2025
End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage.
ACM Trans. Priv. Secur., May, 2025
HBSS: (Simple) hash-based stateless signatures - hash all the way to the rescue!
Cryptogr. Commun., May, 2025
The Battery Insertion Attack: Is Periodic Pseudo-randomization Sufficient for Beacon Privacy?
Proc. Priv. Enhancing Technol., 2025
RSA Blind Signatures with Public Metadata.
Proc. Priv. Enhancing Technol., 2025
Anamorphism Beyond One-to-One Messaging: Public-Key with Anamorphic Broadcast Mode.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025
2024
Adversarial Missingness Attacks on Causal Structure Learning.
ACM Trans. Intell. Syst. Technol., December, 2024
Public-Key Anamorphism in (CCA-secure) Public-Key Encryption and Beyond.
IACR Cryptol. ePrint Arch., 2024
Covert 19th century political intrigues of Tenerife nobility revealed by cryptanalyzing an encrypted letter.
IACR Cryptol. ePrint Arch., 2024
Mirrored Commitment: Fixing "Randomized Partial Checking" and Applications.
IACR Cryptol. ePrint Arch., 2024
The Mis/Dis-information Problem is Hard to Solve.
IACR Cryptol. ePrint Arch., 2024
Challenges in Timed Cryptography: A Position Paper.
IACR Cryptol. ePrint Arch., 2024
Composing Timed Cryptographic Protocols: Foundations and Applications.
IACR Cryptol. ePrint Arch., 2024
Is Periodic Pseudo-randomization Sufficient for Beacon Privacy?
IACR Cryptol. ePrint Arch., 2024
Cryptiny: Compacting Cryptography for Space-Restricted Channels and its Use-case for IoT-E2EE.
IACR Cryptol. ePrint Arch., 2024
Exploiting the Data Gap: Utilizing Non-ignorable Missingness to Manipulate Model Learning.
CoRR, 2024
SpotProxy: Rediscovering the Cloud for Censorship Circumvention.
Proceedings of the 33rd USENIX Security Symposium, 2024
Challenges in Timed-Cryptography: A Position Paper (Short Paper).
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2024
Stop Stealing My Data: Sanitizing Stego Channels in 3D Printing Design Files.
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024
2023
The Self-Anti-Censorship Nature of Encryption: On the Prevalence of Anamorphic Cryptography.
Proc. Priv. Enhancing Technol., October, 2023
Dynamic Volume-Hiding Encrypted Multi-Maps with Applications to Searchable Encryption.
Proc. Priv. Enhancing Technol., January, 2023
Sender-Anamorphic Encryption Reformulated: Achieving Robust and Generic Constructions.
IACR Cryptol. ePrint Arch., 2023
The Self-Anti-Censorship Nature of Encryption: On the Prevalence of Anamorphic Cryptography.
IACR Cryptol. ePrint Arch., 2023
Anamorphic Signatures: Secrecy From a Dictator Who Only Permits Authentication!
IACR Cryptol. ePrint Arch., 2023
Standard Model Time-Lock Puzzles: Defining Security and Constructing via Composition.
IACR Cryptol. ePrint Arch., 2023
Deception by Omission: Using Adversarial Missingness to Poison Causal Structure Learning.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023
HBSS: (Simple) Hash-Based Stateless Signatures - Hash All the Way to the Rescue! - (Preliminary Version).
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023
Midgame Attacks and Defense Against Them.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023
Anamorphic Signatures: Secrecy from a Dictator Who Only Permits Authentication!
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
2022
Eddystone-EID: Secure and Private Infrastructural Protocol for BLE Beacons.
IEEE Trans. Inf. Forensics Secur., 2022
Anamorphic Encryption: Private Communication against a Dictator.
IACR Cryptol. ePrint Arch., 2022
On Regenerating Codes and Proactive Secret Sharing: Relationships and Implications.
IACR Cryptol. ePrint Arch., 2022
Privacy Guarantees of Bluetooth Low Energy Contact Tracing: A Case Study on COVIDWISE.
Computer, 2022
An Adversarial Perspective on Accuracy, Robustness, Fairness, and Privacy: Multilateral-Tradeoffs in Trustworthy ML.
IEEE Access, 2022
Crypto-Steganographic Validity for Additive Manufacturing (3D Printing) Design Files.
Proceedings of the Information Security - 25th International Conference, 2022
One-Shot Fiat-Shamir-Based NIZK Arguments of Composite Residuosity and Logarithmic-Size Ring Signatures in the Standard Model.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
Scaling up GAEN Pseudorandom Processes: Preparing for a More Extensive Pandemic.
Proceedings of the Computer Security - ESORICS 2022, 2022
Differentially-Private "Draw and Discard" Machine Learning: Training Distributed Model from Enormous Crowds.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2022
AMSec'22: ACM CCS Workshop on Additive Manufacturing (3D Printing) Security.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Privacy Guarantees of BLE Contact Tracing for COVID-19 and Beyond: A Case Study on COVIDWISE.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
Seeking Foundations for the Science of Cyber Security.
Inf. Syst. Frontiers, 2021
Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved.
IACR Cryptol. ePrint Arch., 2021
Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-secure IBE.
IACR Cryptol. ePrint Arch., 2021
Correcting Subverted Random Oracles.
IACR Cryptol. ePrint Arch., 2021
Non-Interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings.
IACR Cryptol. ePrint Arch., 2021
Privacy Guarantees of BLE Contact Tracing: A Case Study on COVIDWISE.
CoRR, 2021
What Did You Add to My Additive Manufacturing Data?: Steganographic Attacks on 3D Printing Files.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021
Bifurcated Signatures: Folding the Accountability vs. Anonymity Dilemma into a Single Private Signing Scheme.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
Fully Dynamic Password Protected Secret Sharing: Simplifying PPSS Operation and Maintenance.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021
Myths and Misconceptions in Additive Manufacturing Security: Deficiencies of the CIA Triad.
Proceedings of the AMSec '21: Proceedings of the 2021 Workshop on Additive Manufacturing (3D Printing) Security, 2021
Emerging Security Challenges for Ubiquitous Devices.
Proceedings of the Security of Ubiquitous Computing Systems, 2021
2020
The combinatorics of hidden diversity.
Theor. Comput. Sci., 2020
Adaptively Secure Non-interactive CCA-Secure Threshold Cryptosystems: Generic Framework and Constructions.
J. Cryptol., 2020
Special issue on security and privacy of blockchain technologies.
Int. J. Inf. Sec., 2020
Two-Sided Malicious Security for Private Intersection-Sum with Cardinality.
IACR Cryptol. ePrint Arch., 2020
Compact Simulation-Sound NIZK Arguments of Composite Residuosity and Applications to Logarithmic-Size Ring Signatures.
IACR Cryptol. ePrint Arch., 2020
Communication-Efficient (Proactive) Secure Computation for Dynamic General Adversary Structures and Dynamic Groups.
IACR Cryptol. ePrint Arch., 2020
A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke Schemes.
IACR Cryptol. ePrint Arch., 2020
Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption.
IACR Cryptol. ePrint Arch., 2020
Secure Computation Protocol: A Technology for Our Time.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
On Deploying Secure Computing: Private Intersection-Sum-with-Cardinality.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
GDPR - Challenges for Reconciling Legal Rules with Technical Reality.
Proceedings of the Computer Security - ESORICS 2020, 2020
Zero-Knowledge to the Rescue: Consistent Redundant Backup of Keys Generated for Critical Financial Services.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2020
2019
Paradigm Shifts in Cryptographic Engineering.
IEEE Trans. Dependable Secur. Comput., 2019
Mitigating Leakage in Secure Cloud-Hosted Data Structures: Volume-Hiding for Multi-Maps via Hashing.
IACR Cryptol. ePrint Arch., 2019
On Deploying Secure Computing Commercially: Private Intersection-Sum Protocols and their Business Applications.
IACR Cryptol. ePrint Arch., 2019
Biggest Failures in Security (Dagstuhl Seminar 19451).
Dagstuhl Reports, 2019
CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts.
Comput. J., 2019
Let a Non-barking Watchdog Bite: Cliptographic Signatures with an Offline Watchdog.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019
Secure Zero-Day Detection: Wiping Off the VEP Trade-Off.
Proceedings of the 1st ACM Workshop on Workshop on Cyber-Security Arms Race, 2019
A Methodology for Retrofitting Privacy and Its Application to e-Shopping Transactions.
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019
2018
Special Issue on Advanced Persistent Threat.
Future Gener. Comput. Syst., 2018
Differentially-Private "Draw and Discard" Machine Learning.
CoRR, 2018
Proactive Secure Multiparty Computation with a Dishonest Majority.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018
Privacy in e-Shopping Transactions: Exploring and Addressing the Trade-Offs.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2018
Correcting Subverted Random Oracles.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
Theoretical Foundations for Mobile Target Defense: Proactive Secret Sharing and Secure Multiparty Computation.
Proceedings of the From Database to Cyber Security, 2018
2017
Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency.
Theor. Comput. Sci., 2017
Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange.
Sensors, 2017
Private Intersection-Sum Protocol with Applications to Attributing Aggregate Ad Conversions.
IACR Cryptol. ePrint Arch., 2017
On Ransomware and Envisioning the Enemy of Tomorrow.
Computer, 2017
Cryptovirology: the birth, neglect, and explosion of ransomware.
Commun. ACM, 2017
Brief Announcement: Secure Self-Stabilizing Computation.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2017
The Combinatorics of Product Scanning Multiplication and Squaring.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017
Generic Semantic Security against a Kleptographic Adversary.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Secure Wallet-Assisted Offline Bitcoin Payments with Double-Spender Revocation.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Cliptography: Post-Snowden Cryptography.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Born and raised distributively: Fully distributed non-interactive adaptively-secure threshold signatures with short shares.
Theor. Comput. Sci., 2016
Concurrent Knowledge Extraction in Public-Key Models.
J. Cryptol., 2016
Semantically Secure Anonymity: Foundations of Re-encryption.
IACR Cryptol. ePrint Arch., 2016
Destroying Steganography via Amalgamation: Kleptographically CPA Secure Public Key Encryption.
IACR Cryptol. ePrint Arch., 2016
Functional Commitment Schemes: From Polynomial Commitments to Pairing-Based Accumulators from Simple Assumptions.
IACR Cryptol. ePrint Arch., 2016
Towards a Unified Security Model for Physically Unclonable Functions.
IACR Cryptol. ePrint Arch., 2016
Proactive Secret Sharing with a Dishonest Majority.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016
On the Implausibility of Constant-Round Public-Coin Zero-Knowledge Proofs.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016
Brief Announcement: Proactive Secret Sharing with a Dishonest Majority.
Proceedings of the 2016 ACM Symposium on Principles of Distributed Computing, 2016
Practical "Signatures with Efficient Protocols" from Simple Assumptions.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Cryptography as an Attack Technology: Proving the RSA/Factoring Kleptographic Attack.
Proceedings of the New Codebreakers, 2016
2015
Sequential aggregate signatures with short public keys without random oracles.
Theor. Comput. Sci., 2015
Cliptography: Clipping the Power of Kleptographic Attacks.
IACR Cryptol. ePrint Arch., 2015
Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions.
IACR Cryptol. ePrint Arch., 2015
Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications.
IACR Cryptol. ePrint Arch., 2015
End-to-end Design of a PUF-based Privacy Preserving Authentication Protocol.
IACR Cryptol. ePrint Arch., 2015
Linearly homomorphic structure-preserving signatures and their applications.
Des. Codes Cryptogr., 2015
The "Mobile Adversary" Paradigm in Distributed Computation and Systems.
Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing, 2015
Secure Efficient History-Hiding Append-Only Signatures in the Standard Model.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015
Hard Invalidation of Electronic Signatures.
Proceedings of the Information Security Practice and Experience, 2015
Privacy Threats in E-Shopping (Position Paper).
Proceedings of the Data Privacy Management, and Security Assurance, 2015
The bright side arguments for the coming smartphones crypto war: The added value of device encryption.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
From Mental Poker to Core Business: Why and How to Deploy Secure Computation Protocols?
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
WISCS'15: The 2nd ACM Workshop on Information Sharing and Collaborative Security.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Concise Multi-Challenge CCA-Secure Encryption and Signatures with Almost Tight Security.
IACR Cryptol. ePrint Arch., 2014
A Little Honesty Goes a Long Way: The Two-Tier Model for Secure Multiparty Computation.
IACR Cryptol. ePrint Arch., 2014
Narrow Bandwidth Is Not Inherent in Reverse Public-Key Encryption.
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014
Traceable Group Encryption.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014
On Offline Payments with Bitcoin (Poster Abstract).
Proceedings of the Financial Cryptography and Data Security, 2014
The drunk motorcyclist protocol for anonymous communication.
Proceedings of the IEEE Conference on Communications and Network Security, 2014
2013
Adaptively secure non-interactive threshold cryptosystems.
Theor. Comput. Sci., 2013
PUF-Based RFID Authentication Secure and Private under Complete Memory Leakage.
IACR Cryptol. ePrint Arch., 2013
Order-Preserving Encryption Secure Beyond One-Wayness.
IACR Cryptol. ePrint Arch., 2013
Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures.
IACR Cryptol. ePrint Arch., 2013
Sequential Aggregate Signatures Made Shorter.
IACR Cryptol. ePrint Arch., 2013
2012
Efficient robust private set intersection.
Int. J. Appl. Cryptogr., 2012
"Metaproofs" (and their Cryptographic Applications).
IACR Cryptol. ePrint Arch., 2012
Group Signatures with Almost-for-free Revocation.
IACR Cryptol. ePrint Arch., 2012
Scalable Group Signatures with Revocation.
IACR Cryptol. ePrint Arch., 2012
Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency.
IACR Cryptol. ePrint Arch., 2012
Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies.
IACR Cryptol. ePrint Arch., 2012
PayTree: "Amortized Signature" for Flexible Micro-Payments.
IACR Cryptol. ePrint Arch., 2012
Resource-based Corruptions and the Combinatorics of Hidden Diversity.
IACR Cryptol. ePrint Arch., 2012
On the (Im)Plausibility of Constant-Round Public-Coin Straight-Line-Simulatable Zero-Knowledge Proofs.
IACR Cryptol. ePrint Arch., 2012
Adaptive Preimage Resistance Analysis Revisited: \\ Requirements, Subtleties and Implications.
IACR Cryptol. ePrint Arch., 2012
Secret swarm unit: Reactive k-secret sharing.
Ad Hoc Networks, 2012
Non-interactive CCA-Secure Threshold Cryptosystems with Adaptive Security: New Framework and Constructions.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012
On the Centrality of Off-Line E-Cash to Concrete Partial Information Games.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012
Multi-location Leakage Resilient Cryptography.
Proceedings of the Public Key Cryptography - PKC 2012, 2012
Strictly-Black-Box Zero-Knowledge and Efficient Validation of Financial Transactions.
Proceedings of the Automata, Languages, and Programming - 39th International Colloquium, 2012
Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
Firm Grip Handshakes: A Tool for Bidirectional Vouching.
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012
Fully Forward-Secure Group Signatures.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012
Contextual OTP: Mitigating Emerging Man-in-the-Middle Attacks with Wireless Hardware Tokens.
Proceedings of the Applied Cryptography and Network Security, 2012
2011
Efficient traceable signatures in the standard model.
Theor. Comput. Sci., 2011
A zero-knowledge based framework for RFID privacy.
J. Comput. Secur., 2011
The Efficient Dual Receiver Cryptosystem and Its Applications.
Int. J. Netw. Secur., 2011
Resettable Cryptography in Constant Rounds - the Case of Zero Knowledge.
IACR Cryptol. ePrint Arch., 2011
Indifferentiability of the Hash Algorithm BLAKE.
IACR Cryptol. ePrint Arch., 2011
Multifactor Authenticated Key Renewal.
Proceedings of the Trusted Systems - Third International Conference, 2011
Cryptographic Protocols: From the Abstract to the Practical to the Actual.
Proceedings of the Financial Cryptography and Data Security, 2011
Efficient Circuit-Size Independent Public Key Encryption with KDM Security.
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011
Key dependent message security: recent results and applications.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011
From Protecting a System to Protecting a Global Ecosystem.
Proceedings of the Communications and Multimedia Security, 2011
Adaptively Secure Forward-Secure Non-interactive Threshold Cryptosystems.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011
Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications.
Proceedings of the Applied Cryptography and Network Security, 2011
2010
Leakage Resilient Cryptography in Practice.
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010
Key Evolution Systems in Untrusted Update Environments.
ACM Trans. Inf. Syst. Secur., 2010
Theor. Comput. Sci., 2010
Adaptive Concurrent Non-Malleability with Bare Public-Keys.
IACR Cryptol. ePrint Arch., 2010
Concurrent Knowledge Extraction in the Public-Key Model.
IACR Cryptol. ePrint Arch., 2010
Signatures Resilient to Continual Leakage on Memory and Computation.
IACR Cryptol. ePrint Arch., 2010
A New Framework for RFID Privacy.
IACR Cryptol. ePrint Arch., 2010
On the Security of Hash Functions Employing Blockcipher Postprocessing.
IACR Cryptol. ePrint Arch., 2010
The Vector-Ballot Approach for Online Voting Procedures.
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010
Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs.
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010
Kleptography from Standard Assumptions and Applications.
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010
Leakage-Resilient RFID Authentication with Forward-Privacy.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010
Leakage Resilient Strong Key-Insulated Signatures in Public Channel.
Proceedings of the Trusted Systems - Second International Conference, 2010
Efficient Completely Non-malleable Public Key Encryption.
Proceedings of the Automata, Languages and Programming, 37th International Colloquium, 2010
Tree-Homomorphic Encryption and Scalable Hierarchical Secret-Ballot Elections.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
Cryptography between Wonderland and Underland.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010
A New Framework for RFID Privacy.
Proceedings of the Computer Security, 2010
Practical leakage-resilient pseudorandom generators.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Dynamic fully forward-secure group signatures.
Proceedings of the 5th ACM Symposium on Information, 2010
2009
Efficient and secure authenticated key exchange using weak passwords.
J. ACM, 2009
The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure.
Inf. Process. Lett., 2009
Elastic block ciphers: method, security and instantiations.
Int. J. Inf. Sec., 2009
Leakage Resilient Cryptography in Practice.
IACR Cryptol. ePrint Arch., 2009
On the Portability of Generalized Schnorr Proofs.
IACR Cryptol. ePrint Arch., 2009
SocialClouds: Concept, Security Architecture and Some Mechanisms.
Proceedings of the Trusted Systems, First International Conference, 2009
Secure Function Collection with Sublinear Storage.
Proceedings of the Automata, Languages and Programming, 36th Internatilonal Colloquium, 2009
How to Guard the Guards Themselves.
Proceedings of the Fundamentals of Computation Theory, 17th International Symposium, 2009
Expecting the Unexpected: Towards Robust Credential Infrastructure.
Proceedings of the Financial Cryptography and Data Security, 2009
Privacy-Preserving Information Markets for Computing Statistical Data.
Proceedings of the Financial Cryptography and Data Security, 2009
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks.
Proceedings of the Advances in Cryptology, 2009
Universal forgery of the identity-based sequential aggregate signature scheme.
Proceedings of the 2009 ACM Symposium on Information, 2009
Reverse Public Key Encryption.
Proceedings of the BIOSIG 2009, 2009
Secure Multi-party Computation Minimizing Online Rounds.
Proceedings of the Advances in Cryptology, 2009
Group Encryption: Non-interactive Realization in the Standard Model.
Proceedings of the Advances in Cryptology, 2009
2008
Cryptographic Hardness Based on the Decoding of Reed-Solomon Codes.
IEEE Trans. Inf. Theory, 2008
On Monotone Formula Composition of Perfect Zero-Knowledge Languages.
SIAM J. Comput., 2008
A New Randomness Extraction Paradigm for Hybrid Encryption.
IACR Cryptol. ePrint Arch., 2008
Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs.
IACR Cryptol. ePrint Arch., 2008
Fair Traceable Multi-Group Signatures.
IACR Cryptol. ePrint Arch., 2008
Privacy Preserving Data Mining within Anonymous Credential Systems.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008
Recovering NTRU Secret Key from Inversion Oracles.
Proceedings of the Public Key Cryptography, 2008
High-Speed Implementations of Block Cipher ARIA Using Graphics Processing Units.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008
Does Physical Security of Cryptographic Devices Need a Formal Study? (Invited Talk).
Proceedings of the Information Theoretic Security, Third International Conference, 2008
Real Electronic Cash Versus Academic Electronic Cash Versus Paper Cash (Panel Report).
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008
Public-key traitor tracing from efficient decoding and unbounded enrollment: extended abstract.
Proceedings of the 8th ACM Workshop on Digital Rights Management, 2008
A block cipher based pseudo random number generator secure against side-channel key recovery.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008
2007
Decoding interleaved Reed-Solomon codes over noisy channels.
Theor. Comput. Sci., 2007
Scalable Protocols for Authenticated Group Key Exchange.
J. Cryptol., 2007
A Block Cipher based PRNG Secure Against Side-Channel Key Recovery.
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
Concurrent Knowledge-Extraction in the Public-Key Model.
Electron. Colloquium Comput. Complex., 2007
Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice.
Des. Codes Cryptogr., 2007
Parallel Key-Insulated Public Key Encryption Without Random Oracles.
Proceedings of the Public Key Cryptography, 2007
The Security of Elastic Block Ciphers Against Key-Recovery Attacks.
Proceedings of the Information Security, 10th International Conference, 2007
Secret Swarm UnitReactive k-Secret Sharing.
Proceedings of the Progress in Cryptology, 2007
Space-Efficient Kleptography Without Random Oracles.
Proceedings of the Information Hiding, 9th International Workshop, 2007
<i>K</i>-Anonymous Multi-party Secret Handshakes.
Proceedings of the Financial Cryptography and Data Security, 2007
Generic and Practical Resettable Zero-Knowledge in the Bare Public-Key Model.
Proceedings of the Advances in Cryptology, 2007
On the Evolution of User Authentication: Non-bilateral Factors.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
A Timing-Resistant Elliptic Curve Backdoor in RSA.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
Forward-secure signatures in untrusted update environments: efficient and generic constructions.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
Elastic block ciphers: the basic design.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007
Two-Party Computing with Encrypted Data.
Proceedings of the Advances in Cryptology, 2007
Preimage Attack on the Parallel FFT-Hashing Function.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
2006
On Fundamental Limitations of Proving Data Theft.
IEEE Trans. Inf. Forensics Secur., 2006
Characterization of Security Notions for Probabilistic Private-Key Encryption.
J. Cryptol., 2006
Secure scalable group signature with dynamic joins and separable authorities.
Int. J. Secur. Networks, 2006
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version).
IACR Cryptol. ePrint Arch., 2006
Copyrighting Public-key Functions and Applications to Black-box Traitor Tracing.
IACR Cryptol. ePrint Arch., 2006
Threshold and Proactive Pseudo-Random Permutations.
IACR Cryptol. ePrint Arch., 2006
Do We Need to Vary the Constants? (Methodological Investigation of Block-Cipher Based Hash Functions).
IACR Cryptol. ePrint Arch., 2006
Interactive Zero-Knowledge with Restricted Random Oracles.
Proceedings of the Theory of Cryptography, Third Theory of Cryptography Conference, 2006
Short Traceable Signatures Based on Bilinear Pairings.
Proceedings of the Advances in Information and Computer Security, 2006
An Elliptic Curve Backdoor Algorithm for RSASSA.
Proceedings of the Information Hiding, 8th International Workshop, 2006
Hiding Information Hiding.
Proceedings of the Information Hiding, 8th International Workshop, 2006
Expander Graph based Key Distribution Mechanisms in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2006
A Comparative Cost/Security Analysis of Fault Attack Countermeasures.
Proceedings of the Fault Diagnosis and Tolerance in Cryptography, 2006
Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination.
Proceedings of the Financial Cryptography and Data Security, 2006
Efficient Intrusion-Resilient Signatures Without Random Oracles.
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006
Fourth-factor authentication: somebody you know.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding.
Proceedings of the Advances in Cryptology, 2006
2005
Group Signatures with Efficient Concurrent Join.
IACR Cryptol. ePrint Arch., 2005
Constant-Round Concurrently-Secure rZK in the (Real) Bare Public-Key Model
Electron. Colloquium Comput. Complex., 2005
Scalable public-key tracing and revoking.
Distributed Comput., 2005
A Space Efficient Backdoor in RSA and Its Applications.
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005
Questionable Encryption and Its Applications.
Proceedings of the Progress in Cryptology, 2005
Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers.
Proceedings of the Progress in Cryptology, 2005
"Trust Engineering: " From Requirements to System Design and Maintenance - A Working National Lottery System Experience.
Proceedings of the Information Security, 8th International Conference, 2005
Cryptography and decoding Reed-Solomon codes as a hard problem.
Proceedings of the IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005
Malicious Cryptography: Kleptographic Aspects.
Proceedings of the Topics in Cryptology, 2005
A Remark on Implementing the Weil Pairing.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005
2004
Secure Hypergraphs: Privacy from Partial Broadcast.
SIAM J. Discret. Math., 2004
The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures.
IACR Cryptol. ePrint Arch., 2004
Group Signatures: Provable Security, Efficient Constructions and Anonymity from Trapdoor-Holders.
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
Evaluation of voting systems.
,
,
,
,
,
,
,
,
,
,
Commun. ACM, 2004
Relationships Between Diffie-Hellman and "Index Oracles".
Proceedings of the Security in Communication Networks, 4th International Conference, 2004
A Subliminal Channel in Secret Block Ciphers.
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004
General Group Authentication Codes and Their Relation to "Unconditionally-Secure Signatures".
Proceedings of the Public Key Cryptography, 2004
Symmetric Authentication Codes with Secrecy and Unconditionally Secure Authenticated Encryption.
Proceedings of the Progress in Cryptology, 2004
Electronic National Lotteries.
Proceedings of the Financial Cryptography, 2004
The Vector-Ballot e-Voting Approach.
Proceedings of the Financial Cryptography, 2004
A Key Recovery System as Secure as Factoring.
Proceedings of the Topics in Cryptology, 2004
A Generic Construction for Intrusion-Resilient Public-Key Encryption.
Proceedings of the Topics in Cryptology, 2004
k-anonymous secret handshakes with reusable credentials.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004
The dual receiver cryptosystem and its applications.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004
Accountable Ring Signatures: A Smart Card Approach.
Proceedings of the Smart Card Research and Advanced Applications VI, 2004
Unconditionally Secure Encryption Under Strong Attacks.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
Malicious cryptography - exposing cryptovirology.
Wiley, ISBN: 978-0-7645-4975-5, 2004
2003
Robust Verifiable non-Interactive Zero-Sharing - A Plug-in Utility for Enhanced Voters' Privacy.
Proceedings of the Secure Electronic Voting, 2003
Strong Key-Insulated Signature Schemes.
Proceedings of the Public Key Cryptography, 2003
Decoding of Interleaved Reed Solomon Codes over Noisy Data.
Proceedings of the Automata, Languages and Programming, 30th International Colloquium, 2003
The TrustedFlow (TM) Protocol-Idiosyncratic Signatures for Authenticated Execution.
Proceedings of the IEEE Systems, 2003
Trusted Computing Platforms: The Good, the Bad, and the Ugly.
Proceedings of the Financial Cryptography, 2003
Retrofitting Fairness on the Original RSA-Based E-cash.
Proceedings of the Financial Cryptography, 2003
Non-interactive Zero-Sharing with Applications to Private Distributed Decision Making.
Proceedings of the Financial Cryptography, 2003
Extracting Group Signatures from Traitor Tracing Schemes.
Proceedings of the Advances in Cryptology, 2003
Idiosyncratic Signatures for Authenticated Execution of Management Code.
Proceedings of the Self-Managing Distributed Systems, 2003
Intrusion-Resilient Public-Key Encryption.
Proceedings of the Topics in Cryptology, 2003
Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
2002
Adaptively secure distributed public-key systems.
Theor. Comput. Sci., 2002
Self-Stabilizing Symmetry Breaking in Constant Space.
SIAM J. Comput., 2002
Key-Insulated Public-Key Cryptosystems.
IACR Cryptol. ePrint Arch., 2002
Cryptographic Hardness based on the Decoding of Reed-Solomon Codes with Applications
Electron. Colloquium Comput. Complex., 2002
Exposure-Resilience for Free: The Hierarchical ID-based Encryption Case.
Proceedings of the First International IEEE Security in Storage Workshop, 2002
Forward Secrecy in Password-Only Key Exchange Protocols.
Proceedings of the Security in Communication Networks, Third International Conference, 2002
Self-tallying Elections and Perfect Ballot Secrecy.
Proceedings of the Public Key Cryptography, 2002
The Dark Side of Threshold Cryptography.
Proceedings of the Financial Cryptography, 6th International Conference, 2002
Split-and-Delegate: Threshold Cryptography for the Masses.
Proceedings of the Financial Cryptography, 6th International Conference, 2002
Traitor Tracing with Constant Transmission Rate.
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002
Observability Analysis - Detecting When Improved Cryptosystems Fail.
Proceedings of the Topics in Cryptology, 2002
Breaking and Repairing Asymmetric Public-Key Traitor Tracing.
Proceedings of the Security and Privacy in Digital Rights Management, 2002
Proceedings of the Advances in Cryptology, 2002
Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
2001
Threshold Cryptosystems Based on Factoring.
IACR Cryptol. ePrint Arch., 2001
Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords.
IACR Cryptol. ePrint Arch., 2001
E-commerce applications of smart cards.
Comput. Networks, 2001
Polynomial Reconstruction Based Cryptography.
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001
A PVSS as Hard as Discrete Log and Shareholder Separability.
Proceedings of the Public Key Cryptography, 2001
Adaptive Security for the Additive-Sharing Based Proactive RSA.
Proceedings of the Public Key Cryptography, 2001
DISSECT: DIStribution for SECurity Tool.
Proceedings of the Information Security, 4th International Conference, 2001
Secure Games with Polynomial Expressions.
Proceedings of the Automata, Languages and Programming, 28th International Colloquium, 2001
Incremental Unforgeable Encryption.
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001
The Business of Electronic Voting.
Proceedings of the Financial Cryptography, 2001
On the Power of Misbehaving Adversaries and Security Analysis of the Original EPOC.
Proceedings of the Topics in Cryptology, 2001
Self Protecting Pirates and Black-Box Traitor Tracing.
Proceedings of the Advances in Cryptology, 2001
Bandwidth-Optimal Kleptographic Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2001
On Crafty Pirates and Foxy Tracers.
Proceedings of the Security and Privacy in Digital Rights Management, 2001
2000
Local and congestion-driven fairness algorithm in arbitrary topology networks.
IEEE/ACM Trans. Netw., 2000
Robust Parallel Computations through Randomization.
Theory Comput. Syst., 2000
Combined Asynchronous/Synchronous Packet Switching Architecture: QoS Guarantees for Integrated Parallel Computing and Real-Time Traffic.
J. Parallel Distributed Comput., 2000
Eavesdropping games: a graph-theoretic approach to privacy in distributed systems.
J. ACM, 2000
Connectivity Properties in Random Regular Graphs with Edge Faults.
Int. J. Found. Comput. Sci., 2000
Complete characterization of security notions for probabilistic private-key encryption.
Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, 2000
On zero-knowledge proofs (extended abstract): "from membership to decision".
Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, 2000
RSA-Based Auto-recoverable Cryptosystems.
Proceedings of the Public Key Cryptography, 2000
"Psyeudorandom Intermixing": A Tool for Shared Cryptography.
Proceedings of the Public Key Cryptography, 2000
Design Validations for Discrete Logarithm Based Signature Schemes.
Proceedings of the Public Key Cryptography, 2000
Hash to the Rescue: Space Minimization for PKI Directories.
Proceedings of the Information Security and Cryptology, 2000
Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation.
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000
Payment Systems: The Next Generation.
Proceedings of the Financial Cryptography, 2000
Blind, Auditable Membership Proofs.
Proceedings of the Financial Cryptography, 2000
Funkspiel schemes: an alternative to conventional tamper resistance.
Proceedings of the CCS 2000, 2000
Friendly Observers Ease Off-Line E-Cash.
Proceedings of the Smart Card Research and Advanced Applications, 2000
Towards Signature-Only Signature Schemes.
Proceedings of the Advances in Cryptology, 2000
1999
Convergence routing on disjoint spanning trees.
Comput. Networks, 1999
Access regulation mechanism for switch-based LAN.
Comput. Networks, 1999
Self-Testing/Correcting Protocols (Extended Abstract).
Proceedings of the Distributed Computing, 1999
Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy.
Proceedings of the Public Key Cryptography, 1999
Decision Oracles are Equivalent to Matching Oracles.
Proceedings of the Public Key Cryptography, 1999
Money Conservation via Atomicity in Fair Off-Line E-Cash.
Proceedings of the Information Security, Second International Workshop, 1999
Software DisEngineering: Program Hiding Architecture and Experiments.
Proceedings of the Information Hiding, Third International Workshop, 1999
Self-Escrowed Public-Key Infrastructures.
Proceedings of the Information Security and Cryptology, 1999
On Threshold RSA-Signing with no Dealer.
Proceedings of the Information Security and Cryptology, 1999
Scramble All, Encrypt Small.
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999
Non-Interactive CryptoComputing For NC<sup>1</sup>.
Proceedings of the 40th Annual Symposium on Foundations of Computer Science, 1999
Cryptosystems Robust against "Dynamic Faults" Meet Enterprise Needs for Organizational "Change Control".
Proceedings of the Financial Cryptography, 1999
Auto-recoverable Auto-certifiable Cryptosystems (A Survey).
Proceedings of the Secure Networking - CQRE (Secure) '99, International Exhibition and Congress Düsseldorf, Germany, November 30, 1999
Electronic Payments: Where Do We Go from Here?.
Proceedings of the Secure Networking - CQRE (Secure) '99, International Exhibition and Congress Düsseldorf, Germany, November 30, 1999
Secure Protocol Transformation via "Expansion": From Two-Party to Groups.
Proceedings of the CCS '99, 1999
Adaptively-Secure Optimal-Resilience Proactive RSA.
Proceedings of the Advances in Cryptology, 1999
1998
Perfect Zero-Knowledge Arguments for <i>NP</i> Using Any One-Way Permutation.
J. Cryptol., 1998
Perfectly Secure Key Distribution for Dynamic Conferences.
Inf. Comput., 1998
VarietyCash: A Multi-Purpose Electronic Payment System.
Proceedings of the 3rd USENIX Workshop on Electronic Commerce, Boston, Massachusetts, USA, August 31, 1998
Robust Efficient Distributed RSA-Key Generation.
Proceedings of the Thirtieth Annual ACM Symposium on the Theory of Computing, 1998
Result-Indistinguishable Zero-Knowledge Proofs: Increased Power and Constant-Round Protocols.
Proceedings of the STACS 98, 1998
"Dynamic-Fault-Prone BSP": A Paradigm for Robust Computations in Changing Environments.
Proceedings of the Tenth Annual ACM Symposium on Parallel Algorithms and Architectures, 1998
On the Security of ElGamal Based Encryption.
Proceedings of the Public Key Cryptography, 1998
Lower Bounds on Term-Based Divisible Cash Systems.
Proceedings of the Public Key Cryptography, 1998
Distributed Public Key Cryptosystems.
Proceedings of the Public Key Cryptography, 1998
Checking Programs Discreetly: Demonstrating Result-Correctness Efficiently while Concealing it.
Proceedings of the Algorithms and Computation, 9th International Symposium, 1998
Image Density is Complete for Non-Interactive-SZK (Extended Abstract).
Proceedings of the Automata, Languages and Programming, 25th International Colloquium, 1998
Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs.
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998
On Assurance Structures for WWW Commerce.
Proceedings of the Financial Cryptography, 1998
Beyond Identity: Warranty-Based Digital Signature Transactions.
Proceedings of the Financial Cryptography, 1998
Auto-Recoverable Auto-Certifiable Cryptosystems.
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998
How to Say "YES" with Smart Cards.
Proceedings of the Smart Card Research and Applications, This International Conference, 1998
Fair Off-Line e-cash Made Easy.
Proceedings of the Advances in Cryptology, 1998
Finding Length-3 Positive Cunningham Chains.
Proceedings of the Algorithmic Number Theory, Third International Symposium, 1998
1997
Combinatorial design of congestion-free networks.
IEEE/ACM Trans. Netw., 1997
Scheduling Task-Trees with Additive Scales on Parallel/Distributed Machines.
Theor. Comput. Sci., 1997
The Local Detection Paradigm and Its Application to Self-Stabilization.
Theor. Comput. Sci., 1997
Concurrent Asynchronous Broadcast on the MetaNet.
IEEE Trans. Computers, 1997
Fault-Tolerant Convergence Routing.
J. Parallel Distributed Comput., 1997
Efficient On-Line Call Control Algorithms.
J. Algorithms, 1997
Round-Optimal Zero-Knowledge Arguments Based on any One-Way Function.
IACR Cryptol. ePrint Arch., 1997
Deniable Password Snatching: On the Possibility of Evasive Electronic Espionage.
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997
Generalized secret sharing and group-key distribution using short keys.
Proceedings of the Compression and Complexity of SEQUENCES 1997, 1997
Scalability and Flexibility in Authentication Services: The KryptoKnight Approach.
Proceedings of the Proceedings IEEE INFOCOM '97, 1997
Zero-knowledge proofs of decision power: new protocols and optimal round-complexity.
Proceedings of the Information and Communication Security, First International Conference, 1997
On Characterization of Escrow Encryption Schemes.
Proceedings of the Automata, Languages and Programming, 24th International Colloquium, 1997
Sliding Encryption: A Cryptographic Tool for Mobile Agents.
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997
Optimal Resilience Proactive Public-Key Cryptosystems.
Proceedings of the 38th Annual Symposium on Foundations of Computer Science, 1997
Applying Anti-Trust Policies to Increase Trust in a Versatile E-Money System.
Proceedings of the Financial Cryptography, 1997
Anonymity Control in E-Cash Systems.
Proceedings of the Financial Cryptography, 1997
Kleptography: Using Cryptography Against Cryptography.
Proceedings of the Advances in Cryptology, 1997
Distributed "Magic Ink" Signatures.
Proceedings of the Advances in Cryptology, 1997
The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems.
Proceedings of the Advances in Cryptology, 1997
Keeping the SZK-Verifier Honest Unconditionally.
Proceedings of the Advances in Cryptology, 1997
Proactive Public Key and Signature Systems.
Proceedings of the CCS '97, 1997
1996
Certifying Permutations: Noninteractive Zero-Knowledge Based on Any Trapdoor Permutation.
J. Cryptol., 1996
IACR Cryptol. ePrint Arch., 1996
Witness-Based Cryptographic Program Checking and Robust Function Sharing.
Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, 1996
Cryptovirology: Extortion-Based Security Threats and Countermeasures.
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996
Self-Stabilizing Algorithms for Synchronous Unidirectional Rings.
Proceedings of the Seventh Annual ACM-SIAM Symposium on Discrete Algorithms, 1996
Witness-Based Cryptographic Program Checking and Applications (an Announcement).
Proceedings of the Fifteenth Annual ACM Symposium on Principles of Distributed Computing, 1996
Approximating Max-Min Fair Rates via Distributed Local Scheduling with Partial Information.
Proceedings of the Proceedings IEEE INFOCOM '96, 1996
"Time-Driven Priority" Flow Control for Real-Time Heterogeneous Internetworking.
Proceedings of the Proceedings IEEE INFOCOM '96, 1996
A Progress Report on Subliminal-Free Channels.
Proceedings of the Information Hiding, First International Workshop, Cambridge, UK, May 30, 1996
Agent Rendezvous: A Dynamic Symmetry-Breaking Problem.
Proceedings of the Automata, Languages and Programming, 23rd International Colloquium, 1996
Multi-Autority Secret-Ballot Elections with Linear Work.
Proceedings of the Advances in Cryptology, 1996
The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone?
Proceedings of the Advances in Cryptology, 1996
Proving Without Knowing: On Oblivious, Agnostic and Blindolded Provers.
Proceedings of the Advances in Cryptology, 1996
Distributed Computing in Asynchronous Networks with Byzantine Edges.
Proceedings of the Computing and Combinatorics, Second Annual International Conference, 1996
Revokable and Versatile Electronic Money (extended abstract).
Proceedings of the CCS '96, 1996
"Indirect Discourse Proof": Achieving Efficient Fair Off-Line E-cash.
Proceedings of the Advances in Cryptology, 1996
1995
Security issues in a CDPD wireless network.
IEEE Wirel. Commun., 1995
METANET principles of an arbitrary topology LAN.
IEEE/ACM Trans. Netw., 1995
The KryptoKnight family of light-weight protocols for authentication and key distribution.
IEEE/ACM Trans. Netw., 1995
Secure hypergraphs: privacy from partial broadcast (Extended Abstract).
Proceedings of the Twenty-Seventh Annual ACM Symposium on Theory of Computing, 1995
Topological Design of Loss-Free Switch-Based LANs.
Proceedings of the Proceedings IEEE INFOCOM '95, 1995
Local Fairness in General-Topology Networks with Convergence Routing.
Proceedings of the Proceedings IEEE INFOCOM '95, 1995
Stochastic Graphs Have Short Memory: Fully Dynamic Connectivity in Poly-Log Expected Time.
Proceedings of the Automata, Languages and Programming, 22nd International Colloquium, 1995
Resolving Message Complexity of Byzantine Agreement and beyond.
Proceedings of the 36th Annual Symposium on Foundations of Computer Science, 1995
Efficient Dynamic-Resharing "Verifiable Secret Sharing" Against Mobile Adversary.
Proceedings of the Algorithms, 1995
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage.
Proceedings of the Advances in Cryptology, 1995
Cryptanalysis of the Immunized LL Public Key Systems.
Proceedings of the Advances in Cryptology, 1995
Escrow Encryption Systems Visited: Attacks, Analysis and Designs.
Proceedings of the Advances in Cryptology, 1995
Scheduling Task-Tree with Additive Scales on Parallel / Distributed Machines.
Proceedings of the Computing and Combinatorics, First Annual International Conference, 1995
1994
Routing and Flow Control on the MetaNet: An Overview.
Comput. Networks ISDN Syst., 1994
Secure Distributed Computing: Theory and Practice.
Proceedings of the Distributed Algorithms, 8th International Workshop, 1994
How to share a function securely.
Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing, 1994
Time-Optimal Message-Efficient Work Performance in the Presence of Faults (Extended Summary).
Proceedings of the Thirteenth Annual ACM Symposium on Principles of Distributed Computing, 1994
Coins, Weights and Contention in Balancing Networks.
Proceedings of the Thirteenth Annual ACM Symposium on Principles of Distributed Computing, 1994
The Integrated MetaNet Architecture: A Switch-Based Multimedia LAN for Parallel Computing and Real-Time Traffic.
Proceedings of the Proceedings IEEE INFOCOM '94, 1994
Short Vertex Disjoint Paths and Multiconnectivity in Random Graphs: Reliable Network Computing.
Proceedings of the Automata, Languages and Programming, 21st International Colloquium, 1994
On Monotone Formula Closure of SZK
Proceedings of the 35th Annual Symposium on Foundations of Computer Science, 1994
The Blinding of Weak Signatures (Extended Abstract).
Proceedings of the Advances in Cryptology, 1994
Non-Exploratory Self-Stabilization for Constant-Space Symmetry-Breaking.
Proceedings of the Algorithms, 1994
Space Lower-Bounds for Pseudorandom-Generators.
Proceedings of the Ninth Annual Structure in Complexity Theory Conference, Amsterdam, The Netherlands, June 28, 1994
1993
Systematic Design of a Family of Attack-Resistant Authentication Protocols.
IEEE J. Sel. Areas Commun., 1993
Corrigendum: Maintenance of a Minimum Spanning Forest in a Dynamic Plane Graph.
J. Algorithms, 1993
Perfectly Secure Message Transmission.
J. ACM, 1993
Configuration and performance issues in the MetaNet design.
Proceedings of the 18th Conference on Local Computer Networks, 1993
Secure and Efficient Off-Line Digital Money (Extended Abstract).
Proceedings of the Automata, Languages and Programming, 20nd International Colloquium, 1993
Interactive Hashing Simplifies Zero-Knowledge Protocol Design.
Proceedings of the Advances in Cryptology, 1993
1992
Maintenance of a Minimum Spanning Forest in a Dynamic Plane Graph.
J. Algorithms, 1992
Criticizing solutions to relaxed models yields powerful admissible heuristics.
Inf. Sci., 1992
Self-Stabilizing Symmetry Breaking in Constant-Space (Extended Abstract)
Proceedings of the 24th Annual ACM Symposium on Theory of Computing, 1992
Communication Complexity of Secure Computation (Extended Abstract)
Proceedings of the 24th Annual ACM Symposium on Theory of Computing, 1992
Secure Commitment Against A Powerful Adversary.
Proceedings of the STACS 92, 1992
Multi-Receiver/Multi-Sender Network Security: Efficient Authenticated Multicast/Feedback.
Proceedings of the Proceedings IEEE INFOCOM '92, 1992
One-Message Statistical Zero-Knowledge Proofs and Space-Bounded Verifier.
Proceedings of the Automata, Languages and Programming, 19th International Colloquium, 1992
Perfect Zero-Knowledge Arguments for NP Can Be Based on General Complexity Assumptions (Extended Abstract).
Proceedings of the Advances in Cryptology, 1992
Certifying Cryptographic Tools: The Case of Trapdoor Permutations.
Proceedings of the Advances in Cryptology, 1992
1991
Constant-Round Perfect Zero-Knowledge Computationally Convincing Protocols.
Theor. Comput. Sci., 1991
Efficient Sequential and Parallel Algorithms for Computing Recovery Points in Trees and Paths.
Proceedings of the Second Annual ACM/SIGACT-SIAM Symposium on Discrete Algorithms, 1991
How to Withstand Mobile Virus Attacks (Extended Abstract).
Proceedings of the Tenth Annual ACM Symposium on Principles of Distributed Computing, 1991
Lossless Asynchronous Broadcast-with-Feedback on the MetaNet Architecture.
Proceedings of the Proceedings IEEE INFOCOM '91, 1991
Weakness of Undeniable Signature Schemes (Extended Abstract).
Proceedings of the Advances in Cryptology, 1991
Systematic Design of Two-Party Authentication Protocols.
Proceedings of the Advances in Cryptology, 1991
1990
The Power of Multimedia: Combining Point-to-Point and Multiaccess Networks
Inf. Comput., January, 1990
Efficient Mechanism for Fairness and Deadlock-Avoidance in High-Speed Networks.
Proceedings of the Distributed Algorithms, 4th International Workshop, 1990
Memory-Efficient Self Stabilizing Protocols for General Networks.
Proceedings of the Distributed Algorithms, 4th International Workshop, 1990
Public-key Cryptosystems Provably Secure against Chosen Ciphertext Attacks
Proceedings of the 22nd Annual ACM Symposium on Theory of Computing, 1990
Maintenance of a Minimum Spanning Forest in a Dynamic Planar Graph.
Proceedings of the First Annual ACM-SIAM Symposium on Discrete Algorithms, 1990
Principle for High Speed Network Control: Congestion- and Deadlock-Freeness, Self-Routing, and a Single Buffer per Link.
Proceedings of the Ninth Annual ACM Symposium on Principles of Distributed Computing, 1990
On the Design of Provably Secure Cryptographic Hash Functions.
Proceedings of the Advances in Cryptology, 1990
Fair Games against an All-Powerful Adversary.
Proceedings of the Advances In Computational Complexity Theory, 1990
Crptograpic Applications of the Non-Interactive Metaproof and Many-Prover Systems.
Proceedings of the Advances in Cryptology, 1990
Abritrated Unconditionally Secure Authentication Can Be Unconditionally Protected Against Arbiter's Attacks (Extended Abstract).
Proceedings of the Advances in Cryptology, 1990
Proceedings of the Advances in Cryptology, 1990
1989
Minimum-Knowledge Interactive Proofs for Decision Problems.
SIAM J. Comput., 1989
Divide and Conquer under Global Constraints: A Solution to the N-Queens Problem.
J. Parallel Distributed Comput., 1989
Fast Algorithms for Edge-Coloring Planar Graphs.
J. Algorithms, 1989
Universal One-Way Hash Functions and their Cryptographic Applications
Proceedings of the 21st Annual ACM Symposium on Theory of Computing, 1989
Everything in NP can be Argued in Perfect Zero-Knowledge in a Bounded Number of Rounds.
Proceedings of the Automata, Languages and Programming, 16th International Colloquium, 1989
Lower Bounds for Pseudorandom Number Generators
Proceedings of the 30th Annual Symposium on Foundations of Computer Science, Research Triangle Park, North Carolina, USA, 30 October, 1989
Zero-Knowledge Proofs of Computational Power (Extended Summary).
Proceedings of the Advances in Cryptology, 1989
A Secure Public-key Authentication Scheme.
Proceedings of the Advances in Cryptology, 1989
Everything in NP can be Argued in <i>Perfect</i> Zero-Knowledge in a <i>Bounded</i> Number of Rounds (Extended Abstract).
Proceedings of the Advances in Cryptology, 1989
On Necessary Conditions for Secure Distributed Computation.
Proceedings of the Distributed Computing And Cryptography, 1989
Security against Replay Chosen-Ciphertext Attack.
Proceedings of the Distributed Computing And Cryptography, 1989
1988
The Power of Multimedia: Combining Point-to Point and Multi-Access Networks.
Proceedings of the Seventh Annual ACM Symposium on Principles of Distributed Computing, 1988
Fast Parallel and Sequential Algorithms for Edge-Coloring Planar Graphs.
Proceedings of the VLSI Algorithms and Architectures, 3rd Aegean Workshop on Computing, 1988
1987
Distributed Algorithms in Synchronous Broadcasting Networks.
Theor. Comput. Sci., 1987
Partitioned Encryption and Achieving Simultaneity by Partitioning.
Inf. Process. Lett., 1987
Direct Minimum-Knowledge Computations.
Proceedings of the Advances in Cryptology, 1987
Cryptographic Computation: Secure Faut-Tolerant Protocols and the Public-Key Model.
Proceedings of the Advances in Cryptology, 1987
1986
Distributing the Power of a Government to Enhance the Privacy of Voters (Extended Abstract).
Proceedings of the Fifth Annual ACM Symposium on Principles of Distributed Computing, 1986
Construction Through Decomposition: A Divide-and-Conquer Algoithm for the N-Queens Problem.
Proceedings of the Fall Joint Computer Conference, November 2-6, 1986, Dallas, Texas, USA, 1986
1985
A Secure and Useful 'Keyless Cryptosystem'.
Inf. Process. Lett., 1985
Distributed Algorithms in Synchronous Broadcasting Networks (Extended Abstract).
Proceedings of the Automata, 1985
A Private Interactive Test of a Boolean Predicate and Minimum-Knowledge Public-Key Cryptosystems (Extended Abstract)
Proceedings of the 26th Annual Symposium on Foundations of Computer Science, 1985
Symmetric Public-Key Encryption.
Proceedings of the Advances in Cryptology, 1985
1984
Cryptoprotocols: Subscription to a Public Key, the Secret Blocking and the Multi-Player Mental Poker Game (Extended Abstract).
Proceedings of the Advances in Cryptology, 1984