Obserwuj
Leonid Reyzin
Leonid Reyzin
Professor of Computer Science, Boston University
Zweryfikowany adres z cs.bu.edu - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
Y Dodis, L Reyzin, A Smith
Advances In Cryptology-EUROCRYPT 2004: International Conference On The …, 2004
4172*2004
Physically observable cryptography
S Micali, L Reyzin
Theory of Cryptography: First Theory of Cryptography Conference, TCC 2004 …, 2004
6362004
Dynamic authenticated index structures for outsourced databases
F Li, M Hadjieleftheriou, G Kollios, L Reyzin
Proceedings of the 2006 ACM SIGMOD international conference on Management of …, 2006
5692006
Sequential aggregate signatures from trapdoor permutations
A Lysyanskaya, S Micali, L Reyzin, H Shacham
Advances in Cryptology-EUROCRYPT 2004: International Conference on the …, 2004
4472004
Better than BiBa: Short one-time signatures with fast signing and verifying
L Reyzin, N Reyzin
Australasian Conference on Information Security and Privacy, 144-153, 2002
4392002
Forward-secure signatures with optimal signing and verifying
G Itkis, L Reyzin
Advances in Cryptology—CRYPTO 2001: 21st Annual International Cryptology …, 2001
3952001
Accountable-subgroup multisignatures
S Micali, K Ohta, L Reyzin
Proceedings of the 8th ACM Conference on Computer and Communications …, 2001
3902001
A new forward-secure digital signature scheme
M Abdalla, L Reyzin
Advances in Cryptology—ASIACRYPT 2000: 6th International Conference on the …, 2000
3842000
Robust fuzzy extractors and authenticated key agreement from close secrets
Y Dodis, J Katz, L Reyzin, A Smith
Advances in Cryptology-CRYPTO 2006: 26th Annual International Cryptology …, 2006
2372006
Physical access control
S Micali, D Engberg, P Libin, L Reyzin, A Sinelnikov
US Patent 7,353,396, 2008
2342008
SiBIR: Signer-base intrusion-resilient signatures
G Itkis, L Reyzin
Advances in Cryptology—CRYPTO 2002: 22nd Annual International Cryptology …, 2002
1922002
Protecting circuits from leakage: the computationally-bounded and noisy cases
S Faust, T Rabin, L Reyzin, E Tromer, V Vaikuntanathan
Advances in Cryptology–EUROCRYPT 2010: 29th Annual International Conference …, 2010
1892010
Breaking and repairing optimistic fair exchange from PODC 2003
Y Dodis, L Reyzin
Proceedings of the 3rd ACM workshop on Digital rights management, 47-54, 2003
1832003
Forward-secure signatures with fast key update
A Kozlov, L Reyzin
Security in Communication Networks: Third International Conference, SCN 2002 …, 2003
1772003
Reusable fuzzy extractors for low-entropy distributions
R Canetti, B Fuller, O Paneth, L Reyzin, A Smith
Journal of Cryptology 34, 1-33, 2021
1592021
Authenticated index structures for aggregation queries
F Li, M Hadjieleftheriou, G Kollios, L Reyzin
ACM Transactions on Information and System Security (TISSEC) 13 (4), 1-35, 2010
1232010
Soundness in the public-key model
S Micali, L Reyzin
Advances in Cryptology—CRYPTO 2001: 21st Annual International Cryptology …, 2001
1212001
Conditional computational entropy, or toward separating pseudoentropy from compressibility
CY Hsiao, CJ Lu, L Reyzin
Advances in Cryptology-EUROCRYPT 2007: 26th Annual International Conference …, 2007
1192007
Computational fuzzy extractors
B Fuller, X Meng, L Reyzin
Information and Computation 275, 104602, 2020
1182020
Scrypt is maximally memory-hard
J Alwen, B Chen, K Pietrzak, L Reyzin, S Tessaro
Annual International Conference on the Theory and Applications of …, 2017
1082017
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20