2009 |
10 | EE | Karl Rubin,
Alice Silverberg:
Using Abelian Varieties to Improve Pairing-Based Cryptography.
J. Cryptology 22(3): 330-364 (2009) |
2008 |
9 | EE | Alice Silverberg:
Applications to cryptography of twisting commutative algebraic groups.
Discrete Applied Mathematics 156(16): 3122-3138 (2008) |
8 | EE | Karl Rubin,
Alice Silverberg:
Compression in Finite Fields and Torus-Based Cryptography.
SIAM J. Comput. 37(5): 1401-1428 (2008) |
2005 |
7 | EE | Marten van Dijk,
Robert Granger,
Dan Page,
Karl Rubin,
Alice Silverberg,
Martijn Stam,
David P. Woodruff:
Practical Cryptography in High Dimensional Tori.
EUROCRYPT 2005: 234-250 |
2004 |
6 | EE | Karl Rubin,
Alice Silverberg:
Using Primitive Subgroups to Do More with Fewer Bits.
ANTS 2004: 18-41 |
2003 |
5 | EE | Karl Rubin,
Alice Silverberg:
Torus-Based Cryptography.
CRYPTO 2003: 349-365 |
4 | | Alice Silverberg,
Jessica Staddon,
Judy L. Walker:
Applications of list decoding to tracing traitors.
IEEE Transactions on Information Theory 49(5): 1312-1318 (2003) |
2002 |
3 | EE | Craig Gentry,
Alice Silverberg:
Hierarchical ID-Based Cryptography.
ASIACRYPT 2002: 548-566 |
2 | EE | Karl Rubin,
Alice Silverberg:
Supersingular Abelian Varieties in Cryptology.
CRYPTO 2002: 336-353 |
2001 |
1 | EE | Alice Silverberg,
Jessica Staddon,
Judy L. Walker:
Efficient Traitor Tracing Algorithms Using List Decoding.
ASIACRYPT 2001: 175-192 |