Leonid Reyzin
Leonid Reyzin
Associate Professor of Computer Science, Boston University
Verified email at cs.bu.edu - Homepage
Title
Cited by
Cited by
Year
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
Y Dodis, L Reyzin, A Smith
International conference on the theory and applications of cryptographic …, 2004
3464*2004
Physically observable cryptography
S Micali, L Reyzin
Theory of Cryptography Conference, 278-296, 2004
5822004
Dynamic authenticated index structures for outsourced databases
F Li, M Hadjieleftheriou, G Kollios, L Reyzin
Proceedings of the 2006 ACM SIGMOD international conference on Management of …, 2006
5072006
Sequential aggregate signatures from trapdoor permutations
A Lysyanskaya, S Micali, L Reyzin, H Shacham
International Conference on the Theory and Applications of Cryptographic …, 2004
4042004
Better than BiBa: Short one-time signatures with fast signing and verifying
L Reyzin, N Reyzin
Australasian Conference on Information Security and Privacy, 144-153, 2002
3832002
Forward-secure signatures with optimal signing and verifying
G Itkis, L Reyzin
Annual International Cryptology Conference, 332-354, 2001
3622001
A new forward-secure digital signature scheme
M Abdalla, L Reyzin
International Conference on the Theory and Application of Cryptology and …, 2000
3602000
Accountable-subgroup multisignatures
S Micali, K Ohta, L Reyzin
Proceedings of the 8th ACM Conference on Computer and Communications …, 2001
3382001
Physical access control
S Micali, D Engberg, P Libin, L Reyzin, A Sinelnikov
US Patent 7,353,396, 2008
2162008
Robust fuzzy extractors and authenticated key agreement from close secrets
Y Dodis, J Katz, L Reyzin, A Smith
Annual International Cryptology Conference, 232-250, 2006
2012006
SiBIR: Signer-base intrusion-resilient signatures
G Itkis, L Reyzin
Annual International Cryptology Conference, 499-514, 2002
1852002
Breaking and repairing optimistic fair exchange from PODC 2003
Y Dodis, L Reyzin
Proceedings of the 3rd ACM workshop on Digital rights management, 47-54, 2003
1712003
Forward-secure signatures with fast key update
A Kozlov, L Reyzin
International Conference on Security in Communication Networks, 241-256, 2002
1692002
Protecting circuits from leakage: the computationally-bounded and noisy cases
S Faust, T Rabin, L Reyzin, E Tromer, V Vaikuntanathan
Annual International Conference on the Theory and Applications of …, 2010
1622010
Authenticated index structures for aggregation queries
F Li, M Hadjieleftheriou, G Kollios, L Reyzin
ACM Transactions on Information and System Security (TISSEC) 13 (4), 1-35, 2010
1082010
Soundness in the public-key model
S Micali, L Reyzin
Annual International Cryptology Conference, 542-565, 2001
1082001
Conditional computational entropy, or toward separating pseudoentropy from compressibility
CY Hsiao, CJ Lu, L Reyzin
Annual International Conference on the Theory and Applications of …, 2007
1012007
A unified approach to deterministic encryption: New constructions and a connection to computational entropy
B Fuller, A O’neill, L Reyzin
Journal of Cryptology 28 (3), 671-717, 2015
972015
Finding collisions on a public road, or do secure hash functions need secret coins?
CY Hsiao, L Reyzin
Annual International Cryptology Conference, 92-105, 2004
922004
Key agreement from close secrets over unsecured channels
B Kanukurthi, L Reyzin
Annual International Conference on the Theory and Applications of …, 2009
892009
The system can't perform the operation now. Try again later.
Articles 1–20