Year |
Citation |
Score |
2020 |
Fuller B, Reyzin L, Smith A. When Are Fuzzy Extractors Possible Ieee Transactions On Information Theory. 66: 5282-5298. DOI: 10.1109/Tit.2020.2984751 |
0.666 |
|
2016 |
Canetti R, Fuller B, Paneth O, Reyzin L, Smith A. Reusable fuzzy extractors for low-entropy distributions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9665: 117-146. DOI: 10.1007/978-3-662-49890-3_5 |
0.383 |
|
2015 |
Fuller B, O’Neill A, Reyzin L. A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy Journal of Cryptology. 28: 671-717. DOI: 10.1007/S00145-013-9174-5 |
0.745 |
|
2014 |
Chandran N, Kanukurthi B, Ostrovsky R, Reyzin L. Privacy amplification with asymptotically optimal entropy loss Journal of the Acm. 61. DOI: 10.1145/2630064 |
0.652 |
|
2014 |
Faust S, Rabin T, Reyzin L, Tromer E, Vaikuntanathan V. Protecting circuits from computationally bounded and noisy leakage Siam Journal On Computing. 43: 1564-1614. DOI: 10.1137/120880343 |
0.377 |
|
2014 |
Brogle K, Goldberg S, Reyzin L. Sequential aggregate signatures with lazy verification from trapdoor permutations Information and Computation. 239: 356-376. DOI: 10.1016/J.Ic.2014.07.001 |
0.471 |
|
2013 |
Fuller B, Meng X, Reyzin L. Computational fuzzy extractors Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8269: 174-193. DOI: 10.1016/J.Ic.2020.104602 |
0.728 |
|
2013 |
Chase M, Healy A, Lysyanskaya A, Malkin T, Reyzin L. Mercurial commitments with applications to zero-knowledge sets Journal of Cryptology. 26: 251-279. DOI: 10.1007/S00145-012-9122-9 |
0.377 |
|
2012 |
Dodis Y, Kanukurthi B, Katz J, Reyzin L, Smith A. Robust fuzzy extractors and authenticated key agreement from close secrets Ieee Transactions On Information Theory. 58: 6207-6222. DOI: 10.1109/Tit.2012.2200290 |
0.664 |
|
2010 |
Li F, Hadjieleftheriou M, Kollios G, Reyzin L. Authenticated index structures for aggregation queries Acm Transactions On Information and System Security. 13. DOI: 10.1145/1880022.1880026 |
0.316 |
|
2009 |
Dedić N, Itkis G, Reyzin L, Russell S. Upper and lower bounds on black-box steganography Journal of Cryptology. 22: 365-394. DOI: 10.1007/S00145-008-9020-3 |
0.709 |
|
2009 |
Kanukurthi B, Reyzin L. Key agreement from close secrets over unsecured channels Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5479: 206-223. DOI: 10.1007/978-3-642-01001-9_12 |
0.431 |
|
2008 |
Dodis Y, Ostrovsky R, Reyzin L, Smith A. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data Siam Journal On Computing. 38: 97-139. DOI: 10.1137/060651380 |
0.706 |
|
2008 |
Kanukurthi B, Reyzin L. An improved Robust fuzzy extractor Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5229: 156-171. DOI: 10.1007/978-3-540-85855-3_11 |
0.377 |
|
2006 |
Dodis Y, Katz J, Reyzin L, Smith A. Robust fuzzy extractors and authenticated key agreement from close secrets Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4117: 232-250. |
0.425 |
|
2003 |
Dedic N, Reyzin L, Vadhan SP. An Improved Pseudorandom Generator Based on Hardness of Factoring Lecture Notes in Computer Science. 88-101. DOI: 10.1007/3-540-36413-7 |
0.702 |
|
2003 |
Kozlov A, Reyzin L. Forward-secure signatures with fast key update Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2576: 241-256. |
0.394 |
|
2002 |
Micali S, Reyzin L. Improving the exact security of digital signature schemes Journal of Cryptology. 15: 1-18. DOI: 10.1007/S00145-001-0005-8 |
0.738 |
|
2002 |
Itkis G, Reyzin L. SiBIR: Signer-base intrusion-resilient signatures Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2442: 499-514. |
0.363 |
|
2001 |
Micali S, Ohta K, Reyzin L. Accountable-Subgroup Multisignatures Proceedings of the Acm Conference On Computer and Communications Security. 245-254. |
0.365 |
|
2001 |
Itkis G, Reyzin L. Forward-secure signatures with optimal signing and verifying Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2139: 332-354. |
0.35 |
|
2000 |
Abdalla M, Reyzin L. A new forward-secure digital signature scheme Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1976: 116-129. |
0.367 |
|
2000 |
Ramzan Z, Reyzin L. On the round security of symmetric-key cryptographic primitives Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1880: 376-393. |
0.398 |
|
1999 |
Micali S, Reyzin L. Improving the Exact Security of Fiat-Shamir Signature Schemes Lecture Notes in Computer Science. 167-182. DOI: 10.1007/3-540-46701-7_15 |
0.735 |
|
Show low-probability matches. |