Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Ran Canetti
Search web for home page
Program Committees
1
2012
Crypto
pc chair
2
2010
Eurocrypt
pc
3
2008
TCC
pc chair
4
2007
TCC
pc
5
2004
TCC
pc
6
2001
Crypto
pc
7
2000
Crypto
pc
Publications
year
title
booktitle
pages
1
2012
Efficient Password Authenticated Key Exchange via Oblivious Transfer
pkc
449-466
2
2012
Leakage-Tolerant Interactive Protocols
tcc
266-284
3
2011
Program Obfuscation with Leaky Hardware
asiacrypt
722-739
4
2011
Towards a Game Theoretic View of Secure Computation
eurocrypt
426
5
2011
Secure Computation Without Authentication
jofc
720-760
6
2011
Universally Composable Symbolic Security Analysis
jofc
83-147
7
2010
On Strong Simulation and Composable Point Obfuscation
eprint
online
8
2010
On Symmetric Encryption and Point Obfuscation
tcc
52-71
9
2010
Obfuscation of Hyperplane Membership
tcc
72-89
10
2010
Composable Security Analysis of OS Services
eprint
online
11
2010
On Strong Simulation and Composable Point Obfuscation
crypto
520-537
12
2010
Universally Composable Symbolic Analysis of Diffie-Hellman based Key Exchange
eprint
online
13
2010
On Symmetric Encryption and Point Obfuscation
eprint
online
14
2009
Towards a Theory of Extractable Functions
tcc
595-613
15
2009
Non-malleable Obfuscation
tcc
73-90
16
2008
How to Protect Yourself without Perfect Shredding
eprint
online
17
2008
Non-Malleable Obfuscation
eprint
online
18
2008
Obfuscating Point Functions with Multibit Output
eurocrypt
489-508
19
2008
Modeling Computational Security in Long-Lived Systems, Version 2
eprint
online
20
2007
Universally Composable Security with Global Setup
tcc
61-85
21
2007
Amplifying Collision Resistance: A Complexity-Theoretic Treatment
crypto
264-283
22
2007
On the Role of Scheduling in Simulation-Based Security
eprint
online
23
2007
How to Model Bounded Computation in Long-Lived Systems
eprint
online
24
2007
Chosen-Ciphertext Secure Proxy Re-Encryption
eprint
online
25
2007
Secure Computation Without Authentication
eprint
online
26
2007
Obtaining Universally Composable Security: Towards the Bare Bones of Trust
eprint
online
27
2007
Obtaining Universally Compoable Security: Towards the Bare Bones of Trust
asiacrypt
88-112
28
2007
A Forward-Secure Public-Key Encryption Scheme
jofc
265-294
29
2006
Mitigating Dictionary Attacks on Password-Protected Local Storage
eprint
online
30
2006
Universally Composable Symbolic Analysis of Mutual Authentication and Key-Exchange Protocols
tcc
online
31
2006
On the Limitations of Universally Composable Two-Party Computation Without Set-Up Assumptions
jofc
135-167
32
2006
Mitigating Dictionary Attacks on Password-Protected Local Storage
crypto
online
33
2006
Universally Composable Security with Global Setup
eprint
online
34
2006
Security and Composition of Cryptographic Protocols: A Tutorial
eprint
online
35
2005
Adaptively-Secure, Non-interactive Public-Key Encryption
tcc
online
36
2005
Hardness Amplification of Weakly Verifiable Puzzles
tcc
online
37
2005
Preface
jofc
187-189
38
2005
Universally Composable Password-Based Key Exchange
eurocrypt
online
39
2005
Secure Computation Without Authentication
crypto
online
40
2005
Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol
eprint
online
41
2005
Universally Composable Password-Based Key Exchange
eprint
online
42
2004
Hardness amplification of weakly verifiable puzzles
eprint
online
43
2004
Universally Composable Symbolic Analysis of Cryptographic Protocols (The case of encryption-based mutual authentication and key exchange)
eprint
online
44
2004
On the Random-Oracle Methodology as Applied to Length-Restricted Signature Schemes
tcc
40-57
45
2004
On the Limitations of Universally Composable Two-Party Computation Without Set-up Assumptions
eprint
online
46
2004
Adaptive versus Non-Adaptive Security of Multi-Party Protocols
jofc
153-207
47
2004
Chosen-Ciphertext Security from Identity-Based Encryption
eurocrypt
online
48
2004
Adaptively-Secure, Non-Interactive Public-Key Encryption
eprint
online
49
2003
A Forward-Secure Public-Key Encryption Scheme
eprint
online
50
2003
Relaxing Chosen-Ciphertext Security
crypto
online
51
2003
Universal Composition with Joint State
crypto
online
52
2003
On the random-oracle methodology as applied to length-restricted signature schemes
eprint
online
53
2003
Relaxing Chosen-Ciphertext Security
eprint
online
54
2003
Chosen-Ciphertext Security from Identity-Based Encryption
eprint
online
55
2003
A Forward-Secure Public-Key Encryption Scheme
eurocrypt
online
56
2003
On the Limitations of Universally Composable Two-Party Computation without Set-up Assumptions
eurocrypt
online
57
2003
Universally Composable Signatures, Certification and Authentication
eprint
online
58
2002
Security Analysis of IKE's Signature-Based Key-Exchange Protocol
crypto
online
59
2002
Universal Composition with Joint State
eprint
online
60
2002
Universally Composable Notions of Key Exchange and Secure Channels
eprint
online
61
2002
Security Analysis of IKE's Signature-based Key-Exchange Protocol
eprint
online
62
2002
Universally Composable Two-Party and Multi-Party Secure Computation
eprint
online
63
2002
Universally Composable Notions of Key Exchange and Secure Channels
eurocrypt
online
64
2001
Universally Composable Commitments
crypto
19-40
65
2001
On Adaptive vs. Non-adaptive Security of Multiparty Protocols
eurocrypt
262-279
66
2001
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
eurocrypt
453-474
67
2001
On adaptive vs. non-adaptive security of multiparty protocols
eprint
online
68
2001
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
eprint
online
69
2001
Black-Box Concurrent Zero-Knowledge Requires $\tilde\Omega(\log n)$ Rounds
eprint
online
70
2001
Universally Composable Commitments
eprint
online
71
2000
Security and Composition of Multiparty Cryptographic Protocols
jofc
143-202
72
2000
Maintaining Authenticated Communication in the Presence of Break-Ins
jofc
61-105
73
2000
Randomness versus Fault-Tolerance
jofc
107-142
74
2000
Exposure-Resilient Functions and All-or-Nothing Transforms
eurocrypt
453-469
75
2000
Universally Composable Security: A New Paradigm for Cryptographic Protocols
eprint
online
76
1999
Adaptive Security for Threshold Cryptosystems
crypto
98-115
77
1999
Resettable Zero-Knowledge
eprint
online
78
1999
An Efficient
Threshold
Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack
eurocrypt
90-106
79
1999
Efficient Communication-Storage Tradeoffs for Multicast Encryption
eurocrypt
459-474
80
1998
A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols
eprint
online
81
1998
The Random Oracle Methodology, Revisited
eprint
online
82
1998
Maintaining Authenticated Communication in the Presence of Break-ins
eprint
online
83
1998
Randomness versus Fault-Tolerance
eprint
online
84
1998
Security and Composition of Multi-party Cryptographic Protocols
eprint
online
85
1997
Towards realizing random oracles: Hash functions that hide all partial information
eprint
online
86
1997
Towards Realizing Random Oracles: Hash Functions That Hide All Partial Information
crypto
455-469
87
1997
Deniable Encryption
crypto
90-104
88
1996
Deniable Encryption
eprint
online
89
1996
Keying Hash Functions for Message Authentication
crypto
1-15
90
1994
Maintaining Security in the Presence of Transient Faults
crypto
425-438
Coauthors of Ran Canetti
Gilad Asharov
Boaz Barak
Mihir Bellare
Nir Bitansky
Suresh Chari
Ling Cheung
Dana Dachman-Soled
Ronny Ramzi Dakdouk
Ivan Damgård
Yevgeniy Dodis
Cynthia Dwork
Stefan Dziembowski
Dror Eiger
Marc Fischlin
Sebastian Gajek
Rosario Gennaro
Oded Goldreich
Shafi Goldwasser
Shai Halevi
Carmit Hazay
Amir Herzberg
Jonathan Herzog
Susan Hohenberger
Yuval Ishai
Stanislaw Jarecki
Yael Tauman Kalai
Jonathan Katz
Dilsun Kaynar
Joe Kilian
Hugo Krawczyk
Eyal Kushilevitz
Dah-Yoh Lim
Yehuda Lindell
Moses Liskov
Nancy Lynch
Philip D. MacKenzie
Tal Malkin
Silvio Micali
Moni Naor
Jesper Buus Nielsen
Kobbi Nissim
Rafail Ostrovsky
Rafael Pass
Olivier Pereira
Erez Petrank
Birgit Pfitzmann
Tal Rabin
Ronald L. Rivest
Adi Rosén
Alon Rosen
Guy N. Rothblum
Arnab Roy
Amit Sahai
Roberto Segala
Michael Steiner
Madhu Sudan
Luca Trevisan
Salil P. Vadhan
Vinod Vaikuntanathan
Mayank Varia
Wietse Venema
Shabsi Walfish
Hoeteck Wee
Daniel Wichs