Anna Lysyanskaya

Affiliations: 
Computer Science Brown University, Providence, RI 
Area:
Security and Cryptography
Google:
"Anna Lysyanskaya"

Parents

Sign in to add mentor
Ronald L. Rivest grad student 2002 MIT

Children

Sign in to add trainee
Alptekin Kupcu grad student 2010 Brown
‪Foteini Baldimtsi‬ grad student 2014 Brown
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Chase M, Kohlweiss M, Lysyanskaya A, et al. (2014) Malleable signatures: New definitions and delegatable anonymous credentials Proceedings of the Computer Security Foundations Workshop. 2014: 199-213
Dachman-Soled D, Fleischhacker N, Katz J, et al. (2014) Feasibility and infeasibility of secure computation with malicious PUFs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8617: 405-420
Baldimtsi F, Lysyanskaya A. (2013) Anonymous credentials light Proceedings of the Acm Conference On Computer and Communications Security. 1087-1098
Chase M, Healy A, Lysyanskaya A, et al. (2013) Mercurial commitments with applications to zero-knowledge sets Journal of Cryptology. 26: 251-279
Baldimtsi F, Lysyanskaya A. (2013) On the security of one-witness blind signature schemes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8270: 82-99
Hinterwälder G, Zenger CT, Baldimtsi F, et al. (2013) Efficient e-cash in practice: NFC-based payments for public transportation systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7981: 40-59
Chase M, Kohlweiss M, Lysyanskaya A, et al. (2013) Verifiable elections that scale for free Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7778: 479-496
Camenisch J, Lysyanskaya A, Neven G. (2012) Practical yet universally composable two-server password-authenticated secret sharing Proceedings of the Acm Conference On Computer and Communications Security. 525-536
Küpçü A, Lysyanskaya A. (2012) Usable optimistic fair exchange Computer Networks. 56: 50-63
Chase M, Kohlweiss M, Lysyanskaya A, et al. (2012) Malleable proof systems and applications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7237: 281-300
See more...