
Search the dblp DataBase
Alice Silverberg:
[Publications]
[Author Rank by year]
[Coauthors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
 Karl Rubin, Alice Silverberg
Using Primitive Subgroups to Do More with Fewer Bits. [Citation Graph (0, 0)][DBLP] ANTS, 2004, pp:1841 [Conf]
 Craig Gentry, Alice Silverberg
Hierarchical IDBased Cryptography. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2002, pp:548566 [Conf]
 Alice Silverberg, Jessica Staddon, Judy L. Walker
Efficient Traitor Tracing Algorithms Using List Decoding. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2001, pp:175192 [Conf]
 Karl Rubin, Alice Silverberg
Supersingular Abelian Varieties in Cryptology. [Citation Graph (0, 0)][DBLP] CRYPTO, 2002, pp:336353 [Conf]
 Karl Rubin, Alice Silverberg
TorusBased Cryptography. [Citation Graph (0, 0)][DBLP] CRYPTO, 2003, pp:349365 [Conf]
 Marten van Dijk, Robert Granger, Dan Page, Karl Rubin, Alice Silverberg, Martijn Stam, David P. Woodruff
Practical Cryptography in High Dimensional Tori. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2005, pp:234250 [Conf]
 Alice Silverberg, Jessica Staddon, Judy L. Walker
Applications of list decoding to tracing traitors. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2003, v:49, n:5, pp:13121318 [Journal]
Applications to cryptography of twisting commutative algebraic groups. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs
