Follow
Shabsi Walfish
Shabsi Walfish
Google
Verified email at cs.nyu.edu
Title
Cited by
Cited by
Year
Universally composable security with global setup
R Canetti, Y Dodis, R Pass, S Walfish
Theory of Cryptography Conference, 61-85, 2007
3872007
Public-key encryption in the bounded-retrieval model
J Alwen, Y Dodis, M Naor, G Segev, S Walfish, D Wichs
Annual International Conference on the Theory and Applications of …, 2010
2392010
Perfectly secure password protocols in the bounded retrieval model
GD Crescenzo, R Lipton, S Walfish
Theory of Cryptography Conference, 225-244, 2006
1642006
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface
M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ...
Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006
942006
Composability and on-line deniability of authentication
Y Dodis, J Katz, A Smith, S Walfish
Theory of Cryptography Conference, 146-162, 2009
832009
Intrusion-resilient key exchange in the bounded retrieval model
D Cash, YZ Ding, Y Dodis, W Lee, R Lipton, S Walfish
Theory of Cryptography Conference, 479-498, 2007
792007
Versatile padding schemes for joint signature and encryption
Y Dodis, MJ Freedman, S Jarecki, S Walfish
Proceedings of the 11th ACM conference on Computer and Communications …, 2004
452004
Optimal signcryption from any trapdoor permutation
Y Dodis, MJ Freedman, S Jarecki, S Walfish
Cryptology ePrint Archive, 2004
352004
Efficient constructions of composable commitments and zero-knowledge proofs
Y Dodis, V Shoup, S Walfish
Annual International Cryptology Conference, 515-535, 2008
342008
Enhanced security models for network protocols
S Walfish
New York University, 2008
182008
A Parallel Signcryption Standard Using RSA with PSEP
A Rawat, S Walfish
Project Report, 2003
72003
Parallel signcryption with oaep, pss-r, and other feistel paddings
Y Dodis, MJ Freedman, S Walfish
Cryptology ePrint Archive, 2003
52003
Fully Simulatable Multiparty Computation
Y Dodis, R Pass, S Walfish
Manuscript, 2005
42005
Intrusionresilient authentication in the Limited Communication Model
D Cash, YZ Ding, Y Dodis, W Lee, R Lipton, S Walfish
Cryptology ePrint Archive, 2005
12005
The system can't perform the operation now. Try again later.
Articles 1–14