- What Can We Learn Privately?
S. P. Kasiviswanathan and H. K. Lee and K. Nissim and S. Raskhodnikova and A. Smith
FOCS, pages 531-540, 2008
- Improved Separations between Nondeterministic and Randomized Multiparty Communication
M. David and T. Pitassi and E. Viola
APPROX-RANDOM, pages 371-384, 2008
- The Sum of d Small-Bias Generators Fools Polynomials of Degree d
E. Viola
IEEE Conference on Computational Complexity, pages 124-127, 2008
- Hardness amplification proofs require majority
R. Shaltiel and E. Viola
STOC, pages 589-598, 2008
- The dual receiver cryptosystem and its applications
T. Diament and H. K. Lee and A. D. Keromytis and M. Yung
ACM Conference on Computer and Communications Security, pages 330-343, 2004
- Cryptographic strength of ssl/tls servers: current and recent practices
H. K. Lee and T. Malkin and E. M. Nahum
Internet Measurement Comference, pages 83-92, 2007
- Amplifying Collision Resistance: A Complexity-Theoretic Treatment
R. Canetti and R. L. Rivest and M. Sudan and L. Trevisan and S. P. Vadhan and H. Wee
CRYPTO, pages 264-283, 2007
- Improved Randomness Extraction from Two Independent Sources
Y. Dodis and A. Elbaz and R. Oliveira and R. Raz
APPROX-RANDOM, pages 334-344, 2004
- Separating Models of Learning from Correlated and Uncorrelated Data
A. Elbaz and H. K. Lee and R. A. Servedio and A. Wan
Journal of Machine Learning Research(8), pages 277-290, 2007
- PAR: Payment for Anonymous Routing
E. Androulaki and M. Raykova and S. Srivatsan and A. Stavrou and S. M. Bellovin
Privacy Enhancing Technologies, pages 219-236, 2008
- Optimal Cryptographic Hardness of Learning Monotone Functions
D. Dachman-Soled and H. K. Lee and T. Malkin and R. A. Servedio and A. Wan and H. Wee
ICALP (1), pages 36-47, 2008
- Short Traceable Signatures Based on Bilinear Pairings
S. G. Choi and K. Park and M. Yung
IWSEC, pages 88-103, 2006
- Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication
V. Benjumea and S. G. Choi and J. Lopez and M. Yung
CANS, pages 265-281, 2007
- Two-Party Computing with Encrypted Data
S. G. Choi and A. Elbaz and A. Juels and T. Malkin and M. Yung
ASIACRYPT, pages 298-314, 2007
- Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One
S. G. Choi and D. Dachman-Soled and T. Malkin and H. Wee
TCC, pages 427-444, 2008
- Reputation Systems for Anonymous Networks
E. Androulaki and S. G. Choi and S. M. Bellovin and T. Malkin
Privacy Enhancing Technologies, pages 202-218, 2008
- Fair Traceable Multi-Group Signatures
V. Benjumea and S. G. Choi and J. Lopez and M. Yung
Financial Cryptography, pages 231-246, 2008