Rafail Ostrovsky
Rafail Ostrovsky
Professor of Computer Science and Professor of Mathematics, UCLA
Email verificata su cs.ucla.edu - Home page
Titolo
Citata da
Citata da
Anno
Public key encryption with keyword search
D Boneh, G Di Crescenzo, R Ostrovsky, G Persiano
International conference on the theory and applications of cryptographic …, 2004
31422004
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
Y Dodis, R Ostrovsky, L Reyzin, A Smith
SIAM journal on computing 38 (1), 97-139, 2008
3118*2008
Searchable symmetric encryption: improved definitions and efficient constructions
R Curtmola, J Garay, S Kamara, R Ostrovsky
Journal of Computer Security 19 (5), 895-934, 2011
23362011
Software protection and simulation on oblivious RAMs
O Goldreich, R Ostrovsky
Journal of the ACM (JACM) 43 (3), 431-473, 1996
15411996
Attribute-based encryption with non-monotonic access structures
R Ostrovsky, A Sahai, B Waters
Proceedings of the 14th ACM conference on Computer and communications …, 2007
12652007
Replication is not needed: Single database, computationally-private information retrieval
E Kushilevitz, R Ostrovsky
Proceedings 38th annual symposium on foundations of computer science, 364-373, 1997
10611997
Universally composable two-party and multi-party secure computation
R Canetti, Y Lindell, R Ostrovsky, A Sahai
Proceedings of the thiry-fourth annual ACM symposium on Theory of computing …, 2002
7432002
How to withstand mobile virus attacks
R Ostrovsky, M Yung
Proceedings of the tenth annual ACM symposium on Principles of distributed …, 1991
6661991
Efficient search for approximate nearest neighbor in high dimensional spaces
E Kushilevitz, R Ostrovsky, Y Rabani
SIAM Journal on Computing 30 (2), 457-474, 2000
6302000
Efficient and secure authenticated key exchange using weak passwords
J Katz, R Ostrovsky, M Yung
Journal of the ACM (JACM) 57 (1), 1-39, 2009
590*2009
The effectiveness of lloyd-type methods for the k-means problem
R Ostrovsky, Y Rabani, LJ Schulman, C Swamy
Journal of the ACM (JACM) 59 (6), 28, 2012
4572012
Deniable encryption
R Canetti, C Dwork, M Naor, R Ostrovsky
Annual International Cryptology Conference, 90-104, 1997
4541997
Sequential aggregate signatures and multisignatures without random oracles
S Lu, R Ostrovsky, A Sahai, H Shacham, B Waters
Annual International Conference on the Theory and Applications of …, 2006
3462006
Perfect noninteractive zero-knowledge for NP
J Groth, R Ostrovsky, A Sahai
3362005
A survey of single-database private information retrieval: Techniques and applications
R Ostrovsky, WE Skeith
International Workshop on Public Key Cryptography, 393-411, 2007
3132007
Public key encryption that allows PIR queries
D Boneh, E Kushilevitz, R Ostrovsky, WE Skeith
Annual International Cryptology Conference, 50-67, 2007
3092007
Robust non-interactive zero knowledge
A De Santis, G Di Crescenzo, R Ostrovsky, G Persiano, A Sahai
Annual International Cryptology Conference, 566-598, 2001
2962001
Circular-secure encryption from decision diffie-hellman
D Boneh, S Halevi, M Hamburg, R Ostrovsky
Annual International Cryptology Conference, 108-125, 2008
2862008
Efficient computation on oblivious RAMs
R Ostrovsky
Proceedings of the twenty-second annual ACM symposium on Theory of computing …, 1990
2841990
Secure remote authentication using biometric data
X Boyen, Y Dodis, J Katz, R Ostrovsky, A Smith
annual international conference on the theory and applications of …, 2005
2832005
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20