The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

David Cash: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. David Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke Lee, Richard J. Lipton, Shabsi Walfish
    Intrusion-Resilient Key Exchange in the Bounded Retrieval Model. [Citation Graph (0, 0)][DBLP]
    TCC, 2007, pp:479-498 [Conf]

  2. Foundations of Non-malleable Hash and One-Way Functions. [Citation Graph (, )][DBLP]


  3. Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems. [Citation Graph (, )][DBLP]


  4. Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks. [Citation Graph (, )][DBLP]


  5. Minimal information disclosure with efficiently verifiable credentials. [Citation Graph (, )][DBLP]


  6. The Twin Diffie-Hellman Problem and Applications. [Citation Graph (, )][DBLP]


  7. Bonsai Trees, or How to Delegate a Lattice Basis. [Citation Graph (, )][DBLP]


  8. Cryptographic Agility and Its Relation to Circular Encryption. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002