Search the dblp DataBase
Aggelos Kiayias :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Aggelos Kiayias , Antonina Mitrofanova Syntax-Driven Private Evaluation of Quantified Membership Queries. [Citation Graph (0, 0)][DBLP ] ACNS, 2006, pp:470-485 [Conf ] Aggelos Kiayias , Moti Yung Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:401-416 [Conf ] Aggelos Kiayias , Moti Yung On Crafty Pirates and Foxy Tracers. [Citation Graph (0, 0)][DBLP ] Digital Rights Management Workshop, 2001, pp:22-39 [Conf ] Aggelos Kiayias , Moti Yung Breaking and Repairing Asymmetric Public-Key Traitor Tracing. [Citation Graph (0, 0)][DBLP ] Digital Rights Management Workshop, 2002, pp:32-50 [Conf ] Aggelos Kiayias , Moti Yung Self Protecting Pirates and Black-Box Traitor Tracing. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2001, pp:63-79 [Conf ] Yevgeniy Dodis , Aggelos Kiayias , Antonio Nicolosi , Victor Shoup Anonymous Identification in Ad Hoc Groups. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2004, pp:609-626 [Conf ] Aggelos Kiayias , Yiannis Tsiounis , Moti Yung Traceable Signatures. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2004, pp:571-589 [Conf ] Aggelos Kiayias , Moti Yung Traitor Tracing with Constant Transmission Rate. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:450-465 [Conf ] Aggelos Kiayias , Moti Yung Extracting Group Signatures from Traitor Tracing Schemes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:630-648 [Conf ] Aggelos Kiayias , Moti Yung Group Signatures with Efficient Concurrent Join. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:198-214 [Conf ] Aggelos Kiayias , Antonina Mitrofanova Testing Disjointness of Private Datasets. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2005, pp:109-124 [Conf ] Aggelos Kiayias , Moti Yung Non-interactive Zero-Sharing with Applications to Private Distributed Decision Making. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2003, pp:303-320 [Conf ] Aggelos Kiayias , Moti Yung The Vector-Ballot e-Voting Approach. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2004, pp:72-89 [Conf ] Aggelos Kiayias , Moti Yung Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2006, pp:311-325 [Conf ] Daniel Bleichenbacher , Aggelos Kiayias , Moti Yung Decoding of Interleaved Reed Solomon Codes over Noisy Data. [Citation Graph (0, 0)][DBLP ] ICALP, 2003, pp:97-108 [Conf ] Giovanni Di Crescenzo , Aggelos Kiayias Asynchronous Perfectly Secure Communication over One-Time Pads. [Citation Graph (0, 0)][DBLP ] ICALP, 2005, pp:216-227 [Conf ] Aggelos Kiayias , Moti Yung Secure Games with Polynomial Expressions. [Citation Graph (0, 0)][DBLP ] ICALP, 2001, pp:939-950 [Conf ] Aggelos Kiayias , Moti Yung Cryptographic Hardness Based on the Decoding of Reed-Solomon Codes. [Citation Graph (0, 0)][DBLP ] ICALP, 2002, pp:232-243 [Conf ] Aggelos Kiayias , Yona Raekow , Alexander Russell Efficient Steganography with Provable Security Guarantees. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2005, pp:118-130 [Conf ] Aggelos Kiayias , Moti Yung Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers. [Citation Graph (0, 0)][DBLP ] Mycrypt, 2005, pp:151-170 [Conf ] Aggelos Kiayias , Aris Pagourtzis , Kiron Sharma , Stathis Zachos Acceptor-Definable Counting Classes. [Citation Graph (0, 0)][DBLP ] Panhellenic Conference on Informatics, 2001, pp:453-463 [Conf ] Aggelos Kiayias , Moti Yung Self-tallying Elections and Perfect Ballot Secrecy. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2002, pp:141-158 [Conf ] Yevgeniy Dodis , Nelly Fazio , Aggelos Kiayias , Moti Yung Scalable public-key tracing and revoking. [Citation Graph (0, 0)][DBLP ] PODC, 2003, pp:190-199 [Conf ] Aggelos Kiayias , Moti Yung Polynomial Reconstruction Based Cryptography. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2001, pp:129-133 [Conf ] Aggelos Kiayias , Hong-Sheng Zhou Concurrent Blind Signatures Without Random Oracles. [Citation Graph (0, 0)][DBLP ] SCN, 2006, pp:49-62 [Conf ] Yevgeniy Dodis , Nelly Fazio , Aggelos Kiayias , Moti Yung Scalable public-key tracing and revoking. [Citation Graph (0, 0)][DBLP ] Distributed Computing, 2005, v:17, n:4, pp:323-347 [Journal ] Aggelos Kiayias , Moti Yung Cryptographic Hardness based on the Decoding of Reed-Solomon Codes with Applications [Citation Graph (0, 0)][DBLP ] Electronic Colloquium on Computational Complexity (ECCC), 2002, v:, n:017, pp:- [Journal ] Aggelos Kiayias , Michael Korman , David Walluck An Internet Voting System Supporting User Privacy. [Citation Graph (0, 0)][DBLP ] ACSAC, 2006, pp:165-174 [Conf ] Aggelos Kiayias , Yiannis Tsiounis , Moti Yung Group Encryption. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:181-199 [Conf ] Aggelos Kiayias , Serdar Pehlivanoglu Pirate Evolution: How to Make the Most of Your Traitor Keys. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2007, pp:448-465 [Conf ] Aggelos Kiayias , Hong-Sheng Zhou Trading Static for Adaptive Security in Universally Composable Zero-Knowledge. [Citation Graph (0, 0)][DBLP ] ICALP, 2007, pp:316-327 [Conf ] Aggelos Kiayias , Moti Yung Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2007, v:43, n:2-3, pp:61-78 [Journal ] Daniel Bleichenbacher , Aggelos Kiayias , Moti Yung Decoding interleaved Reed-Solomon codes over noisy channels. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2007, v:379, n:3, pp:348-360 [Journal ] Improving the Round Complexity of Traitor Tracing Schemes. [Citation Graph (, )][DBLP ] Tracing and Revoking Pirate Rebroadcasts. [Citation Graph (, )][DBLP ] Tampering with Special Purpose Trusted Computing Devices: A Case Study in Optical Scan E-Voting. [Citation Graph (, )][DBLP ] Robust key generation from signal envelopes in wireless networks. [Citation Graph (, )][DBLP ] A Framework for the Sound Specification of Cryptographic Tasks. [Citation Graph (, )][DBLP ] Public-key traitor tracing from efficient decoding and unbounded enrollment: extended abstract. [Citation Graph (, )][DBLP ] On the security of a public-key traitor tracing scheme with sublinear ciphertext size. [Citation Graph (, )][DBLP ] On the Portability of Generalized Schnorr Proofs. [Citation Graph (, )][DBLP ] Hidden Identity-Based Signatures. [Citation Graph (, )][DBLP ] Privacy-Preserving Information Markets for Computing Statistical Data. [Citation Graph (, )][DBLP ] Tree-Homomorphic Encryption and Scalable Hierarchical Secret-Ballot Elections. [Citation Graph (, )][DBLP ] RLCPS Preface. [Citation Graph (, )][DBLP ] Secure Function Collection with Sublinear Storage. [Citation Graph (, )][DBLP ] Zero-Knowledge Proofs with Witness Elimination. [Citation Graph (, )][DBLP ] Multi-query Computationally-Private Information Retrieval with Constant Communication Rate. [Citation Graph (, )][DBLP ] Taking total control of voting systems: firmware manipulations on an optical scan voting terminal. [Citation Graph (, )][DBLP ] Privacy Preserving Data Mining within Anonymous Credential Systems. [Citation Graph (, )][DBLP ] At-most-once semantics in asynchronous shared memory. [Citation Graph (, )][DBLP ] Equivocal Blind Signatures and Adaptive UC-Security. [Citation Graph (, )][DBLP ] Pre-Election Testing and Post-Election Audit of Optical Scan Voting Terminal Memory Cards. [Citation Graph (, )][DBLP ] At-Most-Once Semantics in Asynchronous Shared Memory. [Citation Graph (, )][DBLP ] Robust fingerprinting codes and applications. [Citation Graph (, )][DBLP ] The Vector-Ballot Approach for Online Voting Procedures. [Citation Graph (, )][DBLP ] Efficient Steganography with Provable Security Guarantees [Citation Graph (, )][DBLP ] Randomness-optimal Steganography [Citation Graph (, )][DBLP ] Search in 0.006secs, Finished in 0.009secs