Jedrzej Kaniewski

Learn More
Bit commitment is a fundamental cryptographic primitive in which Bob wishes to commit a secret bit to Alice. Perfectly secure bit commitment between two mistrustful parties is impossible through asynchronous exchange of quantum information. Perfect security is however possible when Alice and Bob split into several agents exchanging classical and quantum(More)
  • D Gretkowski, A Guzinski, J Kaniewski, O Maslennikow
  • 2005
This paper deals with problems of logical level designing, modelling and simulations of digital, combinatorial circuits, which are based on the current mode gates – new digital elements operating with constant, continuous power supply current. For the modelling and simulation purpose some elements of standard Active – VHDL library IEEE1164 were changed. All(More)
We investigate two-party cryptographic protocols that are secure under assumptions motivated by physics, namely special relativity and quantum mechanics. In particular, we discuss the security of bit commitment in so-called split models, i.e. models in which at least one of the parties is not allowed to communicate during certain phases of the protocol. We(More)
  • O Maslennikow, N Maslennikowa, A Guzinski, J Kaniewski
  • 2005
The paper deals with the problem of designing digital circuits with the current-mode gates-novel digital gates operating with constant, continuous power supply current. The purpose is the provision of a high level of the noise immunity of the chips which compose both analog and digital circuits. The logical identities of the current-mode logic and(More)
A NADPH-dependent H2O2 generating system associated with a thyroid particular fraction is described. H2O2 is measured by two different methods: iodination of NADPH itself when the system is supplemented with lactoperoxidase and [125I]iodide, and by the scopoletin method. It is shown that: H2O2 generation is inhibited by catalase and is dependent on NADPH or(More)
A serious concern with quantum key distribution (QKD) schemes is that, when under attack, the quantum devices in a real-life implementation may behave differently than modeled in the security proof. This can lead to real-life attacks against provably secure QKD schemes. In this work, we show that the standard BB84 QKD scheme is one-sided device-independent.(More)
  • O Maslennikow, A Wąsik, J Kaniewski, N Maslennikowa
  • 2005
The program environment for automatic designing of the application specific parallel architectures (liked to VLSI processor arrays) is proposed. The environment consists of three compatible programs which allow to construct and to visualize the dependence graph of algorithms given by nested loops, and then mapping of these algorithms onto corresponding(More)
  • 1