Prati
Stanislaw Jarecki
Stanislaw Jarecki
Potvrđena adresa e-pošte na uci.edu - Početna stranica
Naslov
Citirano
Citirano
Godina
Proactive secret sharing or: How to cope with perpetual leakage
A Herzberg, S Jarecki, H Krawczyk, M Yung
Advances in Cryptology—CRYPT0’95: 15th Annual International Cryptology …, 1995
11641995
Highly-scalable searchable symmetric encryption with support for boolean queries
D Cash, S Jarecki, C Jutla, H Krawczyk, MC Roşu, M Steiner
Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013
10492013
Dynamic searchable encryption in very-large databases: Data structures and implementation
D Cash, J Jaeger, S Jarecki, C Jutla, H Krawczyk, MC Roşu, M Steiner
Cryptology ePrint Archive, 2014
8552014
Secure distributed key generation for discrete-log based cryptosystems
R Gennaro, S Jarecki, H Krawczyk, T Rabin
Advances in Cryptology—EUROCRYPT’99: International Conference on the Theory …, 1999
7661999
Robust threshold DSS signatures
R Gennaro, S Jarecki, H Krawczyk, T Rabin
Advances in Cryptology—EUROCRYPT’96: International Conference on the Theory …, 1996
7391996
Secure distributed key generation for discrete-log based cryptosystems
R Gennaro, S Jarecki, H Krawczyk, T Rabin
Journal of Cryptology 20, 51-83, 2007
5082007
Proactive public key and signature systems
A Herzberg, M Jakobsson, S Jarecki, H Krawczyk, M Yung
Proceedings of the 4th ACM Conference on Computer and Communications …, 1997
3961997
Efficient oblivious pseudorandom function with applications to adaptive OT and secure computation of set intersection
S Jarecki, X Liu
Theory of Cryptography: 6th Theory of Cryptography Conference, TCC 2009, San …, 2009
3672009
Robust and efficient sharing of RSA functions
R Gennaro, S Jarecki, H Krawczyk, T Rabin
Advances in Cryptology—CRYPTO’96: 16th Annual International Cryptology …, 1996
2731996
Outsourced symmetric private information retrieval
S Jarecki, C Jutla, H Krawczyk, M Rosu, M Steiner
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
2492013
Rich queries on encrypted data: Beyond exact matches
S Faber, S Jarecki, H Krawczyk, Q Nguyen, M Rosu, M Steiner
Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015
2422015
Adaptive security for threshold cryptosystems
R Canetti, R Gennaro, S Jarecki, H Krawczyk, T Rabin
Advances in Cryptology—CRYPTO’99: 19th Annual International Cryptology …, 1999
2311999
Fast secure computation of set intersection
S Jarecki, X Liu
Security and Cryptography for Networks: 7th International Conference, SCN …, 2010
2132010
OPAQUE: an asymmetric PAKE protocol secure against pre-computation attacks
S Jarecki, H Krawczyk, J Xu
Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018
1902018
Efficient two-party secure computation on committed inputs
S Jarecki, V Shmatikov
Advances in Cryptology-EUROCRYPT 2007: 26th Annual International Conference …, 2007
1902007
A signature scheme as secure as the Diffie-Hellman problem
EJ Goh, S Jarecki
Advances in Cryptology—EUROCRYPT 2003: International Conference on the …, 2003
1792003
Robust threshold DSS signatures
R Gennaro, S Jarecki, H Krawczyk, T Rabin
Information and computation 164 (1), 54-84, 2001
1732001
Adaptively secure threshold cryptography: Introducing concurrency, removing erasures
S Jarecki, A Lysyanskaya
Advances in Cryptology—EUROCRYPT 2000: International Conference on the …, 2000
1622000
Secret handshakes from ca-oblivious encryption
C Castelluccia, S Jarecki, G Tsudik
Advances in Cryptology-ASIACRYPT 2004: 10th International Conference on the …, 2004
1592004
Round-optimal password-protected secret sharing and T-PAKE in the password-only model
S Jarecki, A Kiayias, H Krawczyk
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
1522014
Sustav trenutno ne može provesti ovu radnju. Pokušajte ponovo kasnije.
Članci 1–20