2009 | ||
---|---|---|
96 | EE | Ran Canetti, Ronny Ramzi Dakdouk: Towards a Theory of Extractable Functions. TCC 2009: 595-613 |
95 | EE | Ran Canetti, Mayank Varia: Non-malleable Obfuscation. TCC 2009: 73-90 |
2008 | ||
94 | Ran Canetti: Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Springer 2008 | |
93 | EE | Waseem Daher, Ran Canetti: POSH: a generalized captcha with security applications. AISec 2008: 1-10 |
92 | EE | Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nancy A. Lynch, Olivier Pereira: Modeling Computational Security in Long-Lived Systems. CONCUR 2008: 114-130 |
91 | EE | Ran Canetti, Ronny Ramzi Dakdouk: Obfuscating Point Functions with Multibit Output. EUROCRYPT 2008: 489-508 |
90 | EE | Ran Canetti: Composable Formal Security Analysis: Juggling Soundness, Simplicity and Efficiency. ICALP (2) 2008: 1-13 |
89 | EE | Ran Canetti, Ronny Ramzi Dakdouk: Extractable Perfectly One-Way Functions. ICALP (2) 2008: 449-460 |
88 | EE | Ran Canetti, Dror Eiger, Shafi Goldwasser, Dah-Yoh Lim: How to Protect Yourself without Perfect Shredding. ICALP (2) 2008: 511-523 |
87 | EE | Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Moses Liskov, Nancy A. Lynch, Olivier Pereira, Roberto Segala: Analyzing Security Protocols Using Time-Bounded Task-PIOAs. Discrete Event Dynamic Systems 18(1): 111-159 (2008) |
2007 | ||
86 | EE | Ran Canetti, Susan Hohenberger: Chosen-ciphertext secure proxy re-encryption. ACM Conference on Computer and Communications Security 2007: 185-194 |
85 | EE | Ran Canetti: Obtaining Universally Compoable Security: Towards the Bare Bones of Trust. ASIACRYPT 2007: 88-112 |
84 | EE | Ran Canetti, Ronald L. Rivest, Madhu Sudan, Luca Trevisan, Salil P. Vadhan, Hoeteck Wee: Amplifying Collision Resistance: A Complexity-Theoretic Treatment. CRYPTO 2007: 264-283 |
83 | EE | Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nancy A. Lynch, Olivier Pereira: Compositional Security for Task-PIOAs. CSF 2007: 125-139 |
82 | EE | Ran Canetti, Rafael Pass, Abhi Shelat: Cryptography from Sunspots: How to Use an Imperfect Reference String. FOCS 2007: 249-259 |
81 | EE | Ran Canetti, Yevgeniy Dodis, Rafael Pass, Shabsi Walfish: Universally Composable Security with Global Setup. TCC 2007: 61-85 |
80 | EE | Ran Canetti, Shai Halevi, Jonathan Katz: A Forward-Secure Public-Key Encryption Scheme. J. Cryptology 20(3): 265-294 (2007) |
79 | EE | Dan Boneh, Ran Canetti, Shai Halevi, Jonathan Katz: Chosen-Ciphertext Security from Identity-Based Encryption. SIAM J. Comput. 36(5): 1301-1328 (2007) |
2006 | ||
78 | EE | Ran Canetti, Shai Halevi, Michael Steiner: Mitigating Dictionary Attacks on Password-Protected Local Storage. CRYPTO 2006: 160-179 |
77 | EE | Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Moses Liskov, Nancy A. Lynch, Olivier Pereira, Roberto Segala: Time-Bounded Task-PIOAs: A Framework for Analyzing Security Protocols. DISC 2006: 238-253 |
76 | EE | Ran Canetti, Jonathan Herzog: Universally Composable Symbolic Analysis of Mutual Authentication and Key-Exchange Protocols. TCC 2006: 380-403 |
75 | EE | Ran Canetti, Eyal Kushilevitz, Yehuda Lindell: On the Limitations of Universally Composable Two-Party Computation Without Set-Up Assumptions. J. Cryptology 19(2): 135-167 (2006) |
74 | EE | Ran Canetti: Security and composition of cryptographic protocols: a tutorial (part I). SIGACT News 37(3): 67-92 (2006) |
2005 | ||
73 | EE | Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pass, Tal Rabin: Secure Computation Without Authentication. CRYPTO 2005: 361-377 |
72 | EE | Ran Canetti, Shai Halevi, Jonathan Katz, Yehuda Lindell, Philip D. MacKenzie: Universally Composable Password-Based Key Exchange. EUROCRYPT 2005: 404-421 |
71 | EE | Ran Canetti, Shai Halevi, Jonathan Katz: Adaptively-Secure, Non-interactive Public-Key Encryption. TCC 2005: 150-168 |
70 | EE | Ran Canetti, Shai Halevi, Michael Steiner: Hardness Amplification of Weakly Verifiable Puzzles. TCC 2005: 17-33 |
69 | EE | Ran Canetti: Decisional Diffie-Hellman Assumption. Encyclopedia of Cryptography and Security 2005 |
68 | EE | Ran Canetti: Preface. J. Cryptology 18(3): 187-189 (2005) |
2004 | ||
67 | EE | Ran Canetti: Universally Composable Signature, Certification, and Authentication. CSFW 2004: 219- |
66 | EE | Ran Canetti, Shai Halevi, Jonathan Katz: Chosen-Ciphertext Security from Identity-Based Encryption. EUROCRYPT 2004: 207-222 |
65 | EE | Boaz Barak, Ran Canetti, Jesper Buus Nielsen, Rafael Pass: Universally Composable Protocols with Relaxed Set-Up Assumptions. FOCS 2004: 186-195 |
64 | EE | Ran Canetti, Oded Goldreich, Shai Halevi: On the Random-Oracle Methodology as Applied to Length-Restricted Signature Schemes. TCC 2004: 40-57 |
63 | EE | William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold: Just fast keying: Key agreement in a hostile internet. ACM Trans. Inf. Syst. Secur. 7(2): 242-273 (2004) |
62 | EE | Ran Canetti, Oded Goldreich, Shai Halevi: The random oracle methodology, revisited. J. ACM 51(4): 557-594 (2004) |
61 | EE | Ran Canetti, Ivan Damgård, Stefan Dziembowski, Yuval Ishai, Tal Malkin: Adaptive versus Non-Adaptive Security of Multi-Party Protocols. J. Cryptology 17(3): 153-207 (2004) |
2003 | ||
60 | EE | Ran Canetti, Tal Rabin: Universal Composition with Joint State. CRYPTO 2003: 265-281 |
59 | EE | Ran Canetti, Hugo Krawczyk, Jesper Buus Nielsen: Relaxing Chosen-Ciphertext Security. CRYPTO 2003: 565-582 |
58 | EE | Helmut Scherzer, Ran Canetti, Paul A. Karger, Hugo Krawczyk, Tal Rabin, David C. Toll: Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card. ESORICS 2003: 181-200 |
57 | EE | Ran Canetti, Shai Halevi, Jonathan Katz: A Forward-Secure Public-Key Encryption Scheme. EUROCRYPT 2003: 255-271 |
56 | EE | Ran Canetti, Eyal Kushilevitz, Yehuda Lindell: On the Limitations of Universally Composable Two-Party Computation without Set-up Assumptions. EUROCRYPT 2003: 68-86 |
2002 | ||
55 | EE | William Aiello, Steven M. Bellovin, Matt Blaze, John Ioannidis, Omer Reingold, Ran Canetti, Angelos D. Keromytis: Efficient, DoS-resistant, secure key exchange for internet protocols. ACM Conference on Computer and Communications Security 2002: 48-58 |
54 | EE | Ran Canetti, Hugo Krawczyk: Security Analysis of IKE's Signature-Based Key-Exchange Protocol. CRYPTO 2002: 143-161 |
53 | EE | Ran Canetti, Hugo Krawczyk: Universally Composable Notions of Key Exchange and Secure Channels. EUROCRYPT 2002: 337-351 |
52 | EE | Alain Azagury, Ran Canetti, Michael Factor, Shai Halevi, Ealan Henis, Dalit Naor, Noam Rinetzky, Ohad Rodeh, Julian Satran: A Two Layered Approach for Securing an Object Store Network. IEEE Security in Storage Workshop 2002: 10-23 |
51 | EE | Ran Canetti, Catherine Meadows, Paul F. Syverson: Environmental Requirements for Authentication Protocols. ISSS 2002: 339-355 |
50 | EE | Ran Canetti, Yehuda Lindell, Rafail Ostrovsky, Amit Sahai: Universally composable two-party and multi-party secure computation. STOC 2002: 494-503 |
49 | EE | Ran Canetti, Joe Kilian, Erez Petrank, Alon Rosen: Black-Box Concurrent Zero-Knowledge Requires (Almost) Logarithmically Many Rounds. SIAM J. Comput. 32(1): 1-47 (2002) |
2001 | ||
48 | EE | Ran Canetti, Marc Fischlin: Universally Composable Commitments. CRYPTO 2001: 19-40 |
47 | EE | Andre Scedrov, Ran Canetti, Joshua D. Guttman, David Wagner, Michael Waidner: Relating Cryptography and Cryptographic Protocols. CSFW 2001: 111-114 |
46 | EE | Ran Canetti, Ivan Damgård, Stefan Dziembowski, Yuval Ishai, Tal Malkin: On Adaptive vs. Non-adaptive Security of Multiparty Protocols. EUROCRYPT 2001: 262-279 |
45 | EE | Ran Canetti, Hugo Krawczyk: Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. EUROCRYPT 2001: 453-474 |
44 | Ran Canetti: Universally Composable Security: A New Paradigm for Cryptographic Protocols. FOCS 2001: 136-145 | |
43 | EE | Adrian Perrig, Ran Canetti, Dawn Xiaodong Song, J. D. Tygar: Efficient and Secure Source Authentication for Multicast. NDSS 2001 |
42 | EE | Ran Canetti, Yuval Ishai, Ravi Kumar, Michael K. Reiter, Ronitt Rubinfeld, Rebecca N. Wright: Selective private function evaluation with applications to private statistics. PODC 2001: 293-304 |
41 | EE | Ran Canetti, Joe Kilian, Erez Petrank, Alon Rosen: Black-box concurrent zero-knowledge requires Omega~(log n) rounds. STOC 2001: 570-579 |
40 | EE | William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold: Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols. Security Protocols Workshop 2001: 27-39 |
39 | EE | Ran Canetti: A unified framework for analyzing security of protocols Electronic Colloquium on Computational Complexity (ECCC) 8(16): (2001) |
38 | EE | Ran Canetti, Joe Kilian, Erez Petrank, Alon Rosen: Black-Box Concurrent Zero-Knowledge Requires ~Omega(log n) Rounds Electronic Colloquium on Computational Complexity (ECCC) 8(50): (2001) |
2000 | ||
37 | EE | Ran Canetti, Yevgeniy Dodis, Shai Halevi, Eyal Kushilevitz, Amit Sahai: Exposure-Resilient Functions and All-or-Nothing Transforms. EUROCRYPT 2000: 453-469 |
36 | EE | Adrian Perrig, Ran Canetti, J. D. Tygar, Dawn Xiaodong Song: Efficient Authentication and Signing of Multicast Streams over Lossy Channels. IEEE Symposium on Security and Privacy 2000: 56-73 |
35 | EE | Ran Canetti, Pau-Chen Cheng, Frederique Giraud, Dimitrios E. Pendarakis, Josyula R. Rao, Pankaj Rohatgi, Debanjan Saha: An IPSec-based Host Architecture for Secure Internet Multicast. NDSS 2000 |
34 | EE | Ran Canetti, Oded Goldreich, Shafi Goldwasser, Silvio Micali: Resettable zero-knowledge (extended abstract). STOC 2000: 235-244 |
33 | EE | Ran Canetti, Oded Goldreich, Shai Halevi: The Random Oracle Methodology, Revisited CoRR cs.CR/0010019: (2000) |
32 | EE | Ran Canetti, Eyal Kushilevitz, Rafail Ostrovsky, Adi Rosén: Randomness versus Fault-Tolerance. J. Cryptology 13(1): 107-142 (2000) |
31 | EE | Ran Canetti: Security and Composition of Multiparty Cryptographic Protocols. J. Cryptology 13(1): 143-202 (2000) |
30 | EE | Ran Canetti, Shai Halevi, Amir Herzberg: Maintaining Authenticated Communication in the Presence of Break-Ins. J. Cryptology 13(1): 61-105 (2000) |
1999 | ||
29 | EE | Ran Canetti, Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin: Adaptive Security for Threshold Cryptosystems. CRYPTO 1999: 98-115 |
28 | EE | Ran Canetti, Tal Malkin, Kobbi Nissim: Efficient Communication-Storage Tradeoffs for Multicast Encryption. EUROCRYPT 1999: 459-474 |
27 | EE | Ran Canetti, Shafi Goldwasser: An Efficient Threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack. EUROCRYPT 1999: 90-106 |
26 | Ran Canetti, Juan A. Garay, Gene Itkis, Daniele Micciancio, Moni Naor, Benny Pinkas: Multicast Security: A Taxonomy and Some Efficient Constructions. INFOCOM 1999: 708-716 | |
25 | EE | Ran Canetti, Rafail Ostrovsky: Secure Computation with Honest-Looking Parties: What If Nobody Is Truly Honest? (Extended Abstract). STOC 1999: 255-264 |
24 | EE | Ran Canetti, Oded Goldreich, Shafi Goldwasser, Silvio Micali: Resettable Zero-Knowledge. Electronic Colloquium on Computational Complexity (ECCC)(42): (1999) |
23 | Amotz Bar-Noy, Ran Canetti, Shay Kutten, Yishay Mansour, Baruch Schieber: Bandwidth Allocation with Preemption. SIAM J. Comput. 28(5): 1806-1828 (1999) | |
1998 | ||
22 | EE | Ran Canetti, Daniele Micciancio, Omer Reingold: Perfectly One-Way Probabilistic Hash Functions (Preliminary Version). STOC 1998: 131-140 |
21 | EE | Ran Canetti, Oded Goldreich, Shai Halevi: The Random Oracle Methodology, Revisited (Preliminary Version). STOC 1998: 209-218 |
20 | EE | Mihir Bellare, Ran Canetti, Hugo Krawczyk: A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols (Extended Abstract). STOC 1998: 419-428 |
19 | EE | Ran Canetti, Sandy Irani: Bounding the Power of Preemption in Randomized Scheduling. SIAM J. Comput. 27(4): 993-1015 (1998) |
1997 | ||
18 | EE | Ran Canetti: Towards Realizing Random Oracles: Hash Functions That Hide All Partial Information. CRYPTO 1997: 455-469 |
17 | EE | Ran Canetti, Cynthia Dwork, Moni Naor, Rafail Ostrovsky: Deniable Encryption. CRYPTO 1997: 90-104 |
16 | Ran Canetti, Shai Halevi, Amir Herzberg: Maintaining Authenticated Communication in the Presence of Break-ins. PODC 1997: 15-24 | |
15 | Ran Canetti, Eyal Kushilevitz, Rafail Ostrovsky, Adi Rosén: Randomness vs. Fault-Tolerance. PODC 1997: 35-44 | |
1996 | ||
14 | EE | Mihir Bellare, Ran Canetti, Hugo Krawczyk: Keying Hash Functions for Message Authentication. CRYPTO 1996: 1-15 |
13 | Ran Canetti, Rosario Gennaro: Incoercible Multiparty Computation (extended abstract). FOCS 1996: 504-513 | |
12 | Mihir Bellare, Ran Canetti, Hugo Krawczyk: Pseudorandom Functions Revisited: The Cascade Construction and Its Concrete Security. FOCS 1996: 514-523 | |
11 | EE | Ran Canetti, Uriel Feige, Oded Goldreich, Moni Naor: Adaptively Secure Multi-Party Computation. STOC 1996: 639-648 |
10 | EE | Ran Canetti: More on BPP and the Polynomial-Time Hierarchy. Inf. Process. Lett. 57(5): 237-241 (1996) |
1995 | ||
9 | EE | Ran Canetti, Sandy Irani: Bounding the power of preemption in randomized scheduling. STOC 1995: 606-615 |
8 | EE | Amotz Bar-Noy, Ran Canetti, Shay Kutten, Yishay Mansour, Baruch Schieber: Bandwidth allocation with preemption. STOC 1995: 616-625 |
7 | EE | Ran Canetti, Guy Even, Oded Goldreich: Lower Bounds for Sampling Algorithms for Estimating the Average. Inf. Process. Lett. 53(1): 17-25 (1995) |
1994 | ||
6 | EE | Ran Canetti, Amir Herzberg: Maintaining Security in the Presence of Transient Faults. CRYPTO 1994: 425-438 |
1993 | ||
5 | EE | Ran Canetti, Tal Rabin: Fast asynchronous Byzantine agreement with optimal resilience. STOC 1993: 42-51 |
4 | EE | Michael Ben-Or, Ran Canetti, Oded Goldreich: Asynchronous secure computation. STOC 1993: 52-61 |
3 | Ran Canetti, Oded Goldreich: Bounds on Tradeoffs Between Randomness and Communication Complexity. Computational Complexity 3: 141-167 (1993) | |
1991 | ||
2 | Ran Canetti, L. Paul Fertig, Saul A. Kravitz, Dalia Malki, Ron Y. Pinter, Sara Porat, Avi Teperman: The parallel C (pC) programming language. IBM Journal of Research and Development 35(5): 727-742 (1991) | |
1990 | ||
1 | Ran Canetti, Oded Goldreich: Bounds on Tradeoffs between Randomness and Communication Complexity FOCS 1990: 766-775 |