متابعة
Jonathan Katz
Jonathan Katz
Professor of Computer Science, University of Maryland
بريد إلكتروني تم التحقق منه على cs.umd.edu
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
Introduction to modern cryptography: Principles & protocols (Cryptography & network security series)
J KATZ, Y LINDELL
4715*2007
A pairwise key predistribution scheme for wireless sensor networks
W Du, J Deng, YS Han, PK Varshney, J Katz, A Khalili
ACM Transactions on Information and System Security (TISSEC) 8 (2), 228-258, 2005
25192005
Predicate encryption supporting disjunctions, polynomial eguations, and inner products
J Katz
Proc. EUROCRYPT 2008, l46-162, 2008
1563*2008
Predicate encryption supporting disjunctions, polynomial equations, and inner products
J Katz, A Sahai, B Waters
Advances in Cryptology–EUROCRYPT 2008, 146-162, 2008
14132008
Chosen-ciphertext security from identity-based encryption
R Canetti, S Halevi, J Katz
Advances in Cryptology-Eurocrypt 2004, 207-222, 2004
11152004
A forward-secure public-key encryption scheme
R Canetti, S Halevi, J Katz
Advances in Cryptology—Eurocrypt 2003, 646-646, 2003
10442003
Faster Secure Two-Party Computation Using Garbled Circuits
D Evans, L Malka, J Katz, Y Huang
8132011
Faster secure two-party computation using garbled circuits
Y Huang, D Evans, J Katz, L Malka
USENIX Security Symposium, 2011
8132011
Efficient password-authenticated key exchange using human-memorable passwords
J Katz, R Ostrovsky, M Yung
Advances in Cryptology—EUROCRYPT 2001, 475-494, 2001
5762001
All your queries are belong to us: The power of file-injection attacks on searchable encryption
Y Zhang, J Katz, C Papamanthou
25th {USENIX} Security Symposium ({USENIX} Security 16), 707-720, 2016
5482016
Key-insulated public key cryptosystems
Y Dodis, J Katz, S Xu, M Yung
Advances in Cryptology—Eurocrypt 2002, 65-82, 2002
5292002
Scalable protocols for authenticated group key exchange
J Katz, M Yung
Advances in Cryptology-CRYPTO 2003, 110-125, 2003
5262003
Proofs of storage from homomorphic identification protocols
G Ateniese, S Kamara, J Katz
Advances in Cryptology–ASIACRYPT 2009, 319-333, 2009
5012009
Toward Secure Key Distribution in Truly Ad Hoc Networks
A Khalili, J Katz, W Arbaugh
Proceedings of the IEEE Workshop on Security and Assurance in Ad hoc …, 2003
4952003
Private set intersection: Are garbled circuits better than custom protocols?
Y Huang, D Evans, J Katz
NDSS, 2012
4802012
Signing a linear subspace: Signature schemes for network coding
D Boneh, D Freeman, J Katz, B Waters
Public Key Cryptography–PKC 2009, 68-87, 2009
4352009
Multi-input functional encryption
S Goldwasser, SD Gordon, V Goyal, A Jain, J Katz, FH Liu, A Sahai, E Shi, ...
Advances in Cryptology–EUROCRYPT 2014, 578-602, 2014
4222014
Chosen-ciphertext security from identity-based encryption
D Boneh, R Canetti, S Halevi, J Katz
SIAM Journal on Computing 36 (5), 1301-1328, 2007
4142007
Permacoin: Repurposing Bitcoin Work for Data Preservation
A Miller, A Juels, E Shi, B Parno, J Katz
411*
Ring signatures: Stronger definitions, and constructions without random oracles
A Bender, J Katz, R Morselli
Journal of Cryptology 22 (1), 114-138, 2008
3752008
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–20