Universally Composable Security: A New Paradigm for Cryptographic Protocols R Canetti | 4358 | 2000 |
HMAC: Keyed-hashing for message authentication H Krawczyk, M Bellare, R Canetti | 3592 | 1997 |
Keying hash functions for message authentication M Bellare, R Canetti, H Krawczyk Advances in Cryptology—CRYPTO’96: 16th Annual International Cryptology …, 1996 | 2557 | 1996 |
The random oracle methodology, revisited R Canetti, O Goldreich, S Halevi Journal of the ACM (JACM) 51 (4), 557-594, 2004 | 2460 | 2004 |
Analysis of key-exchange protocols and their use for building secure channels R Canetti, H Krawczyk International conference on the theory and applications of cryptographic …, 2001 | 2119 | 2001 |
Security and composition of multiparty cryptographic protocols R Canetti Journal of CRYPTOLOGY 13, 143-202, 2000 | 1717 | 2000 |
Efficient authentication and signing of multicast streams over lossy channels A Perrig, R Canetti, JD Tygar, D Song Proceeding 2000 IEEE symposium on security and privacy. S&P 2000, 56-73, 2000 | 1452 | 2000 |
TESLA broadcast authentication A Perrig, JD Tygar, A Perrig, JD Tygar Secure Broadcast Communication: In Wired and Wireless Networks, 29-53, 2003 | 1405 | 2003 |
Multicast security: A taxonomy and some efficient constructions R Canetti, J Garay, G Itkis, D Micciancio, M Naor, B Pinkas IEEE INFOCOM'99. Conference on Computer Communications. Proceedings …, 1999 | 1177 | 1999 |
Chosen-ciphertext security from identity-based encryption R Canetti, S Halevi, J Katz Advances in Cryptology-EUROCRYPT 2004: International Conference on the …, 2004 | 1131 | 2004 |
A forward-secure public-key encryption scheme R Canetti, S Halevi, J Katz Advances in Cryptology—EUROCRYPT 2003: International Conference on the …, 2003 | 1074 | 2003 |
Efficient and secure source authentication for multicast A Perrig, R Canetti, D Song, JD Tygar Network and distributed system security symposium, NDSS 1 (2001), 35-46, 2001 | 988 | 2001 |
Universally composable two-party and multi-party secure computation R Canetti, Y Lindell, R Ostrovsky, A Sahai Proceedings of the thiry-fourth annual ACM symposium on Theory of computing …, 2002 | 965 | 2002 |
Universally composable notions of key exchange and secure channels R Canetti, H Krawczyk Advances in Cryptology—EUROCRYPT 2002: International Conference on the …, 2002 | 854 | 2002 |
Universally composable commitments R Canetti, M Fischlin Advances in Cryptology—CRYPTO 2001: 21st Annual International Cryptology …, 2001 | 810 | 2001 |
A modular approach to the design and analysis of authentication and key exchange protocols M Bellare, R Canetti, H Krawczyk Proceedings of the thirtieth annual ACM symposium on Theory of computing …, 1998 | 754 | 1998 |
Adaptively secure multi-party computation R Canetti, U Feige, O Goldreich, M Naor Proceedings of the twenty-eighth annual ACM symposium on Theory of computing …, 1996 | 744 | 1996 |
Chosen-ciphertext secure proxy re-encryption R Canetti, S Hohenberger Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 729 | 2007 |
From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again N Bitansky, R Canetti, A Chiesa, E Tromer Proceedings of the 3rd innovations in theoretical computer science …, 2012 | 676 | 2012 |
Deniable encryption R Canetti, C Dwork, M Naor, R Ostrovsky Advances in Cryptology—CRYPTO'97: 17th Annual International Cryptology …, 1997 | 585 | 1997 |