Search the dblp DataBase
Shai Halevi :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Don Coppersmith , Rosario Gennaro , Shai Halevi , Charanjit S. Jutla , Stephen M. Matyas , Mohammad Peyravian , David Safford , Nevenko Zunic IBM Comments. [Citation Graph (0, 0)][DBLP ] AES Candidate Conference, 2000, pp:333-336 [Conf ] Dan Boneh , Shai Halevi , Nick Howgrave-Graham The Modular Inversion Hidden Number Problem. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:36-51 [Conf ] Boaz Barak , Shai Halevi A model and architecture for pseudo-random generation with applications to /dev/random. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2005, pp:203-212 [Conf ] Shai Halevi , Hugo Krawczyk Public-Key Cryptography and Password Protocols. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1998, pp:122-131 [Conf ] Anna Gál , Shai Halevi , Richard J. Lipton , Erez Petrank Computing from Partial Solutions. [Citation Graph (0, 0)][DBLP ] IEEE Conference on Computational Complexity, 1999, pp:34-45 [Conf ] John Black , Shai Halevi , Hugo Krawczyk , Ted Krovetz , Phillip Rogaway UMAC: Fast and Secure Message Authentication. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:216-233 [Conf ] Mihir Bellare , Shai Halevi , Amit Sahai , Salil P. Vadhan Many-to-One Trapdoor Functions and Their Ralation to Public-Key Cryptosystems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:283-298 [Conf ] Don Coppersmith , Shai Halevi , Charanjit S. Jutla Cryptanalysis of Stream Ciphers with Linear Masking. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:515-532 [Conf ] Yevgeniy Dodis , Shai Halevi , Tal Rabin A Cryptographic Solution to a Game Theoretic Problem. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2000, pp:112-130 [Conf ] Oded Goldreich , Shafi Goldwasser , Shai Halevi Eliminating Decryption Errors in the Ajtai-Dwork Cryptosystem. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1997, pp:105-111 [Conf ] Oded Goldreich , Shafi Goldwasser , Shai Halevi Public-Key Cryptosystems from Lattice Reduction Problems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1997, pp:112-131 [Conf ] Shai Halevi Efficient Commitment Schemes with Bounded Sender and Unbounded Receiver. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:84-96 [Conf ] Shai Halevi , Silvio Micali Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:201-215 [Conf ] Shai Halevi , Phillip Rogaway A Tweakable Enciphering Mode. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:482-499 [Conf ] Ran Canetti , Shai Halevi , Michael Steiner Mitigating Dictionary Attacks on Password-Protected Local Storage. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2006, pp:160-179 [Conf ] Shai Halevi , Hugo Krawczyk Strengthening Digital Signatures Via Randomized Hashing. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2006, pp:41-59 [Conf ] Dan Boneh , Xavier Boyen , Shai Halevi Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2006, pp:226-243 [Conf ] Shai Halevi , Phillip Rogaway A Parallelizable Enciphering Mode. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2004, pp:292-304 [Conf ] Ran Canetti , Yevgeniy Dodis , Shai Halevi , Eyal Kushilevitz , Amit Sahai Exposure-Resilient Functions and All-or-Nothing Transforms. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2000, pp:453-469 [Conf ] Ran Canetti , Shai Halevi , Jonathan Katz A Forward-Secure Public-Key Encryption Scheme. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:255-271 [Conf ] Ran Canetti , Shai Halevi , Jonathan Katz Chosen-Ciphertext Security from Identity-Based Encryption. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2004, pp:207-222 [Conf ] Ran Canetti , Shai Halevi , Jonathan Katz , Yehuda Lindell , Philip D. MacKenzie Universally Composable Password-Based Key Exchange. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:404-421 [Conf ] Dario Catalano , Rosario Gennaro , Shai Halevi Computing Inverses over a Shared Secret Modulus. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2000, pp:190-206 [Conf ] Rosario Gennaro , Shai Halevi , Tal Rabin Secure Hash-and-Sign Signatures Without the Random Oracle. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:123-139 [Conf ] Shai Halevi , Don Coppersmith , Charanjit S. Jutla Scream: A Software-Efficient Stream Cipher. [Citation Graph (0, 0)][DBLP ] FSE, 2002, pp:195-209 [Conf ] Shai Halevi , Hugo Krawczyk MMH: Software Message Authentication in the Gbit/Second Rates. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1997, pp:172-189 [Conf ] Shai Halevi EME* : Extending EME to Handle Arbitrary-Length Messages with Associated Data. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2004, pp:315-327 [Conf ] Amir Ben-Dor , Shai Halevi Zero-One Permanent is #P -Complete, A Simpler Proof. [Citation Graph (0, 0)][DBLP ] ISTCS, 1993, pp:108-117 [Conf ] Boaz Barak , Shai Halevi , Amir Herzberg , Dalit Naor Clock synchronization with faults and recoveries (extended abstract). [Citation Graph (0, 0)][DBLP ] PODC, 2000, pp:133-142 [Conf ] Ran Canetti , Shai Halevi , Amir Herzberg Maintaining Authenticated Communication in the Presence of Break-ins. [Citation Graph (0, 0)][DBLP ] PODC, 1997, pp:15-24 [Conf ] Amir Ben-Dor , Shai Halevi , Assaf Schuster Potential Function Analysis of Greedy Hot-Potato Routing. [Citation Graph (0, 0)][DBLP ] PODC, 1994, pp:225-234 [Conf ] Yevgeniy Dodis , Shai Halevi Incremental Codes. [Citation Graph (0, 0)][DBLP ] RANDOM-APPROX, 2001, pp:75-89 [Conf ] Alain Azagury , Ran Canetti , Michael Factor , Shai Halevi , Ealan Henis , Dalit Naor , Noam Rinetzky , Ohad Rodeh , Julian Satran A Two Layered Approach for Securing an Object Store Network. [Citation Graph (0, 0)][DBLP ] IEEE Security in Storage Workshop, 2002, pp:10-23 [Conf ] Ran Canetti , Oded Goldreich , Shai Halevi The Random Oracle Methodology, Revisited (Preliminary Version). [Citation Graph (0, 0)][DBLP ] STOC, 1998, pp:209-218 [Conf ] Shai Halevi , Robert Krauthgamer , Eyal Kushilevitz , Kobbi Nissim Private approximation of NP-hard functions. [Citation Graph (0, 0)][DBLP ] STOC, 2001, pp:550-559 [Conf ] Ran Canetti , Oded Goldreich , Shai Halevi On the Random-Oracle Methodology as Applied to Length-Restricted Signature Schemes. [Citation Graph (0, 0)][DBLP ] TCC, 2004, pp:40-57 [Conf ] Ran Canetti , Shai Halevi , Jonathan Katz Adaptively-Secure, Non-interactive Public-Key Encryption. [Citation Graph (0, 0)][DBLP ] TCC, 2005, pp:150-168 [Conf ] Ran Canetti , Shai Halevi , Michael Steiner Hardness Amplification of Weakly Verifiable Puzzles. [Citation Graph (0, 0)][DBLP ] TCC, 2005, pp:17-33 [Conf ] Ran Canetti , Oded Goldreich , Shai Halevi The Random Oracle Methodology, Revisited [Citation Graph (0, 0)][DBLP ] CoRR, 2000, v:0, n:, pp:- [Journal ] Oded Goldreich , Shafi Goldwasser , Shai Halevi Collision-Free Hashing from Lattice Problems [Citation Graph (0, 0)][DBLP ] Electronic Colloquium on Computational Complexity (ECCC), 1996, v:3, n:42, pp:- [Journal ] Oded Goldreich , Shafi Goldwasser , Shai Halevi Eliminating Decryption Errors in the Ajtai-Dwork Cryptosystem. [Citation Graph (0, 0)][DBLP ] Electronic Colloquium on Computational Complexity (ECCC), 1997, v:4, n:18, pp:- [Journal ] Ran Canetti , Oded Goldreich , Shai Halevi The random oracle methodology, revisited. [Citation Graph (0, 0)][DBLP ] J. ACM, 2004, v:51, n:4, pp:557-594 [Journal ] Shai Halevi Efficient Commitment Schemes with Bounded Sender and Unbounded Receiver. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1999, v:12, n:2, pp:77-89 [Journal ] Ran Canetti , Shai Halevi , Amir Herzberg Maintaining Authenticated Communication in the Presence of Break-Ins. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2000, v:13, n:1, pp:61-105 [Journal ] Amir Ben-Dor , Shai Halevi , Assaf Schuster Potential Function Analysis of Greedy Hot-Potato Routing. [Citation Graph (0, 0)][DBLP ] Theory Comput. Syst., 1998, v:31, n:1, pp:41-61 [Journal ] Dan Boneh , Ran Canetti , Shai Halevi , Jonathan Katz Chosen-Ciphertext Security from Identity-Based Encryption. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 2007, v:36, n:5, pp:1301-1328 [Journal ] Shai Halevi , Hugo Krawczyk Public-Key Cryptography and Password Protocols. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 1999, v:2, n:3, pp:230-268 [Journal ] Shai Halevi Invertible Universal Hashing and the TET Encryption Mode. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2007, pp:412-429 [Conf ] Ran Canetti , Shai Halevi , Jonathan Katz A Forward-Secure Public-Key Encryption Scheme. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2007, v:20, n:3, pp:265-294 [Journal ] Security under key-dependent inputs. [Citation Graph (, )][DBLP ] Attacking cryptographic schemes based on "perturbation polynomials". [Citation Graph (, )][DBLP ] Circular-Secure Encryption from Decision Diffie-Hellman. [Citation Graph (, )][DBLP ] i -Hop Homomorphic Encryption and Rerandomizable Yao Circuits. [Citation Graph (, )][DBLP ] Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs. [Citation Graph (, )][DBLP ] Threshold RSA for Dynamic and Ad-Hoc Groups. [Citation Graph (, )][DBLP ] A Simple BGN-Type Cryptosystem from LWE. [Citation Graph (, )][DBLP ] Fully Homomorphic Encryption over the Integers. [Citation Graph (, )][DBLP ] More on Key Wrapping. [Citation Graph (, )][DBLP ] Storage Encryption: A Cryptographer's View. [Citation Graph (, )][DBLP ] Rationality and traffic attraction: incentives for honest path announcements in bgp. [Citation Graph (, )][DBLP ] On Seed-Incompressible Functions. [Citation Graph (, )][DBLP ] Degradation and Amplification of Computational Hardness. [Citation Graph (, )][DBLP ] Hierarchical Identity Based Encryption with Polynomially Many Levels. [Citation Graph (, )][DBLP ] Using HB Family of Protocols for Privacy-Preserving Authentication of RFID Tags in a Population [Citation Graph (, )][DBLP ] Search in 0.008secs, Finished in 0.012secs