dblp.uni-trier.dewww.uni-trier.de

Stanislaw Jarecki

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
41EEStanislaw Jarecki, Gene Tsudik: Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings Springer 2009
40EEStanislaw Jarecki, Xiaomin Liu: Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection. TCC 2009: 577-594
2008
39EEAli Bagherzandi, Jung Hee Cheon, Stanislaw Jarecki: Multisignatures secure under the discrete logarithm assumption and a generalized forking lemma. ACM Conference on Computer and Communications Security 2008: 449-458
38EEStanislaw Jarecki, Jihye Kim, Gene Tsudik: Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange. CT-RSA 2008: 352-369
37EEStanislaw Jarecki, Josh Olsen: Proactive RSA with Non-interactive Signing. Financial Cryptography 2008: 215-230
36EEStanislaw Jarecki, Xiaomin Liu: Affiliation-Hiding Envelope and Authentication Schemes with Efficient Support for Multiple Credentials. ICALP (2) 2008: 715-726
35EEAli Bagherzandi, Stanislaw Jarecki: Multisignatures Using Proofs of Secret Key Possession, as Secure as the Diffie-Hellman Problem. SCN 2008: 218-235
2007
34EEStanislaw Jarecki, Jihye Kim, Gene Tsudik: Robust group key agreement using short broadcasts. ACM Conference on Computer and Communications Security 2007: 411-420
33EEStanislaw Jarecki, Xiaomin Liu: Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes. ACNS 2007: 270-287
32EEStanislaw Jarecki, Jihye Kim, Gene Tsudik: Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement. CT-RSA 2007: 287-308
31EEStanislaw Jarecki, Vitaly Shmatikov: Efficient Two-Party Secure Computation on Committed Inputs. EUROCRYPT 2007: 97-114
30EEMichael Sirivianos, Jong Han Park, Xiaowei Yang, Stanislaw Jarecki: Dandelion: Cooperative Content Distribution with Robust Incentives. USENIX Annual Technical Conference 2007: 157-170
29EERosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin: Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. J. Cryptology 20(1): 51-83 (2007)
28EERosario Gennaro, Tal Rabin, Stanislaw Jarecki, Hugo Krawczyk: Robust and Efficient Sharing of RSA Functions. J. Cryptology 20(3): 393 (2007)
27EEEu-Jin Goh, Stanislaw Jarecki, Jonathan Katz, Nan Wang: Efficient Signature Schemes with Tight Reductions to the Diffie-Hellman Problems. J. Cryptology 20(4): 493-514 (2007)
2006
26EEStanislaw Jarecki, Jihye Kim, Gene Tsudik: Authentication for Paranoids: Multi-party Secret Handshakes. ACNS 2006: 325-339
25EEClaude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik: Secure acknowledgment aggregation and multisignatures with limited robustness. Computer Networks 50(10): 1639-1652 (2006)
2005
24EEStanislaw Jarecki, Vitaly Shmatikov: Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure. Financial Cryptography 2005: 172-187
23EEStanislaw Jarecki, Nitesh Saxena: Further Simplifications in Proactive RSA Signatures. TCC 2005: 510-528
2004
22EEYevgeniy Dodis, Michael J. Freedman, Stanislaw Jarecki, Shabsi Walfish: Versatile padding schemes for joint signature and encryption. ACM Conference on Computer and Communications Security 2004: 344-353
21EEClaude Castelluccia, Stanislaw Jarecki, Gene Tsudik: Secret Handshakes from CA-Oblivious Encryption. ASIACRYPT 2004: 293-307
20EEStanislaw Jarecki, Vitaly Shmatikov: Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme. EUROCRYPT 2004: 590-608
19EEClaude Castelluccia, Stanislaw Jarecki, Gene Tsudik: Brief announcement: secret handshakes from CA-oblivious encryption. PODC 2004: 394
18EEStanislaw Jarecki, Nitesh Saxena, Jeong Hyun Yi: An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol. SASN 2004: 1-9
17EEClaude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik: A Robust Multisignatures Scheme with Applications to Acknowledgment Aggregation. SCN 2004: 193-207
2003
16EERosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin: Secure Applications of Pedersen's Distributed Key Generation Protocol. CT-RSA 2003: 373-390
15EEEu-Jin Goh, Stanislaw Jarecki: A Signature Scheme as Secure as the Diffie-Hellman Problem. EUROCRYPT 2003: 401-415
2002
14EEPhilippe Golle, Stanislaw Jarecki, Ilya Mironov: Cryptographic Primitives Enforcing Communication and Storage Complexity. Financial Cryptography 2002: 120-135
13EEStanislaw Jarecki, Patrick Lincoln, Vitaly Shmatikov: Negotiated Privacy: (Extended Abstract). ISSS 2002: 96-111
2001
12 Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin: Robust Threshold DSS Signatures. Inf. Comput. 164(1): 54-84 (2001)
2000
11EEStanislaw Jarecki, Anna Lysyanskaya: Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures. EUROCRYPT 2000: 221-242
10EERosario Gennaro, Tal Rabin, Stanislaw Jarecki, Hugo Krawczyk: Robust and Efficient Sharing of RSA Functions. J. Cryptology 13(2): 273-300 (2000)
1999
9EERan Canetti, Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin: Adaptive Security for Threshold Cryptosystems. CRYPTO 1999: 98-115
8EERosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin: Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. EUROCRYPT 1999: 295-310
1997
7EEAmir Herzberg, Markus Jakobsson, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung: Proactive Public Key and Signature Systems. ACM Conference on Computer and Communications Security 1997: 100-110
6 Stanislaw Jarecki, Andrew M. Odlyzko: An Efficient Micropayment System Based on Probabilistic Polling. Financial Cryptography 1997: 173-192
1996
5EERosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin: Robust and Efficient Sharing of RSA Functions. CRYPTO 1996: 157-172
4EERosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin: Robust Threshold DSS Signatures. EUROCRYPT 1996: 354-371
1995
3EEAmir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung: Proactive Secret Sharing Or: How to Cope With Perpetual Leakage. CRYPTO 1995: 339-352
2EEWlodek Zadrozny, Marcin Szummer, Stanislaw Jarecki, David E. Johnson, Leora Morgenstern: NL Understanding with a Grammar of Constructions CoRR cmp-lg/9501002: (1995)
1994
1EEWlodek Zadrozny, Marcin Szummer, Stanislaw Jarecki, David E. Johnson, Leora Morgenstern: NL Understanding with a Grammar of Constructions. COLING 1994: 1289-1293

Coauthor Index

1Ali Bagherzandi [35] [39]
2Ran Canetti [9]
3Claude Castelluccia [17] [19] [21] [25]
4Jung Hee Cheon [39]
5Yevgeniy Dodis [22]
6Michael J. Freedman [22]
7Rosario Gennaro [4] [5] [8] [9] [10] [12] [16] [28] [29]
8Eu-Jin Goh [15] [27]
9Philippe Golle [14]
10Amir Herzberg [3] [7]
11Markus Jakobsson [7]
12David E. Johnson [1] [2]
13Jonathan Katz [27]
14Jihye Kim [17] [25] [26] [32] [34] [38]
15Hugo Krawczyk [3] [4] [5] [7] [8] [9] [10] [12] [16] [28] [29]
16Patrick Lincoln [13]
17Xiaomin Liu [33] [36] [40]
18Anna Lysyanskaya [11]
19Ilya Mironov [14]
20Leora Morgenstern [1] [2]
21Andrew M. Odlyzko [6]
22Josh Olsen [37]
23Jong Han Park [30]
24Tal Rabin [4] [5] [8] [9] [10] [12] [16] [28] [29]
25Nitesh Saxena [18] [23]
26Vitaly Shmatikov [13] [20] [24] [31]
27Michael Sirivianos [30]
28Marcin Szummer [1] [2]
29Gene Tsudik [17] [19] [21] [25] [26] [32] [34] [38] [41]
30Shabsi Walfish [22]
31Nan Wang [27]
32Xiaowei Yang [30]
33Jeong Hyun Yi [18]
34Moti Yung (Mordechai M. Yung) [3] [7]
35Wlodek Zadrozny [1] [2]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)