The SCEAS System
Navigation Menu

Search the dblp DataBase


Alice Silverberg: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Karl Rubin, Alice Silverberg
    Using Primitive Subgroups to Do More with Fewer Bits. [Citation Graph (0, 0)][DBLP]
    ANTS, 2004, pp:18-41 [Conf]
  2. Craig Gentry, Alice Silverberg
    Hierarchical ID-Based Cryptography. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:548-566 [Conf]
  3. Alice Silverberg, Jessica Staddon, Judy L. Walker
    Efficient Traitor Tracing Algorithms Using List Decoding. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:175-192 [Conf]
  4. Karl Rubin, Alice Silverberg
    Supersingular Abelian Varieties in Cryptology. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:336-353 [Conf]
  5. Karl Rubin, Alice Silverberg
    Torus-Based Cryptography. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:349-365 [Conf]
  6. Marten van Dijk, Robert Granger, Dan Page, Karl Rubin, Alice Silverberg, Martijn Stam, David P. Woodruff
    Practical Cryptography in High Dimensional Tori. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2005, pp:234-250 [Conf]
  7. Alice Silverberg, Jessica Staddon, Judy L. Walker
    Applications of list decoding to tracing traitors. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2003, v:49, n:5, pp:1312-1318 [Journal]

  8. Applications to cryptography of twisting commutative algebraic groups. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002