Подписаться
Leonid Reyzin
Leonid Reyzin
Professor of Computer Science, Boston University
Подтвержден адрес электронной почты в домене cs.bu.edu - Главная страница
Название
Процитировано
Процитировано
Год
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
Y Dodis, L Reyzin, A Smith
International conference on the theory and applications of cryptographic …, 2004
3658*2004
Physically observable cryptography
S Micali, L Reyzin
Theory of Cryptography Conference, 278-296, 2004
5982004
Dynamic authenticated index structures for outsourced databases
F Li, M Hadjieleftheriou, G Kollios, L Reyzin
Proceedings of the 2006 ACM SIGMOD international conference on Management of …, 2006
5192006
Sequential aggregate signatures from trapdoor permutations
A Lysyanskaya, S Micali, L Reyzin, H Shacham
International Conference on the Theory and Applications of Cryptographic …, 2004
4042004
Better than BiBa: Short one-time signatures with fast signing and verifying
L Reyzin, N Reyzin
Australasian Conference on Information Security and Privacy, 144-153, 2002
3982002
A new forward-secure digital signature scheme
M Abdalla, L Reyzin
International Conference on the Theory and Application of Cryptology and …, 2000
3652000
Forward-secure signatures with optimal signing and verifying
G Itkis, L Reyzin
Annual International Cryptology Conference, 332-354, 2001
3642001
Accountable-subgroup multisignatures
S Micali, K Ohta, L Reyzin
Proceedings of the 8th ACM Conference on Computer and Communications …, 2001
3372001
Physical access control
S Micali, D Engberg, P Libin, L Reyzin, A Sinelnikov
US Patent 7,353,396, 2008
2212008
Robust fuzzy extractors and authenticated key agreement from close secrets
Y Dodis, J Katz, L Reyzin, A Smith
Annual International Cryptology Conference, 232-250, 2006
2132006
SiBIR: Signer-base intrusion-resilient signatures
G Itkis, L Reyzin
Annual International Cryptology Conference, 499-514, 2002
1842002
Forward-secure signatures with fast key update
A Kozlov, L Reyzin
International Conference on Security in Communication Networks, 241-256, 2002
1742002
Breaking and repairing optimistic fair exchange from PODC 2003
Y Dodis, L Reyzin
Proceedings of the 3rd ACM workshop on Digital rights management, 47-54, 2003
1732003
Protecting circuits from leakage: the computationally-bounded and noisy cases
S Faust, T Rabin, L Reyzin, E Tromer, V Vaikuntanathan
Annual International Conference on the Theory and Applications of …, 2010
1652010
Soundness in the public-key model
S Micali, L Reyzin
Annual International Cryptology Conference, 542-565, 2001
1152001
Authenticated index structures for aggregation queries
F Li, M Hadjieleftheriou, G Kollios, L Reyzin
ACM Transactions on Information and System Security (TISSEC) 13 (4), 1-35, 2010
1112010
Conditional computational entropy, or toward separating pseudoentropy from compressibility
CY Hsiao, CJ Lu, L Reyzin
Annual International Conference on the Theory and Applications of …, 2007
1042007
Reusable fuzzy extractors for low-entropy distributions
R Canetti, B Fuller, O Paneth, L Reyzin, A Smith
Journal of Cryptology 34 (1), 1-33, 2021
1032021
A unified approach to deterministic encryption: New constructions and a connection to computational entropy
B Fuller, A O’neill, L Reyzin
Journal of Cryptology 28 (3), 671-717, 2015
982015
Finding collisions on a public road, or do secure hash functions need secret coins?
CY Hsiao, L Reyzin
Annual International Cryptology Conference, 92-105, 2004
932004
В данный момент система не может выполнить эту операцию. Повторите попытку позднее.
Статьи 1–20