1 | 2017 | TCC | pc |
year | title | booktitle | pages | |
---|---|---|---|---|
1 | 2016 | Reusable Fuzzy Extractors for Low-Entropy Distributions | eurocrypt | online |
2 | 2016 | When Are Fuzzy Extractors Possible? | asiacrypt | online |
3 | 2015 | A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy | jofc | 671-717 |
4 | 2015 | Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy | eprint | 857 |
5 | 2014 | Key Derivation From Noisy Sources With More Errors Than Entropy | eprint | 243 |
6 | 2013 | Computational Fuzzy Extractors | asiacrypt | 174-193 |
7 | 2012 | A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy | tcc | online |