|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 162 occurrences of 106 keywords
|
|
|
Results
Found 428 publication records. Showing 422 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
93 | Yvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto |
Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model. |
Appl. Algebra Eng. Commun. Comput. |
2006 |
DBLP DOI BibTeX RDF |
Canetti, Krawczyk model, Security proofs, Key exchange protocols |
49 | Xinghua Li 0001, Jianfeng Ma 0001, Sang-Jae Moon |
On the Security of the Canetti-Krawczyk Model. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
49 | Yvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto |
Tripartite Key Exchange in the Canetti-Krawczyk Proof Model. |
INDOCRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
49 | Yiu Shing Terry Tin, Colin Boyd, Juan Manuel González Nieto |
Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
44 | Qingfeng Cheng, Chuangui Ma, Xuexian Hu |
A New Strongly Secure Authenticated Key Exchange Protocol. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
Extended Canetti-Krawczyk model, Gap Diffie-Hellman assumption, Random oracle model, Authenticated key exchange |
44 | Xinghua Li 0001, Jianfeng Ma 0001, Sang-Jae Moon |
Security Analysis of the Authentication Modules of Chinese WLAN Standard and Its Implementation Plan. |
NPC |
2007 |
DBLP DOI BibTeX RDF |
WAPI, Canetti-Krawczyk model, WLAN, Key-agreement protocol |
41 | Ralf Küsters, Max Tuengerthal |
Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation. |
CSF |
2008 |
DBLP DOI BibTeX RDF |
simulation-based security, joint state, secure composition, cryptographic protocols |
41 | Benoît Libert, Damien Vergnaud |
Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
unidirectionality, standard model, chosen-ciphertext security, proxy re-encryption |
41 | Chik How Tan |
Public-Key Encryption from ID-Based Encryption Without One-Time Signature. |
OTM Workshops (1) |
2006 |
DBLP DOI BibTeX RDF |
Cryptography, public key encryption, bilinear maps |
41 | Kim-Kwang Raymond Choo, Yvonne Hitchcock |
Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
41 | Yvonne Hitchcock, Yiu Shing Terry Tin, Juan Manuel González Nieto, Colin Boyd, Paul Montague |
A Password-Based Authenticator: Security Proof and Applications. |
INDOCRYPT |
2003 |
DBLP DOI BibTeX RDF |
key agreement, password authentication, Key management protocols |
41 | Ivan Damgård, Jesper Buus Nielsen |
Improved Non-committing Encryption Schemes Based on a General Complexity Assumption. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
|
38 | Waseem Daher, Ran Canetti |
POSH: a generalized captcha with security applications. |
AISec |
2008 |
DBLP DOI BibTeX RDF |
puzzles, password security |
38 | Ran Canetti |
Universally Composable Signature, Certification, and Authentication. |
CSFW |
2004 |
DBLP DOI BibTeX RDF |
|
38 | Ran Canetti, Hugo Krawczyk |
Universally Composable Notions of Key Exchange and Secure Channels. |
EUROCRYPT |
2002 |
DBLP DOI BibTeX RDF |
Composition of protocols, Cryptographic Protocols, Key Exchange, Proofs of Security |
38 | Ran Canetti, Hugo Krawczyk |
Security Analysis of IKE's Signature-Based Key-Exchange Protocol. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
38 | Ran Canetti, Ivan Damgård, Stefan Dziembowski, Yuval Ishai, Tal Malkin |
On Adaptive vs. Non-adaptive Security of Multiparty Protocols. |
EUROCRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
35 | Simone Patonico, An Braeken, Kris Steenhaut |
Identity-based and anonymous key agreement protocol for fog computing resistant in the Canetti-Krawczyk security model. |
Wirel. Networks |
2023 |
DBLP DOI BibTeX RDF |
|
35 | Jung Hee Cheon, Jinhyuck Jeong, Dongwoo Kim 0003, Jongchan Lee |
A Reusable Fuzzy Extractor with Practical Storage Size: Modifying Canetti et al.'s Construction. |
ACISP |
2018 |
DBLP DOI BibTeX RDF |
|
35 | Lucjan Hanzlik, Miroslaw Kutylowski |
Restricted Identification Secure in the Extended Canetti-Krawczyk Model. |
J. Univers. Comput. Sci. |
2015 |
DBLP BibTeX RDF |
|
35 | Xinghua Li 0001, Jianfeng Ma 0001, Sang-Jae Moon |
Security extension for the Canetti-Krawczyk model in identity-based systems. |
Sci. China Ser. F Inf. Sci. |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee |
Improved Non-committing Encryption with Applications to Adaptively Secure Protocols. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
adaptive corruption, non-committing encryption, public-key encryption, secure multi-party computation |
28 | Daniele Micciancio, Saurabh Panjwani |
Optimal communication complexity of generic multicast key distribution. |
IEEE/ACM Trans. Netw. |
2008 |
DBLP DOI BibTeX RDF |
nested encryption, security, multicast, lower bounds, secret sharing, key distribution |
28 | Alfred Menezes, Berkant Ustaoglu |
Comparing the Pre- and Post-specified Peer Models for Key Agreement. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Krzysztof Pietrzak |
Compression from Collisions, or Why CRHF Combiners Have a Long Output. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Marek Klonowski, Przemyslaw Kubiak 0001, Miroslaw Kutylowski |
Practical Deniable Encryption. |
SOFSEM |
2008 |
DBLP DOI BibTeX RDF |
deniable encryption |
28 | Brian A. LaMacchia, Kristin E. Lauter, Anton Mityagin |
Stronger Security of Authenticated Key Exchange. |
ProvSec |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Kim-Kwang Raymond Choo |
Refuting Security Proofs for Tripartite Key Exchange with Model Checker in Planning Problem Setting. |
CSFW |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Alejandro Hevia |
Universally Composable Simultaneous Broadcast. |
SCN |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Fan Zhang, Jianfeng Ma 0001 |
Security Analysis on Chinese Wireless LAN Standard and Its Solution. |
ICPP Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Chanathip Namprempre |
Secure Channels Based on Authenticated Encryption Schemes: A Simple Characterization. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
24 | Ran Canetti, Claudio Chamon, Eduardo R. Mucciolo, Andrei E. Ruckenstein |
Towards general-purpose program obfuscation via local mixing. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
24 | Ran Canetti, Amos Fiat, Yannai A. Gonczarowski |
Zero-Knowledge Mechanisms. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Claudio Chamon, Andrei E. Ruckenstein, Eduardo R. Mucciolo, Ran Canetti |
Circuit complexity and functionality: a thermodynamic perspective. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Jens Ernstberger, Jan Lauinger, Fatima Elsheimy, Liyi Zhou, Sebastian Steinhorst, Ran Canetti, Andrew Miller 0001, Arthur Gervais, Dawn Song |
SoK: Data Sovereignty. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
24 | Ran Canetti, Sebastian Kolby, Divya Ravi, Eduardo Soria-Vazquez, Sophia Yakoubov |
Taming Adaptivity in YOSO Protocols: The Modular Way. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
24 | Maor Bluman, Keren L. G. Snider, Guy Baratz, Amit Cohen, Daphna Canetti, Béatrice S. Hasler |
Virtual Reality-Based Joy Induction: The Role of Interactivity and Prior Mood. |
Cyberpsychology Behav. Soc. Netw. |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Zvika Brakerski, Ran Canetti, Luowen Qian |
On the Computational Hardness Needed for Quantum Cryptography. |
ITCS |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Ran Canetti, Sebastian Kolby, Divya Ravi, Eduardo Soria-Vazquez, Sophia Yakoubov |
Taming Adaptivity in YOSO Protocols: The Modular Way. |
TCC (2) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Jens Ernstberger, Jan Lauinger, Fatima Elsheimy, Liyi Zhou, Sebastian Steinhorst, Ran Canetti, Andrew Miller 0001, Arthur Gervais, Dawn Song |
SoK: Data Sovereignty. |
EuroS&P |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Zvika Brakerski, Ran Canetti, Luowen Qian |
On the computational hardness needed for quantum cryptography. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Ghada Almashaqbeh, Ran Canetti, Yaniv Erlich, Jonathan Gershoni, Tal Malkin, Itsik Pe'er, Anna Roitburd-Berman, Eran Tromer |
Unclonable Polymers and Their Cryptographic Applications. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
24 | Zvika Brakerski, Ran Canetti, Luowen Qian |
On the computational hardness needed for quantum cryptography. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
24 | Ran Canetti, Suvradip Chakraborty, Dakshita Khurana, Nishant Kumar 0001, Oxana Poburinnaya, Manoj Prabhakaran 0001 |
COA-Secure Obfuscation and Applications. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
24 | Ran Canetti, Palak Jain 0004, Marika Swanberg, Mayank Varia |
Universally Composable End-to-End Secure Messaging. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
24 | Ran Canetti, Oxana Poburinnaya, Muthuramakrishnan Venkitasubramaniam |
Equivocating Yao: Constant-Round Adaptively Secure Multiparty Computation in the Plain Model. |
SIAM J. Comput. |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Dor Bitan, Ran Canetti, Shafi Goldwasser, Rebecca Wexler |
Using Zero-Knowledge to Reconcile Law Enforcement Secrecy and Fair Trial Rights in Criminal Cases. |
CSLAW |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Ran Canetti, Pratik Sarkar, Xiao Wang 0012 |
Triply Adaptive UC NIZK. |
ASIACRYPT (2) |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Ghada Almashaqbeh, Ran Canetti, Yaniv Erlich, Jonathan Gershoni, Tal Malkin, Itsik Pe'er, Anna Roitburd-Berman, Eran Tromer |
Unclonable Polymers and Their Cryptographic Applications. |
EUROCRYPT (1) |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Ran Canetti, Suvradip Chakraborty, Dakshita Khurana, Nishant Kumar 0001, Oxana Poburinnaya, Manoj Prabhakaran 0001 |
COA-Secure Obfuscation and Applications. |
EUROCRYPT (1) |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Ran Canetti, Palak Jain 0004, Marika Swanberg, Mayank Varia |
Universally Composable End-to-End Secure Messaging. |
CRYPTO (2) |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Ran Canetti, Benjamin Fuller 0001, Omer Paneth, Leonid Reyzin, Adam D. Smith |
Reusable Fuzzy Extractors for Low-Entropy Distributions. |
J. Cryptol. |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Ran Canetti, Rosario Gennaro, Steven Goldfeder, Nikolaos Makriyannis, Udi Peled |
UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts. |
IACR Cryptol. ePrint Arch. |
2021 |
DBLP BibTeX RDF |
|
24 | Ran Canetti, Ari Karchmer |
Covert Learning: How to Learn with an Untrusted Intermediary. |
IACR Cryptol. ePrint Arch. |
2021 |
DBLP BibTeX RDF |
|
24 | Keren L. G. Snider, Ryan Shandler, Shay Zandani, Daphna Canetti |
Cyberattacks, cyber threats, and attitudes toward cybersecurity policies. |
J. Cybersecur. |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Ran Canetti, Ari Karchmer |
Covert Learning: How to Learn with an Untrusted Intermediary. |
TCC (3) |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Massimo Zancanaro, Oliviero Stock, Gianluca Schiavo, Alessandro Cappelletti, Sebastian Gehrmann, Daphna Canetti, Ohad Shaked, Shani Fachter, Rachel Yifat, Ravit Mimran, Patrice L. (Tamar) Weiss |
Evaluating an automated mediator for joint narratives in a conflict situation. |
Behav. Inf. Technol. |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Ran Canetti |
Universally Composable Security. |
J. ACM |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Ran Canetti, Ari Trachtenberg, Mayank Varia |
Anonymous Collocation Discovery: Taming the Coronavirus While Preserving Privacy. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
24 | Ran Canetti, Pratik Sarkar, Xiao Wang 0012 |
Blazing Fast OT for Three-Round UC OT Extension. |
IACR Cryptol. ePrint Arch. |
2020 |
DBLP BibTeX RDF |
|
24 | Ran Canetti, Oxana Poburinnaya |
Towards Multiparty Computation Withstanding Coercion of All Parties. |
IACR Cryptol. ePrint Arch. |
2020 |
DBLP BibTeX RDF |
|
24 | Ran Canetti, Pratik Sarkar, Xiao Wang 0012 |
Efficient and Round-Optimal Oblivious Transfer and Commitment with Adaptive Security. |
IACR Cryptol. ePrint Arch. |
2020 |
DBLP BibTeX RDF |
|
24 | Christian Badertscher, Ran Canetti, Julia Hesse, Björn Tackmann, Vassilis Zikas |
Universal Composition with Global Subroutines: Capturing Global Setup within plain UC. |
IACR Cryptol. ePrint Arch. |
2020 |
DBLP BibTeX RDF |
|
24 | Ran Canetti, Pratik Sarkar, Xiao Wang 0012 |
Triply Adaptive UC NIZK. |
IACR Cryptol. ePrint Arch. |
2020 |
DBLP BibTeX RDF |
|
24 | Ran Canetti, Nikolaos Makriyannis, Udi Peled |
UC Non-Interactive, Proactive, Threshold ECDSA. |
IACR Cryptol. ePrint Arch. |
2020 |
DBLP BibTeX RDF |
|
24 | Ran Canetti, Yael Tauman Kalai, Anna Lysyanskaya, Ronald L. Rivest, Adi Shamir, Emily Shen, Ari Trachtenberg, Mayank Varia, Daniel J. Weitzner |
Privacy-Preserving Automated Exposure Notification. |
IACR Cryptol. ePrint Arch. |
2020 |
DBLP BibTeX RDF |
|
24 | Sophia Backhaus, Michael L. Gross, Israel Waismel-Manor, Hagit Cohen, Daphna Canetti |
A Cyberterrorism Effect? Emotional Reactions to Lethal Attacks on Critical Infrastructure. |
Cyberpsychology Behav. Soc. Netw. |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Ran Canetti, Rosario Gennaro, Steven Goldfeder, Nikolaos Makriyannis, Udi Peled |
UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts. |
CCS |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Ran Canetti, Marten van Dijk, Hoda Maleki, Ulrich Rührmair, Patrick Schaumont |
Using Universal Composition to Design and Analyze Secure Complex Hardware Systems. |
DATE |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Ran Canetti, Oxana Poburinnaya |
Towards Multiparty Computation Withstanding Coercion of All Parties. |
TCC (2) |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Christian Badertscher, Ran Canetti, Julia Hesse, Björn Tackmann, Vassilis Zikas |
Universal Composition with Global Subroutines: Capturing Global Setup Within Plain UC. |
TCC (3) |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Ran Canetti, Pratik Sarkar, Xiao Wang 0012 |
Efficient and Round-Optimal Oblivious Transfer and Commitment with Adaptive Security. |
ASIACRYPT (3) |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Ran Canetti, Pratik Sarkar, Xiao Wang 0012 |
Blazing Fast OT for Three-Round UC OT Extension. |
Public Key Cryptography (2) |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Foteini Baldimtsi, Ran Canetti, Sophia Yakoubov |
Universally Composable Accumulators. |
CT-RSA |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Ran Canetti, Sunoo Park, Oxana Poburinnaya |
Fully Deniable Interactive Encryption. |
CRYPTO (1) |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Massimo Zancanaro, Oliviero Stock, Gianluca Schiavo, Alessandro Cappelletti, Sebastian Gehrmann, Daphna Canetti, Ohad Shaked, Shani Fachter, Rachel Yifat, Ravit Mimran, Patrice L. Weiss |
Evaluating an Automated Mediator for Joint Narratives in a Conflict Situation. |
CoRR |
2019 |
DBLP BibTeX RDF |
|
24 | Ran Canetti, Alley Stoughton, Mayank Varia |
EasyUC: Using EasyCrypt to Mechanize Proofs of Universally Composable Security. |
IACR Cryptol. ePrint Arch. |
2019 |
DBLP BibTeX RDF |
|
24 | Ran Canetti, Alley Stoughton, Mayank Varia |
EasyUC: Using EasyCrypt to Mechanize Proofs of Universally Composable Security. |
CSF |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Kyle Hogan, Hoda Maleki, Reza Rahaeimehr, Ran Canetti, Marten van Dijk, Jason Hennessey, Mayank Varia, Haibin Zhang |
On the Universally Composable Security of OpenStack. |
SecDev |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Ran Canetti, Yilei Chen 0001, Justin Holmgren, Alex Lombardi, Guy N. Rothblum, Ron D. Rothblum, Daniel Wichs |
Fiat-Shamir: from practice to theory. |
STOC |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Ran Canetti, Aloni Cohen, Nishanth Dikkala, Govind Ramnarayan, Sarah Scheffler, Adam D. Smith |
From Soft Classifiers to Hard Decisions: How fair can we be? |
FAT |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Catherine K. Craven, Lina Jandorf, Cristina K. Villagra, Zeida Quintero-Canetti, Joseph L. Kannry, Bruce Darrow |
Mount Sinai Spanish-Language OpenNotes Navigator Program. |
AMIA |
2019 |
DBLP BibTeX RDF |
|
24 | Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Moses D. Liskov, Nancy A. Lynch, Olivier Pereira, Roberto Segala |
Task-structured probabilistic I/O automata. |
J. Comput. Syst. Sci. |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Ran Canetti, Aloni Cohen, Nishanth Dikkala, Govind Ramnarayan, Sarah Scheffler, Adam D. Smith |
From Soft Classifiers to Hard Decisions: How fair can we be? |
CoRR |
2018 |
DBLP BibTeX RDF |
|
24 | Ran Canetti, Sunoo Park, Oxana Poburinnaya |
Fully Bideniable Interactive Encryption. |
IACR Cryptol. ePrint Arch. |
2018 |
DBLP BibTeX RDF |
|
24 | Foteini Baldimtsi, Ran Canetti, Sophia Yakoubov |
Universally Composable Accumulators. |
IACR Cryptol. ePrint Arch. |
2018 |
DBLP BibTeX RDF |
|
24 | Ran Canetti, Alex Lombardi, Daniel Wichs |
Non-Interactive Zero Knowledge and Correlation Intractability from Circular-Secure FHE. |
IACR Cryptol. ePrint Arch. |
2018 |
DBLP BibTeX RDF |
|
24 | Ran Canetti, Yilei Chen 0001, Leonid Reyzin, Ron D. Rothblum |
Fiat-Shamir and Correlation Intractability from Strong KDM-Secure Encryption. |
IACR Cryptol. ePrint Arch. |
2018 |
DBLP BibTeX RDF |
|
24 | Ran Canetti, Yilei Chen 0001, Justin Holmgren, Alex Lombardi, Guy N. Rothblum, Ron D. Rothblum |
Fiat-Shamir From Simpler Assumptions. |
IACR Cryptol. ePrint Arch. |
2018 |
DBLP BibTeX RDF |
|
24 | Kyle Hogan, Hoda Maleki, Reza Rahaeimehr, Ran Canetti, Marten van Dijk, Jason Hennessey, Mayank Varia, Haibin Zhang |
On the Universally Composable Security of OpenStack. |
IACR Cryptol. ePrint Arch. |
2018 |
DBLP BibTeX RDF |
|
24 | Nir Bitansky, Ran Canetti, Sanjam Garg, Justin Holmgren, Abhishek Jain 0002, Huijia Lin, Rafael Pass, Sidharth Telang, Vinod Vaikuntanathan |
Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings. |
SIAM J. Comput. |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Ran Canetti, Amit Lichtenberg |
Certifying Trapdoor Permutations, Revisited. |
TCC (1) |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Ran Canetti, Yilei Chen 0001, Leonid Reyzin, Ron D. Rothblum |
Fiat-Shamir and Correlation Intractability from Strong KDM-Secure Encryption. |
EUROCRYPT (1) |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Nir Bitansky, Ran Canetti, Alessandro Chiesa, Shafi Goldwasser, Huijia Lin, Aviad Rubinstein, Eran Tromer |
The Hunting of the SNARK. |
J. Cryptol. |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Nir Bitansky, Ran Canetti, Yael Tauman Kalai, Omer Paneth |
On Virtual Grey Box Obfuscation for General Circuits. |
Algorithmica |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Ran Canetti, Amit Lichtenberg |
Certifying Trapdoor Permutations, Revisited. |
IACR Cryptol. ePrint Arch. |
2017 |
DBLP BibTeX RDF |
|
24 | Ran Canetti, Justin Holmgren, Silas Richelson |
Towards Doubly Efficient Private Information Retrieval. |
IACR Cryptol. ePrint Arch. |
2017 |
DBLP BibTeX RDF |
|
24 | Ran Canetti, Kyle Hogan, Aanchal Malhotra, Mayank Varia |
A Universally Composable Treatment of Network Time. |
IACR Cryptol. ePrint Arch. |
2017 |
DBLP BibTeX RDF |
|
24 | Ran Canetti, Yilei Chen 0001 |
Constraint-hiding Constrained PRFs for NC1 from LWE. |
IACR Cryptol. ePrint Arch. |
2017 |
DBLP BibTeX RDF |
|
24 | Michael L. Gross, Daphna Canetti, Dana Randall |
Cyberterrorism: its effects on psychological well-being, public confidence and political attitudes. |
J. Cybersecur. |
2017 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 422 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ >>] |
|