Anna Lysyanskaya
Affiliations: | Computer Science | Brown University, Providence, RI |
Area:
Security and CryptographyGoogle:
"Anna Lysyanskaya"Children
Sign in to add traineeAlptekin Kupcu | grad student | 2010 | Brown |
Foteini Baldimtsi | grad student | 2014 | Brown |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Chase M, Kohlweiss M, Lysyanskaya A, et al. (2014) Malleable signatures: New definitions and delegatable anonymous credentials Proceedings of the Computer Security Foundations Workshop. 2014: 199-213 |
Dachman-Soled D, Fleischhacker N, Katz J, et al. (2014) Feasibility and infeasibility of secure computation with malicious PUFs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8617: 405-420 |
Baldimtsi F, Lysyanskaya A. (2013) Anonymous credentials light Proceedings of the Acm Conference On Computer and Communications Security. 1087-1098 |
Chase M, Healy A, Lysyanskaya A, et al. (2013) Mercurial commitments with applications to zero-knowledge sets Journal of Cryptology. 26: 251-279 |
Baldimtsi F, Lysyanskaya A. (2013) On the security of one-witness blind signature schemes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8270: 82-99 |
Hinterwälder G, Zenger CT, Baldimtsi F, et al. (2013) Efficient e-cash in practice: NFC-based payments for public transportation systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7981: 40-59 |
Chase M, Kohlweiss M, Lysyanskaya A, et al. (2013) Verifiable elections that scale for free Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7778: 479-496 |
Camenisch J, Lysyanskaya A, Neven G. (2012) Practical yet universally composable two-server password-authenticated secret sharing Proceedings of the Acm Conference On Computer and Communications Security. 525-536 |
Küpçü A, Lysyanskaya A. (2012) Usable optimistic fair exchange Computer Networks. 56: 50-63 |
Chase M, Kohlweiss M, Lysyanskaya A, et al. (2012) Malleable proof systems and applications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7237: 281-300 |