Anna Lysyanskaya
Orcid: 0000-0002-3567-3550Affiliations:
- Brown University, Providence, RI, USA
According to our database1,
Anna Lysyanskaya
authored at least 96 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on id.loc.gov
On csauthors.net:
Bibliography
2024
Symmetric and Dual PRFs from Standard Assumptions: A Generic Validation of a Prevailing Assumption.
J. Cryptol., December, 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Olympic Privacy-Preserving Blueprints: Faster Communication, Highly Functional, Stronger Security.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
An Unstoppable Ideal Functionality for Signatures and a Modular Analysis of the Dolev-Strong Broadcast.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
PACIFIC: Privacy-preserving automated contact tracing featuring integrity against cloning.
IACR Commun. Cryptol., 2024
2023
Aggregate Signatures with Versatile Randomization and Issuer-Hiding Multi-Authority Anonymous Credentials.
IACR Cryptol. ePrint Arch., 2023
Lattice-based Commit-Transferrable Signatures and Applications to Anonymous Credentials.
IACR Cryptol. ePrint Arch., 2023
PACIFIC: Privacy-preserving automated contact tracing scheme featuring integrity against cloning.
IACR Cryptol. ePrint Arch., 2023
2022
Efficient and Universally Composable Non-Interactive Zero-Knowledge Proofs of Knowledge with Security Against Adaptive Corruptions.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Theory of Cryptography - 20th International Conference, 2022
PI-Cut-Choo and Friends: Compact Blind Signatures via Parallel Instance Cut-and-Choose and More.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022
2021
Proc. Priv. Enhancing Technol., 2021
Safepaths: Vaccine Diary Protocol and Decentralized Vaccine Coordination System using a Privacy Preserving User Centric Experience.
CoRR, 2021
Proceedings of the 2nd Conference on Information-Theoretic Cryptography, 2021
2020
J. Cryptol., 2020
IACR Cryptol. ePrint Arch., 2020
2019
Dagstuhl Reports, 2019
2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 45th International Colloquium on Automata, Languages, and Programming, 2018
2017
IACR Cryptol. ePrint Arch., 2017
2015
Symmetric and Dual PRFs from Standard Assumptions: A Generic Validation of an HMAC Assumption.
IACR Cryptol. ePrint Arch., 2015
2014
Memento: How to Reconstruct your Secrets from a Single Password in a Hostile Environment.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014
2013
Malleable Signatures: Complex Unary Transformations and Delegatable Anonymous Credentials.
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Privacy Enhancing Technologies - 13th International Symposium, 2013
2012
ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash.
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing.
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
2011
2010
ACM Trans. Inf. Syst. Secur., 2010
Rational Secret Sharing with Side Information in Point-to-Point Networks via Time-Delayed Encryption.
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010
2009
Proceedings of the Identity-Based Cryptography, 2009
Brief announcement: impossibility results for optimistic fair exchange with multiple autonomous arbiters.
Proceedings of the 28th Annual ACM Symposium on Principles of Distributed Computing, 2009
Proceedings of the Advances in Cryptology, 2009
2008
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008
2007
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007
Proceedings of the Advances in Cryptology, 2007
2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006
Proceedings of the Public Key Cryptography, 2006
Proceedings of the Advances in Cryptology, 2006
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
2005
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005
2004
ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption.
IACR Cryptol. ePrint Arch., 2004
Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering.
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004
Proceedings of the Security Protocols, 2004
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004
Proceedings of the Advances in Cryptology, 2004
2003
IACR Cryptol. ePrint Arch., 2003
2002
PhD thesis, 2002
IACR Cryptol. ePrint Arch., 2002
Proceedings of the Security in Communication Networks, Third International Conference, 2002
Proceedings of the Twenty-First Annual ACM Symposium on Principles of Distributed Computing, 2002
Proceedings of the Advances in Cryptology, 2002
Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials.
Proceedings of the Advances in Cryptology, 2002
2001
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation.
IACR Cryptol. ePrint Arch., 2001
Proceedings of the Advances in Cryptology, 2001
Proceedings of the Advances in Cryptology, 2001
2000
IACR Cryptol. ePrint Arch., 2000
Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures.
Proceedings of the Advances in Cryptology, 2000
1999
Proceedings of the Selected Areas in Cryptography, 6th Annual International Workshop, 1999
1998
Proceedings of the Financial Cryptography, 1998