The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Aggelos Kiayias: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Aggelos Kiayias, Antonina Mitrofanova
    Syntax-Driven Private Evaluation of Quantified Membership Queries. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:470-485 [Conf]
  2. Aggelos Kiayias, Moti Yung
    Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:401-416 [Conf]
  3. Aggelos Kiayias, Moti Yung
    On Crafty Pirates and Foxy Tracers. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2001, pp:22-39 [Conf]
  4. Aggelos Kiayias, Moti Yung
    Breaking and Repairing Asymmetric Public-Key Traitor Tracing. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2002, pp:32-50 [Conf]
  5. Aggelos Kiayias, Moti Yung
    Self Protecting Pirates and Black-Box Traitor Tracing. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2001, pp:63-79 [Conf]
  6. Yevgeniy Dodis, Aggelos Kiayias, Antonio Nicolosi, Victor Shoup
    Anonymous Identification in Ad Hoc Groups. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:609-626 [Conf]
  7. Aggelos Kiayias, Yiannis Tsiounis, Moti Yung
    Traceable Signatures. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:571-589 [Conf]
  8. Aggelos Kiayias, Moti Yung
    Traitor Tracing with Constant Transmission Rate. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:450-465 [Conf]
  9. Aggelos Kiayias, Moti Yung
    Extracting Group Signatures from Traitor Tracing Schemes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2003, pp:630-648 [Conf]
  10. Aggelos Kiayias, Moti Yung
    Group Signatures with Efficient Concurrent Join. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2005, pp:198-214 [Conf]
  11. Aggelos Kiayias, Antonina Mitrofanova
    Testing Disjointness of Private Datasets. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:109-124 [Conf]
  12. Aggelos Kiayias, Moti Yung
    Non-interactive Zero-Sharing with Applications to Private Distributed Decision Making. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2003, pp:303-320 [Conf]
  13. Aggelos Kiayias, Moti Yung
    The Vector-Ballot e-Voting Approach. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2004, pp:72-89 [Conf]
  14. Aggelos Kiayias, Moti Yung
    Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:311-325 [Conf]
  15. Daniel Bleichenbacher, Aggelos Kiayias, Moti Yung
    Decoding of Interleaved Reed Solomon Codes over Noisy Data. [Citation Graph (0, 0)][DBLP]
    ICALP, 2003, pp:97-108 [Conf]
  16. Giovanni Di Crescenzo, Aggelos Kiayias
    Asynchronous Perfectly Secure Communication over One-Time Pads. [Citation Graph (0, 0)][DBLP]
    ICALP, 2005, pp:216-227 [Conf]
  17. Aggelos Kiayias, Moti Yung
    Secure Games with Polynomial Expressions. [Citation Graph (0, 0)][DBLP]
    ICALP, 2001, pp:939-950 [Conf]
  18. Aggelos Kiayias, Moti Yung
    Cryptographic Hardness Based on the Decoding of Reed-Solomon Codes. [Citation Graph (0, 0)][DBLP]
    ICALP, 2002, pp:232-243 [Conf]
  19. Aggelos Kiayias, Yona Raekow, Alexander Russell
    Efficient Steganography with Provable Security Guarantees. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2005, pp:118-130 [Conf]
  20. Aggelos Kiayias, Moti Yung
    Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:151-170 [Conf]
  21. Aggelos Kiayias, Aris Pagourtzis, Kiron Sharma, Stathis Zachos
    Acceptor-Definable Counting Classes. [Citation Graph (0, 0)][DBLP]
    Panhellenic Conference on Informatics, 2001, pp:453-463 [Conf]
  22. Aggelos Kiayias, Moti Yung
    Self-tallying Elections and Perfect Ballot Secrecy. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:141-158 [Conf]
  23. Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung
    Scalable public-key tracing and revoking. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:190-199 [Conf]
  24. Aggelos Kiayias, Moti Yung
    Polynomial Reconstruction Based Cryptography. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2001, pp:129-133 [Conf]
  25. Aggelos Kiayias, Hong-Sheng Zhou
    Concurrent Blind Signatures Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    SCN, 2006, pp:49-62 [Conf]
  26. Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung
    Scalable public-key tracing and revoking. [Citation Graph (0, 0)][DBLP]
    Distributed Computing, 2005, v:17, n:4, pp:323-347 [Journal]
  27. Aggelos Kiayias, Moti Yung
    Cryptographic Hardness based on the Decoding of Reed-Solomon Codes with Applications [Citation Graph (0, 0)][DBLP]
    Electronic Colloquium on Computational Complexity (ECCC), 2002, v:, n:017, pp:- [Journal]
  28. Aggelos Kiayias, Michael Korman, David Walluck
    An Internet Voting System Supporting User Privacy. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:165-174 [Conf]
  29. Aggelos Kiayias, Yiannis Tsiounis, Moti Yung
    Group Encryption. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:181-199 [Conf]
  30. Aggelos Kiayias, Serdar Pehlivanoglu
    Pirate Evolution: How to Make the Most of Your Traitor Keys. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2007, pp:448-465 [Conf]
  31. Aggelos Kiayias, Hong-Sheng Zhou
    Trading Static for Adaptive Security in Universally Composable Zero-Knowledge. [Citation Graph (0, 0)][DBLP]
    ICALP, 2007, pp:316-327 [Conf]
  32. Aggelos Kiayias, Moti Yung
    Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2007, v:43, n:2-3, pp:61-78 [Journal]
  33. Daniel Bleichenbacher, Aggelos Kiayias, Moti Yung
    Decoding interleaved Reed-Solomon codes over noisy channels. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2007, v:379, n:3, pp:348-360 [Journal]

  34. Improving the Round Complexity of Traitor Tracing Schemes. [Citation Graph (, )][DBLP]


  35. Tracing and Revoking Pirate Rebroadcasts. [Citation Graph (, )][DBLP]


  36. Tampering with Special Purpose Trusted Computing Devices: A Case Study in Optical Scan E-Voting. [Citation Graph (, )][DBLP]


  37. Robust key generation from signal envelopes in wireless networks. [Citation Graph (, )][DBLP]


  38. A Framework for the Sound Specification of Cryptographic Tasks. [Citation Graph (, )][DBLP]


  39. Public-key traitor tracing from efficient decoding and unbounded enrollment: extended abstract. [Citation Graph (, )][DBLP]


  40. On the security of a public-key traitor tracing scheme with sublinear ciphertext size. [Citation Graph (, )][DBLP]


  41. On the Portability of Generalized Schnorr Proofs. [Citation Graph (, )][DBLP]


  42. Hidden Identity-Based Signatures. [Citation Graph (, )][DBLP]


  43. Privacy-Preserving Information Markets for Computing Statistical Data. [Citation Graph (, )][DBLP]


  44. Tree-Homomorphic Encryption and Scalable Hierarchical Secret-Ballot Elections. [Citation Graph (, )][DBLP]


  45. RLCPS Preface. [Citation Graph (, )][DBLP]


  46. Secure Function Collection with Sublinear Storage. [Citation Graph (, )][DBLP]


  47. Zero-Knowledge Proofs with Witness Elimination. [Citation Graph (, )][DBLP]


  48. Multi-query Computationally-Private Information Retrieval with Constant Communication Rate. [Citation Graph (, )][DBLP]


  49. Taking total control of voting systems: firmware manipulations on an optical scan voting terminal. [Citation Graph (, )][DBLP]


  50. Privacy Preserving Data Mining within Anonymous Credential Systems. [Citation Graph (, )][DBLP]


  51. At-most-once semantics in asynchronous shared memory. [Citation Graph (, )][DBLP]


  52. Equivocal Blind Signatures and Adaptive UC-Security. [Citation Graph (, )][DBLP]


  53. Pre-Election Testing and Post-Election Audit of Optical Scan Voting Terminal Memory Cards. [Citation Graph (, )][DBLP]


  54. At-Most-Once Semantics in Asynchronous Shared Memory. [Citation Graph (, )][DBLP]


  55. Robust fingerprinting codes and applications. [Citation Graph (, )][DBLP]


  56. The Vector-Ballot Approach for Online Voting Procedures. [Citation Graph (, )][DBLP]


  57. Efficient Steganography with Provable Security Guarantees [Citation Graph (, )][DBLP]


  58. Randomness-optimal Steganography [Citation Graph (, )][DBLP]


Search in 0.879secs, Finished in 0.882secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002