Ran Canetti
Orcid: 0000-0002-5479-7540Affiliations:
- Boston University, USA
- Tel Aviv University, Israel
According to our database1,
Ran Canetti
authored at least 199 papers
between 1991 and 2024.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2020, "For contributions to cryptography and computer security".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on cs.tau.ac.il
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
CoRR, 2024
2023
IACR Cryptol. ePrint Arch., 2023
2022
Equivocating Yao: Constant-Round Adaptively Secure Multiparty Computation in the Plain Model.
SIAM J. Comput., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Using Zero-Knowledge to Reconcile Law Enforcement Secrecy and Fair Trial Rights in Criminal Cases.
Proceedings of the 2022 Symposium on Computer Science and Law, 2022
2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
2020
Efficient and Round-Optimal Oblivious Transfer and Commitment with Adaptive Security.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Universal Composition with Global Subroutines: Capturing Global Setup within plain UC.
IACR Cryptol. ePrint Arch., 2020
CoRR, 2020
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing, 2019
Proceedings of the Conference on Fairness, Accountability, and Transparency, 2019
2018
SIAM J. Comput., 2018
IACR Cryptol. ePrint Arch., 2018
Non-Interactive Zero Knowledge and Correlation Intractability from Circular-Secure FHE.
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Public-Key Cryptography - PKC 2017, 2017
Proceedings of the Public-Key Cryptography - PKC 2017, 2017
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017
2016
Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions.
SIAM J. Comput., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Theory of Cryptography - 14th International Conference, 2016
Proceedings of the Public-Key Cryptography - PKC 2016, 2016
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, 2015
Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, Melbourne, Victoria, Australia, May 31, 2015
2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
A Simpler Variant of Universally Composable Security for Standard Multiparty Computation.
IACR Cryptol. ePrint Arch., 2014
Client-Server Concurrent Zero Knowledge with Constant Rounds and Guaranteed Complexity.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
2013
Proceedings of the Secure Multi-Party Computation, 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Indistinguishability Obfuscation vs. Auxiliary-Input Extractable Functions: One Must Fall.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013
Proceedings of the 54th Annual IEEE Symposium on Foundations of Computer Science, 2013
2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Public Key Cryptography - PKC 2012, 2012
Proceedings of the Information Theoretic Security - 6th International Conference, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
IACR Cryptol. ePrint Arch., 2011
From Extractable Collision Resistance to Succinct Non-Interactive Arguments of Knowledge, and Back Again.
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010
2009
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009
2008
IACR Cryptol. ePrint Arch., 2008
Discret. Event Dyn. Syst., 2008
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008
Proceedings of the Advances in Cryptology, 2008
Proceedings of the Theoretical Foundations of Practical Information Security, 30.11., 2008
08491 Abstracts Collection - Theoretical Foundations of Practical Information Security.
Proceedings of the Theoretical Foundations of Practical Information Security, 30.11., 2008
Proceedings of the 1st ACM Workshop on Security and Artificial Intelligence, 2008
2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2007), 2007
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007
Proceedings of the Advances in Cryptology, 2007
Proceedings of the Advances in Cryptology, 2007
2006
SIGACT News, 2006
On the Limitations of Universally Composable Two-Party Computation Without Set-Up Assumptions.
J. Cryptol., 2006
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Distributed Computing, 20th International Symposium, 2006
Universally Composable Symbolic Analysis of Mutual Authentication and Key-Exchange Protocols.
Proceedings of the Theory of Cryptography, Third Theory of Cryptography Conference, 2006
2005
Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction.
RFC, June, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
IACR Cryptol. ePrint Arch., 2005
2004
ACM Trans. Inf. Syst. Secur., 2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
Universally Composable Symbolic Analysis of Cryptographic Protocols (The case of encryption-based mutual authentication and key exchange).
IACR Cryptol. ePrint Arch., 2004
Proceedings of the 45th Symposium on Foundations of Computer Science (FOCS 2004), 2004
Proceedings of the 17th IEEE Computer Security Foundations Workshop, 2004
2003
IACR Cryptol. ePrint Arch., 2003
IACR Cryptol. ePrint Arch., 2003
IACR Cryptol. ePrint Arch., 2003
Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card.
Proceedings of the Computer Security, 2003
2002
SIAM J. Comput., 2002
IACR Cryptol. ePrint Arch., 2002
IACR Cryptol. ePrint Arch., 2002
IACR Cryptol. ePrint Arch., 2002
Proceedings of the First International IEEE Security in Storage Workshop, 2002
Proceedings of the Software Security -- Theories and Systems, 2002
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002
2001
IACR Cryptol. ePrint Arch., 2001
IACR Cryptol. ePrint Arch., 2001
Electron. Colloquium Comput. Complex., 2001
Electron. Colloquium Comput. Complex., 2001
Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing, 2001
Proceedings of the Network and Distributed System Security Symposium, 2001
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001
2000
J. Cryptol., 2000
IACR Cryptol. ePrint Arch., 2000
Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, 2000
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000
Proceedings of the Network and Distributed System Security Symposium, 2000
Proceedings of the Advances in Cryptology, 2000
1999
Secure Computation with Honest-Looking Parties: What If Nobody Is Truly Honest? (Extended Abstract).
Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing, 1999
Proceedings of the Proceedings IEEE INFOCOM '99, 1999
Proceedings of the Advances in Cryptology, 1999
An Efficient <i>Threshold</i> Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack.
Proceedings of the Advances in Cryptology, 1999
Proceedings of the Advances in Cryptology, 1999
1998
IACR Cryptol. ePrint Arch., 1998
A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols.
IACR Cryptol. ePrint Arch., 1998
Proceedings of the Thirtieth Annual ACM Symposium on the Theory of Computing, 1998
Proceedings of the Thirtieth Annual ACM Symposium on the Theory of Computing, 1998
A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols (Extended Abstract).
Proceedings of the Thirtieth Annual ACM Symposium on the Theory of Computing, 1998
1997
IACR Cryptol. ePrint Arch., 1997
Proceedings of the Sixteenth Annual ACM Symposium on Principles of Distributed Computing, 1997
1996
Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, 1996
Proceedings of the 37th Annual Symposium on Foundations of Computer Science, 1996
Pseudorandom Functions Revisited: The Cascade Construction and Its Concrete Security.
Proceedings of the 37th Annual Symposium on Foundations of Computer Science, 1996
Proceedings of the Advances in Cryptology, 1996
1995
Inf. Process. Lett., 1995
1994
Proceedings of the Advances in Cryptology, 1994
1993
Comput. Complex., 1993
Proceedings of the Twenty-Fifth Annual ACM Symposium on Theory of Computing, 1993
Proceedings of the Twenty-Fifth Annual ACM Symposium on Theory of Computing, 1993
1991