The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Canetti with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1989-1996 (19) 1997-1998 (16) 1999-2000 (20) 2001 (17) 2002-2003 (29) 2004 (20) 2005 (31) 2006 (24) 2007 (22) 2008 (36) 2009 (19) 2010-2011 (20) 2012-2013 (24) 2014 (21) 2015-2016 (25) 2017 (15) 2018-2019 (19) 2020 (19) 2021-2022 (16) 2023-2024 (10)
Publication types (Num. hits)
article(170) incollection(3) inproceedings(244) proceedings(5)
Venues (Conferences, Journals, ...)
IACR Cryptol. ePrint Arch.(104) CRYPTO(23) EUROCRYPT(19) STOC(19) TCC(19) J. Cryptol.(16) FOCS(11) ASIACRYPT(9) CCS(8) SIAM J. Comput.(8) ACISP(7) CoRR(7) CRYPTO (2)(7) ProvSec(7) CT-RSA(6) TCC (2)(6) More (+10 of total 103)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 162 occurrences of 106 keywords

Results
Found 428 publication records. Showing 422 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
93Yvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model. Search on Bibsonomy Appl. Algebra Eng. Commun. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Canetti, Krawczyk model, Security proofs, Key exchange protocols
49Xinghua Li 0001, Jianfeng Ma 0001, Sang-Jae Moon On the Security of the Canetti-Krawczyk Model. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
49Yvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto Tripartite Key Exchange in the Canetti-Krawczyk Proof Model. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
49Yiu Shing Terry Tin, Colin Boyd, Juan Manuel González Nieto Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
44Qingfeng Cheng, Chuangui Ma, Xuexian Hu A New Strongly Secure Authenticated Key Exchange Protocol. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Extended Canetti-Krawczyk model, Gap Diffie-Hellman assumption, Random oracle model, Authenticated key exchange
44Xinghua Li 0001, Jianfeng Ma 0001, Sang-Jae Moon Security Analysis of the Authentication Modules of Chinese WLAN Standard and Its Implementation Plan. Search on Bibsonomy NPC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF WAPI, Canetti-Krawczyk model, WLAN, Key-agreement protocol
41Ralf Küsters, Max Tuengerthal Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation. Search on Bibsonomy CSF The full citation details ... 2008 DBLP  DOI  BibTeX  RDF simulation-based security, joint state, secure composition, cryptographic protocols
41Benoît Libert, Damien Vergnaud Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF unidirectionality, standard model, chosen-ciphertext security, proxy re-encryption
41Chik How Tan Public-Key Encryption from ID-Based Encryption Without One-Time Signature. Search on Bibsonomy OTM Workshops (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptography, public key encryption, bilinear maps
41Kim-Kwang Raymond Choo, Yvonne Hitchcock Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
41Yvonne Hitchcock, Yiu Shing Terry Tin, Juan Manuel González Nieto, Colin Boyd, Paul Montague A Password-Based Authenticator: Security Proof and Applications. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF key agreement, password authentication, Key management protocols
41Ivan Damgård, Jesper Buus Nielsen Improved Non-committing Encryption Schemes Based on a General Complexity Assumption. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
38Waseem Daher, Ran Canetti POSH: a generalized captcha with security applications. Search on Bibsonomy AISec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF puzzles, password security
38Ran Canetti Universally Composable Signature, Certification, and Authentication. Search on Bibsonomy CSFW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
38Ran Canetti, Hugo Krawczyk Universally Composable Notions of Key Exchange and Secure Channels. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Composition of protocols, Cryptographic Protocols, Key Exchange, Proofs of Security
38Ran Canetti, Hugo Krawczyk Security Analysis of IKE's Signature-Based Key-Exchange Protocol. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
38Ran Canetti, Ivan Damgård, Stefan Dziembowski, Yuval Ishai, Tal Malkin On Adaptive vs. Non-adaptive Security of Multiparty Protocols. Search on Bibsonomy EUROCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
35Simone Patonico, An Braeken, Kris Steenhaut Identity-based and anonymous key agreement protocol for fog computing resistant in the Canetti-Krawczyk security model. Search on Bibsonomy Wirel. Networks The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Jung Hee Cheon, Jinhyuck Jeong, Dongwoo Kim 0003, Jongchan Lee A Reusable Fuzzy Extractor with Practical Storage Size: Modifying Canetti et al.'s Construction. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
35Lucjan Hanzlik, Miroslaw Kutylowski Restricted Identification Secure in the Extended Canetti-Krawczyk Model. Search on Bibsonomy J. Univers. Comput. Sci. The full citation details ... 2015 DBLP  BibTeX  RDF
35Xinghua Li 0001, Jianfeng Ma 0001, Sang-Jae Moon Security extension for the Canetti-Krawczyk model in identity-based systems. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee Improved Non-committing Encryption with Applications to Adaptively Secure Protocols. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF adaptive corruption, non-committing encryption, public-key encryption, secure multi-party computation
28Daniele Micciancio, Saurabh Panjwani Optimal communication complexity of generic multicast key distribution. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF nested encryption, security, multicast, lower bounds, secret sharing, key distribution
28Alfred Menezes, Berkant Ustaoglu Comparing the Pre- and Post-specified Peer Models for Key Agreement. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Krzysztof Pietrzak Compression from Collisions, or Why CRHF Combiners Have a Long Output. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Marek Klonowski, Przemyslaw Kubiak 0001, Miroslaw Kutylowski Practical Deniable Encryption. Search on Bibsonomy SOFSEM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF deniable encryption
28Brian A. LaMacchia, Kristin E. Lauter, Anton Mityagin Stronger Security of Authenticated Key Exchange. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Kim-Kwang Raymond Choo Refuting Security Proofs for Tripartite Key Exchange with Model Checker in Planning Problem Setting. Search on Bibsonomy CSFW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Alejandro Hevia Universally Composable Simultaneous Broadcast. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Fan Zhang, Jianfeng Ma 0001 Security Analysis on Chinese Wireless LAN Standard and Its Solution. Search on Bibsonomy ICPP Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Chanathip Namprempre Secure Channels Based on Authenticated Encryption Schemes: A Simple Characterization. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
24Ran Canetti, Claudio Chamon, Eduardo R. Mucciolo, Andrei E. Ruckenstein Towards general-purpose program obfuscation via local mixing. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
24Ran Canetti, Amos Fiat, Yannai A. Gonczarowski Zero-Knowledge Mechanisms. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Claudio Chamon, Andrei E. Ruckenstein, Eduardo R. Mucciolo, Ran Canetti Circuit complexity and functionality: a thermodynamic perspective. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Jens Ernstberger, Jan Lauinger, Fatima Elsheimy, Liyi Zhou, Sebastian Steinhorst, Ran Canetti, Andrew Miller 0001, Arthur Gervais, Dawn Song SoK: Data Sovereignty. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
24Ran Canetti, Sebastian Kolby, Divya Ravi, Eduardo Soria-Vazquez, Sophia Yakoubov Taming Adaptivity in YOSO Protocols: The Modular Way. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
24Maor Bluman, Keren L. G. Snider, Guy Baratz, Amit Cohen, Daphna Canetti, Béatrice S. Hasler Virtual Reality-Based Joy Induction: The Role of Interactivity and Prior Mood. Search on Bibsonomy Cyberpsychology Behav. Soc. Netw. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Zvika Brakerski, Ran Canetti, Luowen Qian On the Computational Hardness Needed for Quantum Cryptography. Search on Bibsonomy ITCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Ran Canetti, Sebastian Kolby, Divya Ravi, Eduardo Soria-Vazquez, Sophia Yakoubov Taming Adaptivity in YOSO Protocols: The Modular Way. Search on Bibsonomy TCC (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Jens Ernstberger, Jan Lauinger, Fatima Elsheimy, Liyi Zhou, Sebastian Steinhorst, Ran Canetti, Andrew Miller 0001, Arthur Gervais, Dawn Song SoK: Data Sovereignty. Search on Bibsonomy EuroS&P The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Zvika Brakerski, Ran Canetti, Luowen Qian On the computational hardness needed for quantum cryptography. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Ghada Almashaqbeh, Ran Canetti, Yaniv Erlich, Jonathan Gershoni, Tal Malkin, Itsik Pe'er, Anna Roitburd-Berman, Eran Tromer Unclonable Polymers and Their Cryptographic Applications. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
24Zvika Brakerski, Ran Canetti, Luowen Qian On the computational hardness needed for quantum cryptography. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
24Ran Canetti, Suvradip Chakraborty, Dakshita Khurana, Nishant Kumar 0001, Oxana Poburinnaya, Manoj Prabhakaran 0001 COA-Secure Obfuscation and Applications. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
24Ran Canetti, Palak Jain 0004, Marika Swanberg, Mayank Varia Universally Composable End-to-End Secure Messaging. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
24Ran Canetti, Oxana Poburinnaya, Muthuramakrishnan Venkitasubramaniam Equivocating Yao: Constant-Round Adaptively Secure Multiparty Computation in the Plain Model. Search on Bibsonomy SIAM J. Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Dor Bitan, Ran Canetti, Shafi Goldwasser, Rebecca Wexler Using Zero-Knowledge to Reconcile Law Enforcement Secrecy and Fair Trial Rights in Criminal Cases. Search on Bibsonomy CSLAW The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Ran Canetti, Pratik Sarkar, Xiao Wang 0012 Triply Adaptive UC NIZK. Search on Bibsonomy ASIACRYPT (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Ghada Almashaqbeh, Ran Canetti, Yaniv Erlich, Jonathan Gershoni, Tal Malkin, Itsik Pe'er, Anna Roitburd-Berman, Eran Tromer Unclonable Polymers and Their Cryptographic Applications. Search on Bibsonomy EUROCRYPT (1) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Ran Canetti, Suvradip Chakraborty, Dakshita Khurana, Nishant Kumar 0001, Oxana Poburinnaya, Manoj Prabhakaran 0001 COA-Secure Obfuscation and Applications. Search on Bibsonomy EUROCRYPT (1) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Ran Canetti, Palak Jain 0004, Marika Swanberg, Mayank Varia Universally Composable End-to-End Secure Messaging. Search on Bibsonomy CRYPTO (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Ran Canetti, Benjamin Fuller 0001, Omer Paneth, Leonid Reyzin, Adam D. Smith Reusable Fuzzy Extractors for Low-Entropy Distributions. Search on Bibsonomy J. Cryptol. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Ran Canetti, Rosario Gennaro, Steven Goldfeder, Nikolaos Makriyannis, Udi Peled UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
24Ran Canetti, Ari Karchmer Covert Learning: How to Learn with an Untrusted Intermediary. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
24Keren L. G. Snider, Ryan Shandler, Shay Zandani, Daphna Canetti Cyberattacks, cyber threats, and attitudes toward cybersecurity policies. Search on Bibsonomy J. Cybersecur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Ran Canetti, Ari Karchmer Covert Learning: How to Learn with an Untrusted Intermediary. Search on Bibsonomy TCC (3) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Massimo Zancanaro, Oliviero Stock, Gianluca Schiavo, Alessandro Cappelletti, Sebastian Gehrmann, Daphna Canetti, Ohad Shaked, Shani Fachter, Rachel Yifat, Ravit Mimran, Patrice L. (Tamar) Weiss Evaluating an automated mediator for joint narratives in a conflict situation. Search on Bibsonomy Behav. Inf. Technol. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Ran Canetti Universally Composable Security. Search on Bibsonomy J. ACM The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Ran Canetti, Ari Trachtenberg, Mayank Varia Anonymous Collocation Discovery: Taming the Coronavirus While Preserving Privacy. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
24Ran Canetti, Pratik Sarkar, Xiao Wang 0012 Blazing Fast OT for Three-Round UC OT Extension. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
24Ran Canetti, Oxana Poburinnaya Towards Multiparty Computation Withstanding Coercion of All Parties. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
24Ran Canetti, Pratik Sarkar, Xiao Wang 0012 Efficient and Round-Optimal Oblivious Transfer and Commitment with Adaptive Security. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
24Christian Badertscher, Ran Canetti, Julia Hesse, Björn Tackmann, Vassilis Zikas Universal Composition with Global Subroutines: Capturing Global Setup within plain UC. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
24Ran Canetti, Pratik Sarkar, Xiao Wang 0012 Triply Adaptive UC NIZK. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
24Ran Canetti, Nikolaos Makriyannis, Udi Peled UC Non-Interactive, Proactive, Threshold ECDSA. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
24Ran Canetti, Yael Tauman Kalai, Anna Lysyanskaya, Ronald L. Rivest, Adi Shamir, Emily Shen, Ari Trachtenberg, Mayank Varia, Daniel J. Weitzner Privacy-Preserving Automated Exposure Notification. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
24Sophia Backhaus, Michael L. Gross, Israel Waismel-Manor, Hagit Cohen, Daphna Canetti A Cyberterrorism Effect? Emotional Reactions to Lethal Attacks on Critical Infrastructure. Search on Bibsonomy Cyberpsychology Behav. Soc. Netw. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Ran Canetti, Rosario Gennaro, Steven Goldfeder, Nikolaos Makriyannis, Udi Peled UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts. Search on Bibsonomy CCS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Ran Canetti, Marten van Dijk, Hoda Maleki, Ulrich Rührmair, Patrick Schaumont Using Universal Composition to Design and Analyze Secure Complex Hardware Systems. Search on Bibsonomy DATE The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Ran Canetti, Oxana Poburinnaya Towards Multiparty Computation Withstanding Coercion of All Parties. Search on Bibsonomy TCC (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Christian Badertscher, Ran Canetti, Julia Hesse, Björn Tackmann, Vassilis Zikas Universal Composition with Global Subroutines: Capturing Global Setup Within Plain UC. Search on Bibsonomy TCC (3) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Ran Canetti, Pratik Sarkar, Xiao Wang 0012 Efficient and Round-Optimal Oblivious Transfer and Commitment with Adaptive Security. Search on Bibsonomy ASIACRYPT (3) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Ran Canetti, Pratik Sarkar, Xiao Wang 0012 Blazing Fast OT for Three-Round UC OT Extension. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Foteini Baldimtsi, Ran Canetti, Sophia Yakoubov Universally Composable Accumulators. Search on Bibsonomy CT-RSA The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Ran Canetti, Sunoo Park, Oxana Poburinnaya Fully Deniable Interactive Encryption. Search on Bibsonomy CRYPTO (1) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Massimo Zancanaro, Oliviero Stock, Gianluca Schiavo, Alessandro Cappelletti, Sebastian Gehrmann, Daphna Canetti, Ohad Shaked, Shani Fachter, Rachel Yifat, Ravit Mimran, Patrice L. Weiss Evaluating an Automated Mediator for Joint Narratives in a Conflict Situation. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
24Ran Canetti, Alley Stoughton, Mayank Varia EasyUC: Using EasyCrypt to Mechanize Proofs of Universally Composable Security. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
24Ran Canetti, Alley Stoughton, Mayank Varia EasyUC: Using EasyCrypt to Mechanize Proofs of Universally Composable Security. Search on Bibsonomy CSF The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
24Kyle Hogan, Hoda Maleki, Reza Rahaeimehr, Ran Canetti, Marten van Dijk, Jason Hennessey, Mayank Varia, Haibin Zhang On the Universally Composable Security of OpenStack. Search on Bibsonomy SecDev The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
24Ran Canetti, Yilei Chen 0001, Justin Holmgren, Alex Lombardi, Guy N. Rothblum, Ron D. Rothblum, Daniel Wichs Fiat-Shamir: from practice to theory. Search on Bibsonomy STOC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
24Ran Canetti, Aloni Cohen, Nishanth Dikkala, Govind Ramnarayan, Sarah Scheffler, Adam D. Smith From Soft Classifiers to Hard Decisions: How fair can we be? Search on Bibsonomy FAT The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
24Catherine K. Craven, Lina Jandorf, Cristina K. Villagra, Zeida Quintero-Canetti, Joseph L. Kannry, Bruce Darrow Mount Sinai Spanish-Language OpenNotes Navigator Program. Search on Bibsonomy AMIA The full citation details ... 2019 DBLP  BibTeX  RDF
24Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Moses D. Liskov, Nancy A. Lynch, Olivier Pereira, Roberto Segala Task-structured probabilistic I/O automata. Search on Bibsonomy J. Comput. Syst. Sci. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Ran Canetti, Aloni Cohen, Nishanth Dikkala, Govind Ramnarayan, Sarah Scheffler, Adam D. Smith From Soft Classifiers to Hard Decisions: How fair can we be? Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
24Ran Canetti, Sunoo Park, Oxana Poburinnaya Fully Bideniable Interactive Encryption. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
24Foteini Baldimtsi, Ran Canetti, Sophia Yakoubov Universally Composable Accumulators. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
24Ran Canetti, Alex Lombardi, Daniel Wichs Non-Interactive Zero Knowledge and Correlation Intractability from Circular-Secure FHE. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
24Ran Canetti, Yilei Chen 0001, Leonid Reyzin, Ron D. Rothblum Fiat-Shamir and Correlation Intractability from Strong KDM-Secure Encryption. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
24Ran Canetti, Yilei Chen 0001, Justin Holmgren, Alex Lombardi, Guy N. Rothblum, Ron D. Rothblum Fiat-Shamir From Simpler Assumptions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
24Kyle Hogan, Hoda Maleki, Reza Rahaeimehr, Ran Canetti, Marten van Dijk, Jason Hennessey, Mayank Varia, Haibin Zhang On the Universally Composable Security of OpenStack. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
24Nir Bitansky, Ran Canetti, Sanjam Garg, Justin Holmgren, Abhishek Jain 0002, Huijia Lin, Rafael Pass, Sidharth Telang, Vinod Vaikuntanathan Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings. Search on Bibsonomy SIAM J. Comput. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Ran Canetti, Amit Lichtenberg Certifying Trapdoor Permutations, Revisited. Search on Bibsonomy TCC (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Ran Canetti, Yilei Chen 0001, Leonid Reyzin, Ron D. Rothblum Fiat-Shamir and Correlation Intractability from Strong KDM-Secure Encryption. Search on Bibsonomy EUROCRYPT (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Nir Bitansky, Ran Canetti, Alessandro Chiesa, Shafi Goldwasser, Huijia Lin, Aviad Rubinstein, Eran Tromer The Hunting of the SNARK. Search on Bibsonomy J. Cryptol. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Nir Bitansky, Ran Canetti, Yael Tauman Kalai, Omer Paneth On Virtual Grey Box Obfuscation for General Circuits. Search on Bibsonomy Algorithmica The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Ran Canetti, Amit Lichtenberg Certifying Trapdoor Permutations, Revisited. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
24Ran Canetti, Justin Holmgren, Silas Richelson Towards Doubly Efficient Private Information Retrieval. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
24Ran Canetti, Kyle Hogan, Aanchal Malhotra, Mayank Varia A Universally Composable Treatment of Network Time. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
24Ran Canetti, Yilei Chen 0001 Constraint-hiding Constrained PRFs for NC1 from LWE. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
24Michael L. Gross, Daphna Canetti, Dana Randall Cyberterrorism: its effects on psychological well-being, public confidence and political attitudes. Search on Bibsonomy J. Cybersecur. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 422 (100 per page; Change: )
Pages: [1][2][3][4][5][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license