Search the dblp DataBase
Hovav Shacham :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Dan Boneh , Ben Lynn , Hovav Shacham Short Signatures from the Weil Pairing. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:514-532 [Conf ] Dan Boneh , Hovav Shacham Group signatures with verifier-local revocation. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2004, pp:168-177 [Conf ] Hovav Shacham , Matthew Page , Ben Pfaff , Eu-Jin Goh , Nagendra Modadugu , Dan Boneh On the effectiveness of address-space randomization. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2004, pp:298-307 [Conf ] Xavier Boyen , Hovav Shacham , Emily Shen , Brent Waters Forward-secure signatures with untrusted update. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:191-200 [Conf ] Dan Boneh , Xavier Boyen , Hovav Shacham Short Group Signatures. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:41-55 [Conf ] Hovav Shacham , Dan Boneh Improving SSL Handshake Performance via Batching. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2001, pp:28-43 [Conf ] Dan Boneh , Craig Gentry , Ben Lynn , Hovav Shacham Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:416-432 [Conf ] Steve Lu , Rafail Ostrovsky , Amit Sahai , Hovav Shacham , Brent Waters Sequential Aggregate Signatures and Multisignatures Without Random Oracles. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:465-485 [Conf ] Anna Lysyanskaya , Silvio Micali , Leonid Reyzin , Hovav Shacham Sequential Aggregate Signatures from Trapdoor Permutations. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2004, pp:74-90 [Conf ] Hovav Shacham , Dan Boneh Fast-Track Session Establishment for TLS. [Citation Graph (0, 0)][DBLP ] NDSS, 2002, pp:- [Conf ] Eu-Jin Goh , Hovav Shacham , Nagendra Modadugu , Dan Boneh SiRiUS: Securing Remote Untrusted Storage. [Citation Graph (0, 0)][DBLP ] NDSS, 2003, pp:- [Conf ] Dan Boneh , Ben Lynn , Hovav Shacham Short Signatures from the Weil Pairing. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2004, v:17, n:4, pp:297-319 [Journal ] Hovav Shacham , Dan Boneh , Eric Rescorla Client-side caching for TLS. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2004, v:7, n:4, pp:553-575 [Journal ] Hovav Shacham , Brent Waters Efficient Ring Signatures Without Random Oracles. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:166-180 [Conf ] Compact Proofs of Retrievability. [Citation Graph (, )][DBLP ] Hedged Public-Key Encryption: How to Protect against Bad Randomness. [Citation Graph (, )][DBLP ] The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86). [Citation Graph (, )][DBLP ] When good instructions go bad: generalizing return-oriented programming to RISC. [Citation Graph (, )][DBLP ] Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. [Citation Graph (, )][DBLP ] Reconstructing RSA Private Keys from Random Key Bits. [Citation Graph (, )][DBLP ] Randomizable Proofs and Delegatable Anonymous Credentials. [Citation Graph (, )][DBLP ] When private keys are public: results from the 2008 Debian OpenSSL vulnerability. [Citation Graph (, )][DBLP ] Experimental Security Analysis of a Modern Automobile. [Citation Graph (, )][DBLP ] You Go to Elections with the Voting System You Have: Stop-Gap Mitigations for Deployed Voting Systems. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.002secs