Alejandro Hevia, Ph.D.
Affiliations: | 2006 | University of California, San Diego, La Jolla, CA |
Area:
Computer ScienceGoogle:
"Alejandro Hevia"Parents
Sign in to add mentorDaniele Micciancio | grad student | 2006 | UCSD | |
(Anonymity and independence in multiparty protocols.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
GONZÁLEZ A, HEVIA A. (2016) A second note on the feasibility of generalized universal composability Mathematical Structures in Computer Science. 1-14 |
Camacho P, Hevia A, Kiwi M, et al. (2012) Strong accumulators from collision-resistant hashing International Journal of Information Security. 11: 349-363 |
Hevia A, Micciancio D. (2008) An indistinguishability-based characterization of anonymous channels Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5134: 24-43 |
Hevia A. (2006) Universally composable simultaneous Broadcast Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4116: 18-33 |
Hevia A, Micciancio D. (2005) Simultaneous broadcast revisited Proceedings of the Annual Acm Symposium On Principles of Distributed Computing. 24: 324-333 |
Gentry C, Hevia A, Jain R, et al. (2005) End-to-end security in the presence of intelligent data adapting proxies: The case of authenticating transcoded streaming media Ieee Journal On Selected Areas in Communications. 23: 464-473 |
Hevia A, Kiwi M. (2002) Electronic jury voting protocols Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2286: 415-429 |
Hevia A, Micciancio D. (2002) The provable security of graph-based one-time signatures and extensions to algebraic signature schemes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2501: 379-396 |
Hevia A, Kiwi M. (1998) Strength of two data encryption standard implementations under timing attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1380: 192-205 |