Joe Kilian
According to our database1,
Joe Kilian
authored at least 84 papers
between 1986 and 2019.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2019
Proceedings of the Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali, 2019
2016
Asymptotic distribution for the birthday problem with multiple coincidences, via an embedding of the collision process.
Random Struct. Algorithms, 2016
2008
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008
Proceedings of the Information Theoretic Security, Third International Conference, 2008
A Linked-List Approach to Cryptographically Secure Elections Using Instant Runoff Voting.
Proceedings of the Advances in Cryptology, 2008
2007
Proceedings of the 9th workshop on Multimedia & Security, 2007
Proceedings of HotOS'07: 11th Workshop on Hot Topics in Operating Systems, 2007
2005
Betting Boolean-style: a framework for trading in securities based on logical formulas.
Decis. Support Syst., 2005
Proceedings of the Advances in Cryptology, 2005
2004
Proceedings of the Fifteenth Annual ACM-SIAM Symposium on Discrete Algorithms, 2004
Proceedings of the Automata, Languages and Programming: 31st International Colloquium, 2004
2003
Proceedings of the 35th Annual ACM Symposium on Theory of Computing, 2003
Proceedings of the 44th Symposium on Foundations of Computer Science (FOCS 2003), 2003
Proceedings of the Advances in Cryptology, 2003
2002
SIAM J. Comput., 2002
2001
J. Cryptol., 2001
Electron. Colloquium Comput. Complex., 2001
Proceedings of the Proceedings on 33rd Annual ACM Symposium on Theory of Computing, 2001
Proceedings of the Advances in Cryptology, 2001
2000
J. Comput. Syst. Sci., 2000
IACR Cryptol. ePrint Arch., 2000
Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, 2000
Proceedings of the Automata, Languages and Programming, 27th International Colloquium, 2000
1999
Proceedings of the Advances in Cryptology, 1999
Proceedings of the Advances in Cryptology, 1999
On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions.
Proceedings of the Advances in Cryptology, 1999
1998
An Efficient Noninteractive Zero-Knowledge Proof System for NP with General Assumptions.
J. Cryptol., 1998
Proceedings of the 39th Annual Symposium on Foundations of Computer Science, 1998
Heuristics for Finding Large Independent Sets, with Applications to Coloring Semi-Random Graphs.
Proceedings of the 39th Annual Symposium on Foundations of Computer Science, 1998
1997
Proceedings of the Twenty-Ninth Annual ACM Symposium on the Theory of Computing, 1997
Proceedings of the Twenty-Ninth Annual ACM Symposium on the Theory of Computing, 1997
1996
Proceedings of the Information Hiding, First International Workshop, Cambridge, UK, May 30, 1996
Proceedings of the Proceedings 1996 International Conference on Image Processing, 1996
Proceedings of the Advances in Cryptology, 1996
1995
An Efficient Non-Interactive Zero-Knowledge Proof System for NP with General Assumptions
Electron. Colloquium Comput. Complex., 1995
Proceedings of the Twenty-Seventh Annual ACM Symposium on Theory of Computing, 1995
Proceedings of the Third Israel Symposium on Theory of Computing and Systems, 1995
Proceedings of the Third Israel Symposium on Theory of Computing and Systems, 1995
Receipt-Free Mix-Type Voting Scheme - A Practical Solution to the Implementation of a Voting Booth.
Proceedings of the Advances in Cryptology, 1995
Fair Cryptosystems, Revisited: A Rigorous Approach to Key-Escrow (Extended Abstract).
Proceedings of the Advances in Cryptology, 1995
Proceedings of the Advances in Cryptology, 1995
1994
Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing, 1994
Proceedings of the 35th Annual Symposium on Foundations of Computer Science, 1994
Proceedings of the Advances in Cryptology, 1994
Proceedings of the Advances in Cryptology, 1994
Proceedings of the Seventh Annual ACM Conference on Computational Learning Theory, 1994
1993
Proceedings of the Sixth Annual ACM Conference on Computational Learning Theory, 1993
1992
Proceedings of the 24th Annual ACM Symposium on Theory of Computing, 1992
Proceedings of the Advances in Cryptology, 1992
1991
Proceedings of the 23rd Annual ACM Symposium on Theory of Computing, 1991
Proceedings of the Advances in Cryptology, 1991
1990
IEEE Trans. Computers, 1990
Proceedings of the Advances in Cryptology, 1990
Proceedings of the Advances in Cryptology, 1990
Uses of randomness in algorithms and protocols.
MIT Press, ISBN: 978-0-262-11153-9, 1990
1989
Proceedings of the Advances in Cryptology, 1989
Proceedings of the Advances in Cryptology, 1989
1988
Proceedings of the 20th Annual ACM Symposium on Theory of Computing, 1988
Proceedings of the 20th Annual ACM Symposium on Theory of Computing, 1988
Proceedings of the 29th Annual Symposium on Foundations of Computer Science, 1988
Proceedings of the 29th Annual Symposium on Foundations of Computer Science, 1988
Proceedings of the Advances in Cryptology, 1988
Proceedings of the Advances in Cryptology, 1988
1987
Proceedings of the 19th Annual ACM Symposium on Theory of Computing, 1987
The Organization of Permutation Architectures with Bussed Interconnections (Extended Abstract)
Proceedings of the 28th Annual Symposium on Foundations of Computer Science, 1987
1986
Proceedings of the 18th Annual ACM Symposium on Theory of Computing, 1986