2009 |
30 | EE | Craig Gentry,
Brent Waters:
Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts).
EUROCRYPT 2009: 171-188 |
29 | EE | Craig Gentry,
Shai Halevi:
Hierarchical Identity Based Encryption with Polynomially Many Levels.
TCC 2009: 437-456 |
2008 |
28 | EE | Craig Gentry,
Chris Peikert,
Vinod Vaikuntanathan:
Trapdoors for hard lattices and new cryptographic constructions.
STOC 2008: 197-206 |
27 | EE | Alexandra Boldyreva,
Craig Gentry,
Adam O'Neill,
Dae Hyun Yum:
New Multiparty Signature Schemes for Network Routing Applications.
ACM Trans. Inf. Syst. Secur. 12(1): (2008) |
2007 |
26 | EE | Alexandra Boldyreva,
Craig Gentry,
Adam O'Neill,
Dae Hyun Yum:
Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing.
ACM Conference on Computer and Communications Security 2007: 276-285 |
25 | EE | Dan Boneh,
Craig Gentry,
Michael Hamburg:
Space-Efficient Identity Based Encryption Without Pairings.
FOCS 2007: 647-657 |
24 | EE | Craig Gentry,
Chris Peikert,
Vinod Vaikuntanathan:
Trapdoors for Hard Lattices and New Cryptographic Constructions.
Electronic Colloquium on Computational Complexity (ECCC) 14(133): (2007) |
2006 |
23 | EE | Craig Gentry,
Philip D. MacKenzie,
Zulfikar Ramzan:
A Method for Making Password-Based Key Exchange Resilient to Server Compromise.
CRYPTO 2006: 142-159 |
22 | EE | Craig Gentry:
Practical Identity-Based Encryption Without Random Oracles.
EUROCRYPT 2006: 445-464 |
21 | EE | Craig Gentry,
Zulfikar Ramzan,
David P. Woodruff:
Explicit Exclusive Set Systems with Applications to Broadcast Encryption.
FOCS 2006: 27-38 |
20 | EE | James Kempf,
Jonathan Wood,
Zulfikar Ramzan,
Craig Gentry:
IP Address Authorization for Secure Address Proxying Using Multi-key CGAs and Ring Signatures.
IWSEC 2006: 196-211 |
19 | EE | Craig Gentry,
Zulfikar Ramzan:
Identity-Based Aggregate Signatures.
Public Key Cryptography 2006: 257-273 |
2005 |
18 | EE | Craig Gentry,
Philip D. MacKenzie,
Zulfikar Ramzan:
Password authenticated key exchange using hidden smooth subgroups.
ACM Conference on Computer and Communications Security 2005: 299-309 |
17 | EE | Craig Gentry,
Zulfikar Ramzan,
Stuart G. Stubblebine:
Secure distributed human computation.
ACM Conference on Electronic Commerce 2005: 155-164 |
16 | EE | Craig Gentry,
David Molnar,
Zulfikar Ramzan:
Efficient Designated Confirmer Signatures Without Random Oracles or General Zero-Knowledge Proofs.
ASIACRYPT 2005: 662-681 |
15 | EE | Dan Boneh,
Craig Gentry,
Brent Waters:
Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys.
CRYPTO 2005: 258-275 |
14 | EE | Craig Gentry,
Zulfikar Ramzan,
Stuart G. Stubblebine:
Secure Distributed Human Computation.
Financial Cryptography 2005: 328-332 |
13 | EE | Craig Gentry,
Zulfikar Ramzan:
Single-Database Private Information Retrieval with Constant Communication Rate.
ICALP 2005: 803-815 |
12 | EE | Craig Gentry,
Alejandro Hevia,
Ravi Jain,
Toshiro Kawahara,
Zulfikar Ramzan:
End-to-end security in the presence of intelligent data adapting proxies: the case of authenticating transcoded streaming media.
IEEE Journal on Selected Areas in Communications 23(2): 464-473 (2005) |
2004 |
11 | EE | Craig Gentry,
Zulfikar Ramzan:
Eliminating Random Permutation Oracles in the Even-Mansour Cipher.
ASIACRYPT 2004: 32-47 |
10 | EE | Craig Gentry:
How to Compress Rabin Ciphertexts and Signatures (and More).
CRYPTO 2004: 179-200 |
9 | EE | Craig Gentry,
Zulfikar Ramzan:
Microcredits for Verifiable Foreign Service Provider Metering.
Financial Cryptography 2004: 9-23 |
8 | EE | Craig Gentry,
Zulfikar Ramzan:
RSA Accumulator Based Broadcast Encryption.
ISC 2004: 73-86 |
7 | EE | Farid F. Elwailly,
Craig Gentry,
Zulfikar Ramzan:
QuasiModo: Efficient Certificate Validation and Revocation.
Public Key Cryptography 2004: 375-388 |
2003 |
6 | EE | Craig Gentry:
Certificate-Based Encryption and the Certificate Revocation Problem.
EUROCRYPT 2003: 272-293 |
5 | EE | Dan Boneh,
Craig Gentry,
Ben Lynn,
Hovav Shacham:
Aggregate and Verifiably Encrypted Signatures from Bilinear Maps.
EUROCRYPT 2003: 416-432 |
2002 |
4 | EE | Craig Gentry,
Alice Silverberg:
Hierarchical ID-Based Cryptography.
ASIACRYPT 2002: 548-566 |
3 | EE | Craig Gentry,
Michael Szydlo:
Cryptanalysis of the Revised NTRU Signature Scheme.
EUROCRYPT 2002: 299-320 |
2001 |
2 | EE | Craig Gentry,
Jakob Jonsson,
Jacques Stern,
Michael Szydlo:
Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001.
ASIACRYPT 2001: 1-20 |
1 | EE | Craig Gentry:
Key Recovery and Message Attacks on NTRU-Composite.
EUROCRYPT 2001: 182-194 |