Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Leonid Reyzin
@article{DBLP:journals/iacr/Reyzin23, author = {Leonid Reyzin}, title = {Proofs of Space with Maximal Hardness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1530}, year = {2023}, url = {https://eprint.iacr.org/2023/1530}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Reyzin23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChaidosKRZ23, author = {Pyrros Chaidos and Aggelos Kiayias and Leonid Reyzin and Anatoliy Zinovyev}, title = {Approximate Lower Bound Arguments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1655}, year = {2023}, url = {https://eprint.iacr.org/2023/1655}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChaidosKRZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc9381, author = {Sharon Goldberg and Leonid Reyzin and Dimitrios Papadopoulos and Jan Vcel{\'{a}}k}, title = {Verifiable Random Functions (VRFs)}, journal = {{RFC}}, volume = {9381}, pages = {1--47}, year = {2023}, url = {https://doi.org/10.17487/RFC9381}, doi = {10.17487/RFC9381}, timestamp = {Wed, 30 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc9381.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LeungG0RZ22, author = {Derek Leung and Yossi Gilad and Sergey Gorbunov and Leonid Reyzin and Nickolai Zeldovich}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Aardvark: An Asynchronous Authenticated Dictionary with Applications to Account-based Cryptocurrencies}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {4237--4254}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/leung}, timestamp = {Tue, 18 Oct 2022 17:10:36 +0200}, biburl = {https://dblp.org/rec/conf/uss/LeungG0RZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/CanettiFPRS21, author = {Ran Canetti and Benjamin Fuller and Omer Paneth and Leonid Reyzin and Adam D. Smith}, title = {Reusable Fuzzy Extractors for Low-Entropy Distributions}, journal = {J. Cryptol.}, volume = {34}, number = {1}, pages = {2}, year = {2021}, url = {https://doi.org/10.1007/s00145-020-09367-8}, doi = {10.1007/S00145-020-09367-8}, timestamp = {Fri, 04 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/CanettiFPRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscml/ReyzinSY21, author = {Leonid Reyzin and Adam D. Smith and Sophia Yakoubov}, editor = {Shlomi Dolev and Oded Margalit and Benny Pinkas and Alexander A. Schwarzmann}, title = {Turning {HATE} into {LOVE:} Compact Homomorphic Ad Hoc Threshold Encryption for Scalable {MPC}}, booktitle = {Cyber Security Cryptography and Machine Learning - 5th International Symposium, {CSCML} 2021, Be'er Sheva, Israel, July 8-9, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12716}, pages = {361--378}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-78086-9\_27}, doi = {10.1007/978-3-030-78086-9\_27}, timestamp = {Mon, 03 Jan 2022 22:32:47 +0100}, biburl = {https://dblp.org/rec/conf/cscml/ReyzinSY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MicaliRVWZ21, author = {Silvio Micali and Leonid Reyzin and Georgios Vlachos and Riad S. Wahby and Nickolai Zeldovich}, title = {Compact Certificates of Collective Knowledge}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {626--641}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00096}, doi = {10.1109/SP40001.2021.00096}, timestamp = {Thu, 21 Sep 2023 15:57:26 +0200}, biburl = {https://dblp.org/rec/conf/sp/MicaliRVWZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/FullerMR20, author = {Benjamin Fuller and Xianrui Meng and Leonid Reyzin}, title = {Computational fuzzy extractors}, journal = {Inf. Comput.}, volume = {275}, pages = {104602}, year = {2020}, url = {https://doi.org/10.1016/j.ic.2020.104602}, doi = {10.1016/J.IC.2020.104602}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/FullerMR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/FullerRS20, author = {Benjamin Fuller and Leonid Reyzin and Adam D. Smith}, title = {When Are Fuzzy Extractors Possible?}, journal = {{IEEE} Trans. Inf. Theory}, volume = {66}, number = {8}, pages = {5282--5298}, year = {2020}, url = {https://doi.org/10.1109/TIT.2020.2984751}, doi = {10.1109/TIT.2020.2984751}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/FullerRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GorbunovRWZ20, author = {Sergey Gorbunov and Leonid Reyzin and Hoeteck Wee and Zhenfei Zhang}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {Pointproofs: Aggregating Proofs for Multiple Vector Commitments}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {2007--2023}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3417244}, doi = {10.1145/3372297.3417244}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GorbunovRWZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BenhamoudaG0HK020, author = {Fabrice Benhamouda and Craig Gentry and Sergey Gorbunov and Shai Halevi and Hugo Krawczyk and Chengyu Lin and Tal Rabin and Leonid Reyzin}, editor = {Rafael Pass and Krzysztof Pietrzak}, title = {Can a Public Blockchain Keep a Secret?}, booktitle = {Theory of Cryptography - 18th International Conference, {TCC} 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12550}, pages = {260--290}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64375-1\_10}, doi = {10.1007/978-3-030-64375-1\_10}, timestamp = {Tue, 15 Dec 2020 11:52:09 +0100}, biburl = {https://dblp.org/rec/conf/tcc/BenhamoudaG0HK020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GorbunovRWZ20, author = {Sergey Gorbunov and Leonid Reyzin and Hoeteck Wee and Zhenfei Zhang}, title = {Pointproofs: Aggregating Proofs for Multiple Vector Commitments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {419}, year = {2020}, url = {https://eprint.iacr.org/2020/419}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GorbunovRWZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BenhamoudaGGHKL20, author = {Fabrice Benhamouda and Craig Gentry and Sergey Gorbunov and Shai Halevi and Hugo Krawczyk and Chengyu Lin and Tal Rabin and Leonid Reyzin}, title = {Can a Blockchain Keep a Secret?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {464}, year = {2020}, url = {https://eprint.iacr.org/2020/464}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BenhamoudaGGHKL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeungGGRZ20, author = {Derek Leung and Yossi Gilad and Sergey Gorbunov and Leonid Reyzin and Nickolai Zeldovich}, title = {Aardvark: {A} Concurrent Authenticated Dictionary with Short Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {975}, year = {2020}, url = {https://eprint.iacr.org/2020/975}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeungGGRZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MicaliRVWZ20, author = {Silvio Micali and Leonid Reyzin and Georgios Vlachos and Riad S. Wahby and Nickolai Zeldovich}, title = {Compact Certificates of Collective Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1568}, year = {2020}, url = {https://eprint.iacr.org/2020/1568}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/MicaliRVWZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pvldb/BogatovKR19, author = {Dmytro Bogatov and George Kollios and Leonid Reyzin}, title = {A Comparative Evaluation of Order-Revealing Encryption Schemes and Secure Range-Query Protocols}, journal = {Proc. {VLDB} Endow.}, volume = {12}, number = {8}, pages = {933--947}, year = {2019}, url = {http://www.vldb.org/pvldb/vol12/p933-bogatov.pdf}, doi = {10.14778/3324301.3324309}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pvldb/BogatovKR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GoldbergRSB19, author = {Sharon Goldberg and Leonid Reyzin and Omar Sagga and Foteini Baldimtsi}, editor = {Steven D. Galbraith and Shiho Moriai}, title = {Efficient Noninteractive Certification of {RSA} Moduli and Beyond}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11923}, pages = {700--727}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34618-8\_24}, doi = {10.1007/978-3-030-34618-8\_24}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/GoldbergRSB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/acm/19/KalaiR19, author = {Yael Tauman Kalai and Leonid Reyzin}, editor = {Oded Goldreich}, title = {A survey of leakage-resilient cryptography}, booktitle = {Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali}, pages = {727--794}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3335741.3335768}, doi = {10.1145/3335741.3335768}, timestamp = {Tue, 05 Nov 2019 15:40:16 +0100}, biburl = {https://dblp.org/rec/books/acm/19/KalaiR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KalaiR19, author = {Yael Tauman Kalai and Leonid Reyzin}, title = {A Survey of Leakage-Resilient Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {302}, year = {2019}, url = {https://eprint.iacr.org/2019/302}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KalaiR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AlwenGKKOPRRR18, author = {Jo{\"{e}}l Alwen and Peter Gazi and Chethan Kamath and Karen Klein and Georg Osang and Krzysztof Pietrzak and Leonid Reyzin and Michal Rol{\'{\i}}nek and Michal Ryb{\'{a}}r}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {On the Memory-Hardness of Data-Independent Password-Hashing Functions}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {51--65}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196534}, doi = {10.1145/3196494.3196534}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AlwenGKKOPRRR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CanettiCRR18, author = {Ran Canetti and Yilei Chen and Leonid Reyzin and Ron D. Rothblum}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Fiat-Shamir and Correlation Intractability from Strong KDM-Secure Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10820}, pages = {91--122}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78381-9\_4}, doi = {10.1007/978-3-319-78381-9\_4}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CanettiCRR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DupontHPRY18, author = {Pierre{-}Alain Dupont and Julia Hesse and David Pointcheval and Leonid Reyzin and Sophia Yakoubov}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Fuzzy Password-Authenticated Key Exchange}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10822}, pages = {393--424}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78372-7\_13}, doi = {10.1007/978-3-319-78372-7\_13}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DupontHPRY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GentryOR18, author = {Craig Gentry and Adam O'Neill and Leonid Reyzin}, editor = {Michel Abdalla and Ricardo Dahab}, title = {A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate Signatures}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10770}, pages = {34--57}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76581-5\_2}, doi = {10.1007/978-3-319-76581-5\_2}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GentryOR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaldimtsiGRS18, author = {Foteini Baldimtsi and Sharon Goldberg and Leonid Reyzin and Omar Sagga}, title = {Certifying {RSA} Public Keys with an Efficient {NIZK}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {57}, year = {2018}, url = {http://eprint.iacr.org/2018/057}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaldimtsiGRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryOR18, author = {Craig Gentry and Adam O'Neill and Leonid Reyzin}, title = {A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {70}, year = {2018}, url = {http://eprint.iacr.org/2018/070}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryOR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiCRR18, author = {Ran Canetti and Yilei Chen and Leonid Reyzin and Ron D. Rothblum}, title = {Fiat-Shamir and Correlation Intractability from Strong KDM-Secure Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {131}, year = {2018}, url = {http://eprint.iacr.org/2018/131}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiCRR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BogatovKR18, author = {Dmytro Bogatov and George Kollios and Leonid Reyzin}, title = {A Comparative Evaluation of Order-Preserving and Order-Revealing Schemes and Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {953}, year = {2018}, url = {https://eprint.iacr.org/2018/953}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BogatovKR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ReyzinSY18, author = {Leonid Reyzin and Adam D. Smith and Sophia Yakoubov}, title = {Turning {HATE} Into {LOVE:} Homomorphic Ad Hoc Threshold Encryption for Scalable {MPC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {997}, year = {2018}, url = {https://eprint.iacr.org/2018/997}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ReyzinSY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AbusalahACKPR17, author = {Hamza Abusalah and Jo{\"{e}}l Alwen and Bram Cohen and Danylo Khilko and Krzysztof Pietrzak and Leonid Reyzin}, editor = {Tsuyoshi Takagi and Thomas Peyrin}, title = {Beyond Hellman's Time-Memory Trade-Offs with Applications to Proofs of Space}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10625}, pages = {357--379}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70697-9\_13}, doi = {10.1007/978-3-319-70697-9\_13}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/AbusalahACKPR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AlwenCPRT17, author = {Jo{\"{e}}l Alwen and Binyi Chen and Krzysztof Pietrzak and Leonid Reyzin and Stefano Tessaro}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Scrypt Is Maximally Memory-Hard}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10212}, pages = {33--62}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56617-7\_2}, doi = {10.1007/978-3-319-56617-7\_2}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AlwenCPRT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/BaldimtsiCDLRSY17, author = {Foteini Baldimtsi and Jan Camenisch and Maria Dubovitskaya and Anna Lysyanskaya and Leonid Reyzin and Kai Samelin and Sophia Yakoubov}, title = {Accumulators with Applications to Anonymity-Preserving Revocation}, booktitle = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2017, Paris, France, April 26-28, 2017}, pages = {301--315}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/EuroSP.2017.13}, doi = {10.1109/EUROSP.2017.13}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/BaldimtsiCDLRSY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ReyzinMCI17, author = {Leonid Reyzin and Dmitry Meshkov and Alexander Chepurnoy and Sasha Ivanov}, editor = {Aggelos Kiayias}, title = {Improving Authenticated Dynamic Dictionaries, with Applications to Cryptocurrencies}, booktitle = {Financial Cryptography and Data Security - 21st International Conference, {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10322}, pages = {376--392}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70972-7\_21}, doi = {10.1007/978-3-319-70972-7\_21}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/ReyzinMCI17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tcc/2017-1, editor = {Yael Kalai and Leonid Reyzin}, title = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10677}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70500-2}, doi = {10.1007/978-3-319-70500-2}, isbn = {978-3-319-70499-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/2017-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tcc/2017-2, editor = {Yael Kalai and Leonid Reyzin}, title = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10678}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70503-3}, doi = {10.1007/978-3-319-70503-3}, isbn = {978-3-319-70502-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/2017-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaldimtsiCDLRSY17, author = {Foteini Baldimtsi and Jan Camenisch and Maria Dubovitskaya and Anna Lysyanskaya and Leonid Reyzin and Kai Samelin and Sophia Yakoubov}, title = {Accumulators with Applications to Anonymity-Preserving Revocation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {43}, year = {2017}, url = {http://eprint.iacr.org/2017/043}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaldimtsiCDLRSY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PapadopoulosWHN17, author = {Dimitrios Papadopoulos and Duane Wessels and Shumon Huque and Moni Naor and Jan Vcel{\'{a}}k and Leonid Reyzin and Sharon Goldberg}, title = {Can {NSEC5} be practical for {DNSSEC} deployments?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {99}, year = {2017}, url = {http://eprint.iacr.org/2017/099}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/PapadopoulosWHN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbusalahACKPR17, author = {Hamza Abusalah and Jo{\"{e}}l Alwen and Bram Cohen and Danylo Khilko and Krzysztof Pietrzak and Leonid Reyzin}, title = {Beyond Hellman's Time-Memory Trade-Offs with Applications to Proofs of Space}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {893}, year = {2017}, url = {http://eprint.iacr.org/2017/893}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbusalahACKPR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DupontHPRY17, author = {Pierre{-}Alain Dupont and Julia Hesse and David Pointcheval and Leonid Reyzin and Sophia Yakoubov}, title = {Fuzzy Authenticated Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1111}, year = {2017}, url = {http://eprint.iacr.org/2017/1111}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DupontHPRY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/FullerRS16, author = {Benjamin Fuller and Leonid Reyzin and Adam D. Smith}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {When Are Fuzzy Extractors Possible?}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10031}, pages = {277--306}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53887-6\_10}, doi = {10.1007/978-3-662-53887-6\_10}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/FullerRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CanettiFPRS16, author = {Ran Canetti and Benjamin Fuller and Omer Paneth and Leonid Reyzin and Adam D. Smith}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Reusable Fuzzy Extractors for Low-Entropy Distributions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {117--146}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_5}, doi = {10.1007/978-3-662-49890-3\_5}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CanettiFPRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/ReyzinY16, author = {Leonid Reyzin and Sophia Yakoubov}, editor = {Vassilis Zikas and Roberto De Prisco}, title = {Efficient Asynchronous Accumulators for Distributed {PKI}}, booktitle = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, pages = {292--309}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9\_16}, doi = {10.1007/978-3-319-44618-9\_16}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/ReyzinY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CanettiCR16, author = {Ran Canetti and Yilei Chen and Leonid Reyzin}, editor = {Eyal Kushilevitz and Tal Malkin}, title = {On the Correlation Intractability of Obfuscated Pseudorandom Functions}, booktitle = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9562}, pages = {389--415}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49096-9\_17}, doi = {10.1007/978-3-662-49096-9\_17}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/CanettiCR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoldbergNPR16, author = {Sharon Goldberg and Moni Naor and Dimitrios Papadopoulos and Leonid Reyzin}, title = {{NSEC5} from Elliptic Curves: Provably Preventing {DNSSEC} Zone Enumeration with Shorter Responses}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {83}, year = {2016}, url = {http://eprint.iacr.org/2016/083}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GoldbergNPR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlwenGKKOPRRR16, author = {Jo{\"{e}}l Alwen and Peter Gazi and Chethan Kamath and Karen Klein and Georg Osang and Krzysztof Pietrzak and Leonid Reyzin and Michal Rol{\'{\i}}nek and Michal Ryb{\'{a}}r}, title = {On the Memory-Hardness of Data-Independent Password-Hashing Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {783}, year = {2016}, url = {http://eprint.iacr.org/2016/783}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlwenGKKOPRRR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlwenCPRT16, author = {Jo{\"{e}}l Alwen and Binyi Chen and Krzysztof Pietrzak and Leonid Reyzin and Stefano Tessaro}, title = {Scrypt is Maximally Memory-Hard}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {989}, year = {2016}, url = {http://eprint.iacr.org/2016/989}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlwenCPRT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ReyzinMCI16, author = {Leonid Reyzin and Dmitry Meshkov and Alexander Chepurnoy and Sasha Ivanov}, title = {Improving Authenticated Dynamic Dictionaries, with Applications to Cryptocurrencies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {994}, year = {2016}, url = {http://eprint.iacr.org/2016/994}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ReyzinMCI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/FullerOR15, author = {Benjamin Fuller and Adam O'Neill and Leonid Reyzin}, title = {A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy}, journal = {J. Cryptol.}, volume = {28}, number = {3}, pages = {671--717}, year = {2015}, url = {https://doi.org/10.1007/s00145-013-9174-5}, doi = {10.1007/S00145-013-9174-5}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/FullerOR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/GoldbergNPRVZ15, author = {Sharon Goldberg and Moni Naor and Dimitrios Papadopoulos and Leonid Reyzin and Sachin Vasant and Asaf Ziv}, title = {{NSEC5:} Provably Preventing {DNSSEC} Zone Enumeration}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/nsec5-provably-preventing-dnssec-zone-enumeration}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/GoldbergNPRVZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiCR15, author = {Ran Canetti and Yilei Chen and Leonid Reyzin}, title = {On the Correlation Intractability of Obfuscated Pseudorandom Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {334}, year = {2015}, url = {http://eprint.iacr.org/2015/334}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiCR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ReyzinY15, author = {Leonid Reyzin and Sophia Yakoubov}, title = {Efficient Asynchronous Accumulators for Distributed {PKI}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {718}, year = {2015}, url = {http://eprint.iacr.org/2015/718}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ReyzinY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/BrogleGR14, author = {Kyle Brogle and Sharon Goldberg and Leonid Reyzin}, title = {Sequential aggregate signatures with lazy verification from trapdoor permutations}, journal = {Inf. Comput.}, volume = {239}, pages = {356--376}, year = {2014}, url = {https://doi.org/10.1016/j.ic.2014.07.001}, doi = {10.1016/J.IC.2014.07.001}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/BrogleGR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/ChandranKOR14, author = {Nishanth Chandran and Bhavana Kanukurthi and Rafail Ostrovsky and Leonid Reyzin}, title = {Privacy amplification with asymptotically optimal entropy loss}, journal = {J. {ACM}}, volume = {61}, number = {5}, pages = {29:1--29:28}, year = {2014}, url = {https://doi.org/10.1145/2630064}, doi = {10.1145/2630064}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jacm/ChandranKOR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/FaustRRTV14, author = {Sebastian Faust and Tal Rabin and Leonid Reyzin and Eran Tromer and Vinod Vaikuntanathan}, title = {Protecting Circuits from Computationally Bounded and Noisy Leakage}, journal = {{SIAM} J. Comput.}, volume = {43}, number = {5}, pages = {1564--1614}, year = {2014}, url = {https://doi.org/10.1137/120880343}, doi = {10.1137/120880343}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/FaustRRTV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AggarwalDJMR14, author = {Divesh Aggarwal and Yevgeniy Dodis and Zahra Jafargholi and Eric Miles and Leonid Reyzin}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Amplifying Privacy in Privacy Amplification}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {183--198}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_11}, doi = {10.1007/978-3-662-44381-1\_11}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AggarwalDJMR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/HeilmanCRG14, author = {Ethan Heilman and Danny Cooper and Leonid Reyzin and Sharon Goldberg}, editor = {Fabi{\'{a}}n E. Bustamante and Y. Charlie Hu and Arvind Krishnamurthy and Sylvia Ratnasamy}, title = {From the consent of the routed: improving the transparency of the {RPKI}}, booktitle = {{ACM} {SIGCOMM} 2014 Conference, SIGCOMM'14, Chicago, IL, USA, August 17-22, 2014}, pages = {51--62}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2619239.2626293}, doi = {10.1145/2619239.2626293}, timestamp = {Wed, 10 Mar 2021 13:04:38 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/HeilmanCRG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiFPR14, author = {Ran Canetti and Benjamin Fuller and Omer Paneth and Leonid Reyzin}, title = {Key Derivation From Noisy Sources With More Errors Than Entropy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {243}, year = {2014}, url = {http://eprint.iacr.org/2014/243}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiFPR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoldbergNPRVZ14, author = {Sharon Goldberg and Moni Naor and Dimitrios Papadopoulos and Leonid Reyzin and Sachin Vasant and Asaf Ziv}, title = {{NSEC5:} Provably Preventing {DNSSEC} Zone Enumeration}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {582}, year = {2014}, url = {http://eprint.iacr.org/2014/582}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GoldbergNPRVZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FullerSR14, author = {Benjamin Fuller and Adam D. Smith and Leonid Reyzin}, title = {Where are Fuzzy Extractors Possible?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {961}, year = {2014}, url = {http://eprint.iacr.org/2014/961}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FullerSR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/ChaseHLMR13, author = {Melissa Chase and Alexander Healy and Anna Lysyanskaya and Tal Malkin and Leonid Reyzin}, title = {Mercurial Commitments with Applications to Zero-Knowledge Sets}, journal = {J. Cryptol.}, volume = {26}, number = {2}, pages = {251--279}, year = {2013}, url = {https://doi.org/10.1007/s00145-012-9122-9}, doi = {10.1007/S00145-012-9122-9}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/ChaseHLMR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/FullerMR13, author = {Benjamin Fuller and Xianrui Meng and Leonid Reyzin}, editor = {Kazue Sako and Palash Sarkar}, title = {Computational Fuzzy Extractors}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8269}, pages = {174--193}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42033-7\_10}, doi = {10.1007/978-3-642-42033-7\_10}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/FullerMR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotnets/CooperHBRG13, author = {Danny Cooper and Ethan Heilman and Kyle Brogle and Leonid Reyzin and Sharon Goldberg}, editor = {Dave Levine and Sachin Katti and Dave Oran}, title = {On the risk of misbehaving {RPKI} authorities}, booktitle = {Twelfth {ACM} Workshop on Hot Topics in Networks, HotNets-XII, College Park, MD, USA, November 21-22, 2013}, pages = {16:1--16:7}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2535771.2535787}, doi = {10.1145/2535771.2535787}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotnets/CooperHBRG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FullerMR13, author = {Benjamin Fuller and Xianrui Meng and Leonid Reyzin}, title = {Computational Fuzzy Extractors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {416}, year = {2013}, url = {http://eprint.iacr.org/2013/416}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FullerMR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AggarwalDJMR13, author = {Divesh Aggarwal and Yevgeniy Dodis and Zahra Jafargholi and Eric Miles and Leonid Reyzin}, title = {Amplifying Privacy in Privacy Amplification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {723}, year = {2013}, url = {http://eprint.iacr.org/2013/723}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AggarwalDJMR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/DodisKKRS12, author = {Yevgeniy Dodis and Bhavana Kanukurthi and Jonathan Katz and Leonid Reyzin and Adam D. Smith}, title = {Robust Fuzzy Extractors and Authenticated Key Agreement From Close Secrets}, journal = {{IEEE} Trans. Inf. Theory}, volume = {58}, number = {9}, pages = {6207--6222}, year = {2012}, url = {https://doi.org/10.1109/TIT.2012.2200290}, doi = {10.1109/TIT.2012.2200290}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/DodisKKRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BrogleGR12, author = {Kyle Brogle and Sharon Goldberg and Leonid Reyzin}, editor = {Xiaoyun Wang and Kazue Sako}, title = {Sequential Aggregate Signatures with Lazy Verification from Trapdoor Permutations - (Extended Abstract)}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7658}, pages = {644--662}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34961-4\_39}, doi = {10.1007/978-3-642-34961-4\_39}, timestamp = {Mon, 25 Nov 2019 15:32:14 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BrogleGR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/FullerOR12, author = {Benjamin Fuller and Adam O'Neill and Leonid Reyzin}, editor = {Ronald Cramer}, title = {A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy}, booktitle = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC} 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7194}, pages = {582--599}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28914-9\_33}, doi = {10.1007/978-3-642-28914-9\_33}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/FullerOR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FullerOR12, author = {Benjamin Fuller and Adam O'Neill and Leonid Reyzin}, title = {A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {5}, year = {2012}, url = {http://eprint.iacr.org/2012/005}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FullerOR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FullerR12, author = {Benjamin Fuller and Leonid Reyzin}, title = {Computational Entropy and Information Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {466}, year = {2012}, url = {http://eprint.iacr.org/2012/466}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FullerR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChandranKOR12, author = {Nishanth Chandran and Bhavana Kanukurthi and Rafail Ostrovsky and Leonid Reyzin}, title = {Privacy Amplification with Asymptotically Optimal Entropy Loss}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {501}, year = {2012}, url = {http://eprint.iacr.org/2012/501}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChandranKOR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Reyzin11, author = {Leonid Reyzin}, editor = {Serge Fehr}, title = {Some Notions of Entropy for Cryptography - (Invited Talk)}, booktitle = {Information Theoretic Security - 5th International Conference, {ICITS} 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6673}, pages = {138--142}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20728-0\_13}, doi = {10.1007/978-3-642-20728-0\_13}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/Reyzin11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrogleGR11, author = {Kyle Brogle and Sharon Goldberg and Leonid Reyzin}, title = {Sequential Aggregate Signatures with Lazy Verification from Trapdoor Permutations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {222}, year = {2011}, url = {http://eprint.iacr.org/2011/222}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrogleGR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LiHKR10, author = {Feifei Li and Marios Hadjieleftheriou and George Kollios and Leonid Reyzin}, title = {Authenticated Index Structures for Aggregation Queries}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {4}, pages = {32:1--32:35}, year = {2010}, url = {https://doi.org/10.1145/1880022.1880026}, doi = {10.1145/1880022.1880026}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/LiHKR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FaustRRTV10, author = {Sebastian Faust and Tal Rabin and Leonid Reyzin and Eran Tromer and Vinod Vaikuntanathan}, editor = {Henri Gilbert}, title = {Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6110}, pages = {135--156}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13190-5\_7}, doi = {10.1007/978-3-642-13190-5\_7}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FaustRRTV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/ChandranKOR10, author = {Nishanth Chandran and Bhavana Kanukurthi and Rafail Ostrovsky and Leonid Reyzin}, editor = {Leonard J. Schulman}, title = {Privacy amplification with asymptotically optimal entropy loss}, booktitle = {Proceedings of the 42nd {ACM} Symposium on Theory of Computing, {STOC} 2010, Cambridge, Massachusetts, USA, 5-8 June 2010}, pages = {785--794}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1806689.1806796}, doi = {10.1145/1806689.1806796}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/ChandranKOR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisKKRS10, author = {Yevgeniy Dodis and Bhavana Kanukurthi and Jonathan Katz and Leonid Reyzin and Adam D. Smith}, title = {Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {456}, year = {2010}, url = {http://eprint.iacr.org/2010/456}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisKKRS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/DedicIRR09, author = {Nenad Dedic and Gene Itkis and Leonid Reyzin and Scott Russell}, title = {Upper and Lower Bounds on Black-Box Steganography}, journal = {J. Cryptol.}, volume = {22}, number = {3}, pages = {365--394}, year = {2009}, url = {https://doi.org/10.1007/s00145-008-9020-3}, doi = {10.1007/S00145-008-9020-3}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/DedicIRR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KanukurthiR09, author = {Bhavana Kanukurthi and Leonid Reyzin}, editor = {Antoine Joux}, title = {Key Agreement from Close Secrets over Unsecured Channels}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5479}, pages = {206--223}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01001-9\_12}, doi = {10.1007/978-3-642-01001-9\_12}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KanukurthiR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DodisRRS09, author = {Yevgeniy Dodis and Leonid Reyzin and Ronald L. Rivest and Emily Shen}, editor = {Orr Dunkelman}, title = {Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to {MD6}}, booktitle = {Fast Software Encryption, 16th International Workshop, {FSE} 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5665}, pages = {104--121}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03317-9\_7}, doi = {10.1007/978-3-642-03317-9\_7}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/DodisRRS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaustRT09, author = {Sebastian Faust and Leonid Reyzin and Eran Tromer}, title = {Protecting Circuits from Computationally-Bounded Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {379}, year = {2009}, url = {http://eprint.iacr.org/2009/379}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FaustRT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/DodisORS08, author = {Yevgeniy Dodis and Rafail Ostrovsky and Leonid Reyzin and Adam D. Smith}, title = {Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data}, journal = {{SIAM} J. Comput.}, volume = {38}, number = {1}, pages = {97--139}, year = {2008}, url = {https://doi.org/10.1137/060651380}, doi = {10.1137/060651380}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/DodisORS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/KanukurthiR08, author = {Bhavana Kanukurthi and Leonid Reyzin}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {An Improved Robust Fuzzy Extractor}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {156--171}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_11}, doi = {10.1007/978-3-540-85855-3\_11}, timestamp = {Tue, 25 Feb 2020 11:33:46 +0100}, biburl = {https://dblp.org/rec/conf/scn/KanukurthiR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DedicHR08, author = {Nenad Dedic and Danny Harnik and Leonid Reyzin}, editor = {Ran Canetti}, title = {Saving Private Randomness in One-Way Functions and Pseudorandom Generators}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {607--625}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_33}, doi = {10.1007/978-3-540-78524-8\_33}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DedicHR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/dbsec/LiHKR08, author = {Feifei Li and Marios Hadjieleftheriou and George Kollios and Leonid Reyzin}, editor = {Michael Gertz and Sushil Jajodia}, title = {Authenticated Index Structures for Outsourced Databases}, booktitle = {Handbook of Database Security - Applications and Trends}, pages = {115--136}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-48533-1\_5}, doi = {10.1007/978-0-387-48533-1\_5}, timestamp = {Mon, 07 Dec 2020 17:16:27 +0100}, biburl = {https://dblp.org/rec/reference/dbsec/LiHKR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0806-0837, author = {Nenad Dedic and Gene Itkis and Leonid Reyzin and Scott Russell}, title = {Upper and Lower Bounds on Black-Box Steganography}, journal = {CoRR}, volume = {abs/0806.0837}, year = {2008}, url = {http://arxiv.org/abs/0806.0837}, eprinttype = {arXiv}, eprint = {0806.0837}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0806-0837.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0807-0799, author = {Bhavana Kanukurthi and Leonid Reyzin}, title = {An Improved Robust Fuzzy Extractor}, journal = {CoRR}, volume = {abs/0807.0799}, year = {2008}, url = {http://arxiv.org/abs/0807.0799}, eprinttype = {arXiv}, eprint = {0807.0799}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0807-0799.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KanukurthiR08, author = {Bhavana Kanukurthi and Leonid Reyzin}, title = {An Improved Robust Fuzzy Extractor}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {278}, year = {2008}, url = {http://eprint.iacr.org/2008/278}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KanukurthiR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KanukurthiR08a, author = {Bhavana Kanukurthi and Leonid Reyzin}, title = {Key Agreement from Close Secrets over Unsecured Channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {494}, year = {2008}, url = {http://eprint.iacr.org/2008/494}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KanukurthiR08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HsiaoLR07, author = {Chun{-}Yuan Hsiao and Chi{-}Jen Lu and Leonid Reyzin}, editor = {Moni Naor}, title = {Conditional Computational Entropy, or Toward Separating Pseudoentropy from Compressibility}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4515}, pages = {169--186}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72540-4\_10}, doi = {10.1007/978-3-540-72540-4\_10}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HsiaoLR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DedicHR07, author = {Nenad Dedic and Danny Harnik and Leonid Reyzin}, title = {Saving Private Randomness in One-Way Functions and Pseudorandom Generators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {458}, year = {2007}, url = {http://eprint.iacr.org/2007/458}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DedicHR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DodisKRS06, author = {Yevgeniy Dodis and Jonathan Katz and Leonid Reyzin and Adam D. Smith}, editor = {Cynthia Dwork}, title = {Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets}, booktitle = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4117}, pages = {232--250}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11818175\_14}, doi = {10.1007/11818175\_14}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DodisKRS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmod/LiHKR06, author = {Feifei Li and Marios Hadjieleftheriou and George Kollios and Leonid Reyzin}, editor = {Surajit Chaudhuri and Vagelis Hristidis and Neoklis Polyzotis}, title = {Dynamic authenticated index structures for outsourced databases}, booktitle = {Proceedings of the {ACM} {SIGMOD} International Conference on Management of Data, Chicago, Illinois, USA, June 27-29, 2006}, pages = {121--132}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1142473.1142488}, doi = {10.1145/1142473.1142488}, timestamp = {Thu, 11 Mar 2021 15:20:15 +0100}, biburl = {https://dblp.org/rec/conf/sigmod/LiHKR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0602007, author = {Yevgeniy Dodis and Rafail Ostrovsky and Leonid Reyzin and Adam D. Smith}, title = {Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data}, journal = {CoRR}, volume = {abs/cs/0602007}, year = {2006}, url = {http://arxiv.org/abs/cs/0602007}, eprinttype = {arXiv}, eprint = {cs/0602007}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0602007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChaseHLMR05, author = {Melissa Chase and Alexander Healy and Anna Lysyanskaya and Tal Malkin and Leonid Reyzin}, editor = {Ronald Cramer}, title = {Mercurial Commitments with Applications to Zero-Knowledge Sets}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {422--439}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_25}, doi = {10.1007/11426639\_25}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChaseHLMR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DedicIRR05, author = {Nenad Dedic and Gene Itkis and Leonid Reyzin and Scott Russell}, editor = {Joe Kilian}, title = {Upper and Lower Bounds on Black-Box Steganography}, booktitle = {Theory of Cryptography, Second Theory of Cryptography Conference, {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3378}, pages = {227--244}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30576-7\_13}, doi = {10.1007/978-3-540-30576-7\_13}, timestamp = {Sun, 02 Jun 2019 21:21:22 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DedicIRR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HsiaoR04, author = {Chun{-}Yuan Hsiao and Leonid Reyzin}, editor = {Matthew K. Franklin}, title = {Finding Collisions on a Public Road, or Do Secure Hash Functions Need Secret Coins?}, booktitle = {Advances in Cryptology - {CRYPTO} 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3152}, pages = {92--105}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28628-8\_6}, doi = {10.1007/978-3-540-28628-8\_6}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HsiaoR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LysyanskayaMRS04, author = {Anna Lysyanskaya and Silvio Micali and Leonid Reyzin and Hovav Shacham}, editor = {Christian Cachin and Jan Camenisch}, title = {Sequential Aggregate Signatures from Trapdoor Permutations}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3027}, pages = {74--90}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24676-3\_5}, doi = {10.1007/978-3-540-24676-3\_5}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LysyanskayaMRS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DodisRS04, author = {Yevgeniy Dodis and Leonid Reyzin and Adam D. Smith}, editor = {Christian Cachin and Jan Camenisch}, title = {Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3027}, pages = {523--540}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24676-3\_31}, doi = {10.1007/978-3-540-24676-3\_31}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DodisRS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/MicaliR04, author = {Silvio Micali and Leonid Reyzin}, editor = {Moni Naor}, title = {Physically Observable Cryptography (Extended Abstract)}, booktitle = {Theory of Cryptography, First Theory of Cryptography Conference, {TCC} 2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2951}, pages = {278--296}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24638-1\_16}, doi = {10.1007/978-3-540-24638-1\_16}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/MicaliR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DedicIRR04, author = {Nenad Dedic and Gene Itkis and Leonid Reyzin and Scott Russell}, title = {Upper and Lower Bounds on Black-Box Steganography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {246}, year = {2004}, url = {http://eprint.iacr.org/2004/246}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DedicIRR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/DodisR03, author = {Yevgeniy Dodis and Leonid Reyzin}, editor = {Moti Yung}, title = {Breaking and repairing optimistic fair exchange from {PODC} 2003}, booktitle = {Proceedings of the 2003 {ACM} workshop on Digital rights management 2003, Washington, DC, USA, October 27, 2003}, pages = {47--54}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/947380.947387}, doi = {10.1145/947380.947387}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/DodisR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LysyanskayaMRS03, author = {Anna Lysyanskaya and Silvio Micali and Leonid Reyzin and Hovav Shacham}, title = {Sequential Aggregate Signatures from Trapdoor Permutations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {91}, year = {2003}, url = {http://eprint.iacr.org/2003/091}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LysyanskayaMRS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ReyzinR03, author = {Leonid Reyzin and Scott Russell}, title = {Simple Stateless Steganography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {93}, year = {2003}, url = {http://eprint.iacr.org/2003/093}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ReyzinR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MicaliR03, author = {Silvio Micali and Leonid Reyzin}, title = {Physically Observable Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {120}, year = {2003}, url = {http://eprint.iacr.org/2003/120}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MicaliR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisR03, author = {Yevgeniy Dodis and Leonid Reyzin}, title = {Breaking and Repairing Optimistic Fair Exchange from {PODC} 2003}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {146}, year = {2003}, url = {http://eprint.iacr.org/2003/146}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisORS03, author = {Yevgeniy Dodis and Rafail Ostrovsky and Leonid Reyzin and Adam D. Smith}, title = {Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {235}, year = {2003}, url = {http://eprint.iacr.org/2003/235}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisORS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/MicaliR02, author = {Silvio Micali and Leonid Reyzin}, title = {Improving the Exact Security of Digital Signature Schemes}, journal = {J. Cryptol.}, volume = {15}, number = {1}, pages = {1--18}, year = {2002}, url = {https://doi.org/10.1007/s00145-001-0005-8}, doi = {10.1007/S00145-001-0005-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/MicaliR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ReyzinR02, author = {Leonid Reyzin and Natan Reyzin}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {Better than BiBa: Short One-Time Signatures with Fast Signing and Verifying}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {144--153}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_11}, doi = {10.1007/3-540-45450-0\_11}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ReyzinR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ItkisR02, author = {Gene Itkis and Leonid Reyzin}, editor = {Moti Yung}, title = {SiBIR: Signer-Base Intrusion-Resilient Signatures}, booktitle = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2442}, pages = {499--514}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45708-9\_32}, doi = {10.1007/3-540-45708-9\_32}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ItkisR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/DodisR02, author = {Yevgeniy Dodis and Leonid Reyzin}, editor = {Stelvio Cimato and Clemente Galdi and Giuseppe Persiano}, title = {On the Power of Claw-Free Permutations}, booktitle = {Security in Communication Networks, Third International Conference, {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2576}, pages = {55--73}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36413-7\_5}, doi = {10.1007/3-540-36413-7\_5}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/DodisR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/DedicRV02, author = {Nenad Dedic and Leonid Reyzin and Salil P. Vadhan}, editor = {Stelvio Cimato and Clemente Galdi and Giuseppe Persiano}, title = {An Improved Pseudorandom Generator Based on Hardness of Factoring}, booktitle = {Security in Communication Networks, Third International Conference, {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2576}, pages = {88--101}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36413-7\_7}, doi = {10.1007/3-540-36413-7\_7}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/DedicRV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/KozlovR02, author = {Anton Kozlov and Leonid Reyzin}, editor = {Stelvio Cimato and Clemente Galdi and Giuseppe Persiano}, title = {Forward-Secure Signatures with Fast Key Update}, booktitle = {Security in Communication Networks, Third International Conference, {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2576}, pages = {241--256}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36413-7\_18}, doi = {10.1007/3-540-36413-7\_18}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/KozlovR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ReyzinR02, author = {Leonid Reyzin and Natan Reyzin}, title = {Better than BiBa: Short One-time Signatures with Fast Signing and Verifying}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {14}, year = {2002}, url = {http://eprint.iacr.org/2002/014}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ReyzinR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ItkisR02, author = {Gene Itkis and Leonid Reyzin}, title = {SiBIR: Signer-Base Intrusion-Resilient Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {54}, year = {2002}, url = {http://eprint.iacr.org/2002/054}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ItkisR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisR02, author = {Yevgeniy Dodis and Leonid Reyzin}, title = {On the Power of Claw-Free Permutations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {103}, year = {2002}, url = {http://eprint.iacr.org/2002/103}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KozlovR02, author = {Anton Kozlov and Leonid Reyzin}, title = {Forward-Secure Signatures with Fast Key Update}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {104}, year = {2002}, url = {http://eprint.iacr.org/2002/104}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KozlovR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DedicRV02, author = {Nenad Dedic and Leonid Reyzin and Salil P. Vadhan}, title = {An Improved Pseudorandom Generator Based on Hardness of Factoring}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {131}, year = {2002}, url = {http://eprint.iacr.org/2002/131}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DedicRV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ndltd/Reyzin01, author = {Leonid Reyzin}, title = {Zero-knowledge with public keys}, school = {Massachusetts Institute of Technology, Cambridge, MA, {USA}}, year = {2001}, url = {https://hdl.handle.net/1721.1/86670}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ndltd/Reyzin01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LiskovLMRS01, author = {Moses D. Liskov and Anna Lysyanskaya and Silvio Micali and Leonid Reyzin and Adam D. Smith}, editor = {Colin Boyd}, title = {Mutually Independent Commitments}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2248}, pages = {385--401}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45682-1\_23}, doi = {10.1007/3-540-45682-1\_23}, timestamp = {Tue, 01 Jun 2021 15:22:33 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/LiskovLMRS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MicaliOR01, author = {Silvio Micali and Kazuo Ohta and Leonid Reyzin}, editor = {Michael K. Reiter and Pierangela Samarati}, title = {Accountable-subgroup multisignatures: extended abstract}, booktitle = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001}, pages = {245--254}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501983.502017}, doi = {10.1145/501983.502017}, timestamp = {Tue, 10 Nov 2020 20:00:35 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MicaliOR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ItkisR01, author = {Gene Itkis and Leonid Reyzin}, editor = {Joe Kilian}, title = {Forward-Secure Signatures with Optimal Signing and Verifying}, booktitle = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2139}, pages = {332--354}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44647-8\_20}, doi = {10.1007/3-540-44647-8\_20}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ItkisR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MicaliR01, author = {Silvio Micali and Leonid Reyzin}, editor = {Joe Kilian}, title = {Soundness in the Public-Key Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2139}, pages = {542--565}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44647-8\_32}, doi = {10.1007/3-540-44647-8\_32}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MicaliR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MicaliR01, author = {Silvio Micali and Leonid Reyzin}, editor = {Birgit Pfitzmann}, title = {Min-round Resettable Zero-Knowledge in the Public-Key Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {2045}, pages = {373--393}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44987-6\_23}, doi = {10.1007/3-540-44987-6\_23}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MicaliR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ItkisR01, author = {Gene Itkis and Leonid Reyzin}, title = {Forward-Secure Signatures with Optimal Signing and Verifying}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {48}, year = {2001}, url = {http://eprint.iacr.org/2001/048}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ItkisR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AbdallaR00, author = {Michel Abdalla and Leonid Reyzin}, editor = {Tatsuaki Okamoto}, title = {A New Forward-Secure Digital Signature Scheme}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1976}, pages = {116--129}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44448-3\_10}, doi = {10.1007/3-540-44448-3\_10}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/AbdallaR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/RamzanR00, author = {Zulfikar Ramzan and Leonid Reyzin}, editor = {Mihir Bellare}, title = {On the Round Security of Symmetric-Key Cryptographic Primitives}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {376--393}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_24}, doi = {10.1007/3-540-44598-6\_24}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/RamzanR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaR00, author = {Michel Abdalla and Leonid Reyzin}, title = {A New Forward-Secure Digital Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {2}, year = {2000}, url = {http://eprint.iacr.org/2000/002}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cqre/MicaliR99, author = {Silvio Micali and Leonid Reyzin}, editor = {Rainer Baumgart}, title = {Improving the Exact Security of Fiat-Shamir Signature Schemes}, booktitle = {Secure Networking - {CQRE} (Secure) '99, International Exhibition and Congress D{\"{u}}sseldorf, Germany, November 30 - December 2, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1740}, pages = {167--182}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-46701-7\_15}, doi = {10.1007/3-540-46701-7\_15}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cqre/MicaliR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MicaliR99, author = {Silvio Micali and Leonid Reyzin}, title = {Improving the Exact Security of Digital Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {20}, year = {1999}, url = {http://eprint.iacr.org/1999/020}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MicaliR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.