What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Oded Goldreich
Google Scholar
ORCID:
0000-0002-4329-135X
46
publications in security and cryptology related venues
Year
Venue
Title
2013
journals/joc
Enhancements of Trapdoor Permutations.
Oded Goldreich
Ron D. Rothblum
2013
journals/joc
More Constructions of Lossy and Correlation-Secure Trapdoor Functions.
David Mandell Freeman
Oded Goldreich
Eike Kiltz
Alon Rosen
Gil Segev
2010
journals/joc
On Expected Probabilistic Polynomial-Time Adversaries: A Suggestion for Restricted Definitions and Their Benefits.
Oded Goldreich
2010
conf/pkc
More Constructions of Lossy and Correlation-Secure Trapdoor Functions.
David Mandell Freeman
Oded Goldreich
Eike Kiltz
Alon Rosen
Gil Segev
2007
conf/tcc
On Expected Probabilistic Polynomial-Time Adversaries: A Suggestion for Restricted Definitions and Their Benefits.
Oded Goldreich
2006
journals/joc
Session-Key Generation Using Human Passwords Only.
Oded Goldreich
Yehuda Lindell
2004
journals/joc
Preface.
Oded Goldreich
2004
conf/tcc
On the Random-Oracle Methodology as Applied to Length-Restricted Signature Schemes.
Ran Canetti
Oded Goldreich
Shai Halevi
2003
journals/joc
On the Security of Modular Exponentiation with Application to the Construction of Pseudorandom Generators.
Oded Goldreich
Vered Rosen
2001
conf/crypto
Session-Key Generation Using Human Passwords Only.
Oded Goldreich
Yehuda Lindell
2001
conf/crypto
On the (Im)possibility of Obfuscating Programs.
Boaz Barak
Oded Goldreich
Russell Impagliazzo
Steven Rudich
Amit Sahai
Salil P. Vadhan
Ke Yang
2000
journals/joc
Preface.
Oded Goldreich
1999
conf/crypto
Stateless Evaluation of Pseudorandom Functions: Security beyond the Birthday Barrier.
Mihir Bellare
Oded Goldreich
Hugo Krawczyk
1999
conf/crypto
Can Statistical Zero Knowledge Be Made Non-interactive? or On the Relationship of SZK and NISZK.
Oded Goldreich
Amit Sahai
Salil P. Vadhan
1998
conf/crypto
Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop.
Oded Goldreich
Birgit Pfitzmann
Ronald L. Rivest
1997
conf/crypto
Public-Key Cryptosystems from Lattice Reduction Problems.
Oded Goldreich
Shafi Goldwasser
Shai Halevi
1997
conf/crypto
On the Foundations of Modern Cryptography.
Oded Goldreich
1997
conf/crypto
Eliminating Decryption Errors in the Ajtai-Dwork Cryptosystem.
Oded Goldreich
Shafi Goldwasser
Shai Halevi
1996
journals/joc
On-Line/Off-Line Digital Signatures.
Shimon Even
Oded Goldreich
Silvio Micali
1996
journals/joc
How to Construct Constant-Round Zero-Knowledge Proof Systems for NP.
Oded Goldreich
Ariel Kahan
1995
conf/crypto
Honest Verifier vs Dishonest Verifier in Public Coin Zero-Knowledge Proofs.
Ivan Damgård
Oded Goldreich
Tatsuaki Okamoto
Avi Wigderson
1994
journals/joc
Definitions and Properties of Zero-Knowledge Proof Systems.
Oded Goldreich
Yair Oren
1994
conf/crypto
Incremental Cryptography: The Case of Hashing and Signing.
Mihir Bellare
Oded Goldreich
Shafi Goldwasser
1993
journals/joc
A Perfect Zero-Knowledge Proof System for a Problem Equivalent to the Discrete Logarithm.
Oded Goldreich
Eyal Kushilevitz
1993
journals/joc
A Uniform-Complexity Treatment of Encryption and Zero-Knowledge.
Oded Goldreich
1992
conf/crypto
On Defining Proofs of Knowledge.
Mihir Bellare
Oded Goldreich
1989
conf/crypto
Sparse Pseudorandom Distributions.
Oded Goldreich
Hugo Krawczyk
1989
conf/crypto
On-Line/Off-Line Digital Schemes.
Shimon Even
Oded Goldreich
Silvio Micali
1988
conf/crypto
A Perfect Zero-Knowledge Proof for a Problem Equivalent to Discrete Logarithm.
Oded Goldreich
Eyal Kushilevitz
1988
conf/crypto
Everything Provable is Provable in Zero-Knowledge.
Michael Ben-Or
Oded Goldreich
Shafi Goldwasser
Johan Håstad
Joe Kilian
Silvio Micali
Phillip Rogaway
1988
conf/crypto
On the Existence of Pseudorandom Generators.
Oded Goldreich
Hugo Krawczyk
Michael Luby
1987
conf/crypto
How to Solve any Protocol Problem - An Efficiency Improvement.
Oded Goldreich
Ronen Vainish
1986
conf/crypto
Two Remarks Concerning the Goldwasser-Micali-Rivest Signature Scheme.
Oded Goldreich
1986
conf/crypto
Towards a Theory of Software Protection.
Oded Goldreich
1986
conf/crypto
How to Prove all NP-Statements in Zero-Knowledge, and a Methodology of Cryptographic Protocol Design.
Oded Goldreich
Silvio Micali
Avi Wigderson
1985
conf/crypto
The Bit Security of Modular Squaring Given Partial Factorization of the Modulos.
Benny Chor
Oded Goldreich
Shafi Goldwasser
1985
conf/crypto
On the Security of Ping-Pong Protocols when Implemented using the RSA.
Shimon Even
Oded Goldreich
Adi Shamir
1984
conf/crypto
RSA/Rabin Least Significant Bits are 1/2 + 1/(poly(log N)) Secure.
Benny Chor
Oded Goldreich
1984
conf/crypto
On the Cryptographic Applications of Random Functions.
Oded Goldreich
Shafi Goldwasser
Silvio Micali
1984
conf/eurocrypt
On the Number of Close-and-Equal Pairs of Bits in a String.
Oded Goldreich
1984
conf/eurocrypt
On Concurrent Identification Protocols.
Oded Goldreich
1983
conf/crypto
Electronic Wallet.
Shimon Even
Oded Goldreich
1983
conf/crypto
On the Power of Cascade Ciphers.
Shimon Even
Oded Goldreich
1983
conf/crypto
A Simple Protocol for Signing Contracts.
Oded Goldreich
1982
conf/crypto
A Randomized Protocol for Signing Contracts.
Shimon Even
Oded Goldreich
Abraham Lempel
1982
conf/crypto
On the Security of Multi-Party Ping-Pong Protocols.
Shimon Even
Oded Goldreich
Coauthors
Abraham Lempel
(1)
Adi Shamir
(1)
Alon Rosen
(2)
Amit Sahai
(2)
Ariel Kahan
(1)
Avi Wigderson
(2)
Benny Chor
(2)
Birgit Pfitzmann
(1)
Boaz Barak
(1)
David Mandell Freeman
(2)
Eike Kiltz
(2)
Eyal Kushilevitz
(2)
Gil Segev
(2)
Hugo Krawczyk
(3)
Ivan Damgård
(1)
Joe Kilian
(1)
Johan Håstad
(1)
Ke Yang
(1)
Michael Ben-Or
(1)
Michael Luby
(1)
Mihir Bellare
(3)
Oded Goldreich
(46)
Phillip Rogaway
(1)
Ran Canetti
(1)
Ron D. Rothblum
(1)
Ronald L. Rivest
(1)
Ronen Vainish
(1)
Russell Impagliazzo
(1)
Salil P. Vadhan
(2)
Shafi Goldwasser
(6)
Shai Halevi
(3)
Shimon Even
(7)
Silvio Micali
(5)
Steven Rudich
(1)
Tatsuaki Okamoto
(1)
Vered Rosen
(1)
Yair Oren
(1)
Yehuda Lindell
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to