The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ron Steinfeld: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ron Steinfeld, Joonsang Baek, Yuliang Zheng
    On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:241-256 [Conf]
  2. Igor Shparlinski, Ron Steinfeld
    Chinese Remaindering for Algebraic Numbers in a Hidden Field. [Citation Graph (0, 0)][DBLP]
    ANTS, 2002, pp:349-356 [Conf]
  3. Ron Steinfeld, Laurence Bull, Huaxiong Wang, Josef Pieprzyk
    Universal Designated-Verifier Signatures. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:523-542 [Conf]
  4. Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang
    On the Provable Security of an Efficient RSA-Based Pseudorandom Generator. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2006, pp:194-209 [Conf]
  5. Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk
    Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:170-186 [Conf]
  6. Ron Steinfeld, Yuliang Zheng
    An Advantage of Low-Exponent RSA with Modulus Primes Sharing Least Significant Bits. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2001, pp:52-62 [Conf]
  7. Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang
    How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:357-371 [Conf]
  8. Scott Contini, Arjen K. Lenstra, Ron Steinfeld
    VSH, an Efficient and Provable Collision-Resistant Hash Function. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:165-182 [Conf]
  9. Ron Steinfeld, Laurence Bull, Yuliang Zheng
    Content Extraction Signatures. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:285-304 [Conf]
  10. Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang
    A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:459-475 [Conf]
  11. Ron Steinfeld, Yuliang Zheng
    A Signcryption Scheme Based on Integer Factorization. [Citation Graph (0, 0)][DBLP]
    ISW, 2000, pp:308-322 [Conf]
  12. Joonsang Baek, Ron Steinfeld, Yuliang Zheng
    Formal Proofs for the Security of Signcryption. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:80-98 [Conf]
  13. Ron Steinfeld, Scott Contini, Huaxiong Wang, Josef Pieprzyk
    Converse Results to the Wiener Attack on RSA. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2005, pp:184-198 [Conf]
  14. Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang
    Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:157-173 [Conf]
  15. Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk
    Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:86-100 [Conf]
  16. Ron Steinfeld, Yuliang Zheng
    On the Security of RSA with Primes Sharing Least-Significant Bits. [Citation Graph (0, 0)][DBLP]
    Appl. Algebra Eng. Commun. Comput., 2004, v:15, n:3-4, pp:179-200 [Journal]
  17. Igor Shparlinski, Ron Steinfeld
    Noisy Chinese remaindering in the Lee norm. [Citation Graph (0, 0)][DBLP]
    J. Complexity, 2004, v:20, n:2-3, pp:423-437 [Journal]
  18. Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang
    On Secure Multi-party Computation in Black-Box Groups. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2007, pp:591-612 [Conf]
  19. Joonsang Baek, Ron Steinfeld, Yuliang Zheng
    Formal Proofs for the Security of Signcryption. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2007, v:20, n:2, pp:203-235 [Journal]
  20. Igor Shparlinski, Ron Steinfeld
    Chinese Remaindering with Multiplicative Noise. [Citation Graph (0, 0)][DBLP]
    Theory Comput. Syst., 2007, v:40, n:1, pp:33-41 [Journal]

  21. Efficient Public Key Encryption Based on Ideal Lattices. [Citation Graph (, )][DBLP]


  22. Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits. [Citation Graph (, )][DBLP]


  23. Cryptanalysis of LASH. [Citation Graph (, )][DBLP]


  24. Efficient Fuzzy Matching and Intersection on Private Datasets. [Citation Graph (, )][DBLP]


Search in 0.017secs, Finished in 0.018secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002