The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Thomas Ristenpart: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Mihir Bellare, Thomas Ristenpart
    Multi-Property-Preserving Hash Domain Extension and the EMD Transform. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2006, pp:299-314 [Conf]
  2. Francis Hsu, Hao Chen, Thomas Ristenpart, Jason Li, Zhendong Su
    Back to the Future: A Framework for Automatic Malware Removal and System Repair. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:257-268 [Conf]
  3. Thomas Ristenpart, Thomas Shrimpton
    How to Build a Hash Function from Any Collision-Resistant Function. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:147-163 [Conf]
  4. Thomas Ristenpart, Scott Yilek
    The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:228-245 [Conf]
  5. Thomas Ristenpart, Phillip Rogaway
    How to Enrich the Message Space of a Cipher. [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:101-118 [Conf]
  6. Mihir Bellare, Thomas Ristenpart
    Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms. [Citation Graph (0, 0)][DBLP]
    ICALP, 2007, pp:399-410 [Conf]

  7. Hedged Public-Key Encryption: How to Protect against Bad Randomness. [Citation Graph (, )][DBLP]


  8. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. [Citation Graph (, )][DBLP]


  9. Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles. [Citation Graph (, )][DBLP]


  10. Salvaging Merkle-Damgård for Practical Applications. [Citation Graph (, )][DBLP]


  11. Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters' IBE Scheme. [Citation Graph (, )][DBLP]


  12. Format-Preserving Encryption. [Citation Graph (, )][DBLP]


  13. Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs. [Citation Graph (, )][DBLP]


Search in 0.016secs, Finished in 0.017secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002