2008 |
34 | EE | Mira Belenkiy,
Melissa Chase,
C. Christopher Erway,
John Jannotti,
Alptekin Küpçü,
Anna Lysyanskaya:
Incentivizing outsourced computation.
NetEcon 2008: 85-90 |
33 | EE | Mira Belenkiy,
Melissa Chase,
Markulf Kohlweiss,
Anna Lysyanskaya:
P-signatures and Noninteractive Anonymous Credentials.
TCC 2008: 356-374 |
2007 |
32 | EE | Melissa Chase,
Anna Lysyanskaya:
Simulatable VRFs with Applications to Multi-theorem NIZK.
CRYPTO 2007: 303-322 |
31 | EE | Jan Camenisch,
Anna Lysyanskaya,
Mira Meyerovich:
Endorsed E-Cash.
IEEE Symposium on Security and Privacy 2007: 101-115 |
30 | EE | Mira Belenkiy,
Melissa Chase,
C. Christopher Erway,
John Jannotti,
Alptekin Küpçü,
Anna Lysyanskaya,
Eric Rachlin:
Making p2p accountable without losing privacy.
WPES 2007: 31-40 |
2006 |
29 | EE | Jan Camenisch,
Susan Hohenberger,
Markulf Kohlweiss,
Anna Lysyanskaya,
Mira Meyerovich:
How to win the clonewars: efficient periodic n-times anonymous authentication.
ACM Conference on Computer and Communications Security 2006: 201-210 |
28 | EE | Anna Lysyanskaya,
Nikos Triandopoulos:
Rationality and Adversarial Behavior in Multi-party Computation.
CRYPTO 2006: 180-197 |
27 | EE | Melissa Chase,
Anna Lysyanskaya:
On Signatures of Knowledge.
CRYPTO 2006: 78-96 |
26 | EE | Anna Lysyanskaya,
Mira Meyerovich:
Provably Secure Steganography with Imperfect Sampling.
Public Key Cryptography 2006: 123-139 |
25 | EE | Jan Camenisch,
Susan Hohenberger,
Anna Lysyanskaya:
Balancing Accountability and Privacy Using E-Cash (Extended Abstract).
SCN 2006: 141-155 |
24 | EE | Yehuda Lindell,
Anna Lysyanskaya,
Tal Rabin:
On the composition of authenticated Byzantine Agreement.
J. ACM 53(6): 881-917 (2006) |
2005 |
23 | EE | Jan Camenisch,
Anna Lysyanskaya:
A Formal Treatment of Onion Routing.
CRYPTO 2005: 169-187 |
22 | EE | Jan Camenisch,
Susan Hohenberger,
Anna Lysyanskaya:
Compact E-Cash.
EUROCRYPT 2005: 302-321 |
21 | EE | Melissa Chase,
Alexander Healy,
Anna Lysyanskaya,
Tal Malkin,
Leonid Reyzin:
Mercurial Commitments with Applications to Zero-Knowledge Sets.
EUROCRYPT 2005: 422-439 |
20 | EE | Susan Hohenberger,
Anna Lysyanskaya:
How to Securely Outsource Cryptographic Computations.
TCC 2005: 264-282 |
2004 |
19 | EE | Danfeng Yao,
Nelly Fazio,
Yevgeniy Dodis,
Anna Lysyanskaya:
ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption.
ACM Conference on Computer and Communications Security 2004: 354-363 |
18 | EE | Jan Camenisch,
Anna Lysyanskaya:
Signature Schemes and Anonymous Credentials from Bilinear Maps.
CRYPTO 2004: 56-72 |
17 | EE | Anna Lysyanskaya,
Silvio Micali,
Leonid Reyzin,
Hovav Shacham:
Sequential Aggregate Signatures from Trapdoor Permutations.
EUROCRYPT 2004: 74-90 |
16 | EE | Anna Lysyanskaya,
Roberto Tamassia,
Nikos Triandopoulos:
Multicast Authentication in Fully Adversarial Networks.
IEEE Symposium on Security and Privacy 2004: 241- |
15 | EE | Endre Bangerter,
Jan Camenisch,
Anna Lysyanskaya:
A Cryptographic Framework for the Controlled Release of Certified Data.
Security Protocols Workshop 2004: 20-42 |
14 | EE | Rosario Gennaro,
Anna Lysyanskaya,
Tal Malkin,
Silvio Micali,
Tal Rabin:
Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering.
TCC 2004: 258-277 |
2002 |
13 | EE | Christian Cachin,
Klaus Kursawe,
Anna Lysyanskaya,
Reto Strobl:
Asynchronous verifiable secret sharing and proactive cryptosystems.
ACM Conference on Computer and Communications Security 2002: 88-97 |
12 | EE | Anna Lysyanskaya:
Unique Signatures and Verifiable Random Functions from the DH-DDH Separation.
CRYPTO 2002: 597-612 |
11 | EE | Jan Camenisch,
Anna Lysyanskaya:
Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials.
CRYPTO 2002: 61-76 |
10 | EE | Yehuda Lindell,
Anna Lysyanskaya,
Tal Rabin:
Sequential composition of protocols without simultaneous termination.
PODC 2002: 203-212 |
9 | EE | Jan Camenisch,
Anna Lysyanskaya:
A Signature Scheme with Efficient Protocols.
SCN 2002: 268-289 |
8 | EE | Yehuda Lindell,
Anna Lysyanskaya,
Tal Rabin:
On the composition of authenticated byzantine agreement.
STOC 2002: 514-523 |
2001 |
7 | EE | Anna Lysyanskaya,
Chris Peikert:
Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes.
ASIACRYPT 2001: 331-350 |
6 | EE | Moses Liskov,
Anna Lysyanskaya,
Silvio Micali,
Leonid Reyzin,
Adam Smith:
Mutually Independent Commitments.
ASIACRYPT 2001: 385-401 |
5 | EE | Jan Camenisch,
Anna Lysyanskaya:
An Identity Escrow Scheme with Appointed Verifiers.
CRYPTO 2001: 388-407 |
4 | EE | Jan Camenisch,
Anna Lysyanskaya:
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation.
EUROCRYPT 2001: 93-118 |
2000 |
3 | EE | Stanislaw Jarecki,
Anna Lysyanskaya:
Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures.
EUROCRYPT 2000: 221-242 |
1999 |
2 | EE | Anna Lysyanskaya,
Ronald L. Rivest,
Amit Sahai,
Stefan Wolf:
Pseudonym Systems.
Selected Areas in Cryptography 1999: 184-199 |
1998 |
1 | EE | Anna Lysyanskaya,
Zulfikar Ramzan:
Group Blind Digital Signatures: A Scalable Solution to Electronic Cash.
Financial Cryptography 1998: 184-197 |