Follow
Shabsi Walfish
Shabsi Walfish
Google
Verified email at cs.nyu.edu
Title
Cited by
Cited by
Year
Universally composable security with global setup
R Canetti, Y Dodis, R Pass, S Walfish
Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007 …, 2007
4642007
Public-key encryption in the bounded-retrieval model
J Alwen, Y Dodis, M Naor, G Segev, S Walfish, D Wichs
Advances in Cryptology–EUROCRYPT 2010: 29th Annual International Conference …, 2010
2562010
Perfectly secure password protocols in the bounded retrieval model
G Di Crescenzo, R Lipton, S Walfish
Theory of Cryptography Conference, 225-244, 2006
1742006
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface
M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ...
Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006
1222006
Composability and on-line deniability of authentication
Y Dodis, J Katz, A Smith, S Walfish
Theory of Cryptography: 6th Theory of Cryptography Conference, TCC 2009, San …, 2009
862009
Intrusion-resilient key exchange in the bounded retrieval model
D Cash, YZ Ding, Y Dodis, W Lee, R Lipton, S Walfish
Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007 …, 2007
822007
Versatile padding schemes for joint signature and encryption
Y Dodis, MJ Freedman, S Jarecki, S Walfish
Proceedings of the 11th ACM conference on Computer and Communications …, 2004
442004
Efficient constructions of composable commitments and zero-knowledge proofs
Y Dodis, V Shoup, S Walfish
Advances in Cryptology–CRYPTO 2008: 28th Annual International Cryptology …, 2008
362008
Optimal signcryption from any trapdoor permutation
Y Dodis, MJ Freedman, S Jarecki, S Walfish
Cryptology ePrint Archive, 2004
352004
Enhanced security models for network protocols
S Walfish
New York University, 2008
182008
A Parallel Signcryption Standard Using RSA with PSEP
A Rawat, S Walfish
Project Report, 2003
72003
Parallel signcryption with oaep, pss-r, and other feistel paddings
Y Dodis, MJ Freedman, S Walfish
Cryptology ePrint Archive, 2003
62003
Fully Simulatable Multiparty Computation
Y Dodis, R Pass, S Walfish
Manuscript, 2005
42005
Intrusionresilient authentication in the Limited Communication Model
D Cash, YZ Ding, Y Dodis, W Lee, R Lipton, S Walfish
Cryptology ePrint Archive, 2005
12005
The system can't perform the operation now. Try again later.
Articles 1–14