2009 |
22 | EE | Giuseppe Ateniese,
Karyn Benson,
Susan Hohenberger:
Key-Private Proxy Re-encryption.
CT-RSA 2009: 279-294 |
21 | EE | Anna Lisa Ferrara,
Matthew Green,
Susan Hohenberger,
Michael Østergaard Pedersen:
Practical Short Signature Batch Verification.
CT-RSA 2009: 309-324 |
20 | EE | Susan Hohenberger,
Brent Waters:
Realizing Hash-and-Sign Signatures under Standard Assumptions.
EUROCRYPT 2009: 333-350 |
19 | EE | Scott E. Coull,
Matthew Green,
Susan Hohenberger:
Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials.
Public Key Cryptography 2009: 501-520 |
2008 |
18 | EE | Matthew Green,
Susan Hohenberger:
Universally Composable Adaptive Oblivious Transfer.
ASIACRYPT 2008: 179-197 |
2007 |
17 | EE | Ran Canetti,
Susan Hohenberger:
Chosen-ciphertext secure proxy re-encryption.
ACM Conference on Computer and Communications Security 2007: 185-194 |
16 | EE | Matthew Green,
Susan Hohenberger:
Blind Identity-Based Encryption and Simulatable Oblivious Transfer.
ASIACRYPT 2007: 265-282 |
15 | EE | David Goldenberg,
Susan Hohenberger,
Moses Liskov,
Elizabeth Crump Schwartz,
Hakan Seyalioglu:
On Tweaking Luby-Rackoff Blockciphers.
ASIACRYPT 2007: 342-356 |
14 | EE | Jan Camenisch,
Susan Hohenberger,
Michael Østergaard Pedersen:
Batch Verification of Short Signatures.
EUROCRYPT 2007: 246-263 |
13 | EE | Susan Hohenberger,
Guy N. Rothblum,
Abhi Shelat,
Vinod Vaikuntanathan:
Securely Obfuscating Re-encryption.
TCC 2007: 233-252 |
2006 |
12 | EE | Jan Camenisch,
Susan Hohenberger,
Markulf Kohlweiss,
Anna Lysyanskaya,
Mira Meyerovich:
How to win the clonewars: efficient periodic n-times anonymous authentication.
ACM Conference on Computer and Communications Security 2006: 201-210 |
11 | EE | Susan Hohenberger,
Stephen A. Weis:
Honest-Verifier Private Disjointness Testing Without Random Oracles.
Privacy Enhancing Technologies 2006: 277-294 |
10 | EE | Jan Camenisch,
Susan Hohenberger,
Anna Lysyanskaya:
Balancing Accountability and Privacy Using E-Cash (Extended Abstract).
SCN 2006: 141-155 |
9 | EE | Ben Adida,
David Chaum,
Susan Hohenberger,
Ronald L. Rivest:
Lightweight Email Signatures (Extended Abstract).
SCN 2006: 288-302 |
8 | EE | Giuseppe Ateniese,
Kevin Fu,
Matthew Green,
Susan Hohenberger:
Improved proxy re-encryption schemes with applications to secure distributed storage.
ACM Trans. Inf. Syst. Secur. 9(1): 1-30 (2006) |
2005 |
7 | EE | Giuseppe Ateniese,
Susan Hohenberger:
Proxy re-signatures: new definitions, algorithms, and applications.
ACM Conference on Computer and Communications Security 2005: 310-319 |
6 | EE | Jan Camenisch,
Susan Hohenberger,
Anna Lysyanskaya:
Compact E-Cash.
EUROCRYPT 2005: 302-321 |
5 | EE | Giuseppe Ateniese,
Kevin Fu,
Matthew Green,
Susan Hohenberger:
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage.
NDSS 2005 |
4 | EE | Susan Hohenberger,
Anna Lysyanskaya:
How to Securely Outsource Cryptographic Computations.
TCC 2005: 264-282 |
2004 |
3 | EE | Ron Breukelaar,
Erik D. Demaine,
Susan Hohenberger,
Hendrik Jan Hoogeboom,
Walter A. Kosters,
David Liben-Nowell:
Tetris is hard, even to approximate.
Int. J. Comput. Geometry Appl. 14(1-2): 41-68 (2004) |
2003 |
2 | EE | Erik D. Demaine,
Susan Hohenberger,
David Liben-Nowell:
Tetris is Hard, Even to Approximate.
COCOON 2003: 351-363 |
2002 |
1 | EE | Erik D. Demaine,
Susan Hohenberger,
David Liben-Nowell:
Tetris is Hard, Even to Approximate
CoRR cs.CC/0210020: (2002) |