The SCEAS System
| |||||||

## Search the dblp DataBase
Vinod Vaikuntanathan:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan
**Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One.**[Citation Graph (0, 0)][DBLP] CRYPTO, 2006, pp:271-289 [Conf] - Shafi Goldwasser, Elan Pavlov, Vinod Vaikuntanathan
**Fault-Tolerant Distributed Computing in Full-Information Networks.**[Citation Graph (0, 0)][DBLP] FOCS, 2006, pp:15-26 [Conf] - Charles W. O'Donnell, Vinod Vaikuntanathan
**Information Leak in the Chord Lookup Protocol.**[Citation Graph (0, 0)][DBLP] Peer-to-Peer Computing, 2004, pp:28-35 [Conf] - Vinod Vaikuntanathan
**Brief announcement: broadcast in radio networks in the presence of byzantine adversaries.**[Citation Graph (0, 0)][DBLP] PODC, 2005, pp:167- [Conf] - Michael Ben-Or, Elan Pavlov, Vinod Vaikuntanathan
**Byzantine agreement in the full-information model in O(log n) rounds.**[Citation Graph (0, 0)][DBLP] STOC, 2006, pp:179-186 [Conf] - Susan Hohenberger, Guy N. Rothblum, Abhi Shelat, Vinod Vaikuntanathan
**Securely Obfuscating Re-encryption.**[Citation Graph (0, 0)][DBLP] TCC, 2007, pp:233-252 [Conf] - Shafi Goldwasser, Madhu Sudan, Vinod Vaikuntanathan
**Distributed Computing with Imperfect Randomness.**[Citation Graph (0, 0)][DBLP] DISC, 2005, pp:288-302 [Conf] - Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan
**Relations Among Notions of Non-malleability for Encryption.**[Citation Graph (0, 0)][DBLP] ASIACRYPT, 2007, pp:519-535 [Conf] - Ronald Cramer, Goichiro Hanaoka, Dennis Hofheinz, Hideki Imai, Eike Kiltz, Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan
**Bounded CCA2-Secure Encryption.**[Citation Graph (0, 0)][DBLP] ASIACRYPT, 2007, pp:502-518 [Conf] - Hao Chen, Ronald Cramer, Shafi Goldwasser, Robbert de Haan, Vinod Vaikuntanathan
**Secure Computation from Random Error Correcting Codes.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 2007, pp:291-310 [Conf] **Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices.**[Citation Graph (, )][DBLP]**Signature Schemes with Bounded Leakage Resilience.**[Citation Graph (, )][DBLP]**A Framework for Efficient and Composable Oblivious Transfer.**[Citation Graph (, )][DBLP]**Noninteractive Statistical Zero-Knowledge Proofs for Lattice Problems.**[Citation Graph (, )][DBLP]**Adaptive One-Way Functions and Applications.**[Citation Graph (, )][DBLP][Citation Graph (, )][DBLP]*i*-Hop Homomorphic Encryption and Rerandomizable Yao Circuits.**A Simple BGN-Type Cryptosystem from LWE.**[Citation Graph (, )][DBLP]**Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases.**[Citation Graph (, )][DBLP]**Fully Homomorphic Encryption over the Integers.**[Citation Graph (, )][DBLP]**Trapdoors for hard lattices and new cryptographic constructions.**[Citation Graph (, )][DBLP]**How Efficient Can Memory Checking Be?.**[Citation Graph (, )][DBLP]**Simultaneous Hardcore Bits and Cryptography against Memory Attacks.**[Citation Graph (, )][DBLP]**Weak Verifiable Random Functions.**[Citation Graph (, )][DBLP]**Public-Key Encryption Schemes with Auxiliary Inputs.**[Citation Graph (, )][DBLP]**Robustness of the Learning with Errors Assumption.**[Citation Graph (, )][DBLP]**Trapdoors for Hard Lattices and New Cryptographic Constructions.**[Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |