Obserwuj
Stanislaw Jarecki
Stanislaw Jarecki
Zweryfikowany adres z uci.edu - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
Proactive secret sharing or: How to cope with perpetual leakage
A Herzberg, S Jarecki, H Krawczyk, M Yung
annual international cryptology conference, 339-352, 1995
10461995
Highly-scalable searchable symmetric encryption with support for boolean queries
D Cash, S Jarecki, C Jutla, H Krawczyk, MC Roşu, M Steiner
Annual cryptology conference, 353-373, 2013
8872013
Dynamic searchable encryption in very-large databases: Data structures and implementation
D Cash, J Jaeger, S Jarecki, C Jutla, H Krawczyk, MC Roşu, M Steiner
Cryptology ePrint Archive, 2014
7082014
Robust threshold DSS signatures
R Gennaro, S Jarecki, H Krawczyk, T Rabin
International Conference on the Theory and Applications of Cryptographic …, 1996
6681996
Secure distributed key generation for discrete-log based cryptosystems
R Gennaro, S Jarecki, H Krawczyk, T Rabin
International Conference on the Theory and Applications of Cryptographic …, 1999
6621999
Proactive public key and signature systems
A Herzberg, M Jakobsson, S Jarecki, H Krawczyk, M Yung
Proceedings of the 4th ACM Conference on Computer and Communications …, 1997
3791997
Secure distributed key generation for discrete-log based cryptosystems
R Gennaro, S Jarecki, H Krawczyk, T Rabin
Journal of Cryptology 20 (1), 51-83, 2007
3662007
Efficient oblivious pseudorandom function with applications to adaptive OT and secure computation of set intersection
S Jarecki, X Liu
Theory of Cryptography Conference, 577-594, 2009
3212009
Robust and efficient sharing of RSA functions
R Gennaro, S Jarecki, H Krawczyk, T Rabin
Annual International Cryptology Conference, 157-172, 1996
2641996
Outsourced symmetric private information retrieval
S Jarecki, C Jutla, H Krawczyk, M Rosu, M Steiner
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
2162013
Adaptive security for threshold cryptosystems
R Canetti, R Gennaro, S Jarecki, H Krawczyk, T Rabin
Annual International Cryptology Conference, 98-116, 1999
2001999
Rich queries on encrypted data: Beyond exact matches
S Faber, S Jarecki, H Krawczyk, Q Nguyen, M Rosu, M Steiner
European symposium on research in computer security, 123-145, 2015
1902015
Efficient two-party secure computation on committed inputs
S Jarecki, V Shmatikov
Annual International Conference on the Theory and Applications of …, 2007
1832007
Fast secure computation of set intersection
S Jarecki, X Liu
International Conference on Security and Cryptography for Networks, 418-435, 2010
1822010
A signature scheme as secure as the Diffie-Hellman problem
EJ Goh, S Jarecki
International Conference on the Theory and Applications of Cryptographic …, 2003
1652003
Robust threshold DSS signatures
R Gennaro, S Jarecki, H Krawczyk, T Rabin
Information and Computation 164 (1), 54-84, 2001
1572001
Secret handshakes from ca-oblivious encryption
C Castelluccia, S Jarecki, G Tsudik
International Conference on the Theory and Application of Cryptology and …, 2004
1532004
Cryptographic primitives enforcing communication and storage complexity
P Golle, S Jarecki, I Mironov
International Conference on Financial Cryptography, 120-135, 2002
1482002
Adaptively secure threshold cryptography: Introducing concurrency, removing erasures
S Jarecki, A Lysyanskaya
International Conference on the Theory and Applications of Cryptographic …, 2000
1472000
Dandelion: Cooperative Content Distribution with Robust Incentives.
M Sirivianos, JH Park, X Yang, S Jarecki
USENIX Annual Technical Conference 7, 2007
1462007
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20