Krzysztof Majcher
Wrocław University of Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Krzysztof Majcher.
ad hoc mobile and wireless networks | 2008
Zbigniew Golebiewski; Krzysztof Majcher; Filip Zagórski
At Pervasive 2008, Cichon, Klonowski, Kutylowski proposed a family of shared-key authentication protocols (
international conference on data mining | 2016
Lukasz Krzywiecki; Krzysztof Majcher; Wojciech Macyna
\mathcal CKK
radio frequency identification security and privacy issues | 2012
Marek Klonowski; Krzysztof Majcher; Wojciech Macyna; Filip Zagórski
). Small computational and communication cost, together with possibility of efficient hardware implementation makes
Archives of Civil and Mechanical Engineering | 2014
Krzysztof Majcher; Zbigniew Wójcicki; Jacek Grosel; Wojciech Pakos; Wojciech Sawicki
\mathcal CKK
international conference information security theory and practice | 2011
Zbigniew Golebiewski; Krzysztof Majcher; Filip Zagórski; Marcin Zawada
attractive for low-cost devices such as RFID tags. In this paper we present a couple of attacks on
Procedia Engineering | 2015
Zbigniew Wójcicki; Jacek Grosel; Wojciech Sawicki; Krzysztof Majcher; Wojciech Pakos
\mathcal CKK
Archives of Civil and Mechanical Engineering | 2016
Wojciech Pakos; Zbigniew Wójcicki; Jacek Grosel; Krzysztof Majcher; Włodzimierz Sawicki
protocols, both passive and active.
cyber-enabled distributed computing and knowledge discovery | 2013
Przemyslaw Blaskiewicz; Marek Klonowski; Krzysztof Majcher; Piotr Syga
Cloud computing is a new paradigm that has received the considerable attention in theory and practice quite recently. One of the applications of cloud computing is the storage of client’s data on remote servers. While maintaining huge volumes of data, the cloud vendors may be tempted to cheat its clients by removing their data. Thus, to avoid such a situation, many proof of possession methods have been proposed. Usually they utilize complex cryptographic calculation which makes them not applicable to devices with limited resources. This paper proposes two novel methods of light-weight proof of possession. Instead of using the resource consuming cryptographic functions, these methods use only straightforward hash functions. In the first method, the client stores his data on one server in the cloud. The second approach addresses the scenario of data duplication between many independent servers.
Pamm | 2012
Krzysztof Majcher
We present an authentication scheme designed for tiny and strictly constrained devices like RFID-tags. Authentication is based on the symmetric key shared between a tag and a reader. While a tag needs to perform only simple operations in order to authenticate: to pick n/2+b random values and then to compute XORs of some values, a reader needs to try 2b possible values to check if a tag replied correctly (b is small). At the same time eavesdropping adversary after r executions of the protocol needs to solve a system of rk-multivariate quadratic equations over GF(2) with nk+rb variables. We present a security discussion of proposed solutions.
ieee international conference on pervasive computing and communications | 2009
Przemyslaw Blaskiewicz; Zbigniew Golebiewski; Marek Klonowski; Krzysztof Majcher