Research areas:
- anonymity, privacy, security, cryptography
- ad hoc networks, distributed systems
- telecommunication and network planning
- rapid mixing algorithms
- automata and communication complexity
- parallel processing networks
- parallel and distributed algorithms, lower bounds
- automata theory
- recursion theory and computational complexity
- foundations of mathematics
- legal issues
Anonymity, privacy of communication, security
- Darknet Signatures
Przemyslaw Blaskiewicz, Anna Lauks-Dutka, Miroslaw Kutylowski, DSPP'2023
abstract , - The Self-Anti-Censorship Nature of Encryption:
On the Prevalence of Anamorphic Cryptography
Miroslaw Kutylowski, Giuseppe Persiano, Duong Hieu Phan, Moti Yung, Marcin Zawada PETS'2023
corresponding IACR report - Anamorphic Signatures: Secrecy From a Dictator Who Only Permits Authentication!
Miroslaw Kutylowski, Giuseppe Persiano, Duong Hieu Phan, Moti Yung, Marcin Zawada CRYPTO'2023, LNCS 14082, 759-790
abstract , corresponding IACR report - VRBC: A Verifiable Redactable Blockchain with Efficient Query and Integrity Auditing
Guohua Tian, Jianghong Wei, Miroslaw Kutylowski, Willy Susilo, Xiaofeng Chen, IEEE Transactions on Computers, volume: 72, issue: 7, 01 July 2023,
paper - Chaining Electronic Seals. An eIDAS compliant framework for controlling SSCD
Przemyslaw Blaskiewicz, Miroslaw Kutylowski, ACIIDS'2022, LNAI 13758,
abstract , presentation, paper - Advanced Electronic Signatures and eIDAS
Przemyslaw Blaskiewicz, Miroslaw Kutylowski, Computer Standards and Interfaces, vol. 83, 103644, Elsevier
abstract , paper - The Last Line of Defence in Case of Signing Key Compromise
Przemyslaw Blaskiewicz, Miroslaw Kutylowski, Marcin Slowik, ESORICS'21 (poster track), LNCS 12973, 777-782
abstract , presentation, presentation video, paper - PACE with Mutual Authentication -- towards an upgraded eID in Europe
Patryk Koziel, Przemyslaw Kubiak, Miroslaw Kutylowski, ESORICS'21, LNCS 12973, 501-519
abstract, presentation, presentation video, paper - Fair Mutual Authentication
Jacek Cichon, Krzysztof Majcher, Miroslaw Kutylowski, SECRYPT'21, SCITEPRESS, 754--759,
abstract, presentation, paper - Poster: eID in Europe - Password Authentication Revisited
Patryk Koziel, Przemyslaw Kubiak, Miroslaw Kutylowski, Yanmei Cao, IFIP-Networking'21,
abstract, presentation, paper - Extensions for Apple-Google Exposure Notification Mechanism
Jacek Cichon, Adam Bobowski, Bulletin of Polish Academy of Sciences, Technical Sciences, vol. 69, issue 4, 2021
paper (open access) - Hierarchical Ring Signatures Immune to Randomness Injection Attacks
Lukasz Krzywiecki, Miroslaw Kutylowski, Rafal Rothenberger, Bartosz Drzazga, CSCML 2021, LNCS 12716, 171--186
paper - Preventing a Fork in a Blockchain - David fighting Goliath
Przemyslaw Kubiak, Miroslaw Kutylowski, TRUSTCOM 2020,
abstract, presentation, presentation video, and its local copy, paper - GDPR - Challenges for Reconciling Legal Rules with Technical Reality
Miroslaw Kutylowski, Anna Lauks-Dutka, Moti Yung, ESORICS 2020, LNCS 12308, 736-755
abstract, presentation, presentation video, paper - Derandomized PACE with Mutual Authentication
Adam Bobowski, Miroslaw Kutylowski, NSS 2019, LNCS 11928 (Springer-Verlag, 2019), pp. 697-705
abstract, presentation, paper - GDPR-Compliant Reputation System Based on Self-Certifying Domain Signatures
Miroslaw Kutylowski, Jakub Lemiesz, Marta Slowik, Marcin Slowik, Kamil Kluczniak, Maciej Gebala, ISPEC 2019, LNCS 11879 (Springer-Verlag, 2019), pp. 341-361
abstract, presentation, paper - CTRL-PACE: Controlled Randomness for e-Passport Password Authentication
Lucjan Hanzlik, Kamil Kluczniak, Miroslaw Kutylowski, Fundamenta Informaticae, 69 (2019) 295-330
paper - Privacy and Security Analysis of PACE GM Protocol
Przemyslaw Kubiak, Miroslaw Kutylowski, SECSOC 2019, TrustCom/BigData 2019 Proceedings, pp. 763-768.
abstract, presentation, paper -
Emerging Security Challenges for Ubiquitous Devices
Miroslaw Kutylowski, Piotr Syga, Moti Yung, Security of Ubiquitous Computing Systems, Selected Topics, COST Action IC1403, CRYPTACUS, Springer, pp 3-17 - E-Passport and E-ID Technologies
Lucjan Hanzlik, Miroslaw Kutylowski, Security of Ubiquitous Computing Systems, Selected Topics, COST Action IC1403, CRYPTACUS, Springer, pp. 81-97 - Rethinking Identification Protocols from the Point of
View of the GDPR
Lukasz Krzywiecki, Miroslaw Kutylowski, Xiaofeng Chen 3rd International Symposium on Cyber Security Cryptology and Machine Learning (CSCML 2019), LNCS 11527 (Springer-Verlag, 2019), pp. 296--315
abstract, presentation, paper - Anonymous Deniable Identification in Ephemeral Setup and Leakage Scenarios
Lukasz Krzywiecki, Miroslaw Kutylowski, Jakub Pezda, Marcin Slowik, 3rd International Symposium on Cyber Security Cryptology and Machine Learning (CSCML 2019), LNCS 11527 (Springer-Verlag, 2019), pp. 320-323
abstract, presentation, paper, IACR full report, - Privacy-Aware Identity Management
Przemyslaw Blaskiewicz, Miroslaw Kutylowski, Encyclopedia of Big Data Technologies, 2019, eds.: Sherif Sakr, Albert Y. Zomaya, Springer, Cham,
chapter - Brief Announcement: Anonymous Credentials Secure to Ephemeral Leakage
Lukasz Krzywiecki, Miroslaw Kutylowski, Marta Wszola, Cyber Security Cryptography and Machine Learning (CSCML 2017), LNCS 10332 (Springer-Verlag, 2017), pp. 96-98
abstract, presentation, paper - Security of Okamoto Identification Scheme in Practice - a Defense against Ephemeral Key Leakage and Setup
Lukasz Krzywiecki, Miroslaw Kutylowski, AsiaCCS 2017, International Workshop on Security in Cloud Computing (SCC), ACM, pp. 43-50
abstract, presentation, paper - Protecting Electronic Signatures in Case of Key Leakage
Miroslaw Kutylowski, Jacek Cichon, Lucjan Hanzlik, Kamil Kluczniak, Chen Xiaofeng, Wang Jianfeng, MYCRYPT - Paradigm-shifting Crypto '2016, LNCS 10311 (Springer-Verlag, 2016), pp. 252-274
abstract, paper, presentation - Controlled Randomness - A Defense against Backdoors in Cryptographic Devices
Kamil Kluczniak, Miroslaw Kutylowski, MYCRYPT - Paradigm-shifting Crypto '2016, LNCS 10311 (Springer-Verlag, 2016), 215-232
abstract, paper, presentation - A Formal Concept of Domain Pseudonymous Signatures
Lucjan, Hanzlik, Kamil Kluczniak, Miroslaw Kutylowski, ISPEC 2016 , LNCS 1060 (Springer-Verlag, 2016), 238-254
abstract, paper, - Ghost Train for Anonymous Communication
Przemyslaw Blaskiewicz, Miroslaw Kutylowski, Jakub Lemiesz, Malgorzata Sulkowska, SpaCCS 2016 , LNCS 10066 (Springer-Verlag, 2016), 224-239
abstract, paper, presentation - Multi-Device Anonymous Authentication
Jianfeng Wang, Xiaofeng Chen, Kamil Kluczniak, Miroslaw Kutylowski, NSS 2016 , LNCS 9955 (Springer-Verlag, 2016), 21-36
abstract, paper, presentation
journal version: International Journal of Information Security 18(2): 181-197 (2019)
paper, - Local Self-Organization with Strong Privacy Protection
L.Hanzlik, K.Kluczniak, M.Kutylowski, Shlomi Dolev, TRUSTCOM 2016,
abstract, paper, presentation - Chip Authentication for E-Passports: PACE with Chip Authentication Mapping v2
L.Hanzlik, M.Kutylowski, ISC 2016, LNCS 9866 (Springer-Verlag, 2016), 115-129
abstract, paper, presentation - Pseudonymous Identification for Embedded Devices
K.Kluczniak, L.Hanzlik, M.Kutylowski, IEEE Emergitech 2016,
abstract, paper, - Pseudonymous Signature on eIDAS Token - Implementation Based Privacy Threats
K.Kluczniak, L.Hanzlik, M.Kutylowski, ACISP'2016, LNCS 9723 (Springer-Verlag, 2016), 467--477
abstract, paper, presentation - Ad-Hoc-Domain Signatures for Personal eID Documents
K.Kluczniak, L.Hanzlik, M.Kutylowski, ARTICCRYPT'2016,
abstract, presentation - A New Secure Data Deduplication Approach Supporting User Traceability
Jianfeng Wang, Xiaofeng Chen, Jin Li, Kamil Kluczniak, Miroslaw Kutylowski, BWCCA 2015 (Best Paper Award), IEEE Computer Society, pp. 120-124
abstract, paper, presentation
journal version: International Journal of Web and Grid Services (IJWGS) , 13.3, pp. 270--289, 2017, paper - Insecurity of Anonymous Login with German Personal Identity Cards
L.Hanzlik, K.Kluczniak, M.Kutylowski, SocialSec'2015, IEEE Conference Publications, pp. 39-43,
abstract, paper, presentation - Anonymous Evaluation System
L.Hanzlik, K.Kluczniak, P.Kubiak, M.Kutylowski, NSS'2015, LNCS 9408 (Springer-Verlag, 2015), 283--299
abstract, paper, - Restricted Identification Secure in the Extended Canetti-Krawczyk Model
L.Hanzlik, M.Kutylowski, Journal of Universal Computer Science , vol 21.3 (2015),
abstract, paper - Hard Invalidation of Electronic Signatures
L.Hanzlik, M.Kutylowski, M.Yung, ISPEC 2015, LNCS 9065 (Springer-Verlag, 2015), 421-436
abstract, paper, presentation - Tracing Attacks on U-Prove with Revocation Mechanism
L.Hanzlik, P.Kubiak, M.Kutylowski, ACM ASIACCS 2015,
abstract, paper, IACR e-print report: pdf, presentation - Provable unlinkability against traffic analysis
with low message overhead
R.Berman, A.Fiat, M.Gomulkiewicz, M.Klonowski, M.Kutylowski, T.Levinboim, A.Ta-Shma, Journal of Cryptology, 28(3) (2015), 623-640,
paper - Lightweight Protocol for Trusted Spontaneous Communication
P. Blaskiewicz, M. Klonowski, M.Kutylowski, P. Syga, INTRUST 2014, LNCS 9473 (Springer-Verlag, 2015), 1-15
abstract, paper, presentation - Stand-by Attacks on E-ID Password Authentication
L.Hanzlik, P.Kubiak, M.Kutylowski, INSCRYPT 2014, LNCS 8957 (Springer-Verlag, 2015), 475-495
abstract, paper, presentation - Forbidden City Model -- towards a Practice Relevant Framework for Designing Cryptographic Protocols
M.Kutylowski, L.Hanzlik, K.Kluczniak, P.Kubiak, L.Krzywiecki, ISPEC 2014, LNCS 8434 (Springer-Verlag, 2014), 42-59
abstract, paper, presentation - Attack on a U-Prove Revocation Scheme from FC'13 - Passing Verification by Revoked Users
L.Hanzlik, K.Kluczniak, M.Kutylowski, Financial Cryptography 2014, LNCS 8437, (Springer-Verlag, 2014), 283-290
abstract, paper, presentation - Probabilistic Admissible Encoding on Elliptic Curves -
Towards PACE with Generalized Integrated Mapping
L.Krzywiecki, P.Kubiak, M.Kutylowski, SOFSEM 2014, LNCS 8327 (Springer-Verlag, 2014), 395-406
abstract, paper, presentation - Supervised Usage of Signature Creation Devices
P.Kubiak, M.Kutylowski, INSCRYPT 2013, LNCS 8567 (Springer-Verlag, 2013), 132--149
abstract, paper, presentation - Mutual Restricted Identification
L.Hanzlik, L.Krzywiecki, K.Kluczniak, M.Kutylowski, Euro PKI , LNCS 8341 (Springer-Verlag, 2013), 119-133
abstract, paper, presentation - Mutual Chip Authentication
L.Hanzlik, L.Krzywiecki, K.Kluczniak, M.Kutylowski, 3rd IEEE International Symposium on Anonymity and Communication Systems , Proc. TrustCom/ISPA/IUCC, pp. 1683-1689, IEEE 2013
abstract, paper, presentation - Protection of Data Groups from
Personal Identity Documents
Przemyslaw Kubiak, Miroslaw Kutylowski, Wojciech Wodo, Journal of Infocommunications, V.3, 2013, 2-7, paper presented also at CECC 2013
abstract, presentation - Chameleon RFID and Tracking Prevention
M.Klonowski, M.Kutylowski, P.Syga, RFID Sec Asia'2013 , in Radio Frequency Identification System Security, pp. 17-30, IOS Press, ISBN 978-1-61499-327-8
abstract, paper, presentation - Disability Parking Permit - Lightweight but Trustworthy Identity Documents
M.Kutylowski, P.Lipiak, IEEE TRUSTID 2013, Proc. TrustCom/ISPA/IUCC, pp. 1535-1540, IEEE 2013
abstract, paper, presentation - Simplified PACE|AA Protocol
L.Hanzlik, K.Kluczniak, L.Krzywiecki, M.Kutylowski, ISPEC 2013 , LNCS 7863 (Springer-Verlag, 2013), 218-232
abstract, paper, presentation - Attack against Ibrahim's Distributed Key Generation for
RSA
B.Brzezniak, L.Hanzlik, P.Kubiak, M.Kutylowski, International Journal of Network Security , Vol. 15, No. 1, 2013, pp. 237-240
abstract, paper downloadable from journal's webpage - Stamp and
Extend - Instant but Undeniable Timestamping based on Lazy Trees
P.Kubiak, L.Krzywiecki, M.Kutylowski, INTRUST 2012 , LNCS 7711 (Springer-Verlag, 2012), 5-24,
abstract, paper, presentation - How to Make Operating Systems for Smart Cards Open
P.Blaskiewicz, P.Kubiak, M.Kutylowski, Bulcrypt 2012 ,
abstract, paper, presentation - Proof of Possession for Cloud Storage via Lagrangian Interpolation
Techniques
L. Krzywiecki, M.Kutylowski, NSS'2012 , LNCS 7645 (Springer-Verlag, 2012), 305-319
abstract, paper, presentation - Restricted Identification without Group Keys
L.Hanzlik, P.Kubiak, K.Kluczniak, M.Kutylowski, , IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, IEEE, 1194-1199
abstract, paper, presentation - Lightweight Certifcates- Towards a Practical Model for PKI
P.Kubiak, L.Krzywiecki, M.Kutylowski, M.Tabor, D.Wachnik Business Information Systems (BIS) 2012 , LNBIP 117, (Springer-Verlag 2012), 296-307
abstract, paper, presentation - Optimizing Segment Based Document Protection
M.Gebala, M.Kutylowski, SOFSEM 2012 , LNCS 7147 (Springer-Verlag, 2012), 566-575,
abstract, paper, presentation
corrected version: Optimizing Segment Based Document Protection (Corrected Version),
IACR eprint, 520 (2012), paper - Restricted Identification Scheme and Diffie-Hellman Linking Problem
M.Koza, L. Krzywiecki, P.Kubiak, M.Kutylowski INTRUST'2011 , LNCS 7222 (Springer-Verlag, 2011), 221-238,
abstract, paper, presentation - Collusion Resistant Anonymous Broadcast Encryption Scheme based on PUF
L. Krzywiecki, M.Kutylowski TRUST'2011 , LNCS 6740 (Springer-Verlag, 2011), 48-62,
abstract, paper, presentation - Technical and Legal Meaning of ``Sole Control'' -- Towards Verifiability in Signing Systems
P.Kubiak, L.Krzywiecki, M.Kutylowski, W.Paluszynski, M.Tabor, 4rd Workshop on Legal Informatics and Legal Information Technology (LIT 2011) , LNBIP 97, 277-288 (Springer-Verlag 2011),
abstract, paper, presentation - Self-keying Identification Mechanism for Small Devices
K.Barczynski, P.Blaskiewicz, M.Klonowski, M.Kutylowski, STA 2011 , Communications in Computer and Information Science, vol. 186, (Springer-Verlag 2011), 37-44
abstract, paper, presentation - RFID Electronic Visa with Personalized Verification
P.Blaskiewicz, J.Cichon, M.Kutylowski, K.Majcher, RFIDsec Asia 2011 , In: Radio Frequency Identification Systems Security, IOS Press 2011, Cryptology and Information Security Series, vol. 6, pp. 81-95
abstract, paper, presentation - 1-out-of-2 Signature
M.Kutylowski, Jun Shao, ASIACCS 2011 , ASIACCS Proceedings, (ACM Press), 391-395
abstract, paper, presentation - How to Transmit Messages via WSN in a
Hostile Environment
M.Klonowski, M.Koza, M.Kutylowski, SECRYPT 2011 , Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, 387-390
abstract, poster - Signing with Multiple ID's and a Single Key
M.Kutylowski, Jun Shao IEEE CCNC 2011 (work in progress), Consumer Communications and Networking Conference (CCNC), 2011 IEEE, 519 - 520
abstract, paper, presentation - Private Information Retrieval with a Trusted Hardware Unit - Revisited
L. Krzywiecki, M.Kutylowski, H.Misztela, T.Struminski INSCRYPT'2010 , LNCS 6584 (Springer-Verlag, 2010), 373-386,
abstract, paper , presentation - Two-Head Dragon Protocol. Preventing Cloning of Signature Keys
P.Blaskiewicz, P.Kubiak, M.Kutylowski, INTRUST 2010 , LNCS 6802 (Springer-Verlag, 2011), 173-188,
abstract, paper, presentation - Digital Signatures for e-Government
-- a Long-Term Security Architecture
P.Blaskiewicz, P.Kubiak, M.Kutylowski, E-FORENSIC 2010 , LNICST, Forensics in Telecommunications, Information, and Multimedia Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Volume 56, 2011, 256-270
abstract, paper, presentation
journal version: China Communications, vol. 7.6, 2010, pp. 64-70, - Mediated Signatures - Towards Undeniability of Digital Data in Technical and Legal Framework
P.Kubiak, M.Kutylowski, A.Lauks-Dutka, M.Tabor, 3rd Workshop on Legal Informatics and Legal Information Technology (LIT 2010) , LNBIP 57, (Springer-Verlag 2010), 298-309
abstract, paper, presentation - Lagrangian E-Voting:
Strong Privacy and Verfiability on Demand
L.Krzywiecki, M.Kutylowski, TRUST 2010 , LNCS 6101 (Springer-Verlag, 2010), 109-123
abstract, paper, presentation - How to Construct State Registries -- Matching Undeniability with Public Security
P.Kubiak, M.Kutylowski, Jun Shao, Intelligent Information and Database Systems, ACIIDS 2010 , LNAI 5990, (Springer-Verlag 2010), 64-73
abstract, paper, presentation - Scratch, Click & Vote: E2E voting over the Internet
M.Kutylowski, F.Zagorski, Towards Trustworthy Elections, in State-of-the-Art Survey series, Springer-Verlag, LNCS 6000 (Springer-Verlag, 2010), 343-356
Cryptology ePrint Archive: Report 2008/314, paper, presentation at IACR Board Meeting on E-Voting, Santa Barbara 2008,
trial voting (voting in a public debate on crucial goals of Poland for the next 20 years) - From Key Predistribution to Key Redistribution
J.Cichon, Z.Golebiewski, M.Kutylowski, ALGOSENSORS'2010 , LNCS 6451 (Springer-Verlag, 2010), 92-104,
abstract, paper , presentation
journal extended version: From key predistribution to key redistribution , Theoretical Computer Science , vol. 453, 2012, pp. 75?87,
paper - Attacking and Repairing the Improved ModOnions Protocol
Nikita Borisov, Marek Klonowski, Miroslaw Kutylowski, Anna Lauks-Dutka, ICISC'2009 , LNCS 5984, (Springer-Verlag 2009), 258-273,
abstract, paper , presentation
journal extended version: Attacking and Repairing the Improved ModOnions Protocol-Tagging Approach,
KSII Transactions on Internet and Information Systems, 4(3): 380-399 (2010),
paper - Machiavelli Confronts 21st Century Digital Technology: Democracy in a Network Society
Baer, Walter S., Borisov, Nikita, Danezis, George, Guerses, Seda F., Klonowski, Marek, Kutylowski, Miroslaw, Maier-Rabler, Ursula, Moran, Tal, Pfitzmann, Andreas, Preneel, Bart, Sadeghi, Ahmad-Reza, Vedel, Thierry, Westen, Tracy, Zagorski, Filip and Dutton, William H., Social Science Research Network, 1521222 , 2009
(a political and social sciences article) - Hierarchical Ring Signatures
L.Krzywiecki, M.Kutylowski, A.Lauks-Dutka, Western European Workshop on Research in Cryptology 2009 ,
abstract, presentation - Securing Random Key Predistribution Against Node Captures
J.Cichon, J.Grzaslewicz, M.Kutylowski, ALGOSENSORS'2009 , LNCS 5304 (Springer-Verlag, 2009), 64-75,
also presented at ACNS'2009, Industrial Track
abstract, paper , presentation - Distributed Verification of Mixing - Local Forking Proofs Model
J.Cichon, M.Klonowski, M.Kutylowski, Australasian Conference on Information Security and Privacy (ACISP) 2008 , LNCS 5107 (Springer-Verlag 2008), 128-140
abstract, paper , presentation - Repelling Detour Attack against Onions with Re-Encryption
M.Klonowski, M.Kutylowski, A.Lauks, Applied Cryptography and Network Security (ACNS) '2008 , LNCS 5037 (Springer-Verlag 2008), 296-308
abstract, paper , presentation - Short Ballot Assumption and Threeballot Voting Protocol
J.Cichon, M.Kutylowski, B.Weglorz, SOFSEM'2008 , LNCS 4910 (Springer-Verlag 2008), 585-598
abstract, paper , presentation - Step-out Ring Signatures
M.Klonowski, L.Krzywiecki, M.Kutylowski, A.Lauks, Mathematical Foundations of Computer Science (MFCS) 2008 , LNCS 5162 (Springer-Verlag, 2008), 431-442
abstract, paper, presentation - Step-out Group Signature Scheme
M.Klonowski, L.Krzywiecki, M.Kutylowski, A.Lauks, Central European Cryptography Conference (CECC) 2008, journal version Computing: 137-151 (2009)
abstract, paper, presentation - Privacy Protection for RFID's -- Hidden Subset Identifiers
J.Cichon, M.Klonowski, M.Kutylowski, PERVASIVE'2008 , LNCS 5013 (Springer-Verlag, 2008), 298-314
abstract, paper, presentation - Fault Jumping Attacks against Shrinking Generator
Marcin Gomulkiewicz, Miroslaw Kutylowski, Pawel Wlaz, Dagstuhl Report,
Random Fault Attacks against Shrinking Generator
an extended version in ALGOSENSORS'2008 LNCS 5389 (Springer-Verlag, 2008), 87-99,
abstract, Dagstul report , paper, presentation - Practical Deniable Encryption
M.Klonowski, P.Kubiak, M.Kutylowski, SOFSEM'2008 , LNCS 4910 (Springer-Verlag, 2008), 599-609
abstract, paper, presentation - Forward-secure
Key Evolution Protocol
in Wireless Sensor Networks
M.Klonowski, M.Kutylowski, M.Ren, K.Rybarczyk, CANS'2007 , LNCS 4856 (Springer-Verlag 2007), 102-120
abstract, paper , presentation - Anonymity and k-choice Identities
J.Cichon, M.Kutylowski, INSCRYPT'2007 , LNCS 4990 (Springer-Verlag 2007), 283-297
abstract, paper, presentation - Kleptographic Attacks on a Cascade of Mix Servers,
P.Kubiak, M.Kutylowski, F.Zagorski, 2007 ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS'07), 57-62 ,
abstract, paper , presentation - Privacy Protection for Dynamic Systems Based
on RFID Tags,
J.Cichon, M.Klonowski, M.Kutylowski, 4th IEEE International Workshop on Pervasive Computing and Communication Security , Proceedings of PERCOM 2007 Workshops, IEEE Computer Society,235-240
abstract, paper , presentation - Verifiable Internet Voting Solving Secure Platform Problem
Miroslaw Kutylowski, Filip Zagorski, IWSEC'2007 (International Workshop on Security), LNCS 4752 (Springer-Verlag, 2006), 199-213,
abstract, paper, presentation - General Anonymous Key Broadcasting via Lagrangian Interpolation
L.Krzywiecki, M.Kutylowski, M.Nikodem, 1st International Workshop on Group-Oriented Cryptographic Protocols (GOCP 2007), journal version IET Information Security vol. 2.3, 79-84,
abstract, presentation, paper - Kleptographic Attacks on E-Auction Schemes
M.Gogolewski, M.Gomulkiewicz, J.Grzaslewicz, P.Kubiak, M.Kutylowski, A.Lauks,, industrial track presentation at ACNS'2007, journal version Tatra Mountains Mathematical Publications 41 (2008), 47-64,
abstract, paper, presentation - A Revocation Scheme Preserving Privacy
Lukasz Krzywiecki, Przemyslaw Kubiak, Miroslaw Kutylowski, INSCRYPT'2006, LNCS 4318 (Springer-Verlag, 2006), 130-143,
abstract, paper, presentation - How to Protect a Signature from Being Schown to a Third Party
Marek Klonowski, Przemyslaw Kubiak, Miroslaw Kutylowski, Anna Lauks, TRUSTBUS'2006, LNCS 4083 (Springer-Verlag, 2006), 192-202
abstract, paper, presentation - Kleptographic Attacks on E-voting Schemes
Marcin Gogolewski, Marek Klonowski, Miroslaw Kutylowski, Przemyslaw Kubiak, Anna Lauks, Filip Zagorski, ETRICS' 2006, LNCS 3995 (Springer-Verlag, 2006), 494-508,
abstract, paper, presentation - Fault Cryptanalysis and Shrinking Generator
Marcin Gomulkiewicz, Miroslaw Kutylowski, Pawel Wlaz, 5th International Workshop on Efficient and Experimental Algorithms (WEA'06), LNCS 4007 (Springer-Verlag, 2006), 61-72
abstract, paper, presentation - Stealing Secrets with SSL/TLS and SSH -- Kleptographic Attacks,
Z.Golebiewski, M.Kutylowski, F.Zagorski, The 5th International Conference on Cryptology and Network Security (CANS) 2006 , LNCS 4301 (Springer-Verlag 2006), 191-202,
abstract, paper, - Kleptographic Weaknesses of Benaloh-Tuistra Protocol,
P.Borzecki, J.Kabarowski, P.Kubiak, M.Kutylowski, F.Zagorski,, International Conference on Systems and Networks Communications (ICNSC'2006) , IEEE Computer Society Press,
abstract, paper, presentation - Hiding Data Sources in P2P Networks,
Marek Klonowski, Miroslaw Kutylowski, Bartlomiej Rozanski, 4th International Workshop on Applied PKI (IWAP'2005), IOS Press, Amsterdam, ISBN 1-58603-550-9.
abstract, paper, presentation - Local View Attack on Anonymous Communication
Marcin Gogolewski, Marek Klonowski, Miroslaw Kutylowski, ESORICS'2005, LNCS 3679 (Springer-Verlag), 475-488
abstract, paper, presentation, - A Practical Voting Scheme with Receipts
Marek Klonowski, Miroslaw Kutylowski, Anna Lauks, Filip Zagorski, ISC'2005, LNCS 3650 (Springer-Verlag, 2005), 490-497
abstract, paper, presentation,
a Web page on the scheme
also presented during Frontiers in Electronic Elections Workshop of ECRYPT - Conditional Digital Signatures
Marek Klonowski, Miroslaw Kutylowski, Anna Lauks, Filip Zagorski, TRUSTBUS'2005, LNCS 3592 (Springer-Verlag, 2005), 206-215
abstract, paper, presentation - Synchronization Fault Cryptanalysis for Breaking A5/1
Marcin Gomulkiewicz, Miroslaw Kutylowski, Theodor Heinrich Vierhaus, Pawel Wlaz, 4th International Workshop on Efficient and Experimental Algorithms (WEA'05), LNCS 3503 (Springer-Verlag, 2005), 415-427
abstract, paper, presentation - Intersection Attack and using Dummy Addresses
Jedrzej Kabarowski, Miroslaw Kutylowski, Moraviacrypt'2005, preceedings in Tatra Mountains Mathematical Publications, 37 (2007), pp. 49-57
abstract, paper, presentation - Provable Anonymity for Networks of Mixes
Marek Klonowski, Miroslaw Kutylowski, Information Hiding 2005, LNCS 3727 (Springer-Verlag), 26-38
abstract, paper, presentation - Privacy Protection for P2P Publish-Subscribe Networks
Marek Klonowski, Miroslaw Kutylowski, Bartlomiej Rozanski, Security and Protection of Information 2005,
Brno University of Defence 2005, ISBN 8085960-99-0, 63-74,
abstract, presentation - Fault Cryptanalysis for Breaking A5/1
Marcin Gomulkiewicz, Miroslaw Kutylowski, Pawel Wlaz Wartacrypt'2004, preceedings in Tatra Mountains Mathematical Publications, 33, 2006,
abstract, paper - Universal Re-encryption of Signatures
and Controlling Anonymous Information Flow
Marek Klonowski, Miroslaw Kutylowski, Anna Lauks, Filip Zagorski, Wartacrypt'2004, preceedings in Tatra Mountains Mathematical Publications, 33, 2006, 179-188,
abstract, paper, presentation from Mikulasska Kryptobesidka 2004 - Anonymous Communication with On-line
and Off-line Onion Encoding
Marek Klonowski, Miroslaw Kutylowski, Filip Zagorski, SOFSEM 2005, LNCS 3381 (Springer-Verlag, 2005), 229-238
abstract, paper, presentation - Onion Routing Based On Universal Re--Encryption
Immune Against Repetitive Attack
Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski, Workshop on Information Security Applications (WISA 2004), LNCS 3225 (Springer-Verlag, 2004), 400-410
abstract, paper, presentation - Anonymous Distribution of Broadcast Keys in Cellular Systems
Jacek Cichon, Lukasz Krzywiecki, Miroslaw Kutylowski, Pawel Wlaz, MADNES'2005, LNCS 4074 (Springer-Verlag, 2006), 96-109
abstract, paper, presentation - DUO--Onions and Hydra--Onions --
Failure and Adversary Resistant Onion Protocols
Jan Iwanik, Marek Klonowski, Miroslaw Kutylowski, IFIP TC-6 TC-11 Conference on Communications and Multimedia Security 2004, Communications and Multimedia Security, Springer-Verlag 2005, ISBN 0-387-24485-9, 1-15,
abstract, paper in IFIP International Federation for Information Processing, presentation - Provable Unlinkability Against
Traffic Analysis already after O(log n) steps!
Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski, 7th Information Security Conference (ISC 04), LNCS 3225 (Springer-Verlag, 2004), 354-366
abstract, paper, presentation, - Interference Watermarks
Ryszard Grzaslewicz, Jaroslaw Kutylowski, Miroslaw Kutylowski Wojciech Pietkiewicz, Information Security & Hiding (ISH '05) , LNCS 3481 (Springer-Verlag, 2005), 517-526,
abstract, paper, presentation - Mobile Mixing
Marcin Gogolewski, Miroslaw Kutylowski, Tomasz Luczak, International Conference on Information Security and Cryptography (ICISC) 2004,, LNCS 3506 (Springer-Verlag, 2005), 380-393
abstract, paper, presentation, - Distributed Timestamping with Boomerang
Onions
Marcin Gogolewski, Miroslaw Kutylowski, Tomasz Luczak, in Tatra Mountains Mathematical Publications 33, 31-40,
abstract, paper - Rapid Mixing and Security of Chaum's Visual Electronic Voting
Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski, Computer Security- ESORICS 2003, LNCS 2808 (Springer-Verlag, 2003), 132-145,
abstract, paper, presentation - How to use Untrusty Cryptographic Devices
Daniel Kucner, Miroslaw Kutylowski, TATRACRYPT'03, Tatra Mountains Mathematical Publications, 29 (2004), 57-67
abstract, paper, presentation - Secure Data Storing in a Pool of Vulnerable Servers
Marcin Gogolewski, Miroslaw Kutylowski, Artificial Intelligence and Security in Computing Systems, Kluwer Academic Publishers, 2003, ISBN 1-4020-7396-8, 217-226.
abstract, presentation - Hamming Weight
Attacks on Cryptographic Hardware
-- Breaking Masking Defense,
Marcin Gomulkiewicz, Miroslaw Kutylowski, Computer Security- ESORICS 2002, LNCS 2502 (Springer-Verlag, 2003), 90-103,
abstract, paper, presentation - Stochastic Kleptography Detection
Daniel Kucner, Miroslaw Kutylowski, Public-Key Cryptography and Computational Number Theory, Walter de Gruyter, Berlin - New York 2001, 137--149
abstract, a link to the publisher
Ad hoc networks, distributed systems
-
Sliding Window Sampling over Data Stream - a Solution Based on Devil's Staircases
Dominik Bojko, Jacek Cichon, Miroslaw Kutylowski, DSAA 2023,
abstract, -
Revised Gateway Selection for LoRa Radio Networks
Przemyslaw Blaskiewicz, Jacek Cichon, Miroslaw Kutylowski, Marcin Zawada, AdHocNow 2019, LNCS 11803, pp. 228--240,
abstract, paper, presentation -
Braid Chain Radio Communication
Jacek Cichon, Miroslaw Kutylowski, Kamil Wolny, ALGOSENSORS 2017, LNCS 10718, pp. 223-235,
abstract, paper, presentation -
On Distributed Cardinality Estimation: Random Arcs Recycled
Marcin Kardas, Miroslaw Kutylowski, Jakub Lemiesz, ANALCO 2015,
abstract, paper, presentation -
Efficient and robust data aggregation using untrusted infrastructure
Marek Klonowski, Michal Koza, Miroslaw Kutylowski SIN 2013, Proceeding Proceedings of the 6th International Conference on Security of Information and Networks, pp. 123-130, ACM
abstract, presentation, paper -
Bit Reversal Broadcast Scheduling for Ad Hoc Systems
M.Kik, M.Gebala, M.Kutylowski, ICDS 2013 , LNCS 8223, (Springer-Verlag, 2013), 223-237
abstract, presentation -
Extreme Propagation in an Ad-hoc Radio Network - Revisited
P.Blaskiewicz, M.Kutylowski, W.Wodo, K.Wolny, ICCCI 2012 , LNCS 7654 (Springer-Verlag, 2012), 142-151
abstract, paper, presentation -
Repelling Sybil-type Attacks
in Wireless Ad Hoc Systems
M.Klonowski, M.Koza, M.Kutylowski, ACISP 2010 , LNCS 6168 (Springer-Verlag, 2010), 391-402
abstract, paper, presentation -
Towards Fair Leader Election in Wireless Networks
Z.Golebiewski, M.Klonowski, M.Koza, M.Kutylowski, AD HOC NOW 2009 , LNCS 5793 (Springer-Verlag, 2009), 166-179
abstract, paper, presentation - On Optimal
One-dimensional
Routing Strategies in Sensor Networks
J.Cichon, M.Gebala, M.Kutylowski, BROADCOM'2009 ,
abstract, - Energy Efficient Alert in Single-Hop Networks of Extremely Weak
Devices
M.Klonowski, M.Kutylowski, J.Zatopianski ALGOSENSORS'2009, LNCS 5304 (Springer-Verlag, 2009), 139-150, journal version Theoretical Computer Science , vol. 453, 2012, pp 65-74
abstract, LNCS paper , journal version, presentation -
Detecting heavy-hitters in a P2P network
Z.Golebiewski, J.Kutylowski, M.Kutylowski, F.Zagorski IFIP 1st International Conference on Network and Service Security , to be published by IEEE Computer Society,
abstract, paper, presentation -
Leader Election for Multi-Channel Radio Networks - Dependent versus
Independent Trials
Z.Golebiewski, M.Klonowski, M.Koza, M.Kutylowski, 1st Asian Conference on Intelligent Information and Database Systems, 2009, , IEEE Computer Society,
abstract, paper, presentation - Power of Discrete
Nonuniformity -- Optimizing Access to Shared Radio Channel in Ad Hoc
Networks
Jacek Cichon, Miroslaw Kutylowski, Marcin Zawada, MSN' 2008 , 9-15
abstract, paper , presentation - Self-stabilizing population of
mobile agents
Zbigniew Golebiewski, Miroslaw Kutylowski, Tomasz Luczak, Filip Zagorski, IPDPS' 2008 ,
abstract, paper , presentation - Algorithmic Challenges for Sensor Networks - Foreword to ALGOSENSORS 2007
Miroslaw Kutylowski, LNCS 4837 (Springer-Verlag, 2006), 1--5
text - Adaptive Initialization Algorithm for
Ad Hoc Radio Networks with Carrier Sensing
Jacek Cichon, Miroslaw Kutylowski, Marcin Zawada, ALGOSENSORS' 2006 , LNCS 4240 (Springer-Verlag, 2006), 35--46
abstract, paper, presentation
journal version: Theoretical Computer Science 402(1): 16-28 (2008)
paper - Initialization for Ad Hoc Radio
Networks with Carrier Sensing and Collision Detection
Jacek Cichon, Miroslaw Kutylowski, Marcin Zawada, 5th International Conference on AD-HOC Networks and Wireless (AdHoc-NOW, 2006) , LNCS 4104 (Springer-Verlag, 2006), 308-320
abstract, paper, presentation - Adversary Immune Size Approximation of
Single-Hop Radio Networks
Jedrzej Kabarowski, Miroslaw Kutylowski, Wojciech Rutkowski, Theory and Applications of Models of Computation 2006 , LNCS 3959 (Springer-Verlag, 2006), 148-158
abstract, paper, presentation - Secure Initialization
in Single-Hop Radio Networks
Miroslaw Kutylowski, Wojciech Rutkowski, 1st European Workshop on Security in Ad-Hoc and Sensor Networks , LNCS 3313 (Springer-Verlag, 2004), 31-41
abstract, paper, presentation - Adversary Immune Leader Election in Ad Hoc Radio Networks
Miroslaw Kutylowski, Wojciech Rutkowski, ESA 2003, LNCS 2832 (Springer-Verlag, 2003), 397-408,
abstract, paper, presentation - Computing Average Value in Ad Hoc Networks,
Miroslaw Kutylowski, Daniel Letkiewicz, MFCS'2003, LNCS 2747 (Springer-Verlag, 2003), 511-520,
abstract, paper, presentation - Weak Communication in Single-hop Radio Networks --
adjusting algorithms to industrial standards,
Tomasz Jurdzinski, Miroslaw Kutylowski, Jan Zatopianski, Concurrency and Computation: Practice & Experience, 15 (2003), 1117-1131, (extended journal version of Euro-Par'2002 paper)
abstract, paper - Weak Communication in Radio Networks
Tomasz Jurdzinski, Miroslaw Kutylowski, Jan Zatopianski, Euro-Par'2002, LNCS 2400 (Springer-Verlag, 2002), 397-408,
abstract, paper, presentation - Efficient Algorithms for Leader Election in Radio Networks
Tomasz Jurdzinski, Miroslaw Kutylowski, Jan Zatopianski, ACM PODC'2002, 51-57, ACM Press,
abstract, paper, presentation - Energy-Efficient Size Approximation for Radio Networks with no Collision Detection
Tomasz Jurdzinski, Miroslaw Kutylowski, Jan Zatopianski, COCOON'2002, LNCS 2387 (Springer-Verlag, 2002), 279-289,
abstract, paper, presentation
Telecommunication and network planning
-
UTRAN Topology Planning Including Point-to-Multipoint Equipment
Maciej Gebala, Bartlomiej Rozanski, Janna Vossnaecker, Thomas Winter, Marcin Zawada, MMB&PGTS04 Proceedings (12th GI/ITG Conference on Measuring, Modelling and Evaluation of Computer and Communication Systems (MMB) together with 3rd Polish-German Teletraffic Symposium (PGTS)), VDE Verlag, Berlin 2004, ISBN 3-8007-2851-6, 87-92,
abstract, presentation
Rapid mixing algorithms
- Provable Anonymity for Networks of Mixes
Marek Klonowski, Miroslaw Kutylowski, Information Hiding 2005, LNCS 3727 (Springer-Verlag 2005), 26-38
abstract, paper, presentation - Provable Unlinkability Against
Traffic Analysis already after O(log n) steps!
Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski, 7th Information Security Conference (ISC 04), LNCS 3225 (Springer-Verlag, 2004), 354-366
abstract, paper, presentation, - Rapid Mixing and Security of Chaum's Visual Electronic Voting
Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski, Computer Security- ESORICS 2003, LNCS 2808 (Springer-Verlag, 2003), 132-145,
abstract, paper, presentation - Generating Random Permutations and Delayed
Path Coupling Method for Mixing Time of Markov Chains,
Artur Czumaj, Miroslaw Kutylowski, Random Structures and Algorithms 17 (2000), 238-259,
abstract, link to the publisher - Distributed Stochastic Processes for Generating
Random Permutations,
Artur Czumaj, Przemyslawa Kanarek, Miroslaw Kutylowski, Krzysztof Lorys, Proc. of 10th ACM-SIAM Symposium on Discrete Algorithms (SODA) '99, SIAM, 1999, 271-280
abstract, paper
Automata and communication complexity
- Efficient Simulation of Synchronous Systems by Multi-speed Systems,
Tomasz Jurdzinski, Miroslaw Kutylowski, Jan Zatopianski, RAIRO Theoretical Informatics and Applications 39 (2005), 401-417
abstract, paper - Communication Complexity for Asynchronous Systems of
Finite Devices,
Tomasz Jurdzinski, Miroslaw Kutylowski, Jan Zatopianski, Workshop on Advances in Parallel and Distributed Computational Models, San Francisco 2001. Proc. 15th International Parallel & Distributed Processing Symposium (IPDPS-01), IEEE Computer Society, 2001.
abstract, paper, presentation - Communication Gap for Finite Memory Devices,
Tomasz Jurdzinski, Miroslaw Kutylowski, Proc. ICALP'2001, LNCS 2076 (Springer-Verlag, 2001), 1052--1064,
abstract, paper, presentation - Multiparty Finite Computations
Tomasz Jurdzinski, Miroslaw Kutylowski, Krzysztof Lorys, Computing and Combinatorics, Proc. COCOON'99, LNCS 1627 (Springer-Verlag, 1999), 318--329,
abstract, paper, presentation - Power of Cooperation and Multihead Finite Systems
Pavol Duris, Tomasz Jurdzinski, Miroslaw Kutylowski, Krzysztof Lorys, ICALP'98, LNCS 1443 (Springer-Verlag, 1998), 896-907,
abstract, paper
Parallel processing networks
- Switching Networks
for Generating Random Permutations,
Artur Czumaj, Przemyslawa Kanarek, Miroslaw Kutylowski, Krzysztof Lorys, Switching Networks: Recent Advances}, Kluwer Academic Publishers, 2001, ISBN 0-7923-6953-X,
abstract(Postscript), paper - Correction Networks
Marcin Kik, Miroslaw Kutylowski, Marek Piotrow, Proc. 1999 International Conference on Parallel Processing (ICPP) , IEEE Computer Society, Los Alamitos, 1999, ISBN 0-7695-0350-0, 40--47
abstract, paper - Periodic Merging Networks,
Miroslaw Kutylowski, Krzysztof Lorys, Brigitte Oesterdiekhoff, Algorithms and Computation, ISAAC'96, LNCS 1178 (Springer-Verlag, 1996), 336--345
abstract, paper, presentation, full journal version: Theory of Computing Systems 31.5 (1998), 551-578. - Constructing Sorting Networks with Constant Period,
Miroslaw Kutylowski, Krzysztof Lorys, Brigitte Oesterdiekhoff, Rolf Wanka, Journal of the ACM, 47(5) (2000), 944--967
abstract, paper - Playing Tetris on Meshes and Multi-Dimensional SHEARSORT,
Miroslaw Kutylowski, Rolf Wanka, ISAAC'97, LNCS 1350 (Springer-Verlag, 1997), 32--41
abstract, paper - Fast and Feasible Periodic Sorting Networks of
Constant Depth,
Miroslaw Kutylowski, Krzysztof Lorys, Brigitte Oesterdiekhoff, Rolf Wanka, 35th IEEE Symposium on Foundations of Computer Science (FOCS) '94, IEEE Press, 1994, 369-380
abstract, paper - Periodic Constant Depth Sorting Networks,
Marcin Kik, Miroslaw Kutylowski, Grzegorz Stachowiak, STACS'94, LNCS 775 (Springer-Verlag, 1994), 201--212,
abstract, paper - Sorting on 2-dimensional Grids,
Miroslaw Kutylowski, Rolf Wanka, Parallel Processing Letters, 2.2 and 2.3 (1992), 213--220.
abstract, paper
Parallel and distributed algorithms, lower bounds
- Towards an Efficient Parallel
Minimum Spanning Tree Algorithm,
Micah Adler, Wolfgang Dittrich, Ben Juurlink, Miroslaw Kutylowski, Ingo Rieping, SPAA' 98, 27-38.
abstract, paper, presentation - Distributed Stochastic Processes for Generating
Random Permutations,
Artur Czumaj, Przemyslawa Kanarek, Miroslaw Kutylowski, Krzysztof Lorys, SODA'99, SIAM, 1999, 271-280
abstract, paper - Fast Generation of Random Permutations
via Network Simulation,
Artur Czumaj, Przemyslawa Kanarek, Miroslaw Kutylowski, Krzysztof Lorys, ESA'96, LNCS 1136 (Springer-Verlag, 1996), 246--260,
abstract, paper, full journal version: Algorithmica, 21 (1998), 2--20. - Limitations of the QRQW and EREW PRAM Models,
Miroslaw Kutylowski, Krzysztof Lorys, Foundations of Software Technology and Theoretical Computer Science (FST&TCS) '96, Hyderabad, India, LNCS 1180 (Springer-Verlag, 1996), 310-321
abstract, paper - Approximate Compaction and Padded Sorting on
Exclusive Write PRAMs,
Miroslaw Kutylowski, Tomasz Wierzbicki, IPPS'96, International Parallel Processing Symposium, IEEE Press, 174--181,
abstract, link to the publisher, presentation - Retrieval of Scattered Information by EREW, CREW
and CRCW PRAMs,
Faith Fich, Miroslaw Kowaluk, Miroslaw Kutylowski, Krzysztof Lorys, R.Ragde, Algorithm Theory - SWAT'92, LNCS 621 (Springer-Verlag, 1992), 30-41,
abstract, paper, full journal version: Computational Complexity, 5 (1995), 113--131 - Complexity of Boolean Functions on PRAMs -- Lower Bound
Techniques,
Miroslaw Kutylowski, Data Structures and Efficient Algorithms, B.~Monien and Th. Ottman (eds.), LNCS 594 (Springer-Verlag, 1992), 309--329
abstract, paper - Fast Merging on the EREW PRAM,
Miroslaw Kutylowski, Torben Hagerup, ICALP'92, LNCS 623 (Springer-Verlag, 1992), 318--329,
abstract, paper, full journal version: Algorithmica, 17.1 (1997), 55--66. link to the publisher - Limits on the Power of Parallel Random Access Machines
with Weak Forms of Write Conflict Resolution,
Faith Fich, Russel Impagliazzo, Bruce Kapron, Valerie King, Miroslaw Kutylowski, STACS'93, LNCS 665 (Springer-Verlag, 1993), 386--397,
abstract, paper, full journal version: Journal of Computer and System Sciences, 53.1 (1996) 104--111 - Feasible Time-Optimal Algorithms for Boolean Functions
on Exclusive Read PRAMs,
Martin Dietzfelbinger, Miroslaw Kutylowski, Ruediger Reischuk, SIAM Journal on Computing, 25.6 (1996), 1196-1230,
abstract, paper - Exact Lower Time Bounds for Boolean Functions on CREW
PRAMs,
Martin Dietzfelbinger, Miroslaw Kutylowski, Ruediger Reischuk, Journal of Computer and System Sciences, 48.2 (1994), 231--254,
paper - Broadcasting Information by Exclusive Read PRAMs,
Paul Beame, Marcin Kik, Miroslaw Kutylowski, Parallel Processing Letters, 4.1&2 (1994), 159--169
paper - Exact Time Bounds for Computing Boolean Functions on
PRAMs without Simultaneous Writes,
Martin Dietzfelbinger, Miroslaw Kutylowski, Ruediger Reischuk, ACM SPAA'1990, 125-135,
paper - Time Complexity of Boolean Functions on CREW PRAMs,
Miroslaw Kutylowski, SIAM Journal on Computing, 20 (1991), 824--833,
paper
Automata theory
- Computational Power of One-way Multihead Finite Automata,
Miroslaw Kutylowski, STACS'90, LNCS 415 (Springer-Verlag, 1990), 176-187,
abstract, paper - Stack Versus Sensitivity for One-way Automata,
Miroslaw Kutylowski, Theoretical Computer Science, 119.2 (1993), 233-246,
paper - `Remarks on Sorting and One-way
Multihead Finite Automata,
Miroslaw Kutylowski, Information Processing Letters, 36 (1990), 215--218
paper - One-way Multihead Finite Automata and 2-bounded Languages,
Miroslaw Kutylowski, Mathematical Systems Theory, 23 (1990), 107--139,
paper
Recursion theory and computational complexity theory
- Reversal Complexity Classes for Alternating Turing
machines,
Miroslaw Kutylowski, Maciej Liskiewicz, Krzysztof Lorys, SIAM Journal on Computing, 19.2 (1990), 207-221,
paper - Chains of Finite Automata with Bounded Number of States,
Miroslaw Kutylowski, Fundamenta Informaticae, 11.3 (1988).
- Finite Automata, Real Time Processes and Counting Problem
for Bounded Arithmetics,
Miroslaw Kutylowski, Journal of Symbolic Logic, 53.1 (1988), 243--258.
- A note about $ E^{0}_{*}=E^{2}_{*} $ ? Problem,
Miroslaw Kutylowski, Krzysztof Lorys, Zt. math. Logik und Grundlag. Math., 33 (1987),
- A Generalized Grzegorczyk Hierarchy and Low Complexity
classes,
Miroslaw Kutylowski, Information and Computation 72.2 (1987), 133-149.
- Small Grzegorczyk Classes,
Miroslaw Kutylowski, journal version of PhD. Dissertation, the Journal of the London Mathematical Society, 36.2 (1987), 193--210.
Foundations of mathematics
- Restricted Comprehension and Collection Schemata in Weak
Set Theories,
Miroslaw Kutylowski, Zt. math. Log. Grundlag. Math., 30.1 (1987)
paper - Boolean Operations over Measure Algebras,
Anastasis Kamburelis, Miroslaw Kutylowski, Coll. Math., 50.2 (1986)
paper
Law and social sciences (some articles in Polish)
- Polish Concepts for Securing
E-Government Document Flow
Przemyslaw Kubiak, Miroslaw Kutylowski, ISSE (Information Security Solutions Europe), 2010 - Why Digital Signatures Fail - Legal Concepts for Long Term Validity
Dariusz Adamski, Miroslaw Kutylowski, Anna Lauks ETRICS 2006 Workshop Long-lasting Security, 2006,
in: Long Term and Dynamical Aspects of Information Security, 113-124, ed.: Andreas Schmidt, michael Kreutzer, Rafael Accorsi, Nova Science Publishers, New York 2008, ISBN 1-60021-912-8 - Sad na e-sadem gospodarczym,
Sylwia Kotecka, Miroslaw Kutylowski, Prawo Teleinformatyczne, 1, 2006, 52-57 - Podpis elektroniczny osoby prawnej w Republice Czeskiej.
Koncepcja prawna,
technologiczna i zastosowania gospodarcze,
Miroslaw Kutylowski, in Prawo umow elektronicznych, , Zakamycze, 2006, 195-204
- Wnoszenie do sadu pism procesowych w postaci elektronicznej,
Sylwia Kotecka, Miroslaw Kutylowski, Prawo Mediow Elektronicznych, dodatek do Monitora Prawniczego, - Cyfrowa reprezentacja podpisow cyfrowych,
Miroslaw Kutylowski, Anna Lauks, E-Administracja, 1(2), 2006, 11-30 - Krytyczny komentarz do ustawy o informatyzacji,
Dariusz Adamski, Miroslaw Kutylowski, E-Administracja, 1(2), 2006, 45-58 - Terminologia ustawy o informatyzacji - niespojnosci ciag dalszy,
Dariusz Adamski, Miroslaw Kutylowski, Prawo Mediow Elektronicznych, dodatek do Monitora Prawniczego 2/2006 - Koncepcje uregulowan prawnych dotyczacych bezpieczenstwa technicznego bankow elektronicznych a polski stan prawny,
Miroslaw Kutylowski, Prawo Mediow Elektronicznych, dodatek do Monitora Prawniczego 12/2005 - Prawne aspekty wykorzystania technologii cyfrowych w komunikacji urzad - obywatel,
Dariusz Adamski, Miroslaw Kutylowski, Kwartalnik Prawa Publicznego nr 1-2/2005.