Leonid Reyzin - Publications

Affiliations: 
Boston University, Boston, MA, United States 
Area:
Computer Science

24 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Fuller B, Reyzin L, Smith A. When Are Fuzzy Extractors Possible Ieee Transactions On Information Theory. 66: 5282-5298. DOI: 10.1109/Tit.2020.2984751  0.666
2016 Canetti R, Fuller B, Paneth O, Reyzin L, Smith A. Reusable fuzzy extractors for low-entropy distributions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9665: 117-146. DOI: 10.1007/978-3-662-49890-3_5  0.383
2015 Fuller B, O’Neill A, Reyzin L. A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy Journal of Cryptology. 28: 671-717. DOI: 10.1007/S00145-013-9174-5  0.745
2014 Chandran N, Kanukurthi B, Ostrovsky R, Reyzin L. Privacy amplification with asymptotically optimal entropy loss Journal of the Acm. 61. DOI: 10.1145/2630064  0.652
2014 Faust S, Rabin T, Reyzin L, Tromer E, Vaikuntanathan V. Protecting circuits from computationally bounded and noisy leakage Siam Journal On Computing. 43: 1564-1614. DOI: 10.1137/120880343  0.377
2014 Brogle K, Goldberg S, Reyzin L. Sequential aggregate signatures with lazy verification from trapdoor permutations Information and Computation. 239: 356-376. DOI: 10.1016/J.Ic.2014.07.001  0.471
2013 Fuller B, Meng X, Reyzin L. Computational fuzzy extractors Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8269: 174-193. DOI: 10.1016/J.Ic.2020.104602  0.728
2013 Chase M, Healy A, Lysyanskaya A, Malkin T, Reyzin L. Mercurial commitments with applications to zero-knowledge sets Journal of Cryptology. 26: 251-279. DOI: 10.1007/S00145-012-9122-9  0.377
2012 Dodis Y, Kanukurthi B, Katz J, Reyzin L, Smith A. Robust fuzzy extractors and authenticated key agreement from close secrets Ieee Transactions On Information Theory. 58: 6207-6222. DOI: 10.1109/Tit.2012.2200290  0.664
2010 Li F, Hadjieleftheriou M, Kollios G, Reyzin L. Authenticated index structures for aggregation queries Acm Transactions On Information and System Security. 13. DOI: 10.1145/1880022.1880026  0.316
2009 Dedić N, Itkis G, Reyzin L, Russell S. Upper and lower bounds on black-box steganography Journal of Cryptology. 22: 365-394. DOI: 10.1007/S00145-008-9020-3  0.709
2009 Kanukurthi B, Reyzin L. Key agreement from close secrets over unsecured channels Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5479: 206-223. DOI: 10.1007/978-3-642-01001-9_12  0.431
2008 Dodis Y, Ostrovsky R, Reyzin L, Smith A. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data Siam Journal On Computing. 38: 97-139. DOI: 10.1137/060651380  0.706
2008 Kanukurthi B, Reyzin L. An improved Robust fuzzy extractor Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5229: 156-171. DOI: 10.1007/978-3-540-85855-3_11  0.377
2006 Dodis Y, Katz J, Reyzin L, Smith A. Robust fuzzy extractors and authenticated key agreement from close secrets Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4117: 232-250.  0.425
2003 Dedic N, Reyzin L, Vadhan SP. An Improved Pseudorandom Generator Based on Hardness of Factoring Lecture Notes in Computer Science. 88-101. DOI: 10.1007/3-540-36413-7  0.702
2003 Kozlov A, Reyzin L. Forward-secure signatures with fast key update Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2576: 241-256.  0.394
2002 Micali S, Reyzin L. Improving the exact security of digital signature schemes Journal of Cryptology. 15: 1-18. DOI: 10.1007/S00145-001-0005-8  0.738
2002 Itkis G, Reyzin L. SiBIR: Signer-base intrusion-resilient signatures Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2442: 499-514.  0.363
2001 Micali S, Ohta K, Reyzin L. Accountable-Subgroup Multisignatures Proceedings of the Acm Conference On Computer and Communications Security. 245-254.  0.365
2001 Itkis G, Reyzin L. Forward-secure signatures with optimal signing and verifying Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2139: 332-354.  0.35
2000 Abdalla M, Reyzin L. A new forward-secure digital signature scheme Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1976: 116-129.  0.367
2000 Ramzan Z, Reyzin L. On the round security of symmetric-key cryptographic primitives Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1880: 376-393.  0.398
1999 Micali S, Reyzin L. Improving the Exact Security of Fiat-Shamir Signature Schemes Lecture Notes in Computer Science. 167-182. DOI: 10.1007/3-540-46701-7_15  0.735
Show low-probability matches.