I publish on a wide range of topics, mainly related to applications of statistics, such as cryptography with weak randomness, random number generators, probabilistic algorithms, information theory, statistics and machine learning.
Machine Learning
Landowska, A., Robak, M., & Skorski, M. (2023). What twitter data
tell us about the future? CoRR, abs/2308.02035. https://doi.org/10.48550/ARXIV.2308.02035
Skorski, M., & Temperoni, A. (2023). Exact non-oblivious performance
of rademacher random embeddings. CoRR, abs/2303.11774.
https://doi.org/10.48550/ARXIV.2303.11774
Skorski, M. (2022). Entropy matters: Understanding performance of sparse
random embeddings. In S. W. Bae & H. Park (Eds.), 33rd
international symposium on algorithms and computation,
ISAAC 2022, december 19-21, 2022, seoul, korea (Vol.
248, pp. 18:1–18:18). Schloss Dagstuhl – Leibniz-Zentrum
für Informatik. https://doi.org/10.4230/LIPICS.ISAAC.2022.18
Skorski, M., Temperoni, A., & Theobald, M. (2022). Robust and
provable guarantees for sparse random embeddings. In J. Gama, T. Li, Y.
Yu, E. Chen, Y. Zheng, & F. Teng (Eds.), Advances in knowledge
discovery and data mining – 26th pacific-asia conference,
PAKDD 2022, chengdu, china, may 16-19, 2022, proceedings,
part II (Vol. 13281, pp. 211–223). Springer. https://doi.org/10.1007/978-3-031-05936-0\_17
Skorski, M. (2021). Johnson-lindenstrauss transforms with best
confidence. In M. Belkin & S. Kpotufe (Eds.), Conference on
learning theory, COLT 2021, 15-19 august 2021, boulder,
colorado, USA (Vol. 134, pp. 3989–4007).
PMLR. http://proceedings.mlr.press/v134/skorski21a.html
Skorski, M. (2021). Random embeddings with optimal accuracy.
CoRR, abs/2101.00029. https://arxiv.org/abs/2101.00029
Skorski, M., Temperoni, A., & Theobald, M. (2021). Revisiting weight
initialization of deep neural networks. In V. N. Balasubramanian &
I. W. Tsang (Eds.), Asian conference on machine learning,
ACML 2021, 17-19 november 2021, virtual event (Vol.
157, pp. 1192–1207). PMLR. https://proceedings.mlr.press/v157/skorski21a.html
Skorski, M. (2020). Efficient sampled softmax for tensorflow.
CoRR, abs/2004.05244. https://arxiv.org/abs/2004.05244
Skorski, M. (2019). Bayesian root cause analysis by separable
likelihoods. In B. Catania, R. Královic, J. R. Nawrocki, & G.
Pighizzini (Eds.), SOFSEM 2019: Theory and practice of
computer science – 45th international conference on current trends in
theory and practice of computer science, nový smokovec,
slovakia, january 27-30, 2019, proceedings (Vol. 11376, pp.
461–472). Springer. https://doi.org/10.1007/978-3-030-10801-4\_36
Skorski, M. (2019). On bayes factors for success rate A/B
testing. In S. Hammoudi, C. Quix, & J. Bernardino (Eds.),
Proceedings of the 8th international conference on data science,
technology and applications, DATA 2019, prague, czech
republic, july 26-28, 2019 (pp. 332–339). SciTePress. https://doi.org/10.5220/0007954503320339
Statistics
Skorski, M. (2023). Bernstein-type bounds for beta distribution.
Modern Stochastics: Theory and Applications, 10(2),
211–228.
Breitner, J., & Skorski, M. (2020). Explicit renyi entropy for
hidden markov models. IEEE International Symposium on
Information Theory, ISIT 2020, Los Angeles, CA, USA, June
21-26, 2020, 2303–2308. https://doi.org/10.1109/ISIT44484.2020.9174390
Skorski, M. (2020). Revisiting concentration of missing mass.
CoRR, abs/2005.10018. https://arxiv.org/abs/2005.10018
Skorski, M. (2019). Bounds on bayes factors for binomial
A/B testing. CoRR, abs/1903.00049. http://arxiv.org/abs/1903.00049
Skorski, M. (2019). Kernel density estimation bias under minimal
assumptions. CoRR, abs/1901.00331. http://arxiv.org/abs/1901.00331
Algorithms
Skorski, M. (2023). Towards more efficient rényi entropy
estimation. Entropy, 25(2), 185. https://doi.org/10.3390/E25020185
Skorski, M. (2022). Tight chernoff-like bounds under limited
independence. In A. Chakrabarti & C. Swamy (Eds.),
Approximation, randomization, and combinatorial optimization.
Algorithms and techniques, APPROX/RANDOM 2022, september
19-21, 2022, university of illinois, urbana-champaign, USA
(virtual conference) (Vol. 245, pp. 15:1–15:14). Schloss Dagstuhl –
Leibniz-Zentrum für Informatik. https://doi.org/10.4230/LIPICS.APPROX/RANDOM.2022.15
Skorski, M. (2021). Concentration of the collision estimator. In E.
Bampis & A. Pagourtzis (Eds.), Fundamentals of computation
theory – 23rd international symposium, FCT 2021, athens,
greece, september 12-15, 2021, proceedings (Vol. 12867, pp.
440–456). Springer. https://doi.org/10.1007/978-3-030-86593-1\_31
Skorski, M. (2021). Mean-squared accuracy of good-turing estimator.
IEEE International Symposium on Information Theory,
ISIT 2021, Melbourne, Australia, July 12-20, 2021,
2846–2851. https://doi.org/10.1109/ISIT45174.2021.9518169
Skorski, M. (2021). Modern analysis of hutchinson’s trace estimator.
55th Annual Conference on Information Sciences and Systems,
CISS 2021, Baltimore, MD, USA, March 24-26, 2021, 1–5.
https://doi.org/10.1109/CISS50987.2021.9400306
Obremski, M., & Skorski, M. (2020). Complexity of estimating
rényi entropy of markov chains. IEEE
International Symposium on Information Theory, ISIT 2020,
Los Angeles, CA, USA, June 21-26, 2020, 2264–2269. https://doi.org/10.1109/ISIT44484.2020.9174261
Obremski, M., & Skorski, M. (2017). Renyi entropy estimation
revisited. In K. Jansen, J. D. P. Rolim, D. Williamson, & S. S.
Vempala (Eds.), Approximation, randomization, and combinatorial
optimization. Algorithms and techniques, APPROX/RANDOM
2017, august 16-18, 2017, berkeley, CA, USA (Vol. 81,
pp. 20:1–20:15). Schloss Dagstuhl – Leibniz-Zentrum für
Informatik. https://doi.org/10.4230/LIPICS.APPROX-RANDOM.2017.20
Pietrzak, K., & Skorski, M. (2017). Non-uniform attacks against
pseudoentropy. In I. Chatzigiannakis, P. Indyk, F. Kuhn, & A.
Muscholl (Eds.), 44th international colloquium on automata,
languages, and programming, ICALP 2017, july 10-14, 2017,
warsaw, poland (Vol. 80, pp. 39:1–39:13). Schloss Dagstuhl –
Leibniz-Zentrum für Informatik. https://doi.org/10.4230/LIPICS.ICALP.2017.39
Skorski, M. (2017). On the complexity of estimating rènyi
divergences. 2017 IEEE International Symposium on
Information Theory, ISIT 2017, Aachen, Germany, June 25-30,
2017, 256–260. https://doi.org/10.1109/ISIT.2017.8006529
Skórski, M. (2015). A new approximate min-max theorem with applications
in cryptography. In K. M. Elbassioni & K. Makino (Eds.),
Algorithms and computation – 26th international symposium,
ISAAC 2015, nagoya, japan, december 9-11, 2015,
proceedings (Vol. 9472, pp. 653–663). Springer. https://doi.org/10.1007/978-3-662-48971-0\_55
Cryptography
Fischer, V., Bernard, F., Bochard, N., Dallison, Q., & Skórski, M.
(2023). Enhancing quality and security of the PLL-TRNG.
IACR Trans. Cryptogr. Hardw. Embed. Syst.,
2023(4), 211–237. https://doi.org/10.46586/TCHES.V2023.I4.211-237
Brian, G., Faonio, A., Obremski, M., Ribeiro, J., Simkin, M., Skórski,
M., & Venturi, D. (2022). The mother of all leakages: How to
simulate noisy leakages via bounded leakage (almost) for free.
IEEE Trans. Inf. Theory, 68(12),
8197–8227. https://doi.org/10.1109/TIT.2022.3193848
Brian, G., Faonio, A., Obremski, M., Ribeiro, J., Simkin, M., Skórski,
M., & Venturi, D. (2021). The mother of all leakages: How to
simulate noisy leakages via bounded leakage (almost) for free. In A.
Canteaut & F.-X. Standaert (Eds.), Advances in cryptology –
EUROCRYPT 2021 – 40th annual international conference on
the theory and applications of cryptographic techniques, zagreb,
croatia, october 17-21, 2021, proceedings, part II
(Vol. 12697, pp. 408–437). Springer. https://doi.org/10.1007/978-3-030-77886-6\_14
Brian, G., Faonio, A., Obremski, M., Ribeiro, J., Simkin, M., Skórski,
M., & Venturi, D. (2020). The mother of all leakages: How to
simulate noisy leakages via bounded leakage (almost) for free.
IACR Cryptol. ePrint Arch., 1246. https://eprint.iacr.org/2020/1246
Skórski, M. (2019). Strong chain rules for min-entropy under few bits
spoiled. IEEE International Symposium on Information
Theory, ISIT 2019, Paris, France, July 7-12, 2019,
1122–1126. https://doi.org/10.1109/ISIT.2019.8849240
Allini, E. N., Skórski, M., Petura, O., Bernard, F., Laban, M., &
Fischer, V. (2018). Evaluation and monitoring of free running
oscillators serving as source of randomness. IACR
Trans. Cryptogr. Hardw. Embed. Syst., 2018(3), 214–242. https://doi.org/10.13154/TCHES.V2018.I3.214-242
Obremski, M., & Skorski, M. (2018). Inverted leftover hash lemma.
2018 IEEE International Symposium on Information
Theory, ISIT 2018, Vail, CO, USA, June 17-22, 2018,
1834–1838. https://doi.org/10.1109/ISIT.2018.8437654
Skorski, M. (2018). Pseudorandomness against mean and variance bounded
attackers. IACR Cryptol. ePrint Arch., 984. https://eprint.iacr.org/2018/984
Pietrzak, K., & Skorski, M. (2017). Non-uniform attacks against
pseudoentropy. CoRR, abs/1704.08678. http://arxiv.org/abs/1704.08678
Skorski, M. (2017). Lower bounds on key derivation for square-friendly
applications. In H. Vollmer & B. Vallée (Eds.), 34th symposium
on theoretical aspects of computer science, STACS 2017,
march 8-11, 2017, hannover, germany (Vol. 66, pp. 57:1–57:12).
Schloss Dagstuhl – Leibniz-Zentrum für Informatik. https://doi.org/10.4230/LIPICS.STACS.2017.57
Skorski, M. (2017). Strong chain rules for min-entropy under few bits
spoiled. CoRR, abs/1702.08476. http://arxiv.org/abs/1702.08476
Skórski, M. (2017). On the complexity of breaking pseudoentropy. In T.
V. Gopal, G. Jäger, & S. Steila (Eds.), Theory and applications
of models of computation – 14th annual conference, TAMC
2017, bern, switzerland, april 20-22, 2017, proceedings (Vol.
10185, pp. 600–613). https://doi.org/10.1007/978-3-319-55911-7\_43
Dziembowski, S., Faust, S., & Skórski, M. (2016). Optimal
amplification of noisy leakages. In E. Kushilevitz & T. Malkin
(Eds.), Theory of cryptography – 13th international conference,
TCC 2016-a, tel aviv, israel, january 10-13, 2016,
proceedings, part II (Vol. 9563, pp. 291–318).
Springer. https://doi.org/10.1007/978-3-662-49099-0\_11
Pietrzak, K., & Skórski, M. (2016). Pseudoentropy: Lower-bounds for
chain rules and transformations. In M. Hirt & A. D. Smith (Eds.),
Theory of cryptography – 14th international conference,
TCC 2016-b, beijing, china, october 31 – november 3, 2016,
proceedings, part I (Vol. 9985, pp. 183–203). https://doi.org/10.1007/978-3-662-53641-4\_8
Skorski, M. (2016). Evaluating entropy for true random number
generators: Efficient, robust and provably secure. In K. Chen, D. Lin,
& M. Yung (Eds.), Information security and cryptology – 12th
international conference, inscrypt 2016, beijing, china, november 4-6,
2016, revised selected papers (Vol. 10143, pp. 526–541). Springer.
https://doi.org/10.1007/978-3-319-54705-3\_32
Skorski, M. (2016). How to smooth entropy? In R. M. Freivalds, G.
Engels, & B. Catania (Eds.), SOFSEM 2016: Theory
and practice of computer science – 42nd international conference on
current trends in theory and practice of computer science, harrachov,
czech republic, january 23-28, 2016, proceedings (Vol. 9587, pp.
392–403). Springer. https://doi.org/10.1007/978-3-662-49192-8\_32
Skorski, M. (2016). On pseudorandomness in stateless sources. In D. Choi
& S. Guilley (Eds.), Information security applications – 17th
international workshop, WISA 2016, jeju island, korea,
august 25-27, 2016, revised selected papers (Vol. 10144, pp.
280–291). https://doi.org/10.1007/978-3-319-56549-1\_24
Skórski, M. (2016). A better chain rule for HILL
pseudoentropy – beyond bounded leakage. In A. C. A. Nascimento & P.
S. L. M. Barreto (Eds.), Information theoretic security – 9th
international conference, ICITS 2016, tacoma, WA, USA,
august 9-12, 2016, revised selected papers (Vol. 10015, pp.
279–299). https://doi.org/10.1007/978-3-319-49175-2\_14
Skórski, M. (2016). Evaluating entropy sources for true random number
generators by collision counting. In L. Batten & G. Li (Eds.),
Applications and techniques in information security – 6th
international conference, ATIS 2016, cairns, QLD,
australia, october 26-28, 2016, proceedings (Vol. 651, pp. 69–80).
https://doi.org/10.1007/978-981-10-2741-3\_6
Skórski, M. (2016). Simulating auxiliary inputs, revisited. In M. Hirt
& A. D. Smith (Eds.), Theory of cryptography – 14th
international conference, TCC 2016-b, beijing, china,
october 31 – november 3, 2016, proceedings, part I
(Vol. 9985, pp. 159–179). https://doi.org/10.1007/978-3-662-53641-4\_7
Dziembowski, S., Faust, S., & Skorski, M. (2015). Noisy leakage
revisited. In E. Oswald & M. Fischlin (Eds.), Advances in
cryptology – EUROCRYPT 2015 – 34th annual international
conference on the theory and applications of cryptographic techniques,
sofia, bulgaria, april 26-30, 2015, proceedings, part
II (Vol. 9057, pp. 159–188). Springer. https://doi.org/10.1007/978-3-662-46803-6\_6
Günlü, O., Kramer, G., & Skorski, M. (2015). Privacy and secrecy
with multiple measurements of physical and biometric identifiers.
2015 IEEE Conference on Communications and Network
Security, CNS 2015, Florence, Italy, September 28-30,
2015, 89–94. https://doi.org/10.1109/CNS.2015.7346815
Pietrzak, K., & Skorski, M. (2015). The chain rule for
HILL pseudoentropy, revisited. In K. E. Lauter & F.
Rodrı́guez-Henrı́quez (Eds.), Progress in cryptology –
LATINCRYPT 2015 – 4th international conference on
cryptology and information security in latin america, guadalajara,
mexico, august 23-26, 2015, proceedings (Vol. 9230, pp. 81–98).
Springer. https://doi.org/10.1007/978-3-319-22174-8\_5
Skorski, M. (2015). An improved transformation between HILL
and metric conditional pseudoentropy. In G. F. Italiano, T.
Margaria-Steffen, J. Pokorný, J.-J. Quisquater, R. Wattenhofer, R.
Spanek, & M. Rimnac (Eds.), Proceedings of student research
forum papers and posters at SOFSEM 2015, the 41st
international conference on current trends in theory and practice of
computer science (SOFSEM 2015) , pec pod snezkou, czech
republic, january 24-29, 2015 (Vol. 1326, pp. 67–77). CEUR-WS.org.
https://ceur-ws.org/Vol-1326/067-Skorski.pdf
Skorski, M. (2015). Efficiently simulating high min-entropy sources in
the presence of side information. In A. Biryukov & V. Goyal (Eds.),
Progress in cryptology – INDOCRYPT 2015 – 16th
international conference on cryptology in india, bangalore, india,
december 6-9, 2015, proceedings (Vol. 9462, pp. 312–325). Springer.
https://doi.org/10.1007/978-3-319-26617-6\_17
Skorski, M. (2015). How much randomness can be extracted from memoryless
shannon entropy sources? In H. Kim & D. Choi (Eds.), Information
security applications – 16th international workshop, WISA
2015, jeju island, korea, august 20-22, 2015, revised selected
papers (Vol. 9503, pp. 75–86). Springer. https://doi.org/10.1007/978-3-319-31875-2\_7
Skorski, M. (2015). Indistinguishability and unpredictability hardcore
lemmas: New proofs with applications to pseudoentropy. In G. F.
Italiano, T. Margaria-Steffen, J. Pokorný, J.-J. Quisquater, R.
Wattenhofer, R. Spanek, & M. Rimnac (Eds.), Proceedings of
student research forum papers and posters at SOFSEM 2015,
the 41st international conference on current trends in theory and
practice of computer science (SOFSEM 2015) , pec pod
snezkou, czech republic, january 24-29, 2015 (Vol. 1326, pp.
78–89). CEUR-WS.org. https://ceur-ws.org/Vol-1326/078-Skorski.pdf
Skorski, M. (2015). Metric pseudoentropy: Characterizations and
applications. In G. F. Italiano, T. Margaria-Steffen, J. Pokorný, J.-J.
Quisquater, R. Wattenhofer, R. Spanek, & M. Rimnac (Eds.),
Proceedings of student research forum papers and posters at
SOFSEM 2015, the 41st international conference on current
trends in theory and practice of computer science (SOFSEM
2015) , pec pod snezkou, czech republic, january 24-29, 2015 (Vol.
1326, pp. 90–102). CEUR-WS.org. https://ceur-ws.org/Vol-1326/090-Skorski.pdf
Skorski, M. (2015). Metric pseudoentropy: Characterizations,
transformations and applications. In A. Lehmann & S. Wolf (Eds.),
Information theoretic security – 8th international conference,
ICITS 2015, lugano, switzerland, may 2-5, 2015.
proceedings (Vol. 9063, pp. 105–122). Springer. https://doi.org/10.1007/978-3-319-17470-9\_7
Skorski, M. (2015). Nonuniform indistinguishability and unpredictability
hardcore lemmas: New proofs and applications to pseudoentropy. In A.
Lehmann & S. Wolf (Eds.), Information theoretic security – 8th
international conference, ICITS 2015, lugano, switzerland,
may 2-5, 2015. proceedings (Vol. 9063, pp. 123–140). Springer. https://doi.org/10.1007/978-3-319-17470-9\_8
Skorski, M. (2015). On provable security of wPRF-based leakage-resilient
stream ciphers. In M. H. Au & A. Miyaji (Eds.), Provable
security – 9th international conference, ProvSec 2015, kanazawa, japan,
november 24-26, 2015, proceedings (Vol. 9451, pp. 391–411).
Springer. https://doi.org/10.1007/978-3-319-26059-4\_22
Skorski, M. (2015). True random number generators secure in a changing
environment: Improved security bounds. In G. F. Italiano, T.
Margaria-Steffen, J. Pokorný, J.-J. Quisquater, & R. Wattenhofer
(Eds.), SOFSEM 2015: Theory and practice of computer
science – 41st international conference on current trends in theory and
practice of computer science, pec pod sněžkou,
czech republic, january 24-29, 2015. proceedings (Vol. 8939, pp.
590–602). Springer. https://doi.org/10.1007/978-3-662-46078-8\_49
Skorski, M., Golovnev, A., & Pietrzak, K. (2015). Condensed
unpredictability. In M. M. Halldórsson, K. Iwama, N. Kobayashi, & B.
Speckmann (Eds.), Automata, languages, and programming – 42nd
international colloquium, ICALP 2015, kyoto, japan, july
6-10, 2015, proceedings, part I (Vol. 9134, pp.
1046–1057). Springer. https://doi.org/10.1007/978-3-662-47672-7\_85
Skórski, M. (2015). Shannon entropy versus renyi entropy from a
cryptographic viewpoint. In J. Groth (Ed.), Cryptography and coding
– 15th IMA international conference, IMACC
2015, oxford, UK, december 15-17, 2015. proceedings (Vol. 9496, pp.
257–274). Springer. https://doi.org/10.1007/978-3-319-27239-9\_16
Skórski, M. (2015). Time-advantage ratios under simple transformations:
Applications in cryptography. In E. Pasalic & L. R. Knudsen (Eds.),
Cryptography and information security in the balkans – second
international conference, BalkanCryptSec 2015, koper, slovenia,
september 3-4, 2015, revised selected papers (Vol. 9540, pp.
79–91). Springer. https://doi.org/10.1007/978-3-319-29172-7\_6
Skorski, M. (2014). On recent advances in key derivation via the
leftover hash lemma. In R. Neykova & N. Ng (Eds.), 2014 imperial
college computing student workshop, ICCSW 2014, september
25-26, 2014, london, united kingdom (Vol. 43, pp. 83–90). Schloss
Dagstuhl – Leibniz-Zentrum für Informatik. https://doi.org/10.4230/OASICS.ICCSW.2014.83
Skorski, M. (2013). Modulus computational entropy. In C. Padró (Ed.),
Information theoretic security – 7th international conference,
ICITS 2013, singapore, november 28-30, 2013,
proceedings (Vol. 8317, pp. 179–199). Springer. https://doi.org/10.1007/978-3-319-04268-8\_11
Hardware Cryptography
Fischer, V., Bernard, F., Bochard, N., Dallison, Q., & Skórski, M.
(2023). Enhancing quality and security of the PLL-TRNG.
IACR Trans. Cryptogr. Hardw. Embed. Syst.,
2023(4), 211–237. https://doi.org/10.46586/TCHES.V2023.I4.211-237
Allini, E. N., Skórski, M., Petura, O., Bernard, F., Laban, M., &
Fischer, V. (2018). Evaluation and monitoring of free running
oscillators serving as source of randomness. IACR
Trans. Cryptogr. Hardw. Embed. Syst., 2018(3), 214–242. https://doi.org/10.13154/TCHES.V2018.I3.214-242
Skorski, M. (2015). True random number generators secure in a changing
environment: Improved security bounds. In G. F. Italiano, T.
Margaria-Steffen, J. Pokorný, J.-J. Quisquater, & R. Wattenhofer
(Eds.), SOFSEM 2015: Theory and practice of computer
science – 41st international conference on current trends in theory and
practice of computer science, pec pod sněžkou,
czech republic, january 24-29, 2015. proceedings (Vol. 8939, pp.
590–602). Springer. https://doi.org/10.1007/978-3-662-46078-8\_49
