The following pages link to Anna Lysyanskaya (Q2175216):
Displayed 47 items.
- Feasibility and infeasibility of secure computation with malicious PUFs (Q2175217) (← links)
- Fully homomorphic NIZK and NIWI proofs (Q2175946) (← links)
- Delegatable anonymous credentials from mercurial signatures (Q2290472) (← links)
- Mercurial commitments with applications to zero-knowledge sets (Q2377062) (← links)
- Cryptographic shallots: a formal treatment of repliable onion encryption (Q2697893) (← links)
- (Q2778843) (← links)
- On the Security of One-Witness Blind Signature Schemes (Q2867147) (← links)
- Memento: How to Reconstruct Your Secrets from a Single Password in a Hostile Environment (Q2874541) (← links)
- Feasibility and Infeasibility of Secure Computation with Malicious PUFs (Q2874550) (← links)
- Malleable Proof Systems and Applications (Q2894414) (← links)
- Tamper and Leakage Resilience in the Split-State Model (Q2914281) (← links)
- Randomizable Proofs and Delegatable Anonymous Credentials (Q3183560) (← links)
- (Q3374910) (← links)
- Compact E-Cash and Simulatable VRFs Revisited (Q3392907) (← links)
- On the composition of authenticated Byzantine Agreement (Q3455220) (← links)
- Balancing Accountability and Privacy Using E-Cash (Extended Abstract) (Q3541884) (← links)
- On the composition of authenticated byzantine agreement (Q3579242) (← links)
- Algorithmic Tamper-Proof Security under Probing Attacks (Q3588333) (← links)
- Simulatable VRFs with Applications to Multi-theorem NIZK (Q3612556) (← links)
- (Q3615882) (← links)
- (Q4409110) (← links)
- (Q4409145) (← links)
- (Q4414288) (← links)
- (Q4474183) (← links)
- (Q4783737) (← links)
- Succinct Malleable NIZKs and an Application to Compact Shuffles (Q4910273) (← links)
- Verifiable Elections That Scale for Free (Q4916026) (← links)
- (Q4949336) (← links)
- (Q5002833) (← links)
- Sequential composition of protocols without simultaneous termination (Q5170881) (← links)
- Usable Optimistic Fair Exchange (Q5189455) (← links)
- Advances in Cryptology - EUROCRYPT 2004 (Q5307247) (← links)
- Advances in Cryptology – CRYPTO 2004 (Q5311558) (← links)
- Compact E-Cash (Q5385736) (← links)
- Mercurial Commitments with Applications to Zero-Knowledge Sets (Q5385743) (← links)
- P-signatures and Noninteractive Anonymous Credentials (Q5445515) (← links)
- A Formal Treatment of Onion Routing (Q5451025) (← links)
- Theory of Cryptography (Q5711647) (← links)
- On Signatures of Knowledge (Q5756623) (← links)
- Rationality and Adversarial Behavior in Multi-party Computation (Q5756639) (← links)
- Public Key Cryptography - PKC 2006 (Q5898940) (← links)
- Theory of Cryptography (Q5901776) (← links)
- Security analysis of RSA-BSSA (Q6070761) (← links)
- (Q6107258) (← links)
- PI-Cut-Choo and friends: compact blind signatures via parallel instance cut-and-choose and more (Q6108972) (← links)
- Universally composable \(\varSigma \)-protocols in the global random-oracle model (Q6169354) (← links)
- Poly onions: achieving anonymity in the presence of churn (Q6169429) (← links)