Seguir
Ran Canetti
Ran Canetti
Professor of Computer Science, Boston University
Dirección de correo verificada de bu.edu
Título
Citado por
Citado por
Año
Universally Composable Security: A New Paradigm for Cryptographic Protocols
R Canetti
42762000
HMAC: Keyed-hashing for message authentication
H Krawczyk, M Bellare, R Canetti
35741997
Keying hash functions for message authentication
M Bellare, R Canetti, H Krawczyk
Advances in Cryptology—CRYPTO’96: 16th Annual International Cryptology …, 1996
25441996
The random oracle methodology, revisited
R Canetti, O Goldreich, S Halevi
Journal of the ACM (JACM) 51 (4), 557-594, 2004
24432004
Analysis of key-exchange protocols and their use for building secure channels
R Canetti, H Krawczyk
International conference on the theory and applications of cryptographic …, 2001
21062001
Security and composition of multiparty cryptographic protocols
R Canetti
Journal of CRYPTOLOGY 13, 143-202, 2000
16872000
Efficient authentication and signing of multicast streams over lossy channels
A Perrig, R Canetti, JD Tygar, D Song
Proceeding 2000 IEEE symposium on security and privacy. S&P 2000, 56-73, 2000
14502000
TESLA broadcast authentication
A Perrig, JD Tygar, A Perrig, JD Tygar
Secure Broadcast Communication: In Wired and Wireless Networks, 29-53, 2003
13932003
Multicast security: A taxonomy and some efficient constructions
R Canetti, J Garay, G Itkis, D Micciancio, M Naor, B Pinkas
IEEE INFOCOM'99. Conference on Computer Communications. Proceedings …, 1999
11751999
Chosen-ciphertext security from identity-based encryption
R Canetti, S Halevi, J Katz
Advances in Cryptology-EUROCRYPT 2004: International Conference on the …, 2004
11262004
A forward-secure public-key encryption scheme
R Canetti, S Halevi, J Katz
Advances in Cryptology—EUROCRYPT 2003: International Conference on the …, 2003
10622003
Efficient and secure source authentication for multicast
A Perrig, R Canetti, D Song, JD Tygar
Network and distributed system security symposium, NDSS 1 (2001), 35-46, 2001
9872001
Universally composable two-party and multi-party secure computation
R Canetti, Y Lindell, R Ostrovsky, A Sahai
Proceedings of the thiry-fourth annual ACM symposium on Theory of computing …, 2002
9492002
Universally composable notions of key exchange and secure channels
R Canetti, H Krawczyk
Advances in Cryptology—EUROCRYPT 2002: International Conference on the …, 2002
8432002
Universally composable commitments
R Canetti, M Fischlin
Advances in Cryptology—CRYPTO 2001: 21st Annual International Cryptology …, 2001
7992001
A modular approach to the design and analysis of authentication and key exchange protocols
M Bellare, R Canetti, H Krawczyk
Proceedings of the thirtieth annual ACM symposium on Theory of computing …, 1998
7541998
Adaptively secure multi-party computation
R Canetti, U Feige, O Goldreich, M Naor
Proceedings of the twenty-eighth annual ACM symposium on Theory of computing …, 1996
7361996
Chosen-ciphertext secure proxy re-encryption
R Canetti, S Hohenberger
Proceedings of the 14th ACM conference on Computer and communications …, 2007
7232007
From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again
N Bitansky, R Canetti, A Chiesa, E Tromer
Proceedings of the 3rd innovations in theoretical computer science …, 2012
6452012
Deniable encryption
R Canetti, C Dwork, M Naor, R Ostrovsky
Advances in Cryptology—CRYPTO'97: 17th Annual International Cryptology …, 1997
5791997
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20