeva, B Mennink, B Preneel, M Škrobot
International Conference on Cryptology in Africa, 287-305, 2012
312012
On the Provable Security of the Dragonfly Protocol
J Lancrenon, M Škrobot
International Conference on Information Security, 244-261, 2015
292015
Forward Secrecy of SPAKE2
J Becerra, D Ostrev, M Škrobot
International Conference on Provable Security, 366-384, 2018
252018
Two More Efficient Variants of the J-PAKE Protocol
J Lancrenon, M Škrobot, Q Tang
International Conference on Applied Cryptography and Network Security, 58-76, 2016
212016
On Composability of Game-based Password Authenticated Key Exchange
M Škrobot, J Lancrenon
2018 IEEE European Symposium on Security and Privacy (EuroS&P), 443-457, 2018
152018
Tightly-Secure PAK(E)
JM Lopez Becerra, V Iovino, D Ostrev, P Šala, M Škrobot
Cryptology and Network Security, 2017
12*2017
An Offline Dictionary Attack against zkPAKE Protocol
J Becerra, PYA Ryan, P Šala, M Škrobot
IFIP Advances in Information and Communication Technology, 2019
112019
C’est très CHIC: A compact password-authenticated key exchange from lattice-based KEM
A Arriaga, M Barbosa, S Jarecki, M Škrobot
International Conference on the Theory and Application of Cryptology and …, 2025
42025
On the Relation Between SIM and IND-RoR Security Models for PAKEs
J Becerra, V Iovino, D Ostrev, M Skrobot
Cryptology ePrint Archive, 2017
32017
On the Relation Between SIM and IND-RoR Security Models for PAKEs
JM Lopez Becerra, V Iovino, D Ostrev, M Škrobot
Proceedings of the International Conference on Security and Cryptography, 12, 2017
32017
On Composability and Security of Game-based Password-Authenticated Key Exchange
M Škrobot
University of Luxembourg,​​ Luxembourg, 2017
22017
Verifying Artifact Authenticity with Unclonable Optical Tags
MP Arenas, G Lenzini, M Rakeei, PYA Ryan, M Škrobot, M Zhekova
12024
Wireless-Channel Key Exchange
A Arriaga, P Šala, M Škrobot
Cryptographers’ Track at the RSA Conference, 672-699, 2023
12023
A survey of requirements for COVID-19 mitigation strategies. Part I: newspaper clips
W Jamroga, D Mestel, PB Roenne, PYA Ryan, M Skrobot
arXiv preprint arXiv:2011.07887, 2020
12020
On the Relation Between SIM and IND-RoR Security Models for PAKEs with Forward Secrecy
J Becerra, V Iovino, D Ostrev, M Škrobot
E-Business and Telecommunications: 14th International Joint Conference …, 2019
12019
Provable Security Analysis of SHA-3 Candidates
M Škrobot, B Preneel, V Rijmen, E Andreeva, B Mennink
Master’s thesis, University of Novi Sad, 2012
12012
C’est très CHIC: A compact password-authenticated key exchange from lattice-based KEM
A DELERUE ARRIAGA, M Barbosa, S Jarecki, M SKROBOT
9789819609345, 2024
2024
SweetPAKE: Key exchange with decoy passwords
A Arriaga, PYA Ryan, M Skrobot
Proceedings of the 19th ACM Asia Conference on Computer and Communications …, 2024
2024
POSTER: An Offline Dictionary Attack against zkPAKE Protocol
J Becerra, PYA Ryan, P Šala, M Škrobot
2018
On the Provable Security of the Dragonfly Protocol
M Skrobot, J Lancrenon
18th International Conference, ISC 2015, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–20