Introduction to modern cryptography: Principles & protocols (Cryptography & network security series) J KATZ, Y LINDELL | 3277* | 2007 |

Introduction to modern cryptography Y Lindell, J Katz Chapman and Hall/CRC, 2014 | 3139* | 2014 |

Introduction to modern cryptography J Katz, Y Lindell CRC Press, 2008 | 3139* | 2008 |

Introduction to Modern Cryptography (Chapman 8 Hall/Crc Cryptography and Network Security Series) J Katz, Y Lindell Chapman, 2007 | 3139* | 2007 |

Introduction to Modern Cryptography J Katz, Y Lindell | 3139* | 2006 |

A pairwise key predistribution scheme for wireless sensor networks W Du, J Deng, YS Han, PK Varshney, J Katz, A Khalili ACM Transactions on Information and System Security (TISSEC) 8 (2), 228-258, 2005 | 2410 | 2005 |

Predicate encryption supporting disjunctions, polynomial eguations, and inner products J Katz Proc. EUROCRYPT 2008, l46-162, 2008 | 1357* | 2008 |

Predicate encryption supporting disjunctions, polynomial equations, and inner products J Katz, A Sahai, B Waters Advances in Cryptology–EUROCRYPT 2008, 146-162, 2008 | 1227 | 2008 |

Chosen-ciphertext security from identity-based encryption R Canetti, S Halevi, J Katz Advances in Cryptology-Eurocrypt 2004, 207-222, 2004 | 1007 | 2004 |

A forward-secure public-key encryption scheme R Canetti, S Halevi, J Katz Advances in Cryptology—Eurocrypt 2003, 646-646, 2003 | 924 | 2003 |

Faster Secure Two-Party Computation Using Garbled Circuits D Evans, L Malka, J Katz, Y Huang | 707 | 2011 |

Faster secure two-party computation using garbled circuits Y Huang, D Evans, J Katz, L Malka USENIX Security Symposium, 2011 | 707 | 2011 |

Efficient password-authenticated key exchange using human-memorable passwords J Katz, R Ostrovsky, M Yung Advances in Cryptology—EUROCRYPT 2001, 475-494, 2001 | 531 | 2001 |

Key-insulated public key cryptosystems Y Dodis, J Katz, S Xu, M Yung Advances in Cryptology—Eurocrypt 2002, 65-82, 2002 | 512 | 2002 |

Toward secure key distribution in truly ad-hoc networks A Khalili, J Katz, WA Arbaugh 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings …, 2003 | 487 | 2003 |

Scalable protocols for authenticated group key exchange J Katz, M Yung Advances in Cryptology-CRYPTO 2003, 110-125, 2003 | 481 | 2003 |

Proofs of storage from homomorphic identification protocols G Ateniese, S Kamara, J Katz Advances in Cryptology–ASIACRYPT 2009, 319-333, 2009 | 459 | 2009 |

Ring signatures: Stronger definitions, and constructions without random oracles A Bender, J Katz, R Morselli Journal of Cryptology 22 (1), 114-138, 2008 | 403 | 2008 |

Chosen-ciphertext security from identity-based encryption D Boneh, R Canetti, S Halevi, J Katz SIAM Journal on Computing 36 (5), 1301-1328, 2007 | 378 | 2007 |

Signing a linear subspace: Signature schemes for network coding D Boneh, D Freeman, J Katz, B Waters Public Key Cryptography–PKC 2009, 68-87, 2009 | 371 | 2009 |