Pairing-Based Verifiable Random Functions Yevgeniy Dodis New York University.
Primary-Secondary-Resolvers Membership Proof Systems and their Applications to DNSSEC Based on: NSEC5: Provably Preventing DNSSEC Zone Enumeration Sharon.
Yevgeniy Dodis, Kristiyan Haralambiev, Adriana López-Alt, Daniel Wichs New York University Efficient Public-Key Cryptography in the Presence of Leakage.
Almost uniform density of power residues and the provable security of ESIGN Jacques Stern ASIACRYPT 2003 December 3rd 2003 École normale supérieure Tatsuaki.
Program Obfuscation: A Quantitative Approach Presented by: Mariusz Jakubowski Microsoft Research Third Workshop on Quality of Protection October 29 th,
IDENTITY BASED ENCRYPTION
Chosen-Ciphertext Security from Identity-Based Encryption
Leakage-Resilient Cryptography
Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups (Part 1.)
Fuzzy Identity Based Signature