dblp.uni-trier.dewww.uni-trier.de

Ran Canetti

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
96EERan Canetti, Ronny Ramzi Dakdouk: Towards a Theory of Extractable Functions. TCC 2009: 595-613
95EERan Canetti, Mayank Varia: Non-malleable Obfuscation. TCC 2009: 73-90
2008
94 Ran Canetti: Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Springer 2008
93EEWaseem Daher, Ran Canetti: POSH: a generalized captcha with security applications. AISec 2008: 1-10
92EERan Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nancy A. Lynch, Olivier Pereira: Modeling Computational Security in Long-Lived Systems. CONCUR 2008: 114-130
91EERan Canetti, Ronny Ramzi Dakdouk: Obfuscating Point Functions with Multibit Output. EUROCRYPT 2008: 489-508
90EERan Canetti: Composable Formal Security Analysis: Juggling Soundness, Simplicity and Efficiency. ICALP (2) 2008: 1-13
89EERan Canetti, Ronny Ramzi Dakdouk: Extractable Perfectly One-Way Functions. ICALP (2) 2008: 449-460
88EERan Canetti, Dror Eiger, Shafi Goldwasser, Dah-Yoh Lim: How to Protect Yourself without Perfect Shredding. ICALP (2) 2008: 511-523
87EERan Canetti, Ling Cheung, Dilsun Kirli Kaynar, Moses Liskov, Nancy A. Lynch, Olivier Pereira, Roberto Segala: Analyzing Security Protocols Using Time-Bounded Task-PIOAs. Discrete Event Dynamic Systems 18(1): 111-159 (2008)
2007
86EERan Canetti, Susan Hohenberger: Chosen-ciphertext secure proxy re-encryption. ACM Conference on Computer and Communications Security 2007: 185-194
85EERan Canetti: Obtaining Universally Compoable Security: Towards the Bare Bones of Trust. ASIACRYPT 2007: 88-112
84EERan Canetti, Ronald L. Rivest, Madhu Sudan, Luca Trevisan, Salil P. Vadhan, Hoeteck Wee: Amplifying Collision Resistance: A Complexity-Theoretic Treatment. CRYPTO 2007: 264-283
83EERan Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nancy A. Lynch, Olivier Pereira: Compositional Security for Task-PIOAs. CSF 2007: 125-139
82EERan Canetti, Rafael Pass, Abhi Shelat: Cryptography from Sunspots: How to Use an Imperfect Reference String. FOCS 2007: 249-259
81EERan Canetti, Yevgeniy Dodis, Rafael Pass, Shabsi Walfish: Universally Composable Security with Global Setup. TCC 2007: 61-85
80EERan Canetti, Shai Halevi, Jonathan Katz: A Forward-Secure Public-Key Encryption Scheme. J. Cryptology 20(3): 265-294 (2007)
79EEDan Boneh, Ran Canetti, Shai Halevi, Jonathan Katz: Chosen-Ciphertext Security from Identity-Based Encryption. SIAM J. Comput. 36(5): 1301-1328 (2007)
2006
78EERan Canetti, Shai Halevi, Michael Steiner: Mitigating Dictionary Attacks on Password-Protected Local Storage. CRYPTO 2006: 160-179
77EERan Canetti, Ling Cheung, Dilsun Kirli Kaynar, Moses Liskov, Nancy A. Lynch, Olivier Pereira, Roberto Segala: Time-Bounded Task-PIOAs: A Framework for Analyzing Security Protocols. DISC 2006: 238-253
76EERan Canetti, Jonathan Herzog: Universally Composable Symbolic Analysis of Mutual Authentication and Key-Exchange Protocols. TCC 2006: 380-403
75EERan Canetti, Eyal Kushilevitz, Yehuda Lindell: On the Limitations of Universally Composable Two-Party Computation Without Set-Up Assumptions. J. Cryptology 19(2): 135-167 (2006)
74EERan Canetti: Security and composition of cryptographic protocols: a tutorial (part I). SIGACT News 37(3): 67-92 (2006)
2005
73EEBoaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pass, Tal Rabin: Secure Computation Without Authentication. CRYPTO 2005: 361-377
72EERan Canetti, Shai Halevi, Jonathan Katz, Yehuda Lindell, Philip D. MacKenzie: Universally Composable Password-Based Key Exchange. EUROCRYPT 2005: 404-421
71EERan Canetti, Shai Halevi, Jonathan Katz: Adaptively-Secure, Non-interactive Public-Key Encryption. TCC 2005: 150-168
70EERan Canetti, Shai Halevi, Michael Steiner: Hardness Amplification of Weakly Verifiable Puzzles. TCC 2005: 17-33
69EERan Canetti: Decisional Diffie-Hellman Assumption. Encyclopedia of Cryptography and Security 2005
68EERan Canetti: Preface. J. Cryptology 18(3): 187-189 (2005)
2004
67EERan Canetti: Universally Composable Signature, Certification, and Authentication. CSFW 2004: 219-
66EERan Canetti, Shai Halevi, Jonathan Katz: Chosen-Ciphertext Security from Identity-Based Encryption. EUROCRYPT 2004: 207-222
65EEBoaz Barak, Ran Canetti, Jesper Buus Nielsen, Rafael Pass: Universally Composable Protocols with Relaxed Set-Up Assumptions. FOCS 2004: 186-195
64EERan Canetti, Oded Goldreich, Shai Halevi: On the Random-Oracle Methodology as Applied to Length-Restricted Signature Schemes. TCC 2004: 40-57
63EEWilliam Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold: Just fast keying: Key agreement in a hostile internet. ACM Trans. Inf. Syst. Secur. 7(2): 242-273 (2004)
62EERan Canetti, Oded Goldreich, Shai Halevi: The random oracle methodology, revisited. J. ACM 51(4): 557-594 (2004)
61EERan Canetti, Ivan Damgård, Stefan Dziembowski, Yuval Ishai, Tal Malkin: Adaptive versus Non-Adaptive Security of Multi-Party Protocols. J. Cryptology 17(3): 153-207 (2004)
2003
60EERan Canetti, Tal Rabin: Universal Composition with Joint State. CRYPTO 2003: 265-281
59EERan Canetti, Hugo Krawczyk, Jesper Buus Nielsen: Relaxing Chosen-Ciphertext Security. CRYPTO 2003: 565-582
58EEHelmut Scherzer, Ran Canetti, Paul A. Karger, Hugo Krawczyk, Tal Rabin, David C. Toll: Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card. ESORICS 2003: 181-200
57EERan Canetti, Shai Halevi, Jonathan Katz: A Forward-Secure Public-Key Encryption Scheme. EUROCRYPT 2003: 255-271
56EERan Canetti, Eyal Kushilevitz, Yehuda Lindell: On the Limitations of Universally Composable Two-Party Computation without Set-up Assumptions. EUROCRYPT 2003: 68-86
2002
55EEWilliam Aiello, Steven M. Bellovin, Matt Blaze, John Ioannidis, Omer Reingold, Ran Canetti, Angelos D. Keromytis: Efficient, DoS-resistant, secure key exchange for internet protocols. ACM Conference on Computer and Communications Security 2002: 48-58
54EERan Canetti, Hugo Krawczyk: Security Analysis of IKE's Signature-Based Key-Exchange Protocol. CRYPTO 2002: 143-161
53EERan Canetti, Hugo Krawczyk: Universally Composable Notions of Key Exchange and Secure Channels. EUROCRYPT 2002: 337-351
52EEAlain Azagury, Ran Canetti, Michael Factor, Shai Halevi, Ealan Henis, Dalit Naor, Noam Rinetzky, Ohad Rodeh, Julian Satran: A Two Layered Approach for Securing an Object Store Network. IEEE Security in Storage Workshop 2002: 10-23
51EERan Canetti, Catherine Meadows, Paul F. Syverson: Environmental Requirements for Authentication Protocols. ISSS 2002: 339-355
50EERan Canetti, Yehuda Lindell, Rafail Ostrovsky, Amit Sahai: Universally composable two-party and multi-party secure computation. STOC 2002: 494-503
49EERan Canetti, Joe Kilian, Erez Petrank, Alon Rosen: Black-Box Concurrent Zero-Knowledge Requires (Almost) Logarithmically Many Rounds. SIAM J. Comput. 32(1): 1-47 (2002)
2001
48EERan Canetti, Marc Fischlin: Universally Composable Commitments. CRYPTO 2001: 19-40
47EEAndre Scedrov, Ran Canetti, Joshua D. Guttman, David Wagner, Michael Waidner: Relating Cryptography and Cryptographic Protocols. CSFW 2001: 111-114
46EERan Canetti, Ivan Damgård, Stefan Dziembowski, Yuval Ishai, Tal Malkin: On Adaptive vs. Non-adaptive Security of Multiparty Protocols. EUROCRYPT 2001: 262-279
45EERan Canetti, Hugo Krawczyk: Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. EUROCRYPT 2001: 453-474
44 Ran Canetti: Universally Composable Security: A New Paradigm for Cryptographic Protocols. FOCS 2001: 136-145
43EEAdrian Perrig, Ran Canetti, Dawn Xiaodong Song, J. D. Tygar: Efficient and Secure Source Authentication for Multicast. NDSS 2001
42EERan Canetti, Yuval Ishai, Ravi Kumar, Michael K. Reiter, Ronitt Rubinfeld, Rebecca N. Wright: Selective private function evaluation with applications to private statistics. PODC 2001: 293-304
41EERan Canetti, Joe Kilian, Erez Petrank, Alon Rosen: Black-box concurrent zero-knowledge requires Omega~(log n) rounds. STOC 2001: 570-579
40EEWilliam Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold: Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols. Security Protocols Workshop 2001: 27-39
39EERan Canetti: A unified framework for analyzing security of protocols Electronic Colloquium on Computational Complexity (ECCC) 8(16): (2001)
38EERan Canetti, Joe Kilian, Erez Petrank, Alon Rosen: Black-Box Concurrent Zero-Knowledge Requires ~Omega(log n) Rounds Electronic Colloquium on Computational Complexity (ECCC) 8(50): (2001)
2000
37EERan Canetti, Yevgeniy Dodis, Shai Halevi, Eyal Kushilevitz, Amit Sahai: Exposure-Resilient Functions and All-or-Nothing Transforms. EUROCRYPT 2000: 453-469
36EEAdrian Perrig, Ran Canetti, J. D. Tygar, Dawn Xiaodong Song: Efficient Authentication and Signing of Multicast Streams over Lossy Channels. IEEE Symposium on Security and Privacy 2000: 56-73
35EERan Canetti, Pau-Chen Cheng, Frederique Giraud, Dimitrios E. Pendarakis, Josyula R. Rao, Pankaj Rohatgi, Debanjan Saha: An IPSec-based Host Architecture for Secure Internet Multicast. NDSS 2000
34EERan Canetti, Oded Goldreich, Shafi Goldwasser, Silvio Micali: Resettable zero-knowledge (extended abstract). STOC 2000: 235-244
33EERan Canetti, Oded Goldreich, Shai Halevi: The Random Oracle Methodology, Revisited CoRR cs.CR/0010019: (2000)
32EERan Canetti, Eyal Kushilevitz, Rafail Ostrovsky, Adi Rosén: Randomness versus Fault-Tolerance. J. Cryptology 13(1): 107-142 (2000)
31EERan Canetti: Security and Composition of Multiparty Cryptographic Protocols. J. Cryptology 13(1): 143-202 (2000)
30EERan Canetti, Shai Halevi, Amir Herzberg: Maintaining Authenticated Communication in the Presence of Break-Ins. J. Cryptology 13(1): 61-105 (2000)
1999
29EERan Canetti, Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin: Adaptive Security for Threshold Cryptosystems. CRYPTO 1999: 98-115
28EERan Canetti, Tal Malkin, Kobbi Nissim: Efficient Communication-Storage Tradeoffs for Multicast Encryption. EUROCRYPT 1999: 459-474
27EERan Canetti, Shafi Goldwasser: An Efficient Threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack. EUROCRYPT 1999: 90-106
26 Ran Canetti, Juan A. Garay, Gene Itkis, Daniele Micciancio, Moni Naor, Benny Pinkas: Multicast Security: A Taxonomy and Some Efficient Constructions. INFOCOM 1999: 708-716
25EERan Canetti, Rafail Ostrovsky: Secure Computation with Honest-Looking Parties: What If Nobody Is Truly Honest? (Extended Abstract). STOC 1999: 255-264
24EERan Canetti, Oded Goldreich, Shafi Goldwasser, Silvio Micali: Resettable Zero-Knowledge. Electronic Colloquium on Computational Complexity (ECCC)(42): (1999)
23 Amotz Bar-Noy, Ran Canetti, Shay Kutten, Yishay Mansour, Baruch Schieber: Bandwidth Allocation with Preemption. SIAM J. Comput. 28(5): 1806-1828 (1999)
1998
22EERan Canetti, Daniele Micciancio, Omer Reingold: Perfectly One-Way Probabilistic Hash Functions (Preliminary Version). STOC 1998: 131-140
21EERan Canetti, Oded Goldreich, Shai Halevi: The Random Oracle Methodology, Revisited (Preliminary Version). STOC 1998: 209-218
20EEMihir Bellare, Ran Canetti, Hugo Krawczyk: A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols (Extended Abstract). STOC 1998: 419-428
19EERan Canetti, Sandy Irani: Bounding the Power of Preemption in Randomized Scheduling. SIAM J. Comput. 27(4): 993-1015 (1998)
1997
18EERan Canetti: Towards Realizing Random Oracles: Hash Functions That Hide All Partial Information. CRYPTO 1997: 455-469
17EERan Canetti, Cynthia Dwork, Moni Naor, Rafail Ostrovsky: Deniable Encryption. CRYPTO 1997: 90-104
16 Ran Canetti, Shai Halevi, Amir Herzberg: Maintaining Authenticated Communication in the Presence of Break-ins. PODC 1997: 15-24
15 Ran Canetti, Eyal Kushilevitz, Rafail Ostrovsky, Adi Rosén: Randomness vs. Fault-Tolerance. PODC 1997: 35-44
1996
14EEMihir Bellare, Ran Canetti, Hugo Krawczyk: Keying Hash Functions for Message Authentication. CRYPTO 1996: 1-15
13 Ran Canetti, Rosario Gennaro: Incoercible Multiparty Computation (extended abstract). FOCS 1996: 504-513
12 Mihir Bellare, Ran Canetti, Hugo Krawczyk: Pseudorandom Functions Revisited: The Cascade Construction and Its Concrete Security. FOCS 1996: 514-523
11EERan Canetti, Uriel Feige, Oded Goldreich, Moni Naor: Adaptively Secure Multi-Party Computation. STOC 1996: 639-648
10EERan Canetti: More on BPP and the Polynomial-Time Hierarchy. Inf. Process. Lett. 57(5): 237-241 (1996)
1995
9EERan Canetti, Sandy Irani: Bounding the power of preemption in randomized scheduling. STOC 1995: 606-615
8EEAmotz Bar-Noy, Ran Canetti, Shay Kutten, Yishay Mansour, Baruch Schieber: Bandwidth allocation with preemption. STOC 1995: 616-625
7EERan Canetti, Guy Even, Oded Goldreich: Lower Bounds for Sampling Algorithms for Estimating the Average. Inf. Process. Lett. 53(1): 17-25 (1995)
1994
6EERan Canetti, Amir Herzberg: Maintaining Security in the Presence of Transient Faults. CRYPTO 1994: 425-438
1993
5EERan Canetti, Tal Rabin: Fast asynchronous Byzantine agreement with optimal resilience. STOC 1993: 42-51
4EEMichael Ben-Or, Ran Canetti, Oded Goldreich: Asynchronous secure computation. STOC 1993: 52-61
3 Ran Canetti, Oded Goldreich: Bounds on Tradeoffs Between Randomness and Communication Complexity. Computational Complexity 3: 141-167 (1993)
1991
2 Ran Canetti, L. Paul Fertig, Saul A. Kravitz, Dalia Malki, Ron Y. Pinter, Sara Porat, Avi Teperman: The parallel C (pC) programming language. IBM Journal of Research and Development 35(5): 727-742 (1991)
1990
1 Ran Canetti, Oded Goldreich: Bounds on Tradeoffs between Randomness and Communication Complexity FOCS 1990: 766-775

Coauthor Index

1William Aiello [40] [55] [63]
2Alain Azagury [52]
3Amotz Bar-Noy [8] [23]
4Boaz Barak [65] [73]
5Mihir Bellare [12] [14] [20]
6Steven M. Bellovin [40] [55] [63]
7Michael Ben-Or [4]
8Matt Blaze [40] [55] [63]
9Dan Boneh [79]
10Pau-Chen Cheng [35]
11Ling Cheung [77] [83] [87] [92]
12Waseem Daher [93]
13Ronny Ramzi Dakdouk [89] [91] [96]
14Ivan Damgård [46] [61]
15Yevgeniy Dodis [37] [81]
16Cynthia Dwork [17]
17Stefan Dziembowski [46] [61]
18Dror Eiger [88]
19Guy Even [7]
20Michael Factor [52]
21Uriel Feige [11]
22L. Paul Fertig [2]
23Marc Fischlin [48]
24Juan A. Garay [26]
25Rosario Gennaro [13] [29]
26Frederique Giraud [35]
27Oded Goldreich [1] [3] [4] [7] [11] [21] [24] [33] [34] [62] [64]
28Shafi Goldwasser [24] [27] [34] [88]
29Joshua D. Guttman [47]
30Shai Halevi [16] [21] [30] [33] [37] [52] [57] [62] [64] [66] [70] [71] [72] [78] [79] [80]
31Ealan Henis [52]
32Amir Herzberg [6] [16] [30]
33Jonathan Herzog [76]
34Susan Hohenberger [86]
35John Ioannidis [40] [55] [63]
36Sandy Irani [9] [19]
37Yuval Ishai [42] [46] [61]
38Gene Itkis [26]
39Stanislaw Jarecki [29]
40Paul A. Karger [58]
41Jonathan Katz [57] [66] [71] [72] [79] [80]
42Dilsun Kirli Kaynar [77] [83] [87] [92]
43Angelos D. Keromytis [40] [55] [63]
44Joe Kilian [38] [41] [49]
45Saul A. Kravitz [2]
46Hugo Krawczyk [12] [14] [20] [29] [45] [53] [54] [58] [59]
47Ravi Kumar (S. Ravi Kumar) [42]
48Eyal Kushilevitz [15] [32] [37] [56] [75]
49Shay Kutten [8] [23]
50Dah-Yoh Lim [88]
51Yehuda Lindell (Andrew Y. Lindell) [50] [56] [72] [73] [75]
52Moses Liskov [77] [87]
53Nancy A. Lynch [77] [83] [87] [92]
54Philip D. MacKenzie [72]
55Dahlia Malkhi (Dalia Malki) [2]
56Tal Malkin [28] [46] [61]
57Yishay Mansour [8] [23]
58Catherine Meadows [51]
59Silvio Micali [24] [34]
60Daniele Micciancio [22] [26]
61Dalit Naor [52]
62Moni Naor [11] [17] [26]
63Jesper Buus Nielsen [59] [65]
64Kobbi Nissim [28]
65Rafail Ostrovsky [15] [17] [25] [32] [50]
66Rafael Pass [65] [73] [81] [82]
67Dimitrios E. Pendarakis [35]
68Olivier Pereira [77] [83] [87] [92]
69Adrian Perrig [36] [43]
70Erez Petrank [38] [41] [49]
71Benny Pinkas [26]
72Ron Y. Pinter [2]
73Sara Porat [2]
74Tal Rabin [5] [29] [58] [60] [73]
75Josyula R. Rao [35]
76Omer Reingold [22] [40] [55] [63]
77Michael K. Reiter [42]
78Noam Rinetzky [52]
79Ronald L. Rivest [84]
80Ohad Rodeh [52]
81Pankaj Rohatgi [35]
82Adi Rosén [15] [32]
83Alon Rosen [38] [41] [49]
84Ronitt Rubinfeld [42]
85Debanjan Saha [35]
86Amit Sahai [37] [50]
87Julian Satran [52]
88Andre Scedrov [47]
89Helmut Scherzer [58]
90Baruch Schieber [8] [23]
91Roberto Segala [77] [87]
92Abhi Shelat [82]
93Dawn Xiaodong Song [36] [43]
94Michael Steiner [70] [78]
95Madhu Sudan [84]
96Paul F. Syverson [51]
97Avi Teperman [2]
98David C. Toll [58]
99Luca Trevisan [84]
100J. Doug Tygar (J. D. Tygar) [36] [43]
101Salil P. Vadhan [84]
102Mayank Varia [95]
103David Wagner [47]
104Michael Waidner [47]
105Shabsi Walfish [81]
106Hoeteck Wee [84]
107Rebecca N. Wright [42]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)