BibTeX records: Leonid Reyzin

download as .bib file

@article{DBLP:journals/iacr/Reyzin23,
  author       = {Leonid Reyzin},
  title        = {Proofs of Space with Maximal Hardness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1530},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1530},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Reyzin23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaidosKRZ23,
  author       = {Pyrros Chaidos and
                  Aggelos Kiayias and
                  Leonid Reyzin and
                  Anatoliy Zinovyev},
  title        = {Approximate Lower Bound Arguments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1655},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1655},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaidosKRZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc9381,
  author       = {Sharon Goldberg and
                  Leonid Reyzin and
                  Dimitrios Papadopoulos and
                  Jan Vcel{\'{a}}k},
  title        = {Verifiable Random Functions (VRFs)},
  journal      = {{RFC}},
  volume       = {9381},
  pages        = {1--47},
  year         = {2023},
  url          = {https://doi.org/10.17487/RFC9381},
  doi          = {10.17487/RFC9381},
  timestamp    = {Wed, 30 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc9381.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LeungG0RZ22,
  author       = {Derek Leung and
                  Yossi Gilad and
                  Sergey Gorbunov and
                  Leonid Reyzin and
                  Nickolai Zeldovich},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Aardvark: An Asynchronous Authenticated Dictionary with Applications
                  to Account-based Cryptocurrencies},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {4237--4254},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/leung},
  timestamp    = {Tue, 18 Oct 2022 17:10:36 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/LeungG0RZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/CanettiFPRS21,
  author       = {Ran Canetti and
                  Benjamin Fuller and
                  Omer Paneth and
                  Leonid Reyzin and
                  Adam D. Smith},
  title        = {Reusable Fuzzy Extractors for Low-Entropy Distributions},
  journal      = {J. Cryptol.},
  volume       = {34},
  number       = {1},
  pages        = {2},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00145-020-09367-8},
  doi          = {10.1007/S00145-020-09367-8},
  timestamp    = {Fri, 04 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/CanettiFPRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/ReyzinSY21,
  author       = {Leonid Reyzin and
                  Adam D. Smith and
                  Sophia Yakoubov},
  editor       = {Shlomi Dolev and
                  Oded Margalit and
                  Benny Pinkas and
                  Alexander A. Schwarzmann},
  title        = {Turning {HATE} into {LOVE:} Compact Homomorphic Ad Hoc Threshold Encryption
                  for Scalable {MPC}},
  booktitle    = {Cyber Security Cryptography and Machine Learning - 5th International
                  Symposium, {CSCML} 2021, Be'er Sheva, Israel, July 8-9, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12716},
  pages        = {361--378},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-78086-9\_27},
  doi          = {10.1007/978-3-030-78086-9\_27},
  timestamp    = {Mon, 03 Jan 2022 22:32:47 +0100},
  biburl       = {https://dblp.org/rec/conf/cscml/ReyzinSY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MicaliRVWZ21,
  author       = {Silvio Micali and
                  Leonid Reyzin and
                  Georgios Vlachos and
                  Riad S. Wahby and
                  Nickolai Zeldovich},
  title        = {Compact Certificates of Collective Knowledge},
  booktitle    = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco,
                  CA, USA, 24-27 May 2021},
  pages        = {626--641},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SP40001.2021.00096},
  doi          = {10.1109/SP40001.2021.00096},
  timestamp    = {Thu, 21 Sep 2023 15:57:26 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/MicaliRVWZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/FullerMR20,
  author       = {Benjamin Fuller and
                  Xianrui Meng and
                  Leonid Reyzin},
  title        = {Computational fuzzy extractors},
  journal      = {Inf. Comput.},
  volume       = {275},
  pages        = {104602},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ic.2020.104602},
  doi          = {10.1016/J.IC.2020.104602},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/FullerMR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/FullerRS20,
  author       = {Benjamin Fuller and
                  Leonid Reyzin and
                  Adam D. Smith},
  title        = {When Are Fuzzy Extractors Possible?},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {66},
  number       = {8},
  pages        = {5282--5298},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIT.2020.2984751},
  doi          = {10.1109/TIT.2020.2984751},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/FullerRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GorbunovRWZ20,
  author       = {Sergey Gorbunov and
                  Leonid Reyzin and
                  Hoeteck Wee and
                  Zhenfei Zhang},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {Pointproofs: Aggregating Proofs for Multiple Vector Commitments},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {2007--2023},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3417244},
  doi          = {10.1145/3372297.3417244},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GorbunovRWZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BenhamoudaG0HK020,
  author       = {Fabrice Benhamouda and
                  Craig Gentry and
                  Sergey Gorbunov and
                  Shai Halevi and
                  Hugo Krawczyk and
                  Chengyu Lin and
                  Tal Rabin and
                  Leonid Reyzin},
  editor       = {Rafael Pass and
                  Krzysztof Pietrzak},
  title        = {Can a Public Blockchain Keep a Secret?},
  booktitle    = {Theory of Cryptography - 18th International Conference, {TCC} 2020,
                  Durham, NC, USA, November 16-19, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12550},
  pages        = {260--290},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64375-1\_10},
  doi          = {10.1007/978-3-030-64375-1\_10},
  timestamp    = {Tue, 15 Dec 2020 11:52:09 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/BenhamoudaG0HK020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GorbunovRWZ20,
  author       = {Sergey Gorbunov and
                  Leonid Reyzin and
                  Hoeteck Wee and
                  Zhenfei Zhang},
  title        = {Pointproofs: Aggregating Proofs for Multiple Vector Commitments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {419},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/419},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GorbunovRWZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenhamoudaGGHKL20,
  author       = {Fabrice Benhamouda and
                  Craig Gentry and
                  Sergey Gorbunov and
                  Shai Halevi and
                  Hugo Krawczyk and
                  Chengyu Lin and
                  Tal Rabin and
                  Leonid Reyzin},
  title        = {Can a Blockchain Keep a Secret?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {464},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/464},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BenhamoudaGGHKL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeungGGRZ20,
  author       = {Derek Leung and
                  Yossi Gilad and
                  Sergey Gorbunov and
                  Leonid Reyzin and
                  Nickolai Zeldovich},
  title        = {Aardvark: {A} Concurrent Authenticated Dictionary with Short Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {975},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/975},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeungGGRZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MicaliRVWZ20,
  author       = {Silvio Micali and
                  Leonid Reyzin and
                  Georgios Vlachos and
                  Riad S. Wahby and
                  Nickolai Zeldovich},
  title        = {Compact Certificates of Collective Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1568},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1568},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/MicaliRVWZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pvldb/BogatovKR19,
  author       = {Dmytro Bogatov and
                  George Kollios and
                  Leonid Reyzin},
  title        = {A Comparative Evaluation of Order-Revealing Encryption Schemes and
                  Secure Range-Query Protocols},
  journal      = {Proc. {VLDB} Endow.},
  volume       = {12},
  number       = {8},
  pages        = {933--947},
  year         = {2019},
  url          = {http://www.vldb.org/pvldb/vol12/p933-bogatov.pdf},
  doi          = {10.14778/3324301.3324309},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pvldb/BogatovKR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GoldbergRSB19,
  author       = {Sharon Goldberg and
                  Leonid Reyzin and
                  Omar Sagga and
                  Foteini Baldimtsi},
  editor       = {Steven D. Galbraith and
                  Shiho Moriai},
  title        = {Efficient Noninteractive Certification of {RSA} Moduli and Beyond},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kobe, Japan, December 8-12, 2019, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11923},
  pages        = {700--727},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34618-8\_24},
  doi          = {10.1007/978-3-030-34618-8\_24},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GoldbergRSB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/acm/19/KalaiR19,
  author       = {Yael Tauman Kalai and
                  Leonid Reyzin},
  editor       = {Oded Goldreich},
  title        = {A survey of leakage-resilient cryptography},
  booktitle    = {Providing Sound Foundations for Cryptography: On the Work of Shafi
                  Goldwasser and Silvio Micali},
  pages        = {727--794},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3335741.3335768},
  doi          = {10.1145/3335741.3335768},
  timestamp    = {Tue, 05 Nov 2019 15:40:16 +0100},
  biburl       = {https://dblp.org/rec/books/acm/19/KalaiR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KalaiR19,
  author       = {Yael Tauman Kalai and
                  Leonid Reyzin},
  title        = {A Survey of Leakage-Resilient Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {302},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/302},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KalaiR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AlwenGKKOPRRR18,
  author       = {Jo{\"{e}}l Alwen and
                  Peter Gazi and
                  Chethan Kamath and
                  Karen Klein and
                  Georg Osang and
                  Krzysztof Pietrzak and
                  Leonid Reyzin and
                  Michal Rol{\'{\i}}nek and
                  Michal Ryb{\'{a}}r},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {On the Memory-Hardness of Data-Independent Password-Hashing Functions},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {51--65},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196534},
  doi          = {10.1145/3196494.3196534},
  timestamp    = {Fri, 29 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AlwenGKKOPRRR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CanettiCRR18,
  author       = {Ran Canetti and
                  Yilei Chen and
                  Leonid Reyzin and
                  Ron D. Rothblum},
  editor       = {Jesper Buus Nielsen and
                  Vincent Rijmen},
  title        = {Fiat-Shamir and Correlation Intractability from Strong KDM-Secure
                  Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10820},
  pages        = {91--122},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-78381-9\_4},
  doi          = {10.1007/978-3-319-78381-9\_4},
  timestamp    = {Tue, 22 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CanettiCRR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DupontHPRY18,
  author       = {Pierre{-}Alain Dupont and
                  Julia Hesse and
                  David Pointcheval and
                  Leonid Reyzin and
                  Sophia Yakoubov},
  editor       = {Jesper Buus Nielsen and
                  Vincent Rijmen},
  title        = {Fuzzy Password-Authenticated Key Exchange},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10822},
  pages        = {393--424},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-78372-7\_13},
  doi          = {10.1007/978-3-319-78372-7\_13},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DupontHPRY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GentryOR18,
  author       = {Craig Gentry and
                  Adam O'Neill and
                  Leonid Reyzin},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate
                  Signatures},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10770},
  pages        = {34--57},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76581-5\_2},
  doi          = {10.1007/978-3-319-76581-5\_2},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GentryOR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaldimtsiGRS18,
  author       = {Foteini Baldimtsi and
                  Sharon Goldberg and
                  Leonid Reyzin and
                  Omar Sagga},
  title        = {Certifying {RSA} Public Keys with an Efficient {NIZK}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {57},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/057},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaldimtsiGRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryOR18,
  author       = {Craig Gentry and
                  Adam O'Neill and
                  Leonid Reyzin},
  title        = {A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate
                  Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {70},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/070},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryOR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiCRR18,
  author       = {Ran Canetti and
                  Yilei Chen and
                  Leonid Reyzin and
                  Ron D. Rothblum},
  title        = {Fiat-Shamir and Correlation Intractability from Strong KDM-Secure
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {131},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/131},
  timestamp    = {Tue, 22 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiCRR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BogatovKR18,
  author       = {Dmytro Bogatov and
                  George Kollios and
                  Leonid Reyzin},
  title        = {A Comparative Evaluation of Order-Preserving and Order-Revealing Schemes
                  and Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {953},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/953},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BogatovKR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ReyzinSY18,
  author       = {Leonid Reyzin and
                  Adam D. Smith and
                  Sophia Yakoubov},
  title        = {Turning {HATE} Into {LOVE:} Homomorphic Ad Hoc Threshold Encryption
                  for Scalable {MPC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {997},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/997},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ReyzinSY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AbusalahACKPR17,
  author       = {Hamza Abusalah and
                  Jo{\"{e}}l Alwen and
                  Bram Cohen and
                  Danylo Khilko and
                  Krzysztof Pietrzak and
                  Leonid Reyzin},
  editor       = {Tsuyoshi Takagi and
                  Thomas Peyrin},
  title        = {Beyond Hellman's Time-Memory Trade-Offs with Applications to Proofs
                  of Space},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Hong Kong, China, December 3-7, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10625},
  pages        = {357--379},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70697-9\_13},
  doi          = {10.1007/978-3-319-70697-9\_13},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AbusalahACKPR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AlwenCPRT17,
  author       = {Jo{\"{e}}l Alwen and
                  Binyi Chen and
                  Krzysztof Pietrzak and
                  Leonid Reyzin and
                  Stefano Tessaro},
  editor       = {Jean{-}S{\'{e}}bastien Coron and
                  Jesper Buus Nielsen},
  title        = {Scrypt Is Maximally Memory-Hard},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10212},
  pages        = {33--62},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-56617-7\_2},
  doi          = {10.1007/978-3-319-56617-7\_2},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AlwenCPRT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/BaldimtsiCDLRSY17,
  author       = {Foteini Baldimtsi and
                  Jan Camenisch and
                  Maria Dubovitskaya and
                  Anna Lysyanskaya and
                  Leonid Reyzin and
                  Kai Samelin and
                  Sophia Yakoubov},
  title        = {Accumulators with Applications to Anonymity-Preserving Revocation},
  booktitle    = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2017, Paris, France, April 26-28, 2017},
  pages        = {301--315},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/EuroSP.2017.13},
  doi          = {10.1109/EUROSP.2017.13},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/BaldimtsiCDLRSY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ReyzinMCI17,
  author       = {Leonid Reyzin and
                  Dmitry Meshkov and
                  Alexander Chepurnoy and
                  Sasha Ivanov},
  editor       = {Aggelos Kiayias},
  title        = {Improving Authenticated Dynamic Dictionaries, with Applications to
                  Cryptocurrencies},
  booktitle    = {Financial Cryptography and Data Security - 21st International Conference,
                  {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10322},
  pages        = {376--392},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70972-7\_21},
  doi          = {10.1007/978-3-319-70972-7\_21},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/ReyzinMCI17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2017-1,
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10677},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70500-2},
  doi          = {10.1007/978-3-319-70500-2},
  isbn         = {978-3-319-70499-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/2017-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2017-2,
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10678},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70503-3},
  doi          = {10.1007/978-3-319-70503-3},
  isbn         = {978-3-319-70502-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/2017-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaldimtsiCDLRSY17,
  author       = {Foteini Baldimtsi and
                  Jan Camenisch and
                  Maria Dubovitskaya and
                  Anna Lysyanskaya and
                  Leonid Reyzin and
                  Kai Samelin and
                  Sophia Yakoubov},
  title        = {Accumulators with Applications to Anonymity-Preserving Revocation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {43},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/043},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaldimtsiCDLRSY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PapadopoulosWHN17,
  author       = {Dimitrios Papadopoulos and
                  Duane Wessels and
                  Shumon Huque and
                  Moni Naor and
                  Jan Vcel{\'{a}}k and
                  Leonid Reyzin and
                  Sharon Goldberg},
  title        = {Can {NSEC5} be practical for {DNSSEC} deployments?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {99},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/099},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/PapadopoulosWHN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbusalahACKPR17,
  author       = {Hamza Abusalah and
                  Jo{\"{e}}l Alwen and
                  Bram Cohen and
                  Danylo Khilko and
                  Krzysztof Pietrzak and
                  Leonid Reyzin},
  title        = {Beyond Hellman's Time-Memory Trade-Offs with Applications to Proofs
                  of Space},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {893},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/893},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbusalahACKPR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DupontHPRY17,
  author       = {Pierre{-}Alain Dupont and
                  Julia Hesse and
                  David Pointcheval and
                  Leonid Reyzin and
                  Sophia Yakoubov},
  title        = {Fuzzy Authenticated Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1111},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1111},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DupontHPRY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/FullerRS16,
  author       = {Benjamin Fuller and
                  Leonid Reyzin and
                  Adam D. Smith},
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {When Are Fuzzy Extractors Possible?},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10031},
  pages        = {277--306},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53887-6\_10},
  doi          = {10.1007/978-3-662-53887-6\_10},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/FullerRS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CanettiFPRS16,
  author       = {Ran Canetti and
                  Benjamin Fuller and
                  Omer Paneth and
                  Leonid Reyzin and
                  Adam D. Smith},
  editor       = {Marc Fischlin and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Reusable Fuzzy Extractors for Low-Entropy Distributions},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9665},
  pages        = {117--146},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49890-3\_5},
  doi          = {10.1007/978-3-662-49890-3\_5},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CanettiFPRS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/ReyzinY16,
  author       = {Leonid Reyzin and
                  Sophia Yakoubov},
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {Efficient Asynchronous Accumulators for Distributed {PKI}},
  booktitle    = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  pages        = {292--309},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9\_16},
  doi          = {10.1007/978-3-319-44618-9\_16},
  timestamp    = {Thu, 23 Jun 2022 19:58:57 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/ReyzinY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CanettiCR16,
  author       = {Ran Canetti and
                  Yilei Chen and
                  Leonid Reyzin},
  editor       = {Eyal Kushilevitz and
                  Tal Malkin},
  title        = {On the Correlation Intractability of Obfuscated Pseudorandom Functions},
  booktitle    = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A,
                  Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9562},
  pages        = {389--415},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49096-9\_17},
  doi          = {10.1007/978-3-662-49096-9\_17},
  timestamp    = {Tue, 22 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/CanettiCR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoldbergNPR16,
  author       = {Sharon Goldberg and
                  Moni Naor and
                  Dimitrios Papadopoulos and
                  Leonid Reyzin},
  title        = {{NSEC5} from Elliptic Curves: Provably Preventing {DNSSEC} Zone Enumeration
                  with Shorter Responses},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {83},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/083},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GoldbergNPR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlwenGKKOPRRR16,
  author       = {Jo{\"{e}}l Alwen and
                  Peter Gazi and
                  Chethan Kamath and
                  Karen Klein and
                  Georg Osang and
                  Krzysztof Pietrzak and
                  Leonid Reyzin and
                  Michal Rol{\'{\i}}nek and
                  Michal Ryb{\'{a}}r},
  title        = {On the Memory-Hardness of Data-Independent Password-Hashing Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {783},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/783},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlwenGKKOPRRR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlwenCPRT16,
  author       = {Jo{\"{e}}l Alwen and
                  Binyi Chen and
                  Krzysztof Pietrzak and
                  Leonid Reyzin and
                  Stefano Tessaro},
  title        = {Scrypt is Maximally Memory-Hard},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {989},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/989},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlwenCPRT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ReyzinMCI16,
  author       = {Leonid Reyzin and
                  Dmitry Meshkov and
                  Alexander Chepurnoy and
                  Sasha Ivanov},
  title        = {Improving Authenticated Dynamic Dictionaries, with Applications to
                  Cryptocurrencies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {994},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/994},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ReyzinMCI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/FullerOR15,
  author       = {Benjamin Fuller and
                  Adam O'Neill and
                  Leonid Reyzin},
  title        = {A Unified Approach to Deterministic Encryption: New Constructions
                  and a Connection to Computational Entropy},
  journal      = {J. Cryptol.},
  volume       = {28},
  number       = {3},
  pages        = {671--717},
  year         = {2015},
  url          = {https://doi.org/10.1007/s00145-013-9174-5},
  doi          = {10.1007/S00145-013-9174-5},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/FullerOR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/GoldbergNPRVZ15,
  author       = {Sharon Goldberg and
                  Moni Naor and
                  Dimitrios Papadopoulos and
                  Leonid Reyzin and
                  Sachin Vasant and
                  Asaf Ziv},
  title        = {{NSEC5:} Provably Preventing {DNSSEC} Zone Enumeration},
  booktitle    = {22nd Annual Network and Distributed System Security Symposium, {NDSS}
                  2015, San Diego, California, USA, February 8-11, 2015},
  publisher    = {The Internet Society},
  year         = {2015},
  url          = {https://www.ndss-symposium.org/ndss2015/nsec5-provably-preventing-dnssec-zone-enumeration},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/GoldbergNPRVZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiCR15,
  author       = {Ran Canetti and
                  Yilei Chen and
                  Leonid Reyzin},
  title        = {On the Correlation Intractability of Obfuscated Pseudorandom Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {334},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/334},
  timestamp    = {Tue, 22 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiCR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ReyzinY15,
  author       = {Leonid Reyzin and
                  Sophia Yakoubov},
  title        = {Efficient Asynchronous Accumulators for Distributed {PKI}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {718},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/718},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ReyzinY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/BrogleGR14,
  author       = {Kyle Brogle and
                  Sharon Goldberg and
                  Leonid Reyzin},
  title        = {Sequential aggregate signatures with lazy verification from trapdoor
                  permutations},
  journal      = {Inf. Comput.},
  volume       = {239},
  pages        = {356--376},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ic.2014.07.001},
  doi          = {10.1016/J.IC.2014.07.001},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/BrogleGR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/ChandranKOR14,
  author       = {Nishanth Chandran and
                  Bhavana Kanukurthi and
                  Rafail Ostrovsky and
                  Leonid Reyzin},
  title        = {Privacy amplification with asymptotically optimal entropy loss},
  journal      = {J. {ACM}},
  volume       = {61},
  number       = {5},
  pages        = {29:1--29:28},
  year         = {2014},
  url          = {https://doi.org/10.1145/2630064},
  doi          = {10.1145/2630064},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jacm/ChandranKOR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/FaustRRTV14,
  author       = {Sebastian Faust and
                  Tal Rabin and
                  Leonid Reyzin and
                  Eran Tromer and
                  Vinod Vaikuntanathan},
  title        = {Protecting Circuits from Computationally Bounded and Noisy Leakage},
  journal      = {{SIAM} J. Comput.},
  volume       = {43},
  number       = {5},
  pages        = {1564--1614},
  year         = {2014},
  url          = {https://doi.org/10.1137/120880343},
  doi          = {10.1137/120880343},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/FaustRRTV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AggarwalDJMR14,
  author       = {Divesh Aggarwal and
                  Yevgeniy Dodis and
                  Zahra Jafargholi and
                  Eric Miles and
                  Leonid Reyzin},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Amplifying Privacy in Privacy Amplification},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {183--198},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_11},
  doi          = {10.1007/978-3-662-44381-1\_11},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AggarwalDJMR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/HeilmanCRG14,
  author       = {Ethan Heilman and
                  Danny Cooper and
                  Leonid Reyzin and
                  Sharon Goldberg},
  editor       = {Fabi{\'{a}}n E. Bustamante and
                  Y. Charlie Hu and
                  Arvind Krishnamurthy and
                  Sylvia Ratnasamy},
  title        = {From the consent of the routed: improving the transparency of the
                  {RPKI}},
  booktitle    = {{ACM} {SIGCOMM} 2014 Conference, SIGCOMM'14, Chicago, IL, USA, August
                  17-22, 2014},
  pages        = {51--62},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2619239.2626293},
  doi          = {10.1145/2619239.2626293},
  timestamp    = {Wed, 10 Mar 2021 13:04:38 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcomm/HeilmanCRG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiFPR14,
  author       = {Ran Canetti and
                  Benjamin Fuller and
                  Omer Paneth and
                  Leonid Reyzin},
  title        = {Key Derivation From Noisy Sources With More Errors Than Entropy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {243},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/243},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiFPR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoldbergNPRVZ14,
  author       = {Sharon Goldberg and
                  Moni Naor and
                  Dimitrios Papadopoulos and
                  Leonid Reyzin and
                  Sachin Vasant and
                  Asaf Ziv},
  title        = {{NSEC5:} Provably Preventing {DNSSEC} Zone Enumeration},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {582},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/582},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GoldbergNPRVZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FullerSR14,
  author       = {Benjamin Fuller and
                  Adam D. Smith and
                  Leonid Reyzin},
  title        = {Where are Fuzzy Extractors Possible?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {961},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/961},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FullerSR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/ChaseHLMR13,
  author       = {Melissa Chase and
                  Alexander Healy and
                  Anna Lysyanskaya and
                  Tal Malkin and
                  Leonid Reyzin},
  title        = {Mercurial Commitments with Applications to Zero-Knowledge Sets},
  journal      = {J. Cryptol.},
  volume       = {26},
  number       = {2},
  pages        = {251--279},
  year         = {2013},
  url          = {https://doi.org/10.1007/s00145-012-9122-9},
  doi          = {10.1007/S00145-012-9122-9},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/ChaseHLMR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/FullerMR13,
  author       = {Benjamin Fuller and
                  Xianrui Meng and
                  Leonid Reyzin},
  editor       = {Kazue Sako and
                  Palash Sarkar},
  title        = {Computational Fuzzy Extractors},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8269},
  pages        = {174--193},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42033-7\_10},
  doi          = {10.1007/978-3-642-42033-7\_10},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/FullerMR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotnets/CooperHBRG13,
  author       = {Danny Cooper and
                  Ethan Heilman and
                  Kyle Brogle and
                  Leonid Reyzin and
                  Sharon Goldberg},
  editor       = {Dave Levine and
                  Sachin Katti and
                  Dave Oran},
  title        = {On the risk of misbehaving {RPKI} authorities},
  booktitle    = {Twelfth {ACM} Workshop on Hot Topics in Networks, HotNets-XII, College
                  Park, MD, USA, November 21-22, 2013},
  pages        = {16:1--16:7},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2535771.2535787},
  doi          = {10.1145/2535771.2535787},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hotnets/CooperHBRG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FullerMR13,
  author       = {Benjamin Fuller and
                  Xianrui Meng and
                  Leonid Reyzin},
  title        = {Computational Fuzzy Extractors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {416},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/416},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FullerMR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AggarwalDJMR13,
  author       = {Divesh Aggarwal and
                  Yevgeniy Dodis and
                  Zahra Jafargholi and
                  Eric Miles and
                  Leonid Reyzin},
  title        = {Amplifying Privacy in Privacy Amplification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {723},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/723},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AggarwalDJMR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/DodisKKRS12,
  author       = {Yevgeniy Dodis and
                  Bhavana Kanukurthi and
                  Jonathan Katz and
                  Leonid Reyzin and
                  Adam D. Smith},
  title        = {Robust Fuzzy Extractors and Authenticated Key Agreement From Close
                  Secrets},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {58},
  number       = {9},
  pages        = {6207--6222},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIT.2012.2200290},
  doi          = {10.1109/TIT.2012.2200290},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/DodisKKRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BrogleGR12,
  author       = {Kyle Brogle and
                  Sharon Goldberg and
                  Leonid Reyzin},
  editor       = {Xiaoyun Wang and
                  Kazue Sako},
  title        = {Sequential Aggregate Signatures with Lazy Verification from Trapdoor
                  Permutations - (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Beijing, China, December 2-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7658},
  pages        = {644--662},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34961-4\_39},
  doi          = {10.1007/978-3-642-34961-4\_39},
  timestamp    = {Mon, 25 Nov 2019 15:32:14 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BrogleGR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/FullerOR12,
  author       = {Benjamin Fuller and
                  Adam O'Neill and
                  Leonid Reyzin},
  editor       = {Ronald Cramer},
  title        = {A Unified Approach to Deterministic Encryption: New Constructions
                  and a Connection to Computational Entropy},
  booktitle    = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC}
                  2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7194},
  pages        = {582--599},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28914-9\_33},
  doi          = {10.1007/978-3-642-28914-9\_33},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/FullerOR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FullerOR12,
  author       = {Benjamin Fuller and
                  Adam O'Neill and
                  Leonid Reyzin},
  title        = {A Unified Approach to Deterministic Encryption: New Constructions
                  and a Connection to Computational Entropy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {5},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/005},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FullerOR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FullerR12,
  author       = {Benjamin Fuller and
                  Leonid Reyzin},
  title        = {Computational Entropy and Information Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {466},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/466},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FullerR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChandranKOR12,
  author       = {Nishanth Chandran and
                  Bhavana Kanukurthi and
                  Rafail Ostrovsky and
                  Leonid Reyzin},
  title        = {Privacy Amplification with Asymptotically Optimal Entropy Loss},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {501},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/501},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChandranKOR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Reyzin11,
  author       = {Leonid Reyzin},
  editor       = {Serge Fehr},
  title        = {Some Notions of Entropy for Cryptography - (Invited Talk)},
  booktitle    = {Information Theoretic Security - 5th International Conference, {ICITS}
                  2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6673},
  pages        = {138--142},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20728-0\_13},
  doi          = {10.1007/978-3-642-20728-0\_13},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Reyzin11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrogleGR11,
  author       = {Kyle Brogle and
                  Sharon Goldberg and
                  Leonid Reyzin},
  title        = {Sequential Aggregate Signatures with Lazy Verification from Trapdoor
                  Permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {222},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/222},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrogleGR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LiHKR10,
  author       = {Feifei Li and
                  Marios Hadjieleftheriou and
                  George Kollios and
                  Leonid Reyzin},
  title        = {Authenticated Index Structures for Aggregation Queries},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {4},
  pages        = {32:1--32:35},
  year         = {2010},
  url          = {https://doi.org/10.1145/1880022.1880026},
  doi          = {10.1145/1880022.1880026},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/LiHKR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/FaustRRTV10,
  author       = {Sebastian Faust and
                  Tal Rabin and
                  Leonid Reyzin and
                  Eran Tromer and
                  Vinod Vaikuntanathan},
  editor       = {Henri Gilbert},
  title        = {Protecting Circuits from Leakage: the Computationally-Bounded and
                  Noisy Cases},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Monaco / French Riviera, May 30 - June 3, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6110},
  pages        = {135--156},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13190-5\_7},
  doi          = {10.1007/978-3-642-13190-5\_7},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/FaustRRTV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/ChandranKOR10,
  author       = {Nishanth Chandran and
                  Bhavana Kanukurthi and
                  Rafail Ostrovsky and
                  Leonid Reyzin},
  editor       = {Leonard J. Schulman},
  title        = {Privacy amplification with asymptotically optimal entropy loss},
  booktitle    = {Proceedings of the 42nd {ACM} Symposium on Theory of Computing, {STOC}
                  2010, Cambridge, Massachusetts, USA, 5-8 June 2010},
  pages        = {785--794},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1806689.1806796},
  doi          = {10.1145/1806689.1806796},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/ChandranKOR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisKKRS10,
  author       = {Yevgeniy Dodis and
                  Bhavana Kanukurthi and
                  Jonathan Katz and
                  Leonid Reyzin and
                  Adam D. Smith},
  title        = {Robust Fuzzy Extractors and Authenticated Key Agreement from Close
                  Secrets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {456},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/456},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisKKRS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/DedicIRR09,
  author       = {Nenad Dedic and
                  Gene Itkis and
                  Leonid Reyzin and
                  Scott Russell},
  title        = {Upper and Lower Bounds on Black-Box Steganography},
  journal      = {J. Cryptol.},
  volume       = {22},
  number       = {3},
  pages        = {365--394},
  year         = {2009},
  url          = {https://doi.org/10.1007/s00145-008-9020-3},
  doi          = {10.1007/S00145-008-9020-3},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/DedicIRR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KanukurthiR09,
  author       = {Bhavana Kanukurthi and
                  Leonid Reyzin},
  editor       = {Antoine Joux},
  title        = {Key Agreement from Close Secrets over Unsecured Channels},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cologne, Germany, April 26-30, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5479},
  pages        = {206--223},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01001-9\_12},
  doi          = {10.1007/978-3-642-01001-9\_12},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KanukurthiR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DodisRRS09,
  author       = {Yevgeniy Dodis and
                  Leonid Reyzin and
                  Ronald L. Rivest and
                  Emily Shen},
  editor       = {Orr Dunkelman},
  title        = {Indifferentiability of Permutation-Based Compression Functions and
                  Tree-Based Modes of Operation, with Applications to {MD6}},
  booktitle    = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
                  Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5665},
  pages        = {104--121},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03317-9\_7},
  doi          = {10.1007/978-3-642-03317-9\_7},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DodisRRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustRT09,
  author       = {Sebastian Faust and
                  Leonid Reyzin and
                  Eran Tromer},
  title        = {Protecting Circuits from Computationally-Bounded Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {379},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/379},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FaustRT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/DodisORS08,
  author       = {Yevgeniy Dodis and
                  Rafail Ostrovsky and
                  Leonid Reyzin and
                  Adam D. Smith},
  title        = {Fuzzy Extractors: How to Generate Strong Keys from Biometrics and
                  Other Noisy Data},
  journal      = {{SIAM} J. Comput.},
  volume       = {38},
  number       = {1},
  pages        = {97--139},
  year         = {2008},
  url          = {https://doi.org/10.1137/060651380},
  doi          = {10.1137/060651380},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/DodisORS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/KanukurthiR08,
  author       = {Bhavana Kanukurthi and
                  Leonid Reyzin},
  editor       = {Rafail Ostrovsky and
                  Roberto De Prisco and
                  Ivan Visconti},
  title        = {An Improved Robust Fuzzy Extractor},
  booktitle    = {Security and Cryptography for Networks, 6th International Conference,
                  {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5229},
  pages        = {156--171},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85855-3\_11},
  doi          = {10.1007/978-3-540-85855-3\_11},
  timestamp    = {Tue, 25 Feb 2020 11:33:46 +0100},
  biburl       = {https://dblp.org/rec/conf/scn/KanukurthiR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DedicHR08,
  author       = {Nenad Dedic and
                  Danny Harnik and
                  Leonid Reyzin},
  editor       = {Ran Canetti},
  title        = {Saving Private Randomness in One-Way Functions and Pseudorandom Generators},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {607--625},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_33},
  doi          = {10.1007/978-3-540-78524-8\_33},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DedicHR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/dbsec/LiHKR08,
  author       = {Feifei Li and
                  Marios Hadjieleftheriou and
                  George Kollios and
                  Leonid Reyzin},
  editor       = {Michael Gertz and
                  Sushil Jajodia},
  title        = {Authenticated Index Structures for Outsourced Databases},
  booktitle    = {Handbook of Database Security - Applications and Trends},
  pages        = {115--136},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-48533-1\_5},
  doi          = {10.1007/978-0-387-48533-1\_5},
  timestamp    = {Mon, 07 Dec 2020 17:16:27 +0100},
  biburl       = {https://dblp.org/rec/reference/dbsec/LiHKR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0806-0837,
  author       = {Nenad Dedic and
                  Gene Itkis and
                  Leonid Reyzin and
                  Scott Russell},
  title        = {Upper and Lower Bounds on Black-Box Steganography},
  journal      = {CoRR},
  volume       = {abs/0806.0837},
  year         = {2008},
  url          = {http://arxiv.org/abs/0806.0837},
  eprinttype    = {arXiv},
  eprint       = {0806.0837},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0806-0837.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0807-0799,
  author       = {Bhavana Kanukurthi and
                  Leonid Reyzin},
  title        = {An Improved Robust Fuzzy Extractor},
  journal      = {CoRR},
  volume       = {abs/0807.0799},
  year         = {2008},
  url          = {http://arxiv.org/abs/0807.0799},
  eprinttype    = {arXiv},
  eprint       = {0807.0799},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0807-0799.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KanukurthiR08,
  author       = {Bhavana Kanukurthi and
                  Leonid Reyzin},
  title        = {An Improved Robust Fuzzy Extractor},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {278},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/278},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KanukurthiR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KanukurthiR08a,
  author       = {Bhavana Kanukurthi and
                  Leonid Reyzin},
  title        = {Key Agreement from Close Secrets over Unsecured Channels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {494},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/494},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KanukurthiR08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/HsiaoLR07,
  author       = {Chun{-}Yuan Hsiao and
                  Chi{-}Jen Lu and
                  Leonid Reyzin},
  editor       = {Moni Naor},
  title        = {Conditional Computational Entropy, or Toward Separating Pseudoentropy
                  from Compressibility},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Barcelona, Spain, May 20-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4515},
  pages        = {169--186},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72540-4\_10},
  doi          = {10.1007/978-3-540-72540-4\_10},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/HsiaoLR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DedicHR07,
  author       = {Nenad Dedic and
                  Danny Harnik and
                  Leonid Reyzin},
  title        = {Saving Private Randomness in One-Way Functions and Pseudorandom Generators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {458},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/458},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DedicHR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DodisKRS06,
  author       = {Yevgeniy Dodis and
                  Jonathan Katz and
                  Leonid Reyzin and
                  Adam D. Smith},
  editor       = {Cynthia Dwork},
  title        = {Robust Fuzzy Extractors and Authenticated Key Agreement from Close
                  Secrets},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4117},
  pages        = {232--250},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11818175\_14},
  doi          = {10.1007/11818175\_14},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DodisKRS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmod/LiHKR06,
  author       = {Feifei Li and
                  Marios Hadjieleftheriou and
                  George Kollios and
                  Leonid Reyzin},
  editor       = {Surajit Chaudhuri and
                  Vagelis Hristidis and
                  Neoklis Polyzotis},
  title        = {Dynamic authenticated index structures for outsourced databases},
  booktitle    = {Proceedings of the {ACM} {SIGMOD} International Conference on Management
                  of Data, Chicago, Illinois, USA, June 27-29, 2006},
  pages        = {121--132},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1142473.1142488},
  doi          = {10.1145/1142473.1142488},
  timestamp    = {Thu, 11 Mar 2021 15:20:15 +0100},
  biburl       = {https://dblp.org/rec/conf/sigmod/LiHKR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0602007,
  author       = {Yevgeniy Dodis and
                  Rafail Ostrovsky and
                  Leonid Reyzin and
                  Adam D. Smith},
  title        = {Fuzzy Extractors: How to Generate Strong Keys from Biometrics and
                  Other Noisy Data},
  journal      = {CoRR},
  volume       = {abs/cs/0602007},
  year         = {2006},
  url          = {http://arxiv.org/abs/cs/0602007},
  eprinttype    = {arXiv},
  eprint       = {cs/0602007},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0602007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ChaseHLMR05,
  author       = {Melissa Chase and
                  Alexander Healy and
                  Anna Lysyanskaya and
                  Tal Malkin and
                  Leonid Reyzin},
  editor       = {Ronald Cramer},
  title        = {Mercurial Commitments with Applications to Zero-Knowledge Sets},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {422--439},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_25},
  doi          = {10.1007/11426639\_25},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/ChaseHLMR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DedicIRR05,
  author       = {Nenad Dedic and
                  Gene Itkis and
                  Leonid Reyzin and
                  Scott Russell},
  editor       = {Joe Kilian},
  title        = {Upper and Lower Bounds on Black-Box Steganography},
  booktitle    = {Theory of Cryptography, Second Theory of Cryptography Conference,
                  {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3378},
  pages        = {227--244},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30576-7\_13},
  doi          = {10.1007/978-3-540-30576-7\_13},
  timestamp    = {Sun, 02 Jun 2019 21:21:22 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DedicIRR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HsiaoR04,
  author       = {Chun{-}Yuan Hsiao and
                  Leonid Reyzin},
  editor       = {Matthew K. Franklin},
  title        = {Finding Collisions on a Public Road, or Do Secure Hash Functions Need
                  Secret Coins?},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2004, 24th Annual International
                  CryptologyConference, Santa Barbara, California, USA, August 15-19,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3152},
  pages        = {92--105},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28628-8\_6},
  doi          = {10.1007/978-3-540-28628-8\_6},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HsiaoR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LysyanskayaMRS04,
  author       = {Anna Lysyanskaya and
                  Silvio Micali and
                  Leonid Reyzin and
                  Hovav Shacham},
  editor       = {Christian Cachin and
                  Jan Camenisch},
  title        = {Sequential Aggregate Signatures from Trapdoor Permutations},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Interlaken,
                  Switzerland, May 2-6, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3027},
  pages        = {74--90},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24676-3\_5},
  doi          = {10.1007/978-3-540-24676-3\_5},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LysyanskayaMRS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DodisRS04,
  author       = {Yevgeniy Dodis and
                  Leonid Reyzin and
                  Adam D. Smith},
  editor       = {Christian Cachin and
                  Jan Camenisch},
  title        = {Fuzzy Extractors: How to Generate Strong Keys from Biometrics and
                  Other Noisy Data},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Interlaken,
                  Switzerland, May 2-6, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3027},
  pages        = {523--540},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24676-3\_31},
  doi          = {10.1007/978-3-540-24676-3\_31},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DodisRS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/MicaliR04,
  author       = {Silvio Micali and
                  Leonid Reyzin},
  editor       = {Moni Naor},
  title        = {Physically Observable Cryptography (Extended Abstract)},
  booktitle    = {Theory of Cryptography, First Theory of Cryptography Conference, {TCC}
                  2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2951},
  pages        = {278--296},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24638-1\_16},
  doi          = {10.1007/978-3-540-24638-1\_16},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/MicaliR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DedicIRR04,
  author       = {Nenad Dedic and
                  Gene Itkis and
                  Leonid Reyzin and
                  Scott Russell},
  title        = {Upper and Lower Bounds on Black-Box Steganography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {246},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/246},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DedicIRR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/DodisR03,
  author       = {Yevgeniy Dodis and
                  Leonid Reyzin},
  editor       = {Moti Yung},
  title        = {Breaking and repairing optimistic fair exchange from {PODC} 2003},
  booktitle    = {Proceedings of the 2003 {ACM} workshop on Digital rights management
                  2003, Washington, DC, USA, October 27, 2003},
  pages        = {47--54},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/947380.947387},
  doi          = {10.1145/947380.947387},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/DodisR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LysyanskayaMRS03,
  author       = {Anna Lysyanskaya and
                  Silvio Micali and
                  Leonid Reyzin and
                  Hovav Shacham},
  title        = {Sequential Aggregate Signatures from Trapdoor Permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {91},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/091},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LysyanskayaMRS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ReyzinR03,
  author       = {Leonid Reyzin and
                  Scott Russell},
  title        = {Simple Stateless Steganography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {93},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/093},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ReyzinR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MicaliR03,
  author       = {Silvio Micali and
                  Leonid Reyzin},
  title        = {Physically Observable Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {120},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/120},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MicaliR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisR03,
  author       = {Yevgeniy Dodis and
                  Leonid Reyzin},
  title        = {Breaking and Repairing Optimistic Fair Exchange from {PODC} 2003},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {146},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/146},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisORS03,
  author       = {Yevgeniy Dodis and
                  Rafail Ostrovsky and
                  Leonid Reyzin and
                  Adam D. Smith},
  title        = {Fuzzy Extractors: How to Generate Strong Keys from Biometrics and
                  Other Noisy Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {235},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/235},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisORS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/MicaliR02,
  author       = {Silvio Micali and
                  Leonid Reyzin},
  title        = {Improving the Exact Security of Digital Signature Schemes},
  journal      = {J. Cryptol.},
  volume       = {15},
  number       = {1},
  pages        = {1--18},
  year         = {2002},
  url          = {https://doi.org/10.1007/s00145-001-0005-8},
  doi          = {10.1007/S00145-001-0005-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/MicaliR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ReyzinR02,
  author       = {Leonid Reyzin and
                  Natan Reyzin},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {Better than BiBa: Short One-Time Signatures with Fast Signing and
                  Verifying},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {144--153},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_11},
  doi          = {10.1007/3-540-45450-0\_11},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ReyzinR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ItkisR02,
  author       = {Gene Itkis and
                  Leonid Reyzin},
  editor       = {Moti Yung},
  title        = {SiBIR: Signer-Base Intrusion-Resilient Signatures},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 18-22,
                  2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2442},
  pages        = {499--514},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45708-9\_32},
  doi          = {10.1007/3-540-45708-9\_32},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ItkisR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/DodisR02,
  author       = {Yevgeniy Dodis and
                  Leonid Reyzin},
  editor       = {Stelvio Cimato and
                  Clemente Galdi and
                  Giuseppe Persiano},
  title        = {On the Power of Claw-Free Permutations},
  booktitle    = {Security in Communication Networks, Third International Conference,
                  {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2576},
  pages        = {55--73},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36413-7\_5},
  doi          = {10.1007/3-540-36413-7\_5},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/DodisR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/DedicRV02,
  author       = {Nenad Dedic and
                  Leonid Reyzin and
                  Salil P. Vadhan},
  editor       = {Stelvio Cimato and
                  Clemente Galdi and
                  Giuseppe Persiano},
  title        = {An Improved Pseudorandom Generator Based on Hardness of Factoring},
  booktitle    = {Security in Communication Networks, Third International Conference,
                  {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2576},
  pages        = {88--101},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36413-7\_7},
  doi          = {10.1007/3-540-36413-7\_7},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/DedicRV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/KozlovR02,
  author       = {Anton Kozlov and
                  Leonid Reyzin},
  editor       = {Stelvio Cimato and
                  Clemente Galdi and
                  Giuseppe Persiano},
  title        = {Forward-Secure Signatures with Fast Key Update},
  booktitle    = {Security in Communication Networks, Third International Conference,
                  {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2576},
  pages        = {241--256},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36413-7\_18},
  doi          = {10.1007/3-540-36413-7\_18},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/KozlovR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ReyzinR02,
  author       = {Leonid Reyzin and
                  Natan Reyzin},
  title        = {Better than BiBa: Short One-time Signatures with Fast Signing and
                  Verifying},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {14},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/014},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ReyzinR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ItkisR02,
  author       = {Gene Itkis and
                  Leonid Reyzin},
  title        = {SiBIR: Signer-Base Intrusion-Resilient Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {54},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/054},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ItkisR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisR02,
  author       = {Yevgeniy Dodis and
                  Leonid Reyzin},
  title        = {On the Power of Claw-Free Permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {103},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/103},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KozlovR02,
  author       = {Anton Kozlov and
                  Leonid Reyzin},
  title        = {Forward-Secure Signatures with Fast Key Update},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {104},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/104},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KozlovR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DedicRV02,
  author       = {Nenad Dedic and
                  Leonid Reyzin and
                  Salil P. Vadhan},
  title        = {An Improved Pseudorandom Generator Based on Hardness of Factoring},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {131},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/131},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DedicRV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ndltd/Reyzin01,
  author       = {Leonid Reyzin},
  title        = {Zero-knowledge with public keys},
  school       = {Massachusetts Institute of Technology, Cambridge, MA, {USA}},
  year         = {2001},
  url          = {https://hdl.handle.net/1721.1/86670},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ndltd/Reyzin01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LiskovLMRS01,
  author       = {Moses D. Liskov and
                  Anna Lysyanskaya and
                  Silvio Micali and
                  Leonid Reyzin and
                  Adam D. Smith},
  editor       = {Colin Boyd},
  title        = {Mutually Independent Commitments},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2001, 7th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Gold Coast, Australia, December 9-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2248},
  pages        = {385--401},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45682-1\_23},
  doi          = {10.1007/3-540-45682-1\_23},
  timestamp    = {Tue, 01 Jun 2021 15:22:33 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LiskovLMRS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MicaliOR01,
  author       = {Silvio Micali and
                  Kazuo Ohta and
                  Leonid Reyzin},
  editor       = {Michael K. Reiter and
                  Pierangela Samarati},
  title        = {Accountable-subgroup multisignatures: extended abstract},
  booktitle    = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
                  Communications Security, Philadelphia, Pennsylvania, USA, November
                  6-8, 2001},
  pages        = {245--254},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501983.502017},
  doi          = {10.1145/501983.502017},
  timestamp    = {Tue, 10 Nov 2020 20:00:35 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MicaliOR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ItkisR01,
  author       = {Gene Itkis and
                  Leonid Reyzin},
  editor       = {Joe Kilian},
  title        = {Forward-Secure Signatures with Optimal Signing and Verifying},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 19-23,
                  2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2139},
  pages        = {332--354},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44647-8\_20},
  doi          = {10.1007/3-540-44647-8\_20},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ItkisR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MicaliR01,
  author       = {Silvio Micali and
                  Leonid Reyzin},
  editor       = {Joe Kilian},
  title        = {Soundness in the Public-Key Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 19-23,
                  2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2139},
  pages        = {542--565},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44647-8\_32},
  doi          = {10.1007/3-540-44647-8\_32},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MicaliR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/MicaliR01,
  author       = {Silvio Micali and
                  Leonid Reyzin},
  editor       = {Birgit Pfitzmann},
  title        = {Min-round Resettable Zero-Knowledge in the Public-Key Model},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference
                  on the Theory and Application of Cryptographic Techniques, Innsbruck,
                  Austria, May 6-10, 2001, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {2045},
  pages        = {373--393},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44987-6\_23},
  doi          = {10.1007/3-540-44987-6\_23},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/MicaliR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ItkisR01,
  author       = {Gene Itkis and
                  Leonid Reyzin},
  title        = {Forward-Secure Signatures with Optimal Signing and Verifying},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {48},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/048},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ItkisR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AbdallaR00,
  author       = {Michel Abdalla and
                  Leonid Reyzin},
  editor       = {Tatsuaki Okamoto},
  title        = {A New Forward-Secure Digital Signature Scheme},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kyoto, Japan, December 3-7, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1976},
  pages        = {116--129},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44448-3\_10},
  doi          = {10.1007/3-540-44448-3\_10},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AbdallaR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/RamzanR00,
  author       = {Zulfikar Ramzan and
                  Leonid Reyzin},
  editor       = {Mihir Bellare},
  title        = {On the Round Security of Symmetric-Key Cryptographic Primitives},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1880},
  pages        = {376--393},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44598-6\_24},
  doi          = {10.1007/3-540-44598-6\_24},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/RamzanR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaR00,
  author       = {Michel Abdalla and
                  Leonid Reyzin},
  title        = {A New Forward-Secure Digital Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {2},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/002},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cqre/MicaliR99,
  author       = {Silvio Micali and
                  Leonid Reyzin},
  editor       = {Rainer Baumgart},
  title        = {Improving the Exact Security of Fiat-Shamir Signature Schemes},
  booktitle    = {Secure Networking - {CQRE} (Secure) '99, International Exhibition
                  and Congress D{\"{u}}sseldorf, Germany, November 30 - December
                  2, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1740},
  pages        = {167--182},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-46701-7\_15},
  doi          = {10.1007/3-540-46701-7\_15},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cqre/MicaliR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MicaliR99,
  author       = {Silvio Micali and
                  Leonid Reyzin},
  title        = {Improving the Exact Security of Digital Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {20},
  year         = {1999},
  url          = {http://eprint.iacr.org/1999/020},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MicaliR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics