|
Search the dblp DataBase
Stanislaw Jarecki:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Stanislaw Jarecki, Jihye Kim, Gene Tsudik
Authentication for Paranoids: Multi-party Secret Handshakes. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:325-339 [Conf]
- Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik
Secret Handshakes from CA-Oblivious Encryption. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2004, pp:293-307 [Conf]
- Yevgeniy Dodis, Michael J. Freedman, Stanislaw Jarecki, Shabsi Walfish
Versatile padding schemes for joint signature and encryption. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2004, pp:344-353 [Conf]
- Amir Herzberg, Markus Jakobsson, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung
Proactive Public Key and Signature Systems. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1997, pp:100-110 [Conf]
- Wlodek Zadrozny, Marcin Szummer, Stanislaw Jarecki, David E. Johnson, Leora Morgenstern
NL Understanding with a Grammar of Constructions. [Citation Graph (0, 0)][DBLP] COLING, 1994, pp:1289-1293 [Conf]
- Ran Canetti, Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
Adaptive Security for Threshold Cryptosystems. [Citation Graph (0, 0)][DBLP] CRYPTO, 1999, pp:98-115 [Conf]
- Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
Robust and Efficient Sharing of RSA Functions. [Citation Graph (0, 0)][DBLP] CRYPTO, 1996, pp:157-172 [Conf]
- Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage. [Citation Graph (0, 0)][DBLP] CRYPTO, 1995, pp:339-352 [Conf]
- Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
Secure Applications of Pedersen's Distributed Key Generation Protocol. [Citation Graph (0, 0)][DBLP] CT-RSA, 2003, pp:373-390 [Conf]
- Stanislaw Jarecki, Jihye Kim, Gene Tsudik
Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement. [Citation Graph (0, 0)][DBLP] CT-RSA, 2007, pp:287-308 [Conf]
- Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
Robust Threshold DSS Signatures. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1996, pp:354-371 [Conf]
- Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1999, pp:295-310 [Conf]
- Eu-Jin Goh, Stanislaw Jarecki
A Signature Scheme as Secure as the Diffie-Hellman Problem. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2003, pp:401-415 [Conf]
- Stanislaw Jarecki, Anna Lysyanskaya
Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2000, pp:221-242 [Conf]
- Stanislaw Jarecki, Vitaly Shmatikov
Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2004, pp:590-608 [Conf]
- Philippe Golle, Stanislaw Jarecki, Ilya Mironov
Cryptographic Primitives Enforcing Communication and Storage Complexity. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2002, pp:120-135 [Conf]
- Stanislaw Jarecki, Andrew M. Odlyzko
An Efficient Micropayment System Based on Probabilistic Polling. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 1997, pp:173-192 [Conf]
- Stanislaw Jarecki, Vitaly Shmatikov
Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2005, pp:172-187 [Conf]
- Stanislaw Jarecki, Patrick Lincoln, Vitaly Shmatikov
Negotiated Privacy: (Extended Abstract). [Citation Graph (0, 0)][DBLP] ISSS, 2002, pp:96-111 [Conf]
- Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik
Brief announcement: secret handshakes from CA-oblivious encryption. [Citation Graph (0, 0)][DBLP] PODC, 2004, pp:394- [Conf]
- Stanislaw Jarecki, Nitesh Saxena, Jeong Hyun Yi
An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol. [Citation Graph (0, 0)][DBLP] SASN, 2004, pp:1-9 [Conf]
- Claude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik
A Robust Multisignatures Scheme with Applications to Acknowledgment Aggregation. [Citation Graph (0, 0)][DBLP] SCN, 2004, pp:193-207 [Conf]
- Stanislaw Jarecki, Nitesh Saxena
Further Simplifications in Proactive RSA Signatures. [Citation Graph (0, 0)][DBLP] TCC, 2005, pp:510-528 [Conf]
- Claude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik
Secure acknowledgment aggregation and multisignatures with limited robustness. [Citation Graph (0, 0)][DBLP] Computer Networks, 2006, v:50, n:10, pp:1639-1652 [Journal]
- Wlodek Zadrozny, Marcin Szummer, Stanislaw Jarecki, David E. Johnson, Leora Morgenstern
NL Understanding with a Grammar of Constructions [Citation Graph (0, 0)][DBLP] CoRR, 1995, v:0, n:, pp:- [Journal]
- Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
Robust Threshold DSS Signatures. [Citation Graph (0, 0)][DBLP] Inf. Comput., 2001, v:164, n:1, pp:54-84 [Journal]
- Rosario Gennaro, Tal Rabin, Stanislaw Jarecki, Hugo Krawczyk
Robust and Efficient Sharing of RSA Functions. [Citation Graph (0, 0)][DBLP] J. Cryptology, 2000, v:13, n:2, pp:273-300 [Journal]
- Stanislaw Jarecki, Xiaomin Liu
Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes. [Citation Graph (0, 0)][DBLP] ACNS, 2007, pp:270-287 [Conf]
- Stanislaw Jarecki, Vitaly Shmatikov
Efficient Two-Party Secure Computation on Committed Inputs. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2007, pp:97-114 [Conf]
- Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. [Citation Graph (0, 0)][DBLP] J. Cryptology, 2007, v:20, n:1, pp:51-83 [Journal]
- Rosario Gennaro, Tal Rabin, Stanislaw Jarecki, Hugo Krawczyk
Robust and Efficient Sharing of RSA Functions. [Citation Graph (0, 0)][DBLP] J. Cryptology, 2007, v:20, n:3, pp:393- [Journal]
Robust group key agreement using short broadcasts. [Citation Graph (, )][DBLP]
Multisignatures secure under the discrete logarithm assumption and a generalized forking lemma. [Citation Graph (, )][DBLP]
Private Mutual Authentication and Conditional Oblivious Transfer. [Citation Graph (, )][DBLP]
Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange. [Citation Graph (, )][DBLP]
Proactive RSA with Non-interactive Signing. [Citation Graph (, )][DBLP]
Affiliation-Hiding Envelope and Authentication Schemes with Efficient Support for Multiple Credentials. [Citation Graph (, )][DBLP]
Privacy-Preserving Policy-Based Information Transfer. [Citation Graph (, )][DBLP]
Identity-Based Aggregate and Multi-Signature Schemes Based on RSA. [Citation Graph (, )][DBLP]
Multisignatures Using Proofs of Secret Key Possession, as Secure as the Diffie-Hellman Problem. [Citation Graph (, )][DBLP]
Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model. [Citation Graph (, )][DBLP]
Fast Secure Computation of Set Intersection. [Citation Graph (, )][DBLP]
Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection. [Citation Graph (, )][DBLP]
Dandelion: Cooperative Content Distribution with Robust Incentives. [Citation Graph (, )][DBLP]
Search in 0.006secs, Finished in 0.009secs
|