The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Shai Halevi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Don Coppersmith, Rosario Gennaro, Shai Halevi, Charanjit S. Jutla, Stephen M. Matyas, Mohammad Peyravian, David Safford, Nevenko Zunic
    IBM Comments. [Citation Graph (0, 0)][DBLP]
    AES Candidate Conference, 2000, pp:333-336 [Conf]
  2. Dan Boneh, Shai Halevi, Nick Howgrave-Graham
    The Modular Inversion Hidden Number Problem. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:36-51 [Conf]
  3. Boaz Barak, Shai Halevi
    A model and architecture for pseudo-random generation with applications to /dev/random. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:203-212 [Conf]
  4. Shai Halevi, Hugo Krawczyk
    Public-Key Cryptography and Password Protocols. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1998, pp:122-131 [Conf]
  5. Anna Gál, Shai Halevi, Richard J. Lipton, Erez Petrank
    Computing from Partial Solutions. [Citation Graph (0, 0)][DBLP]
    IEEE Conference on Computational Complexity, 1999, pp:34-45 [Conf]
  6. John Black, Shai Halevi, Hugo Krawczyk, Ted Krovetz, Phillip Rogaway
    UMAC: Fast and Secure Message Authentication. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:216-233 [Conf]
  7. Mihir Bellare, Shai Halevi, Amit Sahai, Salil P. Vadhan
    Many-to-One Trapdoor Functions and Their Ralation to Public-Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:283-298 [Conf]
  8. Don Coppersmith, Shai Halevi, Charanjit S. Jutla
    Cryptanalysis of Stream Ciphers with Linear Masking. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:515-532 [Conf]
  9. Yevgeniy Dodis, Shai Halevi, Tal Rabin
    A Cryptographic Solution to a Game Theoretic Problem. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2000, pp:112-130 [Conf]
  10. Oded Goldreich, Shafi Goldwasser, Shai Halevi
    Eliminating Decryption Errors in the Ajtai-Dwork Cryptosystem. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:105-111 [Conf]
  11. Oded Goldreich, Shafi Goldwasser, Shai Halevi
    Public-Key Cryptosystems from Lattice Reduction Problems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:112-131 [Conf]
  12. Shai Halevi
    Efficient Commitment Schemes with Bounded Sender and Unbounded Receiver. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:84-96 [Conf]
  13. Shai Halevi, Silvio Micali
    Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:201-215 [Conf]
  14. Shai Halevi, Phillip Rogaway
    A Tweakable Enciphering Mode. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:482-499 [Conf]
  15. Ran Canetti, Shai Halevi, Michael Steiner
    Mitigating Dictionary Attacks on Password-Protected Local Storage. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2006, pp:160-179 [Conf]
  16. Shai Halevi, Hugo Krawczyk
    Strengthening Digital Signatures Via Randomized Hashing. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2006, pp:41-59 [Conf]
  17. Dan Boneh, Xavier Boyen, Shai Halevi
    Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:226-243 [Conf]
  18. Shai Halevi, Phillip Rogaway
    A Parallelizable Enciphering Mode. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:292-304 [Conf]
  19. Ran Canetti, Yevgeniy Dodis, Shai Halevi, Eyal Kushilevitz, Amit Sahai
    Exposure-Resilient Functions and All-or-Nothing Transforms. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2000, pp:453-469 [Conf]
  20. Ran Canetti, Shai Halevi, Jonathan Katz
    A Forward-Secure Public-Key Encryption Scheme. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2003, pp:255-271 [Conf]
  21. Ran Canetti, Shai Halevi, Jonathan Katz
    Chosen-Ciphertext Security from Identity-Based Encryption. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:207-222 [Conf]
  22. Ran Canetti, Shai Halevi, Jonathan Katz, Yehuda Lindell, Philip D. MacKenzie
    Universally Composable Password-Based Key Exchange. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2005, pp:404-421 [Conf]
  23. Dario Catalano, Rosario Gennaro, Shai Halevi
    Computing Inverses over a Shared Secret Modulus. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2000, pp:190-206 [Conf]
  24. Rosario Gennaro, Shai Halevi, Tal Rabin
    Secure Hash-and-Sign Signatures Without the Random Oracle. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1999, pp:123-139 [Conf]
  25. Shai Halevi, Don Coppersmith, Charanjit S. Jutla
    Scream: A Software-Efficient Stream Cipher. [Citation Graph (0, 0)][DBLP]
    FSE, 2002, pp:195-209 [Conf]
  26. Shai Halevi, Hugo Krawczyk
    MMH: Software Message Authentication in the Gbit/Second Rates. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1997, pp:172-189 [Conf]
  27. Shai Halevi
    EME*: Extending EME to Handle Arbitrary-Length Messages with Associated Data. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:315-327 [Conf]
  28. Amir Ben-Dor, Shai Halevi
    Zero-One Permanent is #P-Complete, A Simpler Proof. [Citation Graph (0, 0)][DBLP]
    ISTCS, 1993, pp:108-117 [Conf]
  29. Boaz Barak, Shai Halevi, Amir Herzberg, Dalit Naor
    Clock synchronization with faults and recoveries (extended abstract). [Citation Graph (0, 0)][DBLP]
    PODC, 2000, pp:133-142 [Conf]
  30. Ran Canetti, Shai Halevi, Amir Herzberg
    Maintaining Authenticated Communication in the Presence of Break-ins. [Citation Graph (0, 0)][DBLP]
    PODC, 1997, pp:15-24 [Conf]
  31. Amir Ben-Dor, Shai Halevi, Assaf Schuster
    Potential Function Analysis of Greedy Hot-Potato Routing. [Citation Graph (0, 0)][DBLP]
    PODC, 1994, pp:225-234 [Conf]
  32. Yevgeniy Dodis, Shai Halevi
    Incremental Codes. [Citation Graph (0, 0)][DBLP]
    RANDOM-APPROX, 2001, pp:75-89 [Conf]
  33. Alain Azagury, Ran Canetti, Michael Factor, Shai Halevi, Ealan Henis, Dalit Naor, Noam Rinetzky, Ohad Rodeh, Julian Satran
    A Two Layered Approach for Securing an Object Store Network. [Citation Graph (0, 0)][DBLP]
    IEEE Security in Storage Workshop, 2002, pp:10-23 [Conf]
  34. Ran Canetti, Oded Goldreich, Shai Halevi
    The Random Oracle Methodology, Revisited (Preliminary Version). [Citation Graph (0, 0)][DBLP]
    STOC, 1998, pp:209-218 [Conf]
  35. Shai Halevi, Robert Krauthgamer, Eyal Kushilevitz, Kobbi Nissim
    Private approximation of NP-hard functions. [Citation Graph (0, 0)][DBLP]
    STOC, 2001, pp:550-559 [Conf]
  36. Ran Canetti, Oded Goldreich, Shai Halevi
    On the Random-Oracle Methodology as Applied to Length-Restricted Signature Schemes. [Citation Graph (0, 0)][DBLP]
    TCC, 2004, pp:40-57 [Conf]
  37. Ran Canetti, Shai Halevi, Jonathan Katz
    Adaptively-Secure, Non-interactive Public-Key Encryption. [Citation Graph (0, 0)][DBLP]
    TCC, 2005, pp:150-168 [Conf]
  38. Ran Canetti, Shai Halevi, Michael Steiner
    Hardness Amplification of Weakly Verifiable Puzzles. [Citation Graph (0, 0)][DBLP]
    TCC, 2005, pp:17-33 [Conf]
  39. Ran Canetti, Oded Goldreich, Shai Halevi
    The Random Oracle Methodology, Revisited [Citation Graph (0, 0)][DBLP]
    CoRR, 2000, v:0, n:, pp:- [Journal]
  40. Oded Goldreich, Shafi Goldwasser, Shai Halevi
    Collision-Free Hashing from Lattice Problems [Citation Graph (0, 0)][DBLP]
    Electronic Colloquium on Computational Complexity (ECCC), 1996, v:3, n:42, pp:- [Journal]
  41. Oded Goldreich, Shafi Goldwasser, Shai Halevi
    Eliminating Decryption Errors in the Ajtai-Dwork Cryptosystem. [Citation Graph (0, 0)][DBLP]
    Electronic Colloquium on Computational Complexity (ECCC), 1997, v:4, n:18, pp:- [Journal]
  42. Ran Canetti, Oded Goldreich, Shai Halevi
    The random oracle methodology, revisited. [Citation Graph (0, 0)][DBLP]
    J. ACM, 2004, v:51, n:4, pp:557-594 [Journal]
  43. Shai Halevi
    Efficient Commitment Schemes with Bounded Sender and Unbounded Receiver. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1999, v:12, n:2, pp:77-89 [Journal]
  44. Ran Canetti, Shai Halevi, Amir Herzberg
    Maintaining Authenticated Communication in the Presence of Break-Ins. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2000, v:13, n:1, pp:61-105 [Journal]
  45. Amir Ben-Dor, Shai Halevi, Assaf Schuster
    Potential Function Analysis of Greedy Hot-Potato Routing. [Citation Graph (0, 0)][DBLP]
    Theory Comput. Syst., 1998, v:31, n:1, pp:41-61 [Journal]
  46. Dan Boneh, Ran Canetti, Shai Halevi, Jonathan Katz
    Chosen-Ciphertext Security from Identity-Based Encryption. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 2007, v:36, n:5, pp:1301-1328 [Journal]
  47. Shai Halevi, Hugo Krawczyk
    Public-Key Cryptography and Password Protocols. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 1999, v:2, n:3, pp:230-268 [Journal]
  48. Shai Halevi
    Invertible Universal Hashing and the TET Encryption Mode. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2007, pp:412-429 [Conf]
  49. Ran Canetti, Shai Halevi, Jonathan Katz
    A Forward-Secure Public-Key Encryption Scheme. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2007, v:20, n:3, pp:265-294 [Journal]

  50. Security under key-dependent inputs. [Citation Graph (, )][DBLP]


  51. Attacking cryptographic schemes based on "perturbation polynomials". [Citation Graph (, )][DBLP]


  52. Circular-Secure Encryption from Decision Diffie-Hellman. [Citation Graph (, )][DBLP]


  53. i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits. [Citation Graph (, )][DBLP]


  54. Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs. [Citation Graph (, )][DBLP]


  55. Threshold RSA for Dynamic and Ad-Hoc Groups. [Citation Graph (, )][DBLP]


  56. A Simple BGN-Type Cryptosystem from LWE. [Citation Graph (, )][DBLP]


  57. Fully Homomorphic Encryption over the Integers. [Citation Graph (, )][DBLP]


  58. More on Key Wrapping. [Citation Graph (, )][DBLP]


  59. Storage Encryption: A Cryptographer's View. [Citation Graph (, )][DBLP]


  60. Rationality and traffic attraction: incentives for honest path announcements in bgp. [Citation Graph (, )][DBLP]


  61. On Seed-Incompressible Functions. [Citation Graph (, )][DBLP]


  62. Degradation and Amplification of Computational Hardness. [Citation Graph (, )][DBLP]


  63. Hierarchical Identity Based Encryption with Polynomially Many Levels. [Citation Graph (, )][DBLP]


  64. Using HB Family of Protocols for Privacy-Preserving Authentication of RFID Tags in a Population [Citation Graph (, )][DBLP]


Search in 0.008secs, Finished in 0.012secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002