dblp.uni-trier.dewww.uni-trier.de

Anna Lysyanskaya

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
34EEMira Belenkiy, Melissa Chase, C. Christopher Erway, John Jannotti, Alptekin Küpçü, Anna Lysyanskaya: Incentivizing outsourced computation. NetEcon 2008: 85-90
33EEMira Belenkiy, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya: P-signatures and Noninteractive Anonymous Credentials. TCC 2008: 356-374
2007
32EEMelissa Chase, Anna Lysyanskaya: Simulatable VRFs with Applications to Multi-theorem NIZK. CRYPTO 2007: 303-322
31EEJan Camenisch, Anna Lysyanskaya, Mira Meyerovich: Endorsed E-Cash. IEEE Symposium on Security and Privacy 2007: 101-115
30EEMira Belenkiy, Melissa Chase, C. Christopher Erway, John Jannotti, Alptekin Küpçü, Anna Lysyanskaya, Eric Rachlin: Making p2p accountable without losing privacy. WPES 2007: 31-40
2006
29EEJan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, Mira Meyerovich: How to win the clonewars: efficient periodic n-times anonymous authentication. ACM Conference on Computer and Communications Security 2006: 201-210
28EEAnna Lysyanskaya, Nikos Triandopoulos: Rationality and Adversarial Behavior in Multi-party Computation. CRYPTO 2006: 180-197
27EEMelissa Chase, Anna Lysyanskaya: On Signatures of Knowledge. CRYPTO 2006: 78-96
26EEAnna Lysyanskaya, Mira Meyerovich: Provably Secure Steganography with Imperfect Sampling. Public Key Cryptography 2006: 123-139
25EEJan Camenisch, Susan Hohenberger, Anna Lysyanskaya: Balancing Accountability and Privacy Using E-Cash (Extended Abstract). SCN 2006: 141-155
24EEYehuda Lindell, Anna Lysyanskaya, Tal Rabin: On the composition of authenticated Byzantine Agreement. J. ACM 53(6): 881-917 (2006)
2005
23EEJan Camenisch, Anna Lysyanskaya: A Formal Treatment of Onion Routing. CRYPTO 2005: 169-187
22EEJan Camenisch, Susan Hohenberger, Anna Lysyanskaya: Compact E-Cash. EUROCRYPT 2005: 302-321
21EEMelissa Chase, Alexander Healy, Anna Lysyanskaya, Tal Malkin, Leonid Reyzin: Mercurial Commitments with Applications to Zero-Knowledge Sets. EUROCRYPT 2005: 422-439
20EESusan Hohenberger, Anna Lysyanskaya: How to Securely Outsource Cryptographic Computations. TCC 2005: 264-282
2004
19EEDanfeng Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya: ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption. ACM Conference on Computer and Communications Security 2004: 354-363
18EEJan Camenisch, Anna Lysyanskaya: Signature Schemes and Anonymous Credentials from Bilinear Maps. CRYPTO 2004: 56-72
17EEAnna Lysyanskaya, Silvio Micali, Leonid Reyzin, Hovav Shacham: Sequential Aggregate Signatures from Trapdoor Permutations. EUROCRYPT 2004: 74-90
16EEAnna Lysyanskaya, Roberto Tamassia, Nikos Triandopoulos: Multicast Authentication in Fully Adversarial Networks. IEEE Symposium on Security and Privacy 2004: 241-
15EEEndre Bangerter, Jan Camenisch, Anna Lysyanskaya: A Cryptographic Framework for the Controlled Release of Certified Data. Security Protocols Workshop 2004: 20-42
14EERosario Gennaro, Anna Lysyanskaya, Tal Malkin, Silvio Micali, Tal Rabin: Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering. TCC 2004: 258-277
2002
13EEChristian Cachin, Klaus Kursawe, Anna Lysyanskaya, Reto Strobl: Asynchronous verifiable secret sharing and proactive cryptosystems. ACM Conference on Computer and Communications Security 2002: 88-97
12EEAnna Lysyanskaya: Unique Signatures and Verifiable Random Functions from the DH-DDH Separation. CRYPTO 2002: 597-612
11EEJan Camenisch, Anna Lysyanskaya: Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials. CRYPTO 2002: 61-76
10EEYehuda Lindell, Anna Lysyanskaya, Tal Rabin: Sequential composition of protocols without simultaneous termination. PODC 2002: 203-212
9EEJan Camenisch, Anna Lysyanskaya: A Signature Scheme with Efficient Protocols. SCN 2002: 268-289
8EEYehuda Lindell, Anna Lysyanskaya, Tal Rabin: On the composition of authenticated byzantine agreement. STOC 2002: 514-523
2001
7EEAnna Lysyanskaya, Chris Peikert: Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes. ASIACRYPT 2001: 331-350
6EEMoses Liskov, Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Adam Smith: Mutually Independent Commitments. ASIACRYPT 2001: 385-401
5EEJan Camenisch, Anna Lysyanskaya: An Identity Escrow Scheme with Appointed Verifiers. CRYPTO 2001: 388-407
4EEJan Camenisch, Anna Lysyanskaya: An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. EUROCRYPT 2001: 93-118
2000
3EEStanislaw Jarecki, Anna Lysyanskaya: Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures. EUROCRYPT 2000: 221-242
1999
2EEAnna Lysyanskaya, Ronald L. Rivest, Amit Sahai, Stefan Wolf: Pseudonym Systems. Selected Areas in Cryptography 1999: 184-199
1998
1EEAnna Lysyanskaya, Zulfikar Ramzan: Group Blind Digital Signatures: A Scalable Solution to Electronic Cash. Financial Cryptography 1998: 184-197

Coauthor Index

1Endre Bangerter [15]
2Mira Belenkiy [30] [33] [34]
3Christian Cachin [13]
4Jan Camenisch [4] [5] [9] [11] [15] [18] [22] [23] [25] [29] [31]
5Melissa Chase [21] [27] [30] [32] [33] [34]
6Yevgeniy Dodis [19]
7C. Christopher Erway [30] [34]
8Nelly Fazio [19]
9Rosario Gennaro [14]
10Alexander Healy [21]
11Susan Hohenberger [20] [22] [25] [29]
12John Jannotti [30] [34]
13Stanislaw Jarecki [3]
14Markulf Kohlweiss [29] [33]
15Alptekin Küpçü [30] [34]
16Klaus Kursawe [13]
17Yehuda Lindell (Andrew Y. Lindell) [8] [10] [24]
18Moses Liskov [6]
19Tal Malkin [14] [21]
20Mira Meyerovich [26] [29] [31]
21Silvio Micali [6] [14] [17]
22Chris Peikert [7]
23Tal Rabin [8] [10] [14] [24]
24Eric Rachlin [30]
25Zulfikar Ramzan [1]
26Leonid Reyzin [6] [17] [21]
27Ronald L. Rivest [2]
28Amit Sahai [2]
29Hovav Shacham [17]
30Adam Smith [6]
31Reto Strobl [13]
32Roberto Tamassia [16]
33Nikos Triandopoulos [16] [28]
34Stefan Wolf [2]
35Danfeng Yao (Danfeng (Daphne) Yao) [19]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)