Skip to main content

Showing 1–4 of 4 results for author: Gotfryd, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2112.13449  [pdf, ps, other

    cs.DC

    Tree exploration in dual-memory model

    Authors: Dominik Bojko, Karol Gotfryd, Dariusz R. Kowalski, Dominik Pajak

    Abstract: We study the problem of online tree exploration by a deterministic mobile agent. Our main objective is to establish what features of the model of the mobile agent and the environment allow linear exploration time. We study agents that, upon entering to a node, do not receive as input the edge via which they entered. In such a model, deterministic memoryless exploration is infeasible, hence the age… ▽ More

    Submitted 26 December, 2021; originally announced December 2021.

  2. On testing pseudorandom generators via statistical tests based on the arcsine law

    Authors: Paweł Lorek, Grzegorz Łoś, Karol Gotfryd, Filip Zagórski

    Abstract: Testing the quality of pseudorandom number generators is an important issue. Security requirements become more and more demanding, weaknesses in this matter are simply not acceptable. There is a need for an in-depth analysis of statistical tests -- one has to be sure that rejecting/accepting a generator as good is not a result of errors in computations or approximations. In this paper we propose a… ▽ More

    Submitted 23 March, 2019; originally announced March 2019.

  3. RiffleScrambler - a memory-hard password storing function

    Authors: Karol Gotfryd, Pawel Lorek, Filip Zagorski

    Abstract: We introduce RiffleScrambler: a new family of directed acyclic graphs and a corresponding data-independent memory hard function with password independent memory access. We prove its memory hardness in the random oracle model. RiffleScrambler is similar to Catena -- updates of hashes are determined by a graph (bit-reversal or double-butterfly graph in Catena). The advantage of the RiffleScrambler… ▽ More

    Submitted 17 July, 2018; originally announced July 2018.

    Comments: Accepted to ESORICS 2018

  4. arXiv:1611.04211  [pdf, other

    cs.MA cs.DC

    On Location Hiding in Distributed Systems

    Authors: Karol Gotfryd, Marek Klonowski, Dominik Pająk

    Abstract: We consider the following problem - a group of mobile agents perform some task on a terrain modeled as a graph. In a given moment of time an adversary gets an access to the graph and positions of the agents. Shortly before adversary's observation the mobile agents have a chance to relocate themselves in order to hide their initial configuration. We assume that the initial configuration may possibl… ▽ More

    Submitted 13 November, 2016; originally announced November 2016.

    Comments: Submitted to 10th International Conference on Algorithms and Complexity CIAC 2017