The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Stanislaw Jarecki: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Stanislaw Jarecki, Jihye Kim, Gene Tsudik
    Authentication for Paranoids: Multi-party Secret Handshakes. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:325-339 [Conf]
  2. Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik
    Secret Handshakes from CA-Oblivious Encryption. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:293-307 [Conf]
  3. Yevgeniy Dodis, Michael J. Freedman, Stanislaw Jarecki, Shabsi Walfish
    Versatile padding schemes for joint signature and encryption. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:344-353 [Conf]
  4. Amir Herzberg, Markus Jakobsson, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung
    Proactive Public Key and Signature Systems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1997, pp:100-110 [Conf]
  5. Wlodek Zadrozny, Marcin Szummer, Stanislaw Jarecki, David E. Johnson, Leora Morgenstern
    NL Understanding with a Grammar of Constructions. [Citation Graph (0, 0)][DBLP]
    COLING, 1994, pp:1289-1293 [Conf]
  6. Ran Canetti, Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
    Adaptive Security for Threshold Cryptosystems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:98-115 [Conf]
  7. Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
    Robust and Efficient Sharing of RSA Functions. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:157-172 [Conf]
  8. Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung
    Proactive Secret Sharing Or: How to Cope With Perpetual Leakage. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:339-352 [Conf]
  9. Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
    Secure Applications of Pedersen's Distributed Key Generation Protocol. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:373-390 [Conf]
  10. Stanislaw Jarecki, Jihye Kim, Gene Tsudik
    Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:287-308 [Conf]
  11. Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
    Robust Threshold DSS Signatures. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1996, pp:354-371 [Conf]
  12. Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
    Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1999, pp:295-310 [Conf]
  13. Eu-Jin Goh, Stanislaw Jarecki
    A Signature Scheme as Secure as the Diffie-Hellman Problem. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2003, pp:401-415 [Conf]
  14. Stanislaw Jarecki, Anna Lysyanskaya
    Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2000, pp:221-242 [Conf]
  15. Stanislaw Jarecki, Vitaly Shmatikov
    Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:590-608 [Conf]
  16. Philippe Golle, Stanislaw Jarecki, Ilya Mironov
    Cryptographic Primitives Enforcing Communication and Storage Complexity. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2002, pp:120-135 [Conf]
  17. Stanislaw Jarecki, Andrew M. Odlyzko
    An Efficient Micropayment System Based on Probabilistic Polling. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1997, pp:173-192 [Conf]
  18. Stanislaw Jarecki, Vitaly Shmatikov
    Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:172-187 [Conf]
  19. Stanislaw Jarecki, Patrick Lincoln, Vitaly Shmatikov
    Negotiated Privacy: (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ISSS, 2002, pp:96-111 [Conf]
  20. Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik
    Brief announcement: secret handshakes from CA-oblivious encryption. [Citation Graph (0, 0)][DBLP]
    PODC, 2004, pp:394- [Conf]
  21. Stanislaw Jarecki, Nitesh Saxena, Jeong Hyun Yi
    An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol. [Citation Graph (0, 0)][DBLP]
    SASN, 2004, pp:1-9 [Conf]
  22. Claude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik
    A Robust Multisignatures Scheme with Applications to Acknowledgment Aggregation. [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:193-207 [Conf]
  23. Stanislaw Jarecki, Nitesh Saxena
    Further Simplifications in Proactive RSA Signatures. [Citation Graph (0, 0)][DBLP]
    TCC, 2005, pp:510-528 [Conf]
  24. Claude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik
    Secure acknowledgment aggregation and multisignatures with limited robustness. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2006, v:50, n:10, pp:1639-1652 [Journal]
  25. Wlodek Zadrozny, Marcin Szummer, Stanislaw Jarecki, David E. Johnson, Leora Morgenstern
    NL Understanding with a Grammar of Constructions [Citation Graph (0, 0)][DBLP]
    CoRR, 1995, v:0, n:, pp:- [Journal]
  26. Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
    Robust Threshold DSS Signatures. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 2001, v:164, n:1, pp:54-84 [Journal]
  27. Rosario Gennaro, Tal Rabin, Stanislaw Jarecki, Hugo Krawczyk
    Robust and Efficient Sharing of RSA Functions. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2000, v:13, n:2, pp:273-300 [Journal]
  28. Stanislaw Jarecki, Xiaomin Liu
    Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:270-287 [Conf]
  29. Stanislaw Jarecki, Vitaly Shmatikov
    Efficient Two-Party Secure Computation on Committed Inputs. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:97-114 [Conf]
  30. Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
    Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2007, v:20, n:1, pp:51-83 [Journal]
  31. Rosario Gennaro, Tal Rabin, Stanislaw Jarecki, Hugo Krawczyk
    Robust and Efficient Sharing of RSA Functions. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2007, v:20, n:3, pp:393- [Journal]

  32. Robust group key agreement using short broadcasts. [Citation Graph (, )][DBLP]


  33. Multisignatures secure under the discrete logarithm assumption and a generalized forking lemma. [Citation Graph (, )][DBLP]


  34. Private Mutual Authentication and Conditional Oblivious Transfer. [Citation Graph (, )][DBLP]


  35. Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange. [Citation Graph (, )][DBLP]


  36. Proactive RSA with Non-interactive Signing. [Citation Graph (, )][DBLP]


  37. Affiliation-Hiding Envelope and Authentication Schemes with Efficient Support for Multiple Credentials. [Citation Graph (, )][DBLP]


  38. Privacy-Preserving Policy-Based Information Transfer. [Citation Graph (, )][DBLP]


  39. Identity-Based Aggregate and Multi-Signature Schemes Based on RSA. [Citation Graph (, )][DBLP]


  40. Multisignatures Using Proofs of Secret Key Possession, as Secure as the Diffie-Hellman Problem. [Citation Graph (, )][DBLP]


  41. Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model. [Citation Graph (, )][DBLP]


  42. Fast Secure Computation of Set Intersection. [Citation Graph (, )][DBLP]


  43. Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection. [Citation Graph (, )][DBLP]


  44. Dandelion: Cooperative Content Distribution with Robust Incentives. [Citation Graph (, )][DBLP]


Search in 0.025secs, Finished in 0.027secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002