Shabsi Walfish

According to our database1, Shabsi Walfish authored at least 9 papers between 2004 and 2009.

Collaborative distances:
  • Dijkstra number2 of two.
  • Erdős number3 of three.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2009
Public-Key Encryption in the Bounded-Retrieval Model.
IACR Cryptol. ePrint Arch., 2009

Composability and On-Line Deniability of Authentication.
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009

2008
Efficient Constructions of Composable Commitments and Zero-Knowledge Proofs.
Proceedings of the Advances in Cryptology, 2008

2007
Enhanced Security Models for Network Protocols.
PhD thesis, 2007

Intrusion-Resilient Key Exchange in the Bounded Retrieval Model.
Proceedings of the Theory of Cryptography, 4th Theory of Cryptography Conference, 2007

2006
Universally Composable Security with Global Setup.
IACR Cryptol. ePrint Arch., 2006

Perfectly Secure Password Protocols in the Bounded Retrieval Model.
Proceedings of the Theory of Cryptography, Third Theory of Cryptography Conference, 2006

2004
Optimal Signcryption from Any Trapdoor Permutation.
IACR Cryptol. ePrint Arch., 2004

Versatile padding schemes for joint signature and encryption.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004


  Loading...