dblp.uni-trier.dewww.uni-trier.de

Alice Silverberg

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
10EEKarl Rubin, Alice Silverberg: Using Abelian Varieties to Improve Pairing-Based Cryptography. J. Cryptology 22(3): 330-364 (2009)
2008
9EEAlice Silverberg: Applications to cryptography of twisting commutative algebraic groups. Discrete Applied Mathematics 156(16): 3122-3138 (2008)
8EEKarl Rubin, Alice Silverberg: Compression in Finite Fields and Torus-Based Cryptography. SIAM J. Comput. 37(5): 1401-1428 (2008)
2005
7EEMarten van Dijk, Robert Granger, Dan Page, Karl Rubin, Alice Silverberg, Martijn Stam, David P. Woodruff: Practical Cryptography in High Dimensional Tori. EUROCRYPT 2005: 234-250
2004
6EEKarl Rubin, Alice Silverberg: Using Primitive Subgroups to Do More with Fewer Bits. ANTS 2004: 18-41
2003
5EEKarl Rubin, Alice Silverberg: Torus-Based Cryptography. CRYPTO 2003: 349-365
4 Alice Silverberg, Jessica Staddon, Judy L. Walker: Applications of list decoding to tracing traitors. IEEE Transactions on Information Theory 49(5): 1312-1318 (2003)
2002
3EECraig Gentry, Alice Silverberg: Hierarchical ID-Based Cryptography. ASIACRYPT 2002: 548-566
2EEKarl Rubin, Alice Silverberg: Supersingular Abelian Varieties in Cryptology. CRYPTO 2002: 336-353
2001
1EEAlice Silverberg, Jessica Staddon, Judy L. Walker: Efficient Traitor Tracing Algorithms Using List Decoding. ASIACRYPT 2001: 175-192

Coauthor Index

1Marten van Dijk [7]
2Craig Gentry [3]
3Robert Granger [7]
4Dan Page [7]
5Karl Rubin [2] [5] [6] [7] [8] [10]
6Jessica Staddon [1] [4]
7Martijn Stam [7]
8Judy L. Walker [1] [4]
9David P. Woodruff [7]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)