Leonid Reyzin
Affiliations: | Boston University, Boston, MA, United States |
Area:
Computer ScienceGoogle:
"Leonid Reyzin"Children
Sign in to add traineeNenad Dedic | grad student | 2009 | Boston University |
Chun-Yuan Hsiao | grad student | 2010 | Boston University |
Bhavana R. Kanukurthi | grad student | 2011 | Boston University |
Benjamin W. Fuller | grad student | 2015 | Boston University |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Fuller B, Reyzin L, Smith A. (2020) When Are Fuzzy Extractors Possible Ieee Transactions On Information Theory. 66: 5282-5298 |
Canetti R, Fuller B, Paneth O, et al. (2016) Reusable fuzzy extractors for low-entropy distributions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9665: 117-146 |
Fuller B, O’Neill A, Reyzin L. (2015) A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy Journal of Cryptology. 28: 671-717 |
Chandran N, Kanukurthi B, Ostrovsky R, et al. (2014) Privacy amplification with asymptotically optimal entropy loss Journal of the Acm. 61 |
Faust S, Rabin T, Reyzin L, et al. (2014) Protecting circuits from computationally bounded and noisy leakage Siam Journal On Computing. 43: 1564-1614 |
Brogle K, Goldberg S, Reyzin L. (2014) Sequential aggregate signatures with lazy verification from trapdoor permutations Information and Computation. 239: 356-376 |
Fuller B, Meng X, Reyzin L. (2013) Computational fuzzy extractors Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8269: 174-193 |
Chase M, Healy A, Lysyanskaya A, et al. (2013) Mercurial commitments with applications to zero-knowledge sets Journal of Cryptology. 26: 251-279 |
Dodis Y, Kanukurthi B, Katz J, et al. (2012) Robust fuzzy extractors and authenticated key agreement from close secrets Ieee Transactions On Information Theory. 58: 6207-6222 |
Li F, Hadjieleftheriou M, Kollios G, et al. (2010) Authenticated index structures for aggregation queries Acm Transactions On Information and System Security. 13 |