Year |
Citation |
Score |
2014 |
Chase M, Kohlweiss M, Lysyanskaya A, Meiklejohn S. Malleable signatures: New definitions and delegatable anonymous credentials Proceedings of the Computer Security Foundations Workshop. 2014: 199-213. DOI: 10.1109/CSF.2014.22 |
0.361 |
|
2014 |
Dachman-Soled D, Fleischhacker N, Katz J, Lysyanskaya A, Schröder D. Feasibility and infeasibility of secure computation with malicious PUFs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8617: 405-420. DOI: 10.1007/S00145-019-09329-9 |
0.508 |
|
2013 |
Baldimtsi F, Lysyanskaya A. Anonymous credentials light Proceedings of the Acm Conference On Computer and Communications Security. 1087-1098. DOI: 10.1145/2508859.2516687 |
0.383 |
|
2013 |
Chase M, Healy A, Lysyanskaya A, Malkin T, Reyzin L. Mercurial commitments with applications to zero-knowledge sets Journal of Cryptology. 26: 251-279. DOI: 10.1007/S00145-012-9122-9 |
0.337 |
|
2013 |
Baldimtsi F, Lysyanskaya A. On the security of one-witness blind signature schemes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8270: 82-99. DOI: 10.1007/978-3-642-42045-0_5 |
0.362 |
|
2013 |
Hinterwälder G, Zenger CT, Baldimtsi F, Lysyanskaya A, Paar C, Burleson WP. Efficient e-cash in practice: NFC-based payments for public transportation systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7981: 40-59. DOI: 10.1007/978-3-642-39077-7_3 |
0.499 |
|
2013 |
Chase M, Kohlweiss M, Lysyanskaya A, Meiklejohn S. Verifiable elections that scale for free Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7778: 479-496. DOI: 10.1007/978-3-642-36362-7_29 |
0.461 |
|
2012 |
Camenisch J, Lysyanskaya A, Neven G. Practical yet universally composable two-server password-authenticated secret sharing Proceedings of the Acm Conference On Computer and Communications Security. 525-536. DOI: 10.1145/2382196.2382252 |
0.51 |
|
2012 |
Küpçü A, Lysyanskaya A. Usable optimistic fair exchange Computer Networks. 56: 50-63. DOI: 10.1016/J.Comnet.2011.08.005 |
0.577 |
|
2012 |
Chase M, Kohlweiss M, Lysyanskaya A, Meiklejohn S. Malleable proof systems and applications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7237: 281-300. DOI: 10.1007/978-3-642-29011-4_18 |
0.307 |
|
2010 |
Lysyanskaya A, Tamassia R, Triandopoulos N. Authenticated error-correcting codes with applications to multicast authentication Acm Transactions On Information and System Security. 13. DOI: 10.1145/1698750.1698757 |
0.414 |
|
2010 |
Liu FH, Lysyanskaya A. Algorithmic tamper-proof security under probing attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6280: 106-120. DOI: 10.1007/978-3-642-15317-4_8 |
0.334 |
|
2009 |
Yao D, Fazio N, Dodis Y, Lysyanskaya A. Forward-secure hierarchical IBE with applications to broadcast encryption Cryptology and Information Security Series. 2: 100-118. DOI: 10.3233/978-1-58603-947-9-100 |
0.445 |
|
2009 |
Belenkiy M, Camenisch J, Chase M, Kohlweiss M, Lysyanskaya A, Shacham H. Randomizable proofs and delegatable anonymous credentials Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5677: 108-125. DOI: 10.1007/978-3-642-03356-8_7 |
0.338 |
|
2009 |
Belenkiy M, Chase M, Kohlweiss M, Lysyanskaya A. Compact E-cash and simulatable VRFs revisited Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5671: 114-131. DOI: 10.1007/978-3-642-03298-1_9 |
0.378 |
|
2008 |
Lysyanskaya A. How to keep secrets safe. Scientific American. 299: 88-95. PMID 18783057 DOI: 10.1038/Scientificamerican0908-88 |
0.449 |
|
2008 |
Belenkiy M, Chase M, Kohlweiss M, Lysyanskaya A. P-signatures and noninteractive anonymous credentials Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4948: 356-374. DOI: 10.1007/978-3-540-78524-8_20 |
0.383 |
|
2007 |
Belenkiy M, Chase M, Erway CC, Jannotti J, Küpçü A, Lysyanskaya A, Rachlin E. Making P2P accountable without losing privacy Wpes'07 - Proceedings of the 2007 Acm Workshop On Privacy in Electronic Society. 31-40. DOI: 10.1145/1314333.1314339 |
0.357 |
|
2007 |
Camenisch J, Lysyanskaya A, Meyerovich M. Endorsed e-cash Proceedings - Ieee Symposium On Security and Privacy. 101-115. DOI: 10.1109/SP.2007.15 |
0.464 |
|
2007 |
Lysyanskaya A. Authentication without identification Ieee Security and Privacy. 5: 69-71. DOI: 10.1109/MSP.2007.52 |
0.385 |
|
2006 |
Lindell Y, Lysyanskaya A, Rabin T. On the composition of authenticated Byzantine Agreement Journal of the Acm. 53: 881-917. DOI: 10.1145/1217856.1217857 |
0.54 |
|
2006 |
Camenisch J, Hohenberger S, Kohlweiss M, Lysyanskaya A, Meyerovich M. How to win the clonewars: Efficient periodic n-times anonymous authentication Proceedings of the Acm Conference On Computer and Communications Security. 201-210. DOI: 10.1145/1180405.1180431 |
0.632 |
|
2006 |
Camenisch J, Hohenberger S, Lysyanskaya A. Balancing accountability and privacy using E-cash Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4116: 141-155. |
0.649 |
|
2006 |
Camenisch J, Lysyanskaya A. A formal treatment of onion routing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3621: 169-187. |
0.426 |
|
2005 |
Hohenberger S, Lysyanskaya A. How to securely outsource cryptographic computations Lecture Notes in Computer Science. 3378: 264-282. |
0.626 |
|
2004 |
Lysyanskaya A, Tamassia R, Triandopoulos N. Multicast authentication in fully adversarial networks Proceedings - Ieee Symposium On Security and Privacy. 2004: 241-255. DOI: 10.1109/SECPRI.2004.1301327 |
0.375 |
|
2004 |
Lysyanskaya A, Malkin T, Micali S, Rabin T. Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2951: 258-277. |
0.407 |
|
2004 |
Yao D, Dodis Y, Fazio N, Lysyanskaya A. ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption Proceedings of the Acm Conference On Computer and Communications Security. 354-363. |
0.442 |
|
2004 |
Camenisch J, Lysyanskaya A. Signature Schemes and Anonymous Credentials from Bilinear Maps Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3152: 56-72. |
0.38 |
|
2003 |
Camenisch J, Lysyanskaya A. A signature scheme with efficient protocols Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2576: 268-289. |
0.407 |
|
2002 |
Cachin C, Kursawe K, Lysyanskaya A. Asynchronous verifiable secret sharing and proactive cryptosystems Proceedings of the Acm Conference On Computer and Communications Security. 88-97. |
0.368 |
|
2002 |
Lindell Y, Lysyanskaya A, Rabin T. Sequential composition of protocols without simultaneous termination Proceedings of the Annual Acm Symposium On Principles of Distributed Computing. 203-212. |
0.365 |
|
2002 |
Lysyanskaya A. Unique signatures and verifiable random functions from the DH-DDH separation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2442: 597-612. |
0.35 |
|
2001 |
Camenisch J, Lysyanskaya A. An identity escrow scheme with appointed verifiers Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2139: 388-407. |
0.403 |
|
2001 |
Lysyanskaya A, Peikert C. Adaptive security in the threshold setting: From cryptosystems to signature schemes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2248: 331-350. |
0.412 |
|
2001 |
Camenisch J, Lysyanskaya A. An efficient system for non-transferable anonymous credentials with optional anonymity revocation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2045: 93-118. |
0.464 |
|
2000 |
Jarecki S, Lysyanskaya A. Adaptively secure threshold cryptography: Introducing concurrency, removing erasures Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1807: 221-242. |
0.439 |
|
2000 |
Lysyanskaya A, Rivest RL, Sahai A, Wolf S. Pseudonym systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1758: 184-199. |
0.366 |
|
1998 |
Lysyanskaya A, Ramzan Z. Group blind digital signatures: A scalable solution to electronic cash Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1465: 184-197. DOI: 10.1007/BFb0055483 |
0.344 |
|
Show low-probability matches. |