Year |
Citation |
Score |
2014 |
Gordon SD, Katz J, Kumaresan R, Yerukhimovich A. Authenticated broadcast with a partially compromised public-key infrastructure Information and Computation. 234: 17-25. DOI: 10.1016/J.Ic.2013.11.003 |
0.316 |
|
2014 |
Dachman-Soled D, Fleischhacker N, Katz J, Lysyanskaya A, Schröder D. Feasibility and infeasibility of secure computation with malicious PUFs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8617: 405-420. DOI: 10.1007/S00145-019-09329-9 |
0.399 |
|
2014 |
Choi SG, Katz J, Schröder D, Yerukhimovich A, Zhou HS. (Efficient) universally composable oblivious transfer using a minimal number of stateless tokens Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8349: 638-662. DOI: 10.1007/S00145-018-9288-X |
0.382 |
|
2013 |
Katz J. Review of Applied Information Security by David Basin, Patrick Schaller, and Michael Schläpfer Sigact News. 44: 38-40. DOI: 10.1145/2447712.2447725 |
0.308 |
|
2013 |
Katz J, Vaikuntanathan V. Round-Optimal Password-Based Authenticated Key Exchange Journal of Cryptology. 26: 714-743. DOI: 10.1007/S00145-012-9133-6 |
0.338 |
|
2013 |
Katz J, Sahai A, Waters B. Predicate encryption supporting disjunctions, polynomial equations, and inner products Journal of Cryptology. 26: 191-224. DOI: 10.1007/S00145-012-9119-4 |
0.333 |
|
2012 |
Katz J. Review of efficient secure two-party protocols: techniques and constructions by Carmit Hazay and Yehuda Lindell Sigact News. 43: 21-23. DOI: 10.1145/2160649.2160656 |
0.357 |
|
2012 |
Katz J, MacKenzie P, Taban G, Gligor V. Two-server password-only authenticated key exchange Journal of Computer and System Sciences. 78: 651-669. DOI: 10.1016/J.Jcss.2011.09.005 |
0.369 |
|
2012 |
Gordon SD, Katz J. Partial fairness in secure two-party computation Journal of Cryptology. 25: 14-40. DOI: 10.1007/S00145-010-9079-5 |
0.384 |
|
2011 |
Gordon SD, Hazay C, Katz J, Lindell Y. Complete fairness in secure two-party computation Journal of the Acm. 58. DOI: 10.1145/2049697.2049698 |
0.388 |
|
2011 |
Ishai Y, Katz J, Kushilevitz E, Lindell Y, Petrank E. On Achieving the “Best of Both Worlds” in Secure Multiparty Computation Siam Journal On Computing. 40: 122-141. DOI: 10.1137/100783224 |
0.407 |
|
2010 |
Horvitz O, Katz J. Bounds on the efficiency of black-box commitment schemes Theoretical Computer Science. 411: 1251-1260. DOI: 10.1016/J.Tcs.2009.10.021 |
0.329 |
|
2010 |
Katz J, Shin JS, Smith A. Parallel and Concurrent Security of the HB and HB+ Protocols Journal of Cryptology. 23: 402-421. DOI: 10.1007/S00145-010-9061-2 |
0.374 |
|
2009 |
Katz J, Ostrovsky R, Yung M. Efficient and secure authenticated key exchange using weak passwords Journal of the Acm. 57: 1-39. DOI: 10.1145/1613676.1613679 |
0.42 |
|
2009 |
Katz J, Koo C. On expected constant-round protocols for Byzantine agreement Journal of Computer and System Sciences. 75: 91-112. DOI: 10.1016/J.Jcss.2008.08.001 |
0.308 |
|
2009 |
Haitner I, Horvitz O, Katz J, Koo CY, Morselli R, Shaltiel R. Reducing complexity assumptions for statistically-hiding commitment Journal of Cryptology. 22: 283-310. DOI: 10.1007/S00145-007-9012-8 |
0.34 |
|
2009 |
Bender A, Katz J, Morselli R. Ring signatures: Stronger definitions, and constructions without random oracles Journal of Cryptology. 22: 114-138. DOI: 10.1007/S00145-007-9011-9 |
0.351 |
|
2007 |
Goh EJ, Jarecki S, Katz J, Wang N. Efficient signature schemes with tight reductions to the Diffie-Hellman problems Journal of Cryptology. 20: 493-514. DOI: 10.1007/S00145-007-0549-3 |
0.372 |
|
2007 |
Canetti R, Halevi S, Katz J. A Forward-Secure Public-Key Encryption Scheme Journal of Cryptology. 20: 265-294. DOI: 10.1007/S00145-006-0442-5 |
0.388 |
|
2006 |
Boneh D, Canetti R, Halevi S, Katz J. Chosen-Ciphertext Security from Identity-Based Encryption Siam Journal On Computing. 36: 1301-1328. DOI: 10.1137/S009753970544713X |
0.39 |
|
2006 |
Gennaro R, Gertner Y, Katz J, Trevisan L. Bounds on the efficiency of generic cryptographic constructions Siam Journal On Computing. 35: 217-246. DOI: 10.1137/S0097539704443276 |
0.342 |
|
2006 |
Katz J, Yung M. Characterization of security notions for probabilistic private-key encryption Journal of Cryptology. 19: 67-95. DOI: 10.1007/S00145-005-0310-8 |
0.561 |
|
2005 |
Katz J. Comparative book review: Cryptography: An Introduction by V. V. Yaschenko (American Mathematical Society, 2002); Cryptanalysis of Number Theoretic Ciphers by S.S. Wagstaff, Jr. (Chapman & Hall/CRC Press, 2003); RSA and Public-Key Cryptography by R. A. Mollin (Chapman & Hall/CRC Press, 2003); Foundations of Cryptography, vol. 1: Basic Tools by O. Goldreich, (Cambridge University Press, 2001) Sigact News. 36: 14-19. DOI: 10.1145/1067309.1067316 |
0.339 |
|
2005 |
Du W, Deng J, Han YS, Varshney PK, Katz J, Khalili A. A pairwise key predistribution scheme for wireless sensor networks Acm Transactions On Information and System Security (Tissec). 8: 228-258. DOI: 10.1145/1065545.1065548 |
0.313 |
|
2003 |
Katz J, Yung M. Scalable protocols for authenticated group key exchange Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2729: 110-125. DOI: 10.1007/S00145-006-0361-5 |
0.555 |
|
Show low-probability matches. |