Leonid Reyzin

Affiliations: 
Boston University, Boston, MA, United States 
Area:
Computer Science
Google:
"Leonid Reyzin"

Parents

Sign in to add mentor
Silvio Micali grad student 2001 MIT
 (Zero-Knowledge with Public Keys)
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Fuller B, Reyzin L, Smith A. (2020) When Are Fuzzy Extractors Possible Ieee Transactions On Information Theory. 66: 5282-5298
Canetti R, Fuller B, Paneth O, et al. (2016) Reusable fuzzy extractors for low-entropy distributions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9665: 117-146
Fuller B, O’Neill A, Reyzin L. (2015) A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy Journal of Cryptology. 28: 671-717
Chandran N, Kanukurthi B, Ostrovsky R, et al. (2014) Privacy amplification with asymptotically optimal entropy loss Journal of the Acm. 61
Faust S, Rabin T, Reyzin L, et al. (2014) Protecting circuits from computationally bounded and noisy leakage Siam Journal On Computing. 43: 1564-1614
Brogle K, Goldberg S, Reyzin L. (2014) Sequential aggregate signatures with lazy verification from trapdoor permutations Information and Computation. 239: 356-376
Fuller B, Meng X, Reyzin L. (2013) Computational fuzzy extractors Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8269: 174-193
Chase M, Healy A, Lysyanskaya A, et al. (2013) Mercurial commitments with applications to zero-knowledge sets Journal of Cryptology. 26: 251-279
Dodis Y, Kanukurthi B, Katz J, et al. (2012) Robust fuzzy extractors and authenticated key agreement from close secrets Ieee Transactions On Information Theory. 58: 6207-6222
Li F, Hadjieleftheriou M, Kollios G, et al. (2010) Authenticated index structures for aggregation queries Acm Transactions On Information and System Security. 13
See more...