Leonid Reyzin

From MaRDI portal
(Redirected from Person:476199)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Approximate lower bound arguments2024-11-13Paper
In memory of Yuri Ilyich Lyubich
Journal of Mathematical Physics, Analysis, Geometry
2024-04-29Paper
Can a public blockchain keep a secret?2021-12-01Paper
Computational fuzzy extractors
Information and Computation
2020-12-15Paper
Efficient noninteractive certification of RSA moduli and beyond2020-05-11Paper
Fuzzy password-authenticated key exchange2018-07-17Paper
Fiat-Shamir and correlation intractability from strong KDM-secure encryption2018-07-09Paper
A unified framework for trapdoor-permutation-based sequential aggregate signatures2018-05-29Paper
Beyond Hellman's time-memory trade-offs with applications to proofs of space2018-03-08Paper
Scrypt is maximally memory-hard
Lecture Notes in Computer Science
2017-06-23Paper
Reusable fuzzy extractors for low-entropy distributions
Advances in Cryptology – EUROCRYPT 2016
2016-09-09Paper
On the correlation intractability of obfuscated pseudorandom functions
Theory of Cryptography
2016-03-23Paper
Privacy amplification with asymptotically optimal entropy loss
Journal of the ACM
2015-08-14Paper
A unified approach to deterministic encryption: new constructions and a connection to computational entropy
Journal of Cryptology
2015-08-03Paper
Protecting circuits from computationally bounded and noisy leakage
SIAM Journal on Computing
2015-02-09Paper
Sequential aggregate signatures with lazy verification from trapdoor permutations
Information and Computation
2014-11-28Paper
Privacy amplification with asymptotically optimal entropy loss
Proceedings of the forty-second ACM symposium on Theory of computing
2014-08-13Paper
Amplifying Privacy in Privacy Amplification
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Computational fuzzy extractors
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Mercurial commitments with applications to zero-knowledge sets
Journal of Cryptology
2013-06-27Paper
Sequential aggregate signatures with lazy verification from trapdoor permutations. (Extended abstract)
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy
Theory of Cryptography
2012-06-15Paper
Some notions of entropy for cryptography. (Invited talk)
Lecture Notes in Computer Science
2011-05-19Paper
Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6
Fast Software Encryption
2009-08-11Paper
Upper and lower bounds on black-box steganography
Journal of Cryptology
2009-06-30Paper
Theory of Cryptography
Lecture Notes in Computer Science
2009-05-14Paper
Key Agreement from Close Secrets over Unsecured Channels
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
An Improved Robust Fuzzy Extractor
Lecture Notes in Computer Science
2008-11-20Paper
Mercurial Commitments with Applications to Zero-Knowledge Sets
Lecture Notes in Computer Science
2008-05-06Paper
Saving Private Randomness in One-Way Functions and Pseudorandom Generators
Theory of Cryptography
2008-03-05Paper
Conditional Computational Entropy, or Toward Separating Pseudoentropy from Compressibility
Advances in Cryptology - EUROCRYPT 2007
2007-11-29Paper
Advances in Cryptology - EUROCRYPT 2004
Lecture Notes in Computer Science
2007-09-25Paper
Theory of Cryptography
Lecture Notes in Computer Science
2005-12-07Paper
Advances in Cryptology – CRYPTO 2004
Lecture Notes in Computer Science
2005-08-23Paper
scientific article; zbMATH DE number 1952889 (Why is no real title available?)2003-07-24Paper
scientific article; zbMATH DE number 1952904 (Why is no real title available?)2003-07-24Paper
scientific article; zbMATH DE number 1952891 (Why is no real title available?)2003-07-24Paper
scientific article; zbMATH DE number 1950338 (Why is no real title available?)2003-07-17Paper
scientific article; zbMATH DE number 1942440 (Why is no real title available?)2003-06-30Paper
scientific article; zbMATH DE number 1842510 (Why is no real title available?)2002-12-08Paper
scientific article; zbMATH DE number 1842500 (Why is no real title available?)2002-12-08Paper
scientific article; zbMATH DE number 1759791 (Why is no real title available?)2002-10-07Paper
Improving the exact security of digital signature schemes
Journal of Cryptology
2002-05-21Paper
scientific article; zbMATH DE number 1489843 (Why is no real title available?)2002-05-14Paper
scientific article; zbMATH DE number 1722687 (Why is no real title available?)2002-03-21Paper


Research outcomes over time


This page was built for person: Leonid Reyzin