Universally composable security with global setup R Canetti, Y Dodis, R Pass, S Walfish Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007 …, 2007 | 481 | 2007 |
Public-key encryption in the bounded-retrieval model J Alwen, Y Dodis, M Naor, G Segev, S Walfish, D Wichs Advances in Cryptology–EUROCRYPT 2010: 29th Annual International Conference …, 2010 | 258 | 2010 |
Perfectly secure password protocols in the bounded retrieval model G Di Crescenzo, R Lipton, S Walfish Theory of Cryptography Conference, 225-244, 2006 | 176 | 2006 |
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ... Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006 | 112 | 2006 |
Composability and on-line deniability of authentication Y Dodis, J Katz, A Smith, S Walfish Theory of Cryptography: 6th Theory of Cryptography Conference, TCC 2009, San …, 2009 | 89 | 2009 |
Intrusion-resilient key exchange in the bounded retrieval model D Cash, YZ Ding, Y Dodis, W Lee, R Lipton, S Walfish Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007 …, 2007 | 82 | 2007 |
Versatile padding schemes for joint signature and encryption Y Dodis, MJ Freedman, S Jarecki, S Walfish Proceedings of the 11th ACM conference on Computer and Communications …, 2004 | 44 | 2004 |
Efficient constructions of composable commitments and zero-knowledge proofs Y Dodis, V Shoup, S Walfish Advances in Cryptology–CRYPTO 2008: 28th Annual International Cryptology …, 2008 | 37 | 2008 |
Optimal signcryption from any trapdoor permutation Y Dodis, MJ Freedman, S Jarecki, S Walfish Cryptology ePrint Archive, 2004 | 35 | 2004 |
Enhanced security models for network protocols S Walfish New York University, 2008 | 18 | 2008 |
A Parallel Signcryption Standard Using RSA with PSEP A Rawat, S Walfish Project Report, 2003 | 7 | 2003 |
Parallel signcryption with oaep, pss-r, and other feistel paddings Y Dodis, MJ Freedman, S Walfish Cryptology ePrint Archive, 2003 | 6 | 2003 |
Fully Simulatable Multiparty Computation Y Dodis, R Pass, S Walfish Manuscript, 2005 | 4 | 2005 |
Intrusionresilient authentication in the Limited Communication Model D Cash, YZ Ding, Y Dodis, W Lee, R Lipton, S Walfish Cryptology ePrint Archive, 2005 | 1 | 2005 |