The SCEAS System
Navigation Menu

Search the dblp DataBase


Craig Gentry: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Craig Gentry, Jakob Jonsson, Jacques Stern, Michael Szydlo
    Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:1-20 [Conf]
  2. Craig Gentry, David Molnar, Zulfikar Ramzan
    Efficient Designated Confirmer Signatures Without Random Oracles or General Zero-Knowledge Proofs. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2005, pp:662-681 [Conf]
  3. Craig Gentry, Zulfikar Ramzan
    Eliminating Random Permutation Oracles in the Even-Mansour Cipher. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:32-47 [Conf]
  4. Craig Gentry, Alice Silverberg
    Hierarchical ID-Based Cryptography. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:548-566 [Conf]
  5. Craig Gentry, Philip D. MacKenzie, Zulfikar Ramzan
    Password authenticated key exchange using hidden smooth subgroups. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:299-309 [Conf]
  6. Dan Boneh, Craig Gentry, Brent Waters
    Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:258-275 [Conf]
  7. Craig Gentry
    How to Compress Rabin Ciphertexts and Signatures (and More). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2004, pp:179-200 [Conf]
  8. Craig Gentry, Philip D. MacKenzie, Zulfikar Ramzan
    A Method for Making Password-Based Key Exchange Resilient to Server Compromise. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2006, pp:142-159 [Conf]
  9. Dan Boneh, Craig Gentry, Ben Lynn, Hovav Shacham
    Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2003, pp:416-432 [Conf]
  10. Craig Gentry
    Key Recovery and Message Attacks on NTRU-Composite. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2001, pp:182-194 [Conf]
  11. Craig Gentry
    Certificate-Based Encryption and the Certificate Revocation Problem. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2003, pp:272-293 [Conf]
  12. Craig Gentry
    Practical Identity-Based Encryption Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:445-464 [Conf]
  13. Craig Gentry, Michael Szydlo
    Cryptanalysis of the Revised NTRU Signature Scheme. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:299-320 [Conf]
  14. Craig Gentry, Zulfikar Ramzan
    Microcredits for Verifiable Foreign Service Provider Metering. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2004, pp:9-23 [Conf]
  15. Craig Gentry, Zulfikar Ramzan, Stuart G. Stubblebine
    Secure Distributed Human Computation. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:328-332 [Conf]
  16. Craig Gentry, Zulfikar Ramzan, David P. Woodruff
    Explicit Exclusive Set Systems with Applications to Broadcast Encryption. [Citation Graph (0, 0)][DBLP]
    FOCS, 2006, pp:27-38 [Conf]
  17. Craig Gentry, Zulfikar Ramzan
    Single-Database Private Information Retrieval with Constant Communication Rate. [Citation Graph (0, 0)][DBLP]
    ICALP, 2005, pp:803-815 [Conf]
  18. Craig Gentry, Zulfikar Ramzan
    RSA Accumulator Based Broadcast Encryption. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:73-86 [Conf]
  19. James Kempf, Jonathan Wood, Zulfikar Ramzan, Craig Gentry
    IP Address Authorization for Secure Address Proxying Using Multi-key CGAs and Ring Signatures. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:196-211 [Conf]
  20. Farid F. Elwailly, Craig Gentry, Zulfikar Ramzan
    QuasiModo: Efficient Certificate Validation and Revocation. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:375-388 [Conf]
  21. Craig Gentry, Zulfikar Ramzan
    Identity-Based Aggregate Signatures. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:257-273 [Conf]
  22. Craig Gentry, Zulfikar Ramzan, Stuart G. Stubblebine
    Secure distributed human computation. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Electronic Commerce, 2005, pp:155-164 [Conf]

  23. Computing on Encrypted Data. [Citation Graph (, )][DBLP]

  24. Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing. [Citation Graph (, )][DBLP]

  25. Attacking cryptographic schemes based on "perturbation polynomials". [Citation Graph (, )][DBLP]

  26. i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits. [Citation Graph (, )][DBLP]

  27. Toward Basing Fully Homomorphic Encryption on Worst-Case Hardness. [Citation Graph (, )][DBLP]

  28. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers. [Citation Graph (, )][DBLP]

  29. Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts). [Citation Graph (, )][DBLP]

  30. A Simple BGN-Type Cryptosystem from LWE. [Citation Graph (, )][DBLP]

  31. Fully Homomorphic Encryption over the Integers. [Citation Graph (, )][DBLP]

  32. Space-Efficient Identity Based Encryption Without Pairings. [Citation Graph (, )][DBLP]

  33. Secure Distributed Human Computation. [Citation Graph (, )][DBLP]

  34. Secure Distributed Human Computation. [Citation Graph (, )][DBLP]

  35. Trapdoors for hard lattices and new cryptographic constructions. [Citation Graph (, )][DBLP]

  36. Fully homomorphic encryption using ideal lattices. [Citation Graph (, )][DBLP]

  37. Hierarchical Identity Based Encryption with Polynomially Many Levels. [Citation Graph (, )][DBLP]

  38. Computing arbitrary functions of encrypted data. [Citation Graph (, )][DBLP]

  39. Trapdoors for Hard Lattices and New Cryptographic Constructions. [Citation Graph (, )][DBLP]

Search in 0.189secs, Finished in 0.191secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002