Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Hoeteck Wee
Search web for home page
Program Committees
1
2013
TCC
pc
2
2013
PKC
pc
3
2011
Crypto
pc
4
2011
Asiacrypt
pc
5
2010
Crypto
pc
6
2010
Asiacrypt
pc
7
2008
TCC
pc
Publications
year
title
booktitle
pages
1
2012
Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices
pkc
280-297
2
2012
Public Key Encryption against Related Key Attacks
pkc
262-279
3
2012
Efficient Password Authenticated Key Exchange via Oblivious Transfer
pkc
449-466
4
2012
Dual Projective Hashing and Its Applications - Lossy Trapdoor Functions and More
eurocrypt
246-262
5
2012
Functional Encryption with Bounded Collusions via Multi-party Computation
crypto
162-179
6
2011
Threshold and Revocation Cryptosystems via Extractable Hash Proofs
eurocrypt
589
7
2010
Efficient Chosen-Ciphertext Security via Extractable Hash Proofs
crypto
314-332
8
2010
Constant-Round Non-malleable Commitments from Sub-exponential One-Way Functions
eurocrypt
638-655
9
2010
Universal One-Way Hash Functions via Inaccessible Entropy
eurocrypt
616-637
10
2010
Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
eurocrypt
381-402
11
2010
Universal One-Way Hash Functions via Inaccessible Entropy
eprint
online
12
2009
Zero Knowledge in the Random Oracle Model, Revisited
asiacrypt
417-434
13
2009
Improved Non-committing Encryption with Applications to Adaptively Secure Protocols
asiacrypt
287-302
14
2009
Simple, Black-Box Constructions of Adaptively Secure Protocols
tcc
387-402
15
2009
Black-Box Constructions of Two-Party Protocols from One-Way Functions
tcc
403-418
16
2008
Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One
tcc
427-444
17
2007
Lower Bounds for Non-interactive Zero-Knowledge
tcc
103-117
18
2007
Amplifying Collision Resistance: A Complexity-Theoretic Treatment
crypto
264-283
19
2007
One-Way Permutations, Interactive Hashing and Statistically Hiding Commitments
tcc
419-433
20
2006
Finding Pessiland
tcc
online
21
2005
Toward Privacy in Public Databases
tcc
online
22
2005
On Obfuscating Point Functions
eprint
online
23
2005
Pebbling and Proofs of Work
crypto
online
24
2005
On Hardness Amplification of One-Way Functions
tcc
online
Coauthors of Hoeteck Wee
Shweta Agrawal
Xavier Boyen
Ran Canetti
Shuchi Chawla
Seung Geol Choi
Dana Dachman-Soled
Cynthia Dwork
Serge Fehr
Sergey Gorbunov
Iftach Haitner
Dennis Hofheinz
Thomas Holenstein
Eike Kiltz
Henry Lin
Tal Malkin
Frank McSherry
Moni Naor
Rafael Pass
Omer Reingold
Ronald L. Rivest
Adam Smith
Madhu Sudan
Luca Trevisan
Salil P. Vadhan
Vinod Vaikuntanathan
Panagiotis Voulgaris