Obserwuj
Anna Lysyanskaya
Anna Lysyanskaya
Professor of Computer Science, Brown University
Zweryfikowany adres z cs.brown.edu - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
An efficient system for non-transferable anonymous credentials with optional anonymity revocation
J Camenisch, A Lysyanskaya
Advances in Cryptology—EUROCRYPT 2001: International Conference on the …, 2001
16712001
Signature schemes and anonymous credentials from bilinear maps
J Camenisch, A Lysyanskaya
Advances in Cryptology–CRYPTO 2004: 24th Annual International Cryptology …, 2004
11562004
Dynamic accumulators and application to efficient revocation of anonymous credentials
J Camenisch, A Lysyanskaya
Crypto 2442, 61-76, 2002
10612002
A signature scheme with efficient protocols
J Camenisch, A Lysyanskaya
Security in Communication Networks: Third International Conference, SCN 2002 …, 2003
9672003
Pseudonym systems
A Lysyanskaya, RL Rivest, A Sahai, S Wolf
Selected Areas in Cryptography: 6th Annual International Workshop, SAC’99 …, 2000
7032000
Compact e-cash
J Camenisch, S Hohenberger, A Lysyanskaya
Advances in Cryptology–EUROCRYPT 2005: 24th Annual International Conference …, 2005
5852005
How to securely outsource cryptographic computations
S Hohenberger, A Lysyanskaya
Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005 …, 2005
4592005
Sequential aggregate signatures from trapdoor permutations
A Lysyanskaya, S Micali, L Reyzin, H Shacham
Advances in Cryptology-EUROCRYPT 2004: International Conference on the …, 2004
4252004
Randomizable proofs and delegatable anonymous credentials
M Belenkiy, J Camenisch, M Chase, M Kohlweiss, A Lysyanskaya, ...
Advances in Cryptology-CRYPTO 2009: 29th Annual International Cryptology …, 2009
3452009
Group blind digital signatures: A scalable solution to electronic cash
A Lysyanskaya, Z Ramzan
Financial Cryptography: Second International Conference, FC'98 Anguilla …, 1998
3301998
How to win the clonewars: efficient periodic n-times anonymous authentication
J Camenisch, S Hohenberger, M Kohlweiss, A Lysyanskaya, ...
Proceedings of the 13th ACM conference on Computer and communications …, 2006
3132006
P-signatures and noninteractive anonymous credentials
M Belenkiy, M Chase, M Kohlweiss, A Lysyanskaya
Theory of Cryptography: Fifth Theory of Cryptography Conference, TCC 2008 …, 2008
2692008
Asynchronous verifiable secret sharing and proactive cryptosystems
C Cachin, K Kursawe, A Lysyanskaya, R Strobl
Proceedings of the 9th ACM Conference on Computer and Communications …, 2002
2532002
On signatures of knowledge
M Chase, A Lysyanskaya
Advances in Cryptology-CRYPTO 2006: 26th Annual International Cryptology …, 2006
2492006
Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering
R Gennaro, A Lysyanskaya, T Malkin, S Micali, T Rabin
TCC 2951, 258-277, 2004
2412004
Unique signatures and verifiable random functions from the DH-DDH separation
A Lysyanskaya
Advances in Cryptology—CRYPTO 2002: 22nd Annual International Cryptology …, 2002
2312002
A formal treatment of onion routing
J Camenisch, A Lysyanskaya
Advances in Cryptology–CRYPTO 2005: 25th Annual International Cryptology …, 2005
2092005
ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption
D Yao, N Fazio, Y Dodis, A Lysyanskaya
Proceedings of the 11th ACM conference on Computer and communications …, 2004
2032004
Rationality and adversarial behavior in multi-party computation
A Lysyanskaya, N Triandopoulos
Advances in Cryptology-CRYPTO 2006: 26th Annual International Cryptology …, 2006
1892006
Anonymous credentials light
F Baldimtsi, A Lysyanskaya
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1882013
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20