Craig Gentry

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

30EECraig Gentry, Brent Waters: Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts). EUROCRYPT 2009: 171-188
29EECraig Gentry, Shai Halevi: Hierarchical Identity Based Encryption with Polynomially Many Levels. TCC 2009: 437-456
28EECraig Gentry, Chris Peikert, Vinod Vaikuntanathan: Trapdoors for hard lattices and new cryptographic constructions. STOC 2008: 197-206
27EEAlexandra Boldyreva, Craig Gentry, Adam O'Neill, Dae Hyun Yum: New Multiparty Signature Schemes for Network Routing Applications. ACM Trans. Inf. Syst. Secur. 12(1): (2008)
26EEAlexandra Boldyreva, Craig Gentry, Adam O'Neill, Dae Hyun Yum: Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing. ACM Conference on Computer and Communications Security 2007: 276-285
25EEDan Boneh, Craig Gentry, Michael Hamburg: Space-Efficient Identity Based Encryption Without Pairings. FOCS 2007: 647-657
24EECraig Gentry, Chris Peikert, Vinod Vaikuntanathan: Trapdoors for Hard Lattices and New Cryptographic Constructions. Electronic Colloquium on Computational Complexity (ECCC) 14(133): (2007)
23EECraig Gentry, Philip D. MacKenzie, Zulfikar Ramzan: A Method for Making Password-Based Key Exchange Resilient to Server Compromise. CRYPTO 2006: 142-159
22EECraig Gentry: Practical Identity-Based Encryption Without Random Oracles. EUROCRYPT 2006: 445-464
21EECraig Gentry, Zulfikar Ramzan, David P. Woodruff: Explicit Exclusive Set Systems with Applications to Broadcast Encryption. FOCS 2006: 27-38
20EEJames Kempf, Jonathan Wood, Zulfikar Ramzan, Craig Gentry: IP Address Authorization for Secure Address Proxying Using Multi-key CGAs and Ring Signatures. IWSEC 2006: 196-211
19EECraig Gentry, Zulfikar Ramzan: Identity-Based Aggregate Signatures. Public Key Cryptography 2006: 257-273
18EECraig Gentry, Philip D. MacKenzie, Zulfikar Ramzan: Password authenticated key exchange using hidden smooth subgroups. ACM Conference on Computer and Communications Security 2005: 299-309
17EECraig Gentry, Zulfikar Ramzan, Stuart G. Stubblebine: Secure distributed human computation. ACM Conference on Electronic Commerce 2005: 155-164
16EECraig Gentry, David Molnar, Zulfikar Ramzan: Efficient Designated Confirmer Signatures Without Random Oracles or General Zero-Knowledge Proofs. ASIACRYPT 2005: 662-681
15EEDan Boneh, Craig Gentry, Brent Waters: Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. CRYPTO 2005: 258-275
14EECraig Gentry, Zulfikar Ramzan, Stuart G. Stubblebine: Secure Distributed Human Computation. Financial Cryptography 2005: 328-332
13EECraig Gentry, Zulfikar Ramzan: Single-Database Private Information Retrieval with Constant Communication Rate. ICALP 2005: 803-815
12EECraig Gentry, Alejandro Hevia, Ravi Jain, Toshiro Kawahara, Zulfikar Ramzan: End-to-end security in the presence of intelligent data adapting proxies: the case of authenticating transcoded streaming media. IEEE Journal on Selected Areas in Communications 23(2): 464-473 (2005)
11EECraig Gentry, Zulfikar Ramzan: Eliminating Random Permutation Oracles in the Even-Mansour Cipher. ASIACRYPT 2004: 32-47
10EECraig Gentry: How to Compress Rabin Ciphertexts and Signatures (and More). CRYPTO 2004: 179-200
9EECraig Gentry, Zulfikar Ramzan: Microcredits for Verifiable Foreign Service Provider Metering. Financial Cryptography 2004: 9-23
8EECraig Gentry, Zulfikar Ramzan: RSA Accumulator Based Broadcast Encryption. ISC 2004: 73-86
7EEFarid F. Elwailly, Craig Gentry, Zulfikar Ramzan: QuasiModo: Efficient Certificate Validation and Revocation. Public Key Cryptography 2004: 375-388
6EECraig Gentry: Certificate-Based Encryption and the Certificate Revocation Problem. EUROCRYPT 2003: 272-293
5EEDan Boneh, Craig Gentry, Ben Lynn, Hovav Shacham: Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. EUROCRYPT 2003: 416-432
4EECraig Gentry, Alice Silverberg: Hierarchical ID-Based Cryptography. ASIACRYPT 2002: 548-566
3EECraig Gentry, Michael Szydlo: Cryptanalysis of the Revised NTRU Signature Scheme. EUROCRYPT 2002: 299-320
2EECraig Gentry, Jakob Jonsson, Jacques Stern, Michael Szydlo: Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001. ASIACRYPT 2001: 1-20
1EECraig Gentry: Key Recovery and Message Attacks on NTRU-Composite. EUROCRYPT 2001: 182-194

Coauthor Index

1Alexandra Boldyreva [26] [27]
2Dan Boneh [5] [15] [25]
3Farid F. Elwailly [7]
4Shai Halevi [29]
5Michael Hamburg [25]
6Alejandro Hevia [12]
7Ravi Jain [12]
8Jakob Jonsson [2]
9Toshiro Kawahara [12]
10James Kempf [20]
11Ben Lynn [5]
12Philip D. MacKenzie [18] [23]
13David Molnar [16]
14Adam O'Neill [26] [27]
15Chris Peikert [24] [28]
16Zulfikar Ramzan [7] [8] [9] [11] [12] [13] [14] [16] [17] [18] [19] [20] [21] [23]
17Hovav Shacham [5]
18Alice Silverberg [4]
19Jacques Stern [2]
20Stuart G. Stubblebine [14] [17]
21Michael Szydlo [2] [3]
22Vinod Vaikuntanathan (V. Vinod) [24] [28]
23Brent Waters (Brent R. Waters) [15] [30]
24Jonathan Wood [20]
25David P. Woodruff [21]
26Dae Hyun Yum [26] [27]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)