Leonid Reyzin
Leonid Reyzin
Associate Professor of Computer Science, Boston University
Verified email at cs.bu.edu - Homepage
Title
Cited by
Cited by
Year
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
Y Dodis, L Reyzin, A Smith
International conference on the theory and applications of cryptographic …, 2004
3356*2004
Physically observable cryptography
S Micali, L Reyzin
Theory of Cryptography Conference, 278-296, 2004
5722004
Dynamic authenticated index structures for outsourced databases
F Li, M Hadjieleftheriou, G Kollios, L Reyzin
Proceedings of the 2006 ACM SIGMOD international conference on Management of …, 2006
4942006
Sequential aggregate signatures from trapdoor permutations
A Lysyanskaya, S Micali, L Reyzin, H Shacham
International Conference on the Theory and Applications of Cryptographic …, 2004
3792004
Better than BiBa: Short one-time signatures with fast signing and verifying
L Reyzin, N Reyzin
Australasian Conference on Information Security and Privacy, 144-153, 2002
3702002
A new forward-secure digital signature scheme
M Abdalla, L Reyzin
International Conference on the Theory and Application of Cryptology and …, 2000
3622000
Forward-secure signatures with optimal signing and verifying
G Itkis, L Reyzin
Annual International Cryptology Conference, 332-354, 2001
3552001
Accountable-subgroup multisignatures
S Micali, K Ohta, L Reyzin
Proceedings of the 8th ACM Conference on Computer and Communications …, 2001
3152001
Physical access control
S Micali, D Engberg, P Libin, L Reyzin, A Sinelnikov
US Patent 7,353,396, 2008
2142008
Robust fuzzy extractors and authenticated key agreement from close secrets
Y Dodis, J Katz, L Reyzin, A Smith
Annual International Cryptology Conference, 232-250, 2006
2022006
SiBIR: Signer-base intrusion-resilient signatures
G Itkis, L Reyzin
Annual International Cryptology Conference, 499-514, 2002
1842002
Breaking and repairing optimistic fair exchange from PODC 2003
Y Dodis, L Reyzin
Proceedings of the 3rd ACM workshop on Digital rights management, 47-54, 2003
1712003
Forward-secure signatures with fast key update
A Kozlov, L Reyzin
International Conference on Security in Communication Networks, 241-256, 2002
1682002
Protecting circuits from leakage: the computationally-bounded and noisy cases
S Faust, T Rabin, L Reyzin, E Tromer, V Vaikuntanathan
Annual International Conference on the Theory and Applications of …, 2010
1572010
Soundness in the public-key model
S Micali, L Reyzin
Annual International Cryptology Conference, 542-565, 2001
1082001
Authenticated index structures for aggregation queries
F Li, M Hadjieleftheriou, G Kollios, L Reyzin
ACM Transactions on Information and System Security (TISSEC) 13 (4), 1-35, 2010
1032010
Conditional computational entropy, or toward separating pseudoentropy from compressibility
CY Hsiao, CJ Lu, L Reyzin
Annual International Conference on the Theory and Applications of …, 2007
982007
A unified approach to deterministic encryption: New constructions and a connection to computational entropy
B Fuller, A O’neill, L Reyzin
Journal of Cryptology 28 (3), 671-717, 2015
952015
Key agreement from close secrets over unsecured channels
B Kanukurthi, L Reyzin
Annual International Conference on the Theory and Applications of …, 2009
922009
Finding collisions on a public road, or do secure hash functions need secret coins?
CY Hsiao, L Reyzin
Annual International Cryptology Conference, 92-105, 2004
882004
The system can't perform the operation now. Try again later.
Articles 1–20