Leonid Reyzin

From MaRDI portal
Person:476199

Available identifiers

zbMath Open reyzin.leonidMaRDI QIDQ476199

List of research outcomes





PublicationDate of PublicationType
Approximate lower bound arguments2024-11-13Paper
In memory of Yuri Ilyich Lyubich2024-04-29Paper
Can a public blockchain keep a secret?2021-12-01Paper
Computational fuzzy extractors2020-12-15Paper
Efficient noninteractive certification of RSA moduli and beyond2020-05-11Paper
Fuzzy password-authenticated key exchange2018-07-17Paper
Fiat-Shamir and correlation intractability from strong KDM-secure encryption2018-07-09Paper
A unified framework for trapdoor-permutation-based sequential aggregate signatures2018-05-29Paper
Beyond Hellman's time-memory trade-offs with applications to proofs of space2018-03-08Paper
Scrypt Is Maximally Memory-Hard2017-06-23Paper
Reusable Fuzzy Extractors for Low-Entropy Distributions2016-09-09Paper
On the Correlation Intractability of Obfuscated Pseudorandom Functions2016-03-23Paper
Privacy amplification with asymptotically optimal entropy loss2015-08-14Paper
A unified approach to deterministic encryption: new constructions and a connection to computational entropy2015-08-03Paper
Protecting Circuits from Computationally Bounded and Noisy Leakage2015-02-09Paper
Sequential aggregate signatures with lazy verification from trapdoor permutations2014-11-28Paper
Privacy amplification with asymptotically optimal entropy loss2014-08-13Paper
Amplifying Privacy in Privacy Amplification2014-08-07Paper
Computational Fuzzy Extractors2013-12-10Paper
Mercurial commitments with applications to zero-knowledge sets2013-06-27Paper
Sequential Aggregate Signatures with Lazy Verification from Trapdoor Permutations2013-03-19Paper
A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy2012-06-15Paper
Some Notions of Entropy for Cryptography2011-05-19Paper
Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases2010-06-01Paper
Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD62009-08-11Paper
Upper and lower bounds on black-box steganography2009-06-30Paper
Theory of Cryptography2009-05-14Paper
Key Agreement from Close Secrets over Unsecured Channels2009-05-12Paper
An Improved Robust Fuzzy Extractor2008-11-20Paper
Mercurial Commitments with Applications to Zero-Knowledge Sets2008-05-06Paper
Saving Private Randomness in One-Way Functions and Pseudorandom Generators2008-03-05Paper
Conditional Computational Entropy, or Toward Separating Pseudoentropy from Compressibility2007-11-29Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Theory of Cryptography2005-12-07Paper
Advances in Cryptology – CRYPTO 20042005-08-23Paper
https://portal.mardi4nfdi.de/entity/Q44142682003-07-24Paper
https://portal.mardi4nfdi.de/entity/Q44142862003-07-24Paper
https://portal.mardi4nfdi.de/entity/Q44142702003-07-24Paper
https://portal.mardi4nfdi.de/entity/Q44129712003-07-17Paper
https://portal.mardi4nfdi.de/entity/Q44091392003-06-30Paper
https://portal.mardi4nfdi.de/entity/Q47837442002-12-08Paper
https://portal.mardi4nfdi.de/entity/Q47837342002-12-08Paper
https://portal.mardi4nfdi.de/entity/Q45368142002-10-07Paper
Improving the exact security of digital signature schemes2002-05-21Paper
https://portal.mardi4nfdi.de/entity/Q44960632002-05-14Paper
https://portal.mardi4nfdi.de/entity/Q27788582002-03-21Paper

Research outcomes over time

This page was built for person: Leonid Reyzin