Year |
Citation |
Score |
2019 |
Shirvanian M, Saxena N, Jarecki S, Krawczyk H. Building and Studying a Password Store that Perfectly Hides Passwords from Itself Ieee Transactions On Dependable and Secure Computing. 16: 770-782. DOI: 10.1109/Tdsc.2019.2902551 |
0.649 |
|
2016 |
Jarecki S, Shirvanian M, Krawczyk H, Saxena N. Device-enhanced password protocols with optimal online-offline protection Asia Ccs 2016 - Proceedings of the 11th Acm Asia Conference On Computer and Communications Security. 177-188. DOI: 10.1145/2897845.2897880 |
0.433 |
|
2016 |
Jarecki S, Kiayias A, Krawczyk H, Xu J. Highly-efficient and composable password-protected secret sharing (Or: How to Protect Your Bitcoin Wallet Online) Proceedings - 2016 Ieee European Symposium On Security and Privacy, Euro S and P 2016. 276-291. DOI: 10.1109/EuroSP.2016.30 |
0.334 |
|
2015 |
Faber S, Jarecki S, Kentros S, Wei B. Three-party ORAM for secure computation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9452: 360-385. DOI: 10.1007/978-3-662-48797-6_16 |
0.415 |
|
2015 |
Jarecki S, Odlyzko A. An efficient micropayment system based on probabilistic polling Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1318: 173-191. |
0.474 |
|
2014 |
Jarecki S. Practical covert authentication Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8383: 611-629. DOI: 10.1007/978-3-642-54631-0_35 |
0.432 |
|
2014 |
Jarecki S, Kiayias A, Krawczyk H. Round-optimal password-protected secret sharing and T-PAKE in the password-only model Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8874: 233-253. |
0.582 |
|
2013 |
Cash D, Jarecki S, Jutla C, Krawczyk H, Roşu MC, Steiner M. Highly-scalable searchable symmetric encryption with support for Boolean queries Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8042: 353-373. DOI: 10.1007/978-3-642-40041-4_20 |
0.365 |
|
2012 |
Cheon JH, Jarecki S, Seo JH. Multi-party privacy-preserving set intersection with quasi-linear complexity Ieice Transactions On Fundamentals of Electronics, Communications and Computer Sciences. 1366-1378. DOI: 10.1587/Transfun.E95.A.1366 |
0.554 |
|
2011 |
Bagherzandi A, Jarecki S, Saxena N, Lu Y. Password-protected secret sharing Proceedings of the Acm Conference On Computer and Communications Security. 433-443. DOI: 10.1145/2046707.2046758 |
0.694 |
|
2011 |
Jarecki S, Kim J, Tsudik G. Flexible robust group key agreement Ieee Transactions On Parallel and Distributed Systems. 22: 879-886. DOI: 10.1109/Tpds.2010.128 |
0.481 |
|
2011 |
Cheon JH, Jarecki S, Kwon T, Lee MK. Fast exponentiation using split exponents Ieee Transactions On Information Theory. 57: 1816-1826. DOI: 10.1109/Tit.2010.2059831 |
0.492 |
|
2010 |
Jarecki S, Saxena N. On the insecurity of proactive RSA in the URSA mobile Ad Hoc network access control protocol Ieee Transactions On Information Forensics and Security. 5: 739-749. DOI: 10.1109/Tifs.2010.2058104 |
0.717 |
|
2010 |
Jarecki S, Liu X. Fast secure computation of set intersection Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6280: 418-435. DOI: 10.1007/978-3-642-15317-4_26 |
0.368 |
|
2010 |
Jarecki S, Saxena N. Authenticated key agreement with key re-use in the short authenticated strings model Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6280: 253-270. DOI: 10.1007/978-3-642-15317-4_17 |
0.658 |
|
2010 |
Bagherzandi A, Jarecki S. Identity-based aggregate and multi-signature schemes based on RSA Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6056: 480-498. DOI: 10.1007/978-3-642-13013-7_28 |
0.701 |
|
2009 |
Sirivianos M, Yang X, Jarecki S. Robust and efficient incentives for cooperative content distribution Ieee/Acm Transactions On Networking. 17: 1766-1779. DOI: 10.1109/Tnet.2009.2021655 |
0.391 |
|
2009 |
De Cristofaro E, Jarecki S, Kim J, Tsudik G. Privacy-preserving policy-based information transfer Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5672: 164-184. DOI: 10.1007/978-3-642-03168-7_10 |
0.354 |
|
2009 |
Jarecki S, Liu X. Efficient oblivious pseudorandom function with applications to adaptive ot and secure computation of set intersection Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5444: 577-594. DOI: 10.1007/978-3-642-00457-5_34 |
0.434 |
|
2008 |
Bagherzandi A, Cheon JH, Jarecki S. Multisignatures secure under the discrete logarithm assumption and a generalized forking lemma Proceedings of the Acm Conference On Computer and Communications Security. 449-458. DOI: 10.1145/1455770.1455827 |
0.708 |
|
2008 |
Bagherzandi A, Jarecki S. Multisignatures using proofs of secret key possession, as secure as the Diffie-Hellman problem Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5229: 218-235. DOI: 10.1007/978-3-540-85855-3_15 |
0.688 |
|
2008 |
Jarecki S, Kim J, Tsudik G. Beyond secret handshakes: Affiliation-hiding authenticated key exchange Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4964: 352-369. DOI: 10.1007/978-3-540-79263-5_23 |
0.564 |
|
2008 |
Jarecki S, Liu X. Affiliation-hiding envelope and authentication schemes with efficient support for multiple credentials Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5126: 715-726. DOI: 10.1007/978-3-540-70583-3_58 |
0.525 |
|
2007 |
Jarecki S, Kim J, Tsudik G. Robust group key agreement using short broadcasts Proceedings of the Acm Conference On Computer and Communications Security. 411-420. DOI: 10.1145/1315245.1315296 |
0.421 |
|
2007 |
Goh EJ, Jarecki S, Katz J, Wang N. Efficient signature schemes with tight reductions to the Diffie-Hellman problems Journal of Cryptology. 20: 493-514. DOI: 10.1007/S00145-007-0549-3 |
0.627 |
|
2007 |
Gennaro R, Jarecki S, Krawczyk H, Rabin T. Secure distributed key generation for discrete-log based cryptosystems Journal of Cryptology. 20: 51-83. DOI: 10.1007/S00145-006-0347-3 |
0.628 |
|
2007 |
Jarecki S, Shmatikov V. Efficient two-party secure computation on committed inputs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4515: 97-114. |
0.381 |
|
2007 |
Jarecki S, Liu X. Unlinkable secret handshakes and key-private group key management schemes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4521: 270-287. |
0.601 |
|
2006 |
Castelluccia C, Jarecki S, Kim J, Tsudik G. Secure acknowledgment aggregation and multisignatures with limited robustness Computer Networks. 50: 1639-1652. DOI: 10.1016/J.Comnet.2005.09.021 |
0.639 |
|
2006 |
Jarecki S, Kim J, Tsudik G. Authentication for paranoids: Multi-party secret handshakes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3989: 325-339. DOI: 10.1007/11767480_22 |
0.559 |
|
2005 |
Jarecki S, Shmatikov V. Probabilistic escrow of financial transactions with cumulative threshold disclosure Lecture Notes in Computer Science. 3570: 172-187. |
0.535 |
|
2005 |
Castelluccia C, Jarecki S, Kim J, Tsudik G. A robust multisignature scheme with applications to acknowledgement aggregation Lecture Notes in Computer Science. 3352: 193-207. |
0.384 |
|
2005 |
Jarecki S, Saxena N. Further simplifications in proactive RSA signatures Lecture Notes in Computer Science. 3378: 510-528. |
0.527 |
|
2004 |
Jarecki S, Saxena N, Yi JH. An attack on the proactive RSA signature scheme in the ursa ad hoc network access control protocol Proceedings of the 2004 Acm Workshop On Security of Ad Hoc and Sensor Networks, Sasn'04. 1-9. |
0.529 |
|
2004 |
Jarecki S, Shmatikov V. Handcuffing big brother: An abuse-resilient transaction escrow scheme (extended abstract) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3027: 590-608. |
0.51 |
|
2004 |
Dodis Y, Jarecki S, Freedman MJ, Walfish S. Versatile padding schemes for joint signature and encryption Proceedings of the Acm Conference On Computer and Communications Security. 344-353. |
0.412 |
|
2004 |
Castelluccia C, Jarecki S, Tsudik G. Secret handshakes from CA-oblivious encryption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3329: 293-307. |
0.483 |
|
2003 |
Gennaro R, Jarecki S, Krawczyk H, Rabin T. Secure applications of Pedersen's distributed key generation protocol Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2612: 373-390. |
0.575 |
|
2003 |
Goh EJ, Jarecki S. A signature scheme as secure as the Diffie-Hellman problem Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2656: 401-415. |
0.564 |
|
2003 |
Jarecki S, Lincoln P, Shmatikov V. Negotiated privacy (extended abstract) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2609: 96-111. |
0.334 |
|
2000 |
Jarecki S, Lysyanskaya A. Adaptively secure threshold cryptography: Introducing concurrency, removing erasures Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1807: 221-242. |
0.583 |
|
1999 |
Canetti R, Gennaro R, Jarecki S, Krawczyk H, Rabin T. Adaptive security for threshold cryptosystems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1666: 98-116. |
0.515 |
|
1996 |
Gennaro R, Jarecki S, Krawczyk H, Rabin T. Robust threshold DSS signatures Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1070: 354-371. DOI: 10.1006/Inco.2000.2881 |
0.581 |
|
1996 |
Gennaro R, Jarecki S, Krawczyk H, Rabin T. Robust and efficient sharing of RSA functions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1109: 157-172. |
0.54 |
|
1995 |
Herzberg A, Jarecki S, Krawczyk H, Yung M. Proactive secret sharing or: How to cope with perpetual leakage Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 963: 339-352. DOI: 10.1007/3-540-44750-4_27 |
0.432 |
|
Show low-probability matches. |