dblp.uni-trier.dewww.uni-trier.de

Jonathan Katz

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
81EEDan Boneh, David Freeman, Jonathan Katz, Brent Waters: Signing a Linear Subspace: Signature Schemes for Network Coding. Public Key Cryptography 2009: 68-87
80EEYevgeniy Dodis, Jonathan Katz, Adam Smith, Shabsi Walfish: Composability and On-Line Deniability of Authentication. TCC 2009: 146-162
79EES. Dov Gordon, Jonathan Katz: Complete Fairness in Multi-party Computation without an Honest Majority. TCC 2009: 19-35
78EEJonathan Katz, Chiu-Yuen Koo: On expected constant-round protocols for Byzantine agreement. J. Comput. Syst. Sci. 75(2): 91-112 (2009)
77EEAdam Bender, Jonathan Katz, Ruggero Morselli: Ring Signatures: Stronger Definitions, and Constructions without Random Oracles. J. Cryptology 22(1): 114-138 (2009)
76EEIftach Haitner, Omer Horvitz, Jonathan Katz, Chiu-Yuen Koo, Ruggero Morselli, Ronen Shaltiel: Reducing Complexity Assumptions for Statistically-Hiding Commitment. J. Cryptology 22(3): 283-310 (2009)
2008
75EEJonathan Katz, Andrew Y. Lindell: Aggregate Message Authentication Codes. CT-RSA 2008: 155-169
74EEJonathan Katz, Amit Sahai, Brent Waters: Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products. EUROCRYPT 2008: 146-162
73EESeny Kamara, Jonathan Katz: How to Encrypt with a Malicious Random Number Generator. FSE 2008: 303-315
72EEJonathan Katz, Chiu-Yuen Koo, Ranjit Kumaresan: Improving the Round Complexity of VSS in Point-to-Point Networks. ICALP (2) 2008: 499-510
71EES. Dov Gordon, Carmit Hazay, Jonathan Katz, Yehuda Lindell: Complete fairness in secure two-party computation. STOC 2008: 413-422
70EEVipul Goyal, Jonathan Katz: Universally Composable Multi-party Computation with an Unreliable Common Reference String. TCC 2008: 142-154
69EEJonathan Katz: Bridging Game Theory and Cryptography: Recent Results and Future Directions. TCC 2008: 251-272
68EEJonathan Katz: Which Languages Have 4-Round Zero-Knowledge Proofs? TCC 2008: 73-88
67EEJonathan Katz: Cryptography. Wiley Encyclopedia of Computer Science and Engineering 2008
66EEJonathan Katz, Yehuda Lindell: Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs. J. Cryptology 21(3): 303-349 (2008)
2007
65 Jonathan Katz, Moti Yung: Applied Cryptography and Network Security, 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings Springer 2007
64EERuggero Morselli, Bobby Bhattacharjee, Jonathan Katz, Michael A. Marsh: Exploiting approximate transitivity of trust. BROADNETS 2007: 515-524
63EEOmer Horvitz, Jonathan Katz: Universally-Composable Two-Party Computation in Two Rounds. CRYPTO 2007: 111-129
62EEJonathan Katz: Universally Composable Multi-party Computation Using Tamper-Proof Hardware. EUROCRYPT 2007: 115-128
61EEJonathan Katz, Chiu-Yuen Koo: Round-Efficient Secure Computation in Point-to-Point Networks. EUROCRYPT 2007: 311-328
60EEJuan A. Garay, Jonathan Katz, Chiu-Yuen Koo, Rafail Ostrovsky: Round Complexity of Authenticated Broadcast with a Dishonest Majority. FOCS 2007: 658-668
59EEJonathan Katz: Efficient Cryptographic Protocols Based on the Hardness of Learning Parity with Noise. IMA Int. Conf. 2007: 1-15
58EEJonathan Katz: On achieving the "best of both worlds" in secure multiparty computation. STOC 2007: 11-20
57EECarmit Hazay, Jonathan Katz, Chiu-Yuen Koo, Yehuda Lindell: Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions. TCC 2007: 323-341
56EEJonathan Katz: Which Languages Have 4-Round Zero-Knowledge Proofs?. Electronic Colloquium on Computational Complexity (ECCC) 14(065): (2007)
55EEJonathan Katz, Moti Yung: Scalable Protocols for Authenticated Group Key Exchange. J. Cryptology 20(1): 85-113 (2007)
54EERan Canetti, Shai Halevi, Jonathan Katz: A Forward-Secure Public-Key Encryption Scheme. J. Cryptology 20(3): 265-294 (2007)
53EEEu-Jin Goh, Stanislaw Jarecki, Jonathan Katz, Nan Wang: Efficient Signature Schemes with Tight Reductions to the Diffie-Hellman Problems. J. Cryptology 20(4): 493-514 (2007)
52EEDan Boneh, Ran Canetti, Shai Halevi, Jonathan Katz: Chosen-Ciphertext Security from Identity-Based Encryption. SIAM J. Comput. 36(5): 1301-1328 (2007)
51EEJonathan Katz: Review of "Probability and Computing: Randomized Algorithms and Probabilitic Analysis by Michael Mitzenmacher and Eli Upfal", Cambridge University Press, 2005. SIGACT News 38(3): 20-22 (2007)
2006
50EEYevgeniy Dodis, Jonathan Katz, Leonid Reyzin, Adam Smith: Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets. CRYPTO 2006: 232-250
49EEJonathan Katz, Chiu-Yuen Koo: On Expected Constant-Round Protocols for Byzantine Agreement. CRYPTO 2006: 445-462
48EEJonathan Katz, Ji Sun Shin: Parallel and Concurrent Security of the HB and HB+ Protocols. EUROCRYPT 2006: 73-87
47EEChiu-Yuen Koo, Vartika Bhandari, Jonathan Katz, Nitin H. Vaidya: Reliable broadcast in radio networks: the bounded collision case. PODC 2006: 258-264
46EES. Dov Gordon, Jonathan Katz: Rational Secret Sharing, Revisited. SCN 2006: 229-241
45EEAdam Bender, Jonathan Katz, Ruggero Morselli: Ring Signatures: Stronger Definitions, and Constructions Without Random Oracles. TCC 2006: 60-79
44EEJonathan Katz, Chiu-Yuen Koo: On Expected Constant-Round Protocols for Byzantine Agreement. Electronic Colloquium on Computational Complexity (ECCC) 13(028): (2006)
43EEJonathan Katz, Moti Yung: Characterization of Security Notions for Probabilistic Private-Key Encryption. J. Cryptology 19(1): 67-95 (2006)
42EEJonathan Katz: Review of "A Computational Introduction to Number Theory and Algebra by Victor Shoup", Cambridge University Press, 2005. SIGACT News 37(1): 12-13 (2006)
41EEJonathan Katz: Review of "Primality Testing in Polynomial Time by Martin Dietzfelbinger", Springer-Verlag, 2004. SIGACT News 37(1): 14-15 (2006)
2005
40EEJonathan Katz, Ji Sun Shin: Modeling insider attacks on group key-exchange protocols. ACM Conference on Computer and Communications Security 2005: 180-189
39EEJonathan Katz, Philip D. MacKenzie, Gelareh Taban, Virgil D. Gligor: Two-Server Password-Only Authenticated Key Exchange. ACNS 2005: 1-16
38EEDan Boneh, Jonathan Katz: Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption. CT-RSA 2005: 87-103
37EEXavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafail Ostrovsky, Adam Smith: Secure Remote Authentication Using Biometric Data. EUROCRYPT 2005: 147-163
36EERan Canetti, Shai Halevi, Jonathan Katz, Yehuda Lindell, Philip D. MacKenzie: Universally Composable Password-Based Key Exchange. EUROCRYPT 2005: 404-421
35EEIftach Haitner, Omer Horvitz, Jonathan Katz, Chiu-Yuen Koo, Ruggero Morselli, Ronen Shaltiel: Reducing Complexity Assumptions for Statistically-Hiding Commitment. EUROCRYPT 2005: 58-77
34EEOmer Horvitz, Jonathan Katz: Bounds on the Efficiency of "Black-Box" Commitment Schemes. ICALP 2005: 128-139
33EEJonathan Katz, Yehuda Lindell: Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs. TCC 2005: 128-149
32EERan Canetti, Shai Halevi, Jonathan Katz: Adaptively-Secure, Non-interactive Public-Key Encryption. TCC 2005: 150-168
31EEYevgeniy Dodis, Jonathan Katz: Chosen-Ciphertext Security of Multiple Encryption. TCC 2005: 188-209
30EEWenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney, Jonathan Katz, Aram Khalili: A pairwise key predistribution scheme for wireless sensor networks. ACM Trans. Inf. Syst. Secur. 8(2): 228-258 (2005)
29EERosario Gennaro, Yael Gertner, Jonathan Katz, Luca Trevisan: Bounds on the Efficiency of Generic Cryptographic Constructions. SIAM J. Comput. 35(1): 217-246 (2005)
28EEJonathan Katz: Comparative book review: Cryptography: An Introduction by V. V. Yaschenko (American Mathematical Society, 2002); Cryptanalysis of Number Theoretic Ciphers by S.S. Wagstaff, Jr. (Chapman & Hall/CRC Press, 2003); RSA and Public-Key Cryptography by R. A. Mollin (Chapman & Hall/CRC Press, 2003); Foundations of Cryptography, vol. 1: Basic Tools by O. Goldreich, (Cambridge University Press, 2001). SIGACT News 36(2): 14-19 (2005)
2004
27EEIk Rae Jeong, Jonathan Katz, Dong Hoon Lee: One-Round Protocols for Two-Party Authenticated Key Exchange. ACNS 2004: 220-232
26EEJonathan Katz, Rafail Ostrovsky: Round-Optimal Secure Two-Party Computation. CRYPTO 2004: 335-354
25EEYevgeniy Dodis, Matthew K. Franklin, Jonathan Katz, Atsuko Miyaji, Moti Yung: A Generic Construction for Intrusion-Resilient Public-Key Encryption. CT-RSA 2004: 81-98
24EERan Canetti, Shai Halevi, Jonathan Katz: Chosen-Ciphertext Security from Identity-Based Encryption. EUROCRYPT 2004: 207-222
23EERuggero Morselli, Samrat Bhattacharjee, Jonathan Katz, Peter J. Keleher: Trust-Preserving Set Operations. INFOCOM 2004
22EEJonathan Katz, Rafail Ostrovsky, Michael O. Rabin: Identity-Based Zero Knowledge. SCN 2004: 180-192
2003
21EEJonathan Katz, Nan Wang: Efficiency improvements for signature schemes with tight security reductions. ACM Conference on Computer and Communications Security 2003: 155-164
20EEJonathan Katz, Moti Yung: Scalable Protocols for Authenticated Group Key Exchange. CRYPTO 2003: 110-125
19EEYevgeniy Dodis, Matthew K. Franklin, Jonathan Katz, Atsuko Miyaji, Moti Yung: Intrusion-Resilient Public-Key Encryption. CT-RSA 2003: 19-32
18EEJonathan Katz: Efficient and Non-malleable Proofs of Plaintext Knowledge and Applications. EUROCRYPT 2003: 211-228
17EERan Canetti, Shai Halevi, Jonathan Katz: A Forward-Secure Public-Key Encryption Scheme. EUROCRYPT 2003: 255-271
16EEJonathan Katz, Rafail Ostrovsky, Adam Smith: Round Efficiency of Multi-party Computation with a Dishonest Majority. EUROCRYPT 2003: 578-595
15EEJonathan Katz: Binary Tree Encryption: Constructions and Applications. ICISC 2003: 1-11
14EEYevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung: Strong Key-Insulated Signature Schemes. Public Key Cryptography 2003: 130-144
13EEAram Khalili, Jonathan Katz, William A. Arbaugh: Toward Secure Key Distribution in Truly Ad-Hoc Networks. SAINT Workshops 2003: 342-346
12EERosario Gennaro, Yael Gertner, Jonathan Katz: Lower bounds on the efficiency of encryption and digital signature schemes. STOC 2003: 417-425
2002
11EEJonathan Katz, Moti Yung: Threshold Cryptosystems Based on Factoring. ASIACRYPT 2002: 192-205
10EEYevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung: Key-Insulated Public Key Cryptosystems. EUROCRYPT 2002: 65-82
9EEKahil Jallad, Jonathan Katz, Bruce Schneier: Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG. ISC 2002: 90-101
8EEJonathan Katz, Rafail Ostrovsky, Moti Yung: Forward Secrecy in Password-Only Key Exchange Protocols. SCN 2002: 29-44
2001
7EEGiovanni Di Crescenzo, Jonathan Katz, Rafail Ostrovsky, Adam Smith: Efficient and Non-interactive Non-malleable Commitment. EUROCRYPT 2001: 40-59
6EEJonathan Katz, Rafail Ostrovsky, Moti Yung: Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords. EUROCRYPT 2001: 475-494
5EEJonathan Katz, Steven Myers, Rafail Ostrovsky: Cryptographic Counters and Applications to Electronic Voting. EUROCRYPT 2001: 78-92
4EEEnrico Buonanno, Jonathan Katz, Moti Yung: Incremental Unforgeable Encryption. FSE 2001: 109-124
2000
3EEJonathan Katz, Moti Yung: Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation. FSE 2000: 284-299
2EEJonathan Katz, Moti Yung: Complete characterization of security notions for probabilistic private-key encryption. STOC 2000: 245-254
1EEJonathan Katz, Luca Trevisan: On the efficiency of local decoding procedures for error-correcting codes. STOC 2000: 80-86

Coauthor Index

1William A. Arbaugh [13]
2Adam Bender [45] [77]
3Vartika Bhandari [47]
4Bobby Bhattacharjee [64]
5Samrat Bhattacharjee [23]
6Dan Boneh [38] [52] [81]
7Xavier Boyen [37]
8Enrico Buonanno [4]
9Ran Canetti [17] [24] [32] [36] [52] [54]
10Giovanni Di Crescenzo [7]
11Jing Deng [30]
12Yevgeniy Dodis [10] [14] [19] [25] [31] [37] [50] [80]
13Wenliang Du [30]
14Matthew K. Franklin [19] [25]
15David Freeman [81]
16Juan A. Garay [60]
17Rosario Gennaro [12] [29]
18Yael Gertner [12] [29]
19Virgil D. Gligor [39]
20Eu-Jin Goh [53]
21S. Dov Gordon [46] [71] [79]
22Vipul Goyal [70]
23Iftach Haitner [35] [76]
24Shai Halevi [17] [24] [32] [36] [52] [54]
25Yunghsiang S. Han [30]
26Carmit Hazay [57] [71]
27Omer Horvitz [34] [35] [63] [76]
28Kahil Jallad [9]
29Stanislaw Jarecki [53]
30Ik Rae Jeong [27]
31Seny Kamara [73]
32Peter J. Keleher [23]
33Aram Khalili [13] [30]
34Chiu-Yuen Koo [35] [44] [47] [49] [57] [60] [61] [72] [76] [78]
35Ranjit Kumaresan [72]
36Dong Hoon Lee [27]
37Yehuda Lindell (Andrew Y. Lindell) [33] [36] [57] [66] [71] [75]
38Philip D. MacKenzie [36] [39]
39Michael A. Marsh [64]
40Atsuko Miyaji [19] [25]
41Ruggero Morselli [23] [35] [45] [64] [76] [77]
42Steven Myers [5]
43Rafail Ostrovsky [5] [6] [7] [8] [16] [22] [26] [37] [60]
44Michael O. Rabin [22]
45Leonid Reyzin [50]
46Amit Sahai [74]
47Bruce Schneier [9]
48Ronen Shaltiel [35] [76]
49Ji Sun Shin [40] [48]
50Adam Smith [7] [16] [37] [50] [80]
51Gelareh Taban [39]
52Luca Trevisan [1] [29]
53Nitin H. Vaidya [47]
54Pramod K. Varshney [30]
55Shabsi Walfish [80]
56Nan Wang [21] [53]
57Brent Waters (Brent R. Waters) [74] [81]
58Shouhuai Xu [10] [14]
59Moti Yung (Mordechai M. Yung) [2] [3] [4] [6] [8] [10] [11] [14] [19] [20] [25] [43] [55] [65]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)