The SCEAS System
| |||||||

## Search the dblp DataBase
Craig Gentry:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Craig Gentry, Jakob Jonsson, Jacques Stern, Michael Szydlo
**Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001.**[Citation Graph (0, 0)][DBLP] ASIACRYPT, 2001, pp:1-20 [Conf] - Craig Gentry, David Molnar, Zulfikar Ramzan
**Efficient Designated Confirmer Signatures Without Random Oracles or General Zero-Knowledge Proofs.**[Citation Graph (0, 0)][DBLP] ASIACRYPT, 2005, pp:662-681 [Conf] - Craig Gentry, Zulfikar Ramzan
**Eliminating Random Permutation Oracles in the Even-Mansour Cipher.**[Citation Graph (0, 0)][DBLP] ASIACRYPT, 2004, pp:32-47 [Conf] - Craig Gentry, Alice Silverberg
**Hierarchical ID-Based Cryptography.**[Citation Graph (0, 0)][DBLP] ASIACRYPT, 2002, pp:548-566 [Conf] - Craig Gentry, Philip D. MacKenzie, Zulfikar Ramzan
**Password authenticated key exchange using hidden smooth subgroups.**[Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2005, pp:299-309 [Conf] - Dan Boneh, Craig Gentry, Brent Waters
**Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys.**[Citation Graph (0, 0)][DBLP] CRYPTO, 2005, pp:258-275 [Conf] - Craig Gentry
**How to Compress Rabin Ciphertexts and Signatures (and More).**[Citation Graph (0, 0)][DBLP] CRYPTO, 2004, pp:179-200 [Conf] - Craig Gentry, Philip D. MacKenzie, Zulfikar Ramzan
**A Method for Making Password-Based Key Exchange Resilient to Server Compromise.**[Citation Graph (0, 0)][DBLP] CRYPTO, 2006, pp:142-159 [Conf] - Dan Boneh, Craig Gentry, Ben Lynn, Hovav Shacham
**Aggregate and Verifiably Encrypted Signatures from Bilinear Maps.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 2003, pp:416-432 [Conf] - Craig Gentry
**Key Recovery and Message Attacks on NTRU-Composite.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 2001, pp:182-194 [Conf] - Craig Gentry
**Certificate-Based Encryption and the Certificate Revocation Problem.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 2003, pp:272-293 [Conf] - Craig Gentry
**Practical Identity-Based Encryption Without Random Oracles.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 2006, pp:445-464 [Conf] - Craig Gentry, Michael Szydlo
**Cryptanalysis of the Revised NTRU Signature Scheme.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 2002, pp:299-320 [Conf] - Craig Gentry, Zulfikar Ramzan
**Microcredits for Verifiable Foreign Service Provider Metering.**[Citation Graph (0, 0)][DBLP] Financial Cryptography, 2004, pp:9-23 [Conf] - Craig Gentry, Zulfikar Ramzan, Stuart G. Stubblebine
**Secure Distributed**[Citation Graph (0, 0)][DBLP]*Human*Computation. Financial Cryptography, 2005, pp:328-332 [Conf] - Craig Gentry, Zulfikar Ramzan, David P. Woodruff
**Explicit Exclusive Set Systems with Applications to Broadcast Encryption.**[Citation Graph (0, 0)][DBLP] FOCS, 2006, pp:27-38 [Conf] - Craig Gentry, Zulfikar Ramzan
**Single-Database Private Information Retrieval with Constant Communication Rate.**[Citation Graph (0, 0)][DBLP] ICALP, 2005, pp:803-815 [Conf] - Craig Gentry, Zulfikar Ramzan
**RSA Accumulator Based Broadcast Encryption.**[Citation Graph (0, 0)][DBLP] ISC, 2004, pp:73-86 [Conf] - James Kempf, Jonathan Wood, Zulfikar Ramzan, Craig Gentry
**IP Address Authorization for Secure Address Proxying Using Multi-key CGAs and Ring Signatures.**[Citation Graph (0, 0)][DBLP] IWSEC, 2006, pp:196-211 [Conf] - Farid F. Elwailly, Craig Gentry, Zulfikar Ramzan
**QuasiModo: Efficient Certificate Validation and Revocation.**[Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2004, pp:375-388 [Conf] - Craig Gentry, Zulfikar Ramzan
**Identity-Based Aggregate Signatures.**[Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2006, pp:257-273 [Conf] - Craig Gentry, Zulfikar Ramzan, Stuart G. Stubblebine
**Secure distributed human computation.**[Citation Graph (0, 0)][DBLP] ACM Conference on Electronic Commerce, 2005, pp:155-164 [Conf] **Computing on Encrypted Data.**[Citation Graph (, )][DBLP]**Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing.**[Citation Graph (, )][DBLP]**Attacking cryptographic schemes based on "perturbation polynomials".**[Citation Graph (, )][DBLP][Citation Graph (, )][DBLP]*i*-Hop Homomorphic Encryption and Rerandomizable Yao Circuits.**Toward Basing Fully Homomorphic Encryption on Worst-Case Hardness.**[Citation Graph (, )][DBLP]**Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers.**[Citation Graph (, )][DBLP]**Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts).**[Citation Graph (, )][DBLP]**A Simple BGN-Type Cryptosystem from LWE.**[Citation Graph (, )][DBLP]**Fully Homomorphic Encryption over the Integers.**[Citation Graph (, )][DBLP]**Space-Efficient Identity Based Encryption Without Pairings.**[Citation Graph (, )][DBLP]**Secure Distributed Human Computation.**[Citation Graph (, )][DBLP]**Secure Distributed Human Computation.**[Citation Graph (, )][DBLP]**Trapdoors for hard lattices and new cryptographic constructions.**[Citation Graph (, )][DBLP]**Fully homomorphic encryption using ideal lattices.**[Citation Graph (, )][DBLP]**Hierarchical Identity Based Encryption with Polynomially Many Levels.**[Citation Graph (, )][DBLP]**Computing arbitrary functions of encrypted data.**[Citation Graph (, )][DBLP]**Trapdoors for Hard Lattices and New Cryptographic Constructions.**[Citation Graph (, )][DBLP]
Search in 0.189secs, Finished in 0.191secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |