|
Search the dblp DataBase
Xavier Boyen:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Xavier Boyen, Daphne Koller
Exploiting the Architecture of Dynamic Systems. [Citation Graph (0, 0)][DBLP] AAAI/IAAI, 1999, pp:313-320 [Conf]
- Xavier Boyen
Reusable cryptographic fuzzy extractors. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2004, pp:82-91 [Conf]
- Xavier Boyen, Qixiang Mei, Brent Waters
Direct chosen ciphertext security from identity-based techniques. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2005, pp:320-329 [Conf]
- Xavier Boyen, Hovav Shacham, Emily Shen, Brent Waters
Forward-secure signatures with untrusted update. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2006, pp:191-200 [Conf]
- Dan Boneh, Xavier Boyen
Secure Identity Based Encryption Without Random Oracles. [Citation Graph (0, 0)][DBLP] CRYPTO, 2004, pp:443-459 [Conf]
- Dan Boneh, Xavier Boyen, Hovav Shacham
Short Group Signatures. [Citation Graph (0, 0)][DBLP] CRYPTO, 2004, pp:41-55 [Conf]
- Xavier Boyen
Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography). [Citation Graph (0, 0)][DBLP] CRYPTO, 2003, pp:383-399 [Conf]
- Dan Boneh, Xavier Boyen
On the Impossibility of Efficiently Combining Collision Resistant Hash Functions. [Citation Graph (0, 0)][DBLP] CRYPTO, 2006, pp:570-583 [Conf]
- Xavier Boyen, Brent Waters
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles). [Citation Graph (0, 0)][DBLP] CRYPTO, 2006, pp:290-307 [Conf]
- Dan Boneh, Xavier Boyen, Shai Halevi
Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles. [Citation Graph (0, 0)][DBLP] CT-RSA, 2006, pp:226-243 [Conf]
- Dan Boneh, Xavier Boyen
Short Signatures Without Random Oracles. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2004, pp:56-73 [Conf]
- Dan Boneh, Xavier Boyen
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2004, pp:223-238 [Conf]
- Dan Boneh, Xavier Boyen, Eu-Jin Goh
Hierarchical Identity Based Encryption with Constant Size Ciphertext. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2005, pp:440-456 [Conf]
- Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafail Ostrovsky, Adam Smith
Secure Remote Authentication Using Biometric Data. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2005, pp:147-163 [Conf]
- Xavier Boyen, Brent Waters
Compact Group Signatures Without Random Oracles. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2006, pp:427-444 [Conf]
- Xavier Boyen, Daphne Koller
Approximate Learning of Dynamic Models. [Citation Graph (0, 0)][DBLP] NIPS, 1998, pp:396-402 [Conf]
- Xavier Boyen, Nir Friedman, Daphne Koller
Discovering the Hidden Structure of Complex Dynamic Systems. [Citation Graph (0, 0)][DBLP] UAI, 1999, pp:91-100 [Conf]
- Xavier Boyen, Daphne Koller
Tractable Inference for Complex Stochastic Processes. [Citation Graph (0, 0)][DBLP] UAI, 1998, pp:33-42 [Conf]
- Xavier Boyen
Miniature CCA2 PK Encryption: Tight Security Without Redundancy. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2007, pp:485-501 [Conf]
- Xavier Boyen
Mesh Signatures. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2007, pp:210-227 [Conf]
- Xavier Boyen
General Ad Hoc Encryption from Exponent Inversion IBE. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2007, pp:394-411 [Conf]
- Xavier Boyen, Brent Waters
Full-Domain Subgroup Hiding and Constant-Size Group Signatures. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2007, pp:1-15 [Conf]
New Paradigms for Password Security. [Citation Graph (, )][DBLP]
Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions. [Citation Graph (, )][DBLP]
HPAKE : Password Authentication Secure against Cross-Site User Impersonation. [Citation Graph (, )][DBLP]
Hidden credential retrieval from a reusable password. [Citation Graph (, )][DBLP]
Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE. [Citation Graph (, )][DBLP]
Kamouflage: Loss-Resistant Password Management. [Citation Graph (, )][DBLP]
Efficient Lattice (H)IBE in the Standard Model. [Citation Graph (, )][DBLP]
Distributed Public-Key Cryptography from Weak Secrets. [Citation Graph (, )][DBLP]
Preventing Pollution Attacks in Multi-source Network Coding. [Citation Graph (, )][DBLP]
Lattice Mixing and Vanishing Trapdoors: A Framework for Fully Secure Short Signatures and More. [Citation Graph (, )][DBLP]
Expressive Subgroup Signatures. [Citation Graph (, )][DBLP]
The Uber-Assumption Family. [Citation Graph (, )][DBLP]
Strong Cryptography from Weak Secrets. [Citation Graph (, )][DBLP]
Search in 0.046secs, Finished in 0.047secs
|