default search action
Ron Steinfeld
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j34]Shabnam Kasra Kermanshahi, Ron Steinfeld, Xun Yi, Joseph K. Liu, Surya Nepal, Junwei Lou:
Fast and private multi-dimensional range search over encrypted data. Inf. Sci. 652: 119773 (2024) - [j33]Raymond K. Zhao, Sarah McCarthy, Ron Steinfeld, Amin Sakzad, Máire O'Neill:
Quantum-Safe HIBE: Does It Cost a Latte? IEEE Trans. Inf. Forensics Secur. 19: 2680-2695 (2024) - [j32]Wai-Kong Lee, Raymond K. Zhao, Ron Steinfeld, Amin Sakzad, Seong Oun Hwang:
High Throughput Lattice-Based Signatures on GPUs: Comparing Falcon and Mitaka. IEEE Trans. Parallel Distributed Syst. 35(4): 675-692 (2024) - [c94]Xinyu Zhang, Ron Steinfeld, Joseph K. Liu, Muhammed F. Esgin, Dongxi Liu, Sushmita Ruj:
DualRing-PRF: Post-quantum (Linkable) Ring Signatures from Legendre and Power Residue PRFs. ACISP (2) 2024: 124-143 - [c93]Ron Steinfeld, Amin Sakzad, Muhammed F. Esgin, Veronika Kuchta, Mert Yassi, Raymond K. Zhao:
LUNA: Quasi-Optimally Succinct Designated-Verifier Zero-Knowledge Arguments from Lattices. CCS 2024: 3167-3181 - [c92]Ron Steinfeld:
Lattice-Based Cryptography: From Protocol Design to Fast and Secure Implementation. CCSW@CCS 2024: 1 - [c91]Xinyu Zhang, Ron Steinfeld, Muhammed F. Esgin, Joseph K. Liu, Dongxi Liu, Sushmita Ruj:
Loquat: A SNARK-Friendly Post-quantum Signature Based on the Legendre PRF with Applications in Ring and Aggregate Signatures. CRYPTO (1) 2024: 3-38 - [c90]Hans Schmiedel, Runchao Han, Qiang Tang, Ron Steinfeld, Jiangshan Yu:
Modeling Mobile Crash in Byzantine Consensus. CSF 2024: 159-171 - [c89]Muhammed F. Esgin, Thomas Espitau, Guilhem Niot, Thomas Prest, Amin Sakzad, Ron Steinfeld:
Plover: Masking-Friendly Hash-and-Sign Lattice Signatures. EUROCRYPT (6) 2024: 316-345 - [i71]Muhammed F. Esgin, Thomas Espitau, Guilhem Niot, Thomas Prest, Amin Sakzad, Ron Steinfeld:
Plover: Masking-Friendly Hash-and-Sign Lattice Signatures. IACR Cryptol. ePrint Arch. 2024: 401 (2024) - [i70]Hans Schmiedel, Runchao Han, Qiang Tang, Ron Steinfeld, Jiangshan Yu:
Modeling Mobile Crash in Byzantine Consensus. IACR Cryptol. ePrint Arch. 2024: 452 (2024) - [i69]Xinyu Zhang, Ron Steinfeld, Muhammed F. Esgin, Joseph K. Liu, Dongxi Liu, Sushmita Ruj:
Loquat: A SNARK-Friendly Post-Quantum Signature based on the Legendre PRF with Applications in Ring and Aggregate Signatures. IACR Cryptol. ePrint Arch. 2024: 868 (2024) - [i68]Xinyu Zhang, Ron Steinfeld, Joseph K. Liu, Muhammed F. Esgin, Dongxi Liu, Sushmita Ruj:
DualRing-PRF: Post-Quantum (Linkable) Ring Signatures from Legendre and Power Residue PRFs. IACR Cryptol. ePrint Arch. 2024: 985 (2024) - [i67]Muhammed F. Esgin, Ron Steinfeld, Erkan Tairi, Jie Xu:
LeOPaRd: Towards Practical Post-Quantum Oblivious PRFs via Interactive Lattice Problems. IACR Cryptol. ePrint Arch. 2024: 1615 (2024) - 2023
- [j31]Maxime Buser, Rafael Dowsley, Muhammed F. Esgin, Clémentine Gritti, Shabnam Kasra Kermanshahi, Veronika Kuchta, Jason T. LeGrow, Joseph K. Liu, Raphaël C.-W. Phan, Amin Sakzad, Ron Steinfeld, Jiangshan Yu:
A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions. ACM Comput. Surv. 55(12): 251:1-251:32 (2023) - [j30]Shifeng Sun, Ron Steinfeld, Amin Sakzad:
Incremental symmetric puncturable encryption with support for unbounded number of punctures. Des. Codes Cryptogr. 91(4): 1401-1426 (2023) - [j29]Steven D. Galbraith, Rosario Gennaro, Carla Ràfols, Ron Steinfeld:
Guest editorial: Special issue on Mathematics of Zero-Knowledge. Des. Codes Cryptogr. 91(11): 3331-3332 (2023) - [c88]Muhammed F. Esgin, Oguzhan Ersoy, Veronika Kuchta, Julian Loss, Amin Sakzad, Ron Steinfeld, Xiangwen Yang, Raymond K. Zhao:
A New Look at Blockchain Leader Election: Simple, Efficient, Sustainable and Post-Quantum. AsiaCCS 2023: 623-637 - [c87]Ron Steinfeld:
Post-Quantum Zero-Knowledge Proofs and Applications. APKC@AsiaCCS 2023: 1 - [c86]George Tasopoulos, Charis Dimopoulos, Apostolos P. Fournaris, Raymond K. Zhao, Amin Sakzad, Ron Steinfeld:
Energy Consumption Evaluation of Post-Quantum TLS 1.3 for Resource-Constrained Embedded Devices. CF 2023: 366-374 - [c85]Muhammed F. Esgin, Ron Steinfeld, Dongxi Liu, Sushmita Ruj:
Efficient Hybrid Exact/Relaxed Lattice Proofs and Applications to Rounding and VRFs. CRYPTO (5) 2023: 484-517 - [e12]Jian Guo, Ron Steinfeld:
Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part I. Lecture Notes in Computer Science 14438, Springer 2023, ISBN 978-981-99-8720-7 [contents] - [e11]Jian Guo, Ron Steinfeld:
Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part II. Lecture Notes in Computer Science 14439, Springer 2023, ISBN 978-981-99-8723-8 [contents] - [e10]Jian Guo, Ron Steinfeld:
Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part III. Lecture Notes in Computer Science 14440, Springer 2023, ISBN 978-981-99-8726-9 [contents] - [e9]Jian Guo, Ron Steinfeld:
Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part IV. Lecture Notes in Computer Science 14441, Springer 2023, ISBN 978-981-99-8729-0 [contents] - [e8]Jian Guo, Ron Steinfeld:
Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part V. Lecture Notes in Computer Science 14442, Springer 2023, ISBN 978-981-99-8732-0 [contents] - [e7]Jian Guo, Ron Steinfeld:
Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part VI. Lecture Notes in Computer Science 14443, Springer 2023, ISBN 978-981-99-8735-1 [contents] - [e6]Jian Guo, Ron Steinfeld:
Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part VII. Lecture Notes in Computer Science 14444, Springer 2023, ISBN 978-981-99-8738-2 [contents] - [e5]Jian Guo, Ron Steinfeld:
Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part VIII. Lecture Notes in Computer Science 14445, Springer 2023, ISBN 978-981-99-8741-2 [contents] - [i66]Sara Jafarbeiki, Amin Sakzad, Ron Steinfeld, Shabnam Kasra Kermanshahi, Chandra Thapa, Yuki Kume:
ACE: A Consent-Embedded privacy-preserving search on genomic database. CoRR abs/2307.12285 (2023) - [i65]Wai-Kong Lee, Raymond K. Zhao, Ron Steinfeld, Amin Sakzad, Seong Oun Hwang:
High Throughput Lattice-based Signatures on GPUs: Comparing Falcon and Mitaka. IACR Cryptol. ePrint Arch. 2023: 399 (2023) - [i64]George Tasopoulos, Charis Dimopoulos, Apostolos P. Fournaris, Raymond K. Zhao, Amin Sakzad, Ron Steinfeld:
Energy Consumption Evaluation of Post-Quantum TLS 1.3 for Resource-Constrained Embedded Devices. IACR Cryptol. ePrint Arch. 2023: 506 (2023) - 2022
- [j28]Katharina Boudgoust, Amin Sakzad, Ron Steinfeld:
Vandermonde meets Regev: public key encryption schemes based on partial Vandermonde problems. Des. Codes Cryptogr. 90(8): 1899-1936 (2022) - [j27]Shabnam Kasra Kermanshahi, Rafael Dowsley, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Surya Nepal, Xun Yi, Shangqi Lai:
Range search on encrypted spatial data with dynamic updates. J. Comput. Secur. 30(6): 829-849 (2022) - [j26]Shifeng Sun, Cong Zuo, Joseph K. Liu, Amin Sakzad, Ron Steinfeld, Tsz Hon Yuen, Xingliang Yuan, Dawu Gu:
Non-Interactive Multi-Client Searchable Encryption: Realization and Implementation. IEEE Trans. Dependable Secur. Comput. 19(1): 452-467 (2022) - [j25]Shabnam Kasra Kermanshahi, Shifeng Sun, Joseph K. Liu, Ron Steinfeld, Surya Nepal, Wang Fat Lau, Man Ho Allen Au:
Geometric Range Search on Encrypted Data With Forward/Backward Security. IEEE Trans. Dependable Secur. Comput. 19(1): 698-716 (2022) - [j24]Shangqi Lai, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Dongxi Liu:
Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes. IEEE Trans. Dependable Secur. Comput. 19(4): 2609-2621 (2022) - [c84]Xiaohui Ding, Muhammed F. Esgin, Amin Sakzad, Ron Steinfeld:
An Injectivity Analysis of Crystals-Kyber and Implications on Quantum Security. ACISP 2022: 332-351 - [c83]Arash Mirzaei, Amin Sakzad, Jiangshan Yu, Ron Steinfeld:
Garrison: A Novel Watchtower Scheme for Bitcoin. ACISP 2022: 489-508 - [c82]Maxime Buser, Joseph K. Liu, Ron Steinfeld, Amin Sakzad:
Post-quantum ID-Based Ring Signatures from Symmetric-Key Primitives. ACNS 2022: 892-912 - [c81]Sara Jafarbeiki, Amin Sakzad, Shabnam Kasra Kermanshahi, Ron Steinfeld, Raj Gaire:
PRESSGenDB: PRivacy-prEserving Substring Search on Encrypted Genomic DataBase. INFOCOM Workshops 2022: 1-6 - [c80]George Tasopoulos, Jinhui Li, Apostolos P. Fournaris, Raymond K. Zhao, Amin Sakzad, Ron Steinfeld:
Performance Evaluation of Post-Quantum TLS 1.3 on Resource-Constrained Embedded Systems. ISPEC 2022: 432-451 - [c79]Arash Mirzaei, Amin Sakzad, Jiangshan Yu, Ron Steinfeld:
Daric: A Storage Efficient Payment Channel with Punishment Mechanism. ISC 2022: 229-249 - [c78]Muhammed F. Esgin, Ron Steinfeld, Raymond K. Zhao:
Efficient Verifiable Partially-Decryptable Commitments from Lattices and Applications. Public Key Cryptography (1) 2022: 317-348 - [c77]Muhammed F. Esgin, Ron Steinfeld, Raymond K. Zhao:
MatRiCT+: More Efficient Post-Quantum Private Blockchain Payments. SP 2022: 1281-1298 - [i63]Sara Jafarbeiki, Raj Gaire, Amin Sakzad, Shabnam Kasra Kermanshahi, Ron Steinfeld:
Collaborative analysis of genomic data: vision and challenges. CoRR abs/2202.04841 (2022) - [i62]Muhammed F. Esgin, Ron Steinfeld, Dongxi Liu, Sushmita Ruj:
Efficient Hybrid Exact/Relaxed Lattice Proofs and Applications to Rounding and VRFs. IACR Cryptol. ePrint Arch. 2022: 141 (2022) - [i61]Muhammed F. Esgin, Ron Steinfeld, Raymond K. Zhao:
Efficient Verifiable Partially-Decryptable Commitments from Lattices and Applications. IACR Cryptol. ePrint Arch. 2022: 142 (2022) - [i60]Maxime Buser, Joseph K. Liu, Ron Steinfeld, Amin Sakzad:
Post-Quantum ID-based Ring Signatures from Symmetric-key Primitives. IACR Cryptol. ePrint Arch. 2022: 416 (2022) - [i59]Katharina Boudgoust, Amin Sakzad, Ron Steinfeld:
Vandermonde meets Regev: Public Key Encryption Schemes Based on Partial Vandermonde Problems. IACR Cryptol. ePrint Arch. 2022: 679 (2022) - [i58]Muhammed F. Esgin, Oguzhan Ersoy, Veronika Kuchta, Julian Loss, Amin Sakzad, Ron Steinfeld, Wayne Yang, Raymond K. Zhao:
A New Look at Blockchain Leader Election: Simple, Efficient, Sustainable and Post-Quantum. IACR Cryptol. ePrint Arch. 2022: 993 (2022) - [i57]Maxime Buser, Rafael Dowsley, Muhammed F. Esgin, Clémentine Gritti, Shabnam Kasra Kermanshahi, Veronika Kuchta, Jason T. LeGrow, Joseph K. Liu, Raphael C.-W. Phan, Amin Sakzad, Ron Steinfeld, Jiangshan Yu:
A Survey on Exotic Signatures for Post-Quantum Blockchain: Challenges & Research Directions. IACR Cryptol. ePrint Arch. 2022: 1151 (2022) - [i56]Arash Mirzaei, Amin Sakzad, Jiangshan Yu, Ron Steinfeld:
Daric: A Storage Efficient Payment Channel With Penalization Mechanism. IACR Cryptol. ePrint Arch. 2022: 1295 (2022) - [i55]Arash Mirzaei, Amin Sakzad, Jiangshan Yu, Ron Steinfeld:
Garrison: A Novel Watchtower Scheme for Bitcoin. IACR Cryptol. ePrint Arch. 2022: 1300 (2022) - [i54]Ron Steinfeld, Amin Sakzad, Muhammed F. Esgin, Veronika Kuchta:
Private Re-Randomization for Module LWE and Applications to Quasi-Optimal ZK-SNARKs. IACR Cryptol. ePrint Arch. 2022: 1690 (2022) - [i53]Xiaohui Ding, Muhammed F. Esgin, Amin Sakzad, Ron Steinfeld:
An Injectivity Analysis of CRYSTALS-Kyber and Implications on Quantum Security. IACR Cryptol. ePrint Arch. 2022: 1757 (2022) - 2021
- [j23]Veronika Kuchta, Amin Sakzad, Ron Steinfeld, Joseph K. Liu:
Lattice-based zero-knowledge arguments for additive and multiplicative relations. Des. Codes Cryptogr. 89(5): 925-963 (2021) - [j22]Shabnam Kasra Kermanshahi, Joseph K. Liu, Ron Steinfeld, Surya Nepal, Shangqi Lai, Randolph Loh, Cong Zuo:
Multi-Client Cloud-Based Symmetric Searchable Encryption. IEEE Trans. Dependable Secur. Comput. 18(5): 2419-2437 (2021) - [c76]Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu:
Transparency or Anonymity Leak: Monero Mining Pools Data Publication. ACISP 2021: 433-450 - [c75]Sara Jafarbeiki, Raj Gaire, Amin Sakzad, Shabnam Kasra Kermanshahi, Ron Steinfeld:
Collaborative analysis of genomic data: vision and challenges. CIC 2021: 77-86 - [c74]Shabnam Kasra Kermanshahi, Rafael Dowsley, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Surya Nepal, Xun Yi:
Geo-DRS: Geometric Dynamic Range Search on Spatial Data with Backward and Content Privacy. ESORICS (2) 2021: 24-43 - [c73]Arash Mirzaei, Amin Sakzad, Jiangshan Yu, Ron Steinfeld:
FPPW: A Fair and Privacy Preserving Watchtower for Bitcoin. Financial Cryptography (2) 2021: 151-169 - [c72]Muhammed F. Esgin, Veronika Kuchta, Amin Sakzad, Ron Steinfeld, Zhenfei Zhang, Shifeng Sun, Shumo Chu:
Practical Post-quantum Few-Time Verifiable Random Function with Applications to Algorand. Financial Cryptography (2) 2021: 560-578 - [c71]Amin Sakzad, Ron Steinfeld:
Massive MIMO Physical Layer Cryptosystem: Bob cannot decrypt uniquely! GLOBECOM (Workshops) 2021: 1-6 - [c70]Sara Jafarbeiki, Amin Sakzad, Shabnam Kasra Kermanshahi, Ron Steinfeld, Raj Gaire, Shangqi Lai:
A Non-interactive Multi-user Protocol for Private Authorised Query Processing on Genomic Data. ISC 2021: 70-94 - [c69]Shifeng Sun, Ron Steinfeld, Shangqi Lai, Xingliang Yuan, Amin Sakzad, Joseph K. Liu, Surya Nepal, Dawu Gu:
Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy. NDSS 2021 - [c68]Julien Devevey, Amin Sakzad, Damien Stehlé, Ron Steinfeld:
On the Integer Polynomial Learning with Errors Problem. Public Key Cryptography (1) 2021: 184-214 - [i52]Sara Jafarbeiki, Amin Sakzad, Shabnam Kasra Kermanshahi, Raj Gaire, Ron Steinfeld, Shangqi Lai, Gad Abraham:
PrivGenDB: Efficient and privacy-preserving query executions over encrypted SNP-Phenotype database. CoRR abs/2104.02890 (2021) - [i51]Arash Mirzaei, Amin Sakzad, Jiangshan Yu, Ron Steinfeld:
FPPW: A Fair and Privacy Preserving Watchtower For Bitcoin. IACR Cryptol. ePrint Arch. 2021: 117 (2021) - [i50]Raymond K. Zhao, Sarah McCarthy, Ron Steinfeld, Amin Sakzad, Máire O'Neill:
Quantum-safe HIBE: does it cost a Latte? IACR Cryptol. ePrint Arch. 2021: 222 (2021) - [i49]Julien Devevey, Amin Sakzad, Damien Stehlé, Ron Steinfeld:
On the Integer Polynomial Learning with Errors Problem. IACR Cryptol. ePrint Arch. 2021: 277 (2021) - [i48]Veronika Kuchta, Amin Sakzad, Damien Stehlé, Ron Steinfeld, Shifeng Sun:
Measure-Rewind-Measure: Tighter Quantum Random Oracle Model Proofs for One-Way to Hiding and CCA Security. IACR Cryptol. ePrint Arch. 2021: 454 (2021) - [i47]Muhammed F. Esgin, Ron Steinfeld, Raymond K. Zhao:
MatRiCT+: More Efficient Post-Quantum Private Blockchain Payments. IACR Cryptol. ePrint Arch. 2021: 545 (2021) - [i46]George Tasopoulos, Jinhui Li, Apostolos P. Fournaris, Raymond K. Zhao, Amin Sakzad, Ron Steinfeld:
Performance Evaluation of Post-Quantum TLS 1.3 on Embedded Systems. IACR Cryptol. ePrint Arch. 2021: 1553 (2021) - 2020
- [j21]Raymond K. Zhao, Ron Steinfeld, Amin Sakzad:
FACCT: FAst, Compact, and Constant-Time Discrete Gaussian Sampler over Integers. IEEE Trans. Computers 69(1): 126-137 (2020) - [c67]Veronika Kuchta, Amin Sakzad, Damien Stehlé, Ron Steinfeld, Shifeng Sun:
Measure-Rewind-Measure: Tighter Quantum Random Oracle Model Proofs for One-Way to Hiding and CCA Security. EUROCRYPT (3) 2020: 703-728 - [c66]Shi Bai, Dipayan Das, Ryo Hiromasa, Miruna Rosca, Amin Sakzad, Damien Stehlé, Ron Steinfeld, Zhenfei Zhang:
MPSign: A Signature from Small-Secret Middle-Product Learning with Errors. Public Key Cryptography (2) 2020: 66-93 - [c65]Shifeng Sun, Amin Sakzad, Ron Steinfeld, Joseph K. Liu, Dawu Gu:
Public-Key Puncturable Encryption: Modular and Compact Constructions. Public Key Cryptography (1) 2020: 309-338 - [c64]Raymond K. Zhao, Ron Steinfeld, Amin Sakzad:
COSAC: COmpact and Scalable Arbitrary-Centered Discrete Gaussian Sampling over Integers. PQCrypto 2020: 284-303 - [c63]Veronika Kuchta, Amin Sakzad, Ron Steinfeld, Joseph K. Liu:
Efficient Lattice-Based Polynomial Evaluation and Batch ZK Arguments. SAC 2020: 3-33 - [i45]Shangqi Lai, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Dongxi Liu:
Towards Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes. CoRR abs/2001.01848 (2020) - [i44]Amin Sakzad, Ron Steinfeld:
Comments on "Physical-layer cryptography through massive MIMO". CoRR abs/2001.02632 (2020) - [i43]Shangqi Lai, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Dongxi Liu:
Towards Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes. IACR Cryptol. ePrint Arch. 2020: 20 (2020) - [i42]Shifeng Sun, Amin Sakzad, Ron Steinfeld, Joseph K. Liu, Dawu Gu:
Public-Key Puncturable Encryption: Modular and Compact Constructions. IACR Cryptol. ePrint Arch. 2020: 126 (2020) - [i41]Shi Bai, Dipayan Das, Ryo Hiromasa, Miruna Rosca, Amin Sakzad, Damien Stehlé, Ron Steinfeld, Zhenfei Zhang:
MPSign: A Signature from Small-Secret Middle-Product Learning with Errors. IACR Cryptol. ePrint Arch. 2020: 198 (2020) - [i40]Matthieu Monteiro, Kumara Kahatapitiya, Hassan Jameel Asghar, Kanchana Thilakarathna, Thierry Rakotoarivelo, Dali Kaafar, Shujun Li, Ron Steinfeld, Josef Pieprzyk:
Foxtail+: A Learning with Errors-based Authentication Protocol for Resource-Constrained Devices. IACR Cryptol. ePrint Arch. 2020: 261 (2020) - [i39]Wilson Abel Alberto Torres, Ron Steinfeld, Amin Sakzad, Veronika Kuchta:
Post-Quantum Linkable Ring Signature Enabling Distributed Authorised Ring Confidential Transactions in Blockchain. IACR Cryptol. ePrint Arch. 2020: 1121 (2020) - [i38]Muhammed F. Esgin, Veronika Kuchta, Amin Sakzad, Ron Steinfeld, Zhenfei Zhang, Shifeng Sun, Shumo Chu:
Practical Post-Quantum Few-Time Verifiable Random Function with Applications to Algorand. IACR Cryptol. ePrint Arch. 2020: 1222 (2020)
2010 – 2019
- 2019
- [j20]Ron Steinfeld, Amin Sakzad, Raymond K. Zhao:
Practical $$\mathsf {MP} \text{- }\mathsf {LWE} $$ -based encryption balancing security-risk versus efficiency. Des. Codes Cryptogr. 87(12): 2847-2884 (2019) - [c62]Wilson Abel Alberto Torres, Veronika Kuchta, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Jacob Cheng:
Lattice RingCT V2.0 with Multiple Input and Multiple Output Wallets. ACISP 2019: 156-175 - [c61]Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu:
Risk of Asynchronous Protocol Update: Attacks to Monero Protocols. ACISP 2019: 307-321 - [c60]Muhammed F. Esgin, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Dongxi Liu:
Short Lattice-Based One-out-of-Many Proofs and Applications to Ring Signatures. ACNS 2019: 67-88 - [c59]Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu, Fengkie Junis, Dony Ariadi Suwarsono:
Designing Smart Contract for Electronic Document Taxation. CANS 2019: 199-213 - [c58]Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu, Limerlina:
Senarai: A Sustainable Public Blockchain-Based Permanent Storage Protocol. CANS 2019: 235-246 - [c57]Lei Xu, Xingliang Yuan, Ron Steinfeld, Cong Wang, Chungen Xu:
Multi-Writer Searchable Encryption: An LWE-based Realization and Implementation. AsiaCCS 2019: 122-133 - [c56]Muhammed F. Esgin, Raymond K. Zhao, Ron Steinfeld, Joseph K. Liu, Dongxi Liu:
MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol. CCS 2019: 567-584 - [c55]Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu, Jiangshan Yu:
On The Unforkability of Monero. AsiaCCS 2019: 621-632 - [c54]Xinyu Zhang, Joseph K. Liu, Ron Steinfeld, Veronika Kuchta, Jiangshan Yu:
Revocable and Linkable Ring Signature. Inscrypt 2019: 3-27 - [c53]Muhammed F. Esgin, Ron Steinfeld, Joseph K. Liu, Dongxi Liu:
Lattice-Based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Applications. CRYPTO (1) 2019: 115-146 - [c52]Maxime Buser, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Shifeng Sun:
DGM: A Dynamic and Revocable Group Merkle Signature. ESORICS (1) 2019: 194-214 - [c51]Shabnam Kasra Kermanshahi, Joseph K. Liu, Ron Steinfeld, Surya Nepal:
Generic Multi-keyword Ranked Search on Encrypted Cloud Data. ESORICS (2) 2019: 322-343 - [e4]Ron Steinfeld, Tsz Hon Yuen:
Provable Security - 13th International Conference, ProvSec 2019, Cairns, QLD, Australia, October 1-4, 2019, Proceedings. Lecture Notes in Computer Science 11821, Springer 2019, ISBN 978-3-030-31918-2 [contents] - [i37]Muhammed F. Esgin, Ron Steinfeld, Joseph K. Liu, Dongxi Liu:
Lattice-based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Applications. IACR Cryptol. ePrint Arch. 2019: 445 (2019) - [i36]Wilson Abel Alberto Torres, Veronika Kuchta, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Jacob Cheng:
Lattice RingCT v2.0 with Multiple Input and Output Wallets. IACR Cryptol. ePrint Arch. 2019: 569 (2019) - [i35]Raymond K. Zhao, Ron Steinfeld, Amin Sakzad:
Compact and Scalable Arbitrary-centered Discrete Gaussian Sampling over Integers. IACR Cryptol. ePrint Arch. 2019: 1011 (2019) - [i34]Ron Steinfeld, Amin Sakzad, Raymond K. Zhao:
Practical MP-LWE-based encryption balancing security-risk vs. efficiency. IACR Cryptol. ePrint Arch. 2019: 1179 (2019) - [i33]Muhammed F. Esgin, Raymond K. Zhao, Ron Steinfeld, Joseph K. Liu, Dongxi Liu:
MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol. IACR Cryptol. ePrint Arch. 2019: 1287 (2019) - 2018
- [j19]Shi Bai, Tancrède Lepoint, Adeline Roux-Langlois, Amin Sakzad, Damien Stehlé, Ron Steinfeld:
Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather than the Statistical Distance. J. Cryptol. 31(2): 610-640 (2018) - [c50]Wilson Abel Alberto Torres, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Veronika Kuchta, Nandita Bhattacharjee, Man Ho Au, Jacob Cheng:
Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0). ACISP 2018: 558-576 - [c49]Shangqi Lai, Sikhar Patranabis, Amin Sakzad, Joseph K. Liu, Debdeep Mukhopadhyay, Ron Steinfeld, Shifeng Sun, Dongxi Liu, Cong Zuo:
Result Pattern Hiding Searchable Encryption for Conjunctive Queries. CCS 2018: 745-762 - [c48]Shifeng Sun, Xingliang Yuan, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Viet Vo, Surya Nepal:
Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption. CCS 2018: 763-780 - [c47]Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu, Tsz Hon Yuen:
Anonymity Reduction Attacks to Monero. Inscrypt 2018: 86-100 - [c46]Bin Yu, Joseph K. Liu, Amin Sakzad, Surya Nepal, Ron Steinfeld, Paul Rimba, Man Ho Au:
Platform-Independent Secure Blockchain-Based Voting System. ISC 2018: 369-386 - [c45]Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu:
Monero Ring Attack: Recreating Zero Mixin Transaction Effect. TrustCom/BigDataSE 2018: 1196-1201 - [i32]Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu:
Monero Ring Attack: Recreating Zero Mixin Transaction Effect. IACR Cryptol. ePrint Arch. 2018: 348 (2018) - [i31]Wilson Abel Alberto Torres, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Veronika Kuchta, Nandita Bhattacharjee, Man Ho Au, Jacob Cheng:
Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0). IACR Cryptol. ePrint Arch. 2018: 379 (2018) - [i30]Bin Yu, Joseph K. Liu, Amin Sakzad, Surya Nepal, Paul Rimba, Ron Steinfeld, Man Ho Au:
Platform-independent Secure Blockchain-Based Voting System. IACR Cryptol. ePrint Arch. 2018: 657 (2018) - [i29]Muhammed F. Esgin, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Dongxi Liu:
Short Lattice-based One-out-of-Many Proofs and Applications to Ring Signatures. IACR Cryptol. ePrint Arch. 2018: 773 (2018) - [i28]Shangqi Lai, Sikhar Patranabis, Amin Sakzad, Joseph K. Liu, Debdeep Mukhopadhyay, Ron Steinfeld, Shifeng Sun, Dongxi Liu, Cong Zuo:
Result Pattern Hiding Searchable Encryption for Conjunctive Queries. IACR Cryptol. ePrint Arch. 2018: 1168 (2018) - [i27]Raymond K. Zhao, Ron Steinfeld, Amin Sakzad:
FACCT: FAst, Compact, and Constant-Time Discrete Gaussian Sampler over Integers. IACR Cryptol. ePrint Arch. 2018: 1234 (2018) - 2017
- [j18]San Ling, Duong Hieu Phan, Damien Stehlé, Ron Steinfeld:
Hardness of k-LWE and Applications in Traitor Tracing. Algorithmica 79(4): 1318-1352 (2017) - [c44]Xiaoyang Wu, Ron Steinfeld, Joseph K. Liu, Carsten Rudolph:
An implementation of access-control protocol for IoT home scenario. ICIS 2017: 31-37 - [c43]Shabnam Kasra Kermanshahi, Joseph K. Liu, Ron Steinfeld:
Multi-user Cloud-Based Secure Keyword Search. ACISP (1) 2017: 227-247 - [c42]Miruna Rosca, Amin Sakzad, Damien Stehlé, Ron Steinfeld:
Middle-Product Learning with Errors. CRYPTO (3) 2017: 283-297 - [c41]Benoît Libert, Amin Sakzad, Damien Stehlé, Ron Steinfeld:
All-But-Many Lossy Trapdoor Functions and Selective Opening Chosen-Ciphertext Security from LWE. CRYPTO (3) 2017: 332-364 - [c40]Trung Dinh, Ron Steinfeld, Nandita Bhattacharjee:
A Lattice-Based Approach to Privacy-Preserving Biometric Authentication Without Relying on Trusted Third Parties. ISPEC 2017: 297-319 - [i26]Miruna Rosca, Amin Sakzad, Ron Steinfeld, Damien Stehlé:
Middle-Product Learning With Errors. IACR Cryptol. ePrint Arch. 2017: 628 (2017) - [i25]Benoît Libert, Amin Sakzad, Damien Stehlé, Ron Steinfeld:
All-But-Many Lossy Trapdoor Functions and Selective Opening Chosen-Ciphertext Security from LWE. IACR Cryptol. ePrint Arch. 2017: 876 (2017) - 2016
- [c39]Shifeng Sun, Joseph K. Liu, Amin Sakzad, Ron Steinfeld, Tsz Hon Yuen:
An Efficient Non-interactive Multi-client Searchable Encryption with Support for Boolean Queries. ESORICS (1) 2016: 154-172 - [c38]Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Shifeng Sun, Xinyi Huang:
Anonymizing Bitcoin Transaction. ISPEC 2016: 271-283 - [c37]Cong Zuo, James Macindoe, Siyin Yang, Ron Steinfeld, Joseph K. Liu:
Trusted Boolean Search on Cloud Using Searchable Symmetric Encryption. Trustcom/BigDataSE/ISPA 2016: 113-120 - [e3]Joseph K. Liu, Ron Steinfeld:
Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I. Lecture Notes in Computer Science 9722, Springer 2016, ISBN 978-3-319-40252-9 [contents] - [e2]Joseph K. Liu, Ron Steinfeld:
Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II. Lecture Notes in Computer Science 9723, Springer 2016, ISBN 978-3-319-40366-3 [contents] - [i24]Shifeng Sun, Joseph K. Liu, Amin Sakzad, Ron Steinfeld, Tsz Hon Yuen:
An Efficient Non-Interactive Multi-client Searchable Encryption with Support for Boolean Queries. IACR Cryptol. ePrint Arch. 2016: 1038 (2016) - 2015
- [j17]Hassan Jameel Asghar, Ron Steinfeld, Shujun Li, Mohamed Ali Kâafar, Josef Pieprzyk:
On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices. IEEE Trans. Inf. Forensics Secur. 10(8): 1643-1655 (2015) - [c36]Shi Bai, Adeline Langlois, Tancrède Lepoint, Damien Stehlé, Ron Steinfeld:
Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather Than the Statistical Distance. ASIACRYPT (1) 2015: 3-24 - [c35]Dmitry Khovratovich, Ivica Nikolic, Josef Pieprzyk, Przemyslaw Sokolowski, Ron Steinfeld:
Rotational Cryptanalysis of ARX Revisited. FSE 2015: 519-536 - [c34]Ron Steinfeld, Amin Sakzad:
On massive MIMO physical layer cryptosystem. ITW Fall 2015: 292-296 - [i23]Ron Steinfeld, Amin Sakzad:
On Massive MIMO Physical Layer Cryptosystem. CoRR abs/1507.08015 (2015) - [i22]Dmitry Khovratovich, Ivica Nikolic, Josef Pieprzyk, Przemyslaw Sokolowski, Ron Steinfeld:
Rotational Cryptanalysis of ARX Revisited. IACR Cryptol. ePrint Arch. 2015: 95 (2015) - [i21]Shi Bai, Adeline Langlois, Tancrède Lepoint, Damien Stehlé, Ron Steinfeld:
Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance. IACR Cryptol. ePrint Arch. 2015: 483 (2015) - 2014
- [j16]Reza Sepahi, Ron Steinfeld, Josef Pieprzyk:
Lattice-based completely non-malleable public-key encryption in the standard model. Des. Codes Cryptogr. 71(2): 293-313 (2014) - [j15]Reza Sepahi, Ron Steinfeld, Josef Pieprzyk:
Lattice-based certificateless public-key encryption in the standard model. Int. J. Inf. Sec. 13(4): 315-333 (2014) - [j14]Mohammad Ali Orumiehchiha, Josef Pieprzyk, Ron Steinfeld:
Practical attack on NLM-MAC scheme. Inf. Process. Lett. 114(10): 547-550 (2014) - [j13]Hassan Jameel Asghar, Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld:
A subexponential construction of graph coloring for multiparty computation. J. Math. Cryptol. 8(4): 363-403 (2014) - [c33]San Ling, Duong Hieu Phan, Damien Stehlé, Ron Steinfeld:
Hardness of k-LWE and Applications in Traitor Tracing. CRYPTO (1) 2014: 315-334 - [c32]Adeline Langlois, Damien Stehlé, Ron Steinfeld:
GGHLite: More Efficient Multilinear Maps from Ideal Lattices. EUROCRYPT 2014: 239-256 - [i20]Hassan Jameel Asghar, Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld:
A Subexponential Construction of Graph Coloring for Multiparty Computation. IACR Cryptol. ePrint Arch. 2014: 66 (2014) - [i19]Adeline Langlois, Damien Stehlé, Ron Steinfeld:
GGHLite: More Efficient Multilinear Maps from Ideal Lattices. IACR Cryptol. ePrint Arch. 2014: 487 (2014) - [i18]San Ling, Duong Hieu Phan, Damien Stehlé, Ron Steinfeld:
Hardness of k-LWE and Applications in Traitor Tracing. IACR Cryptol. ePrint Arch. 2014: 494 (2014) - [i17]Hassan Jameel Asghar, Ron Steinfeld, Shujun Li, Dali Kaafar, Josef Pieprzyk:
Algebraic Attacks on Human Identification Protocols. IACR Cryptol. ePrint Arch. 2014: 767 (2014) - 2013
- [j12]Mohammad Ali Orumiehchiha, Josef Pieprzyk, Ron Steinfeld, Harry Bartlett:
Security analysis of linearly filtered NLFSRs. J. Math. Cryptol. 7(4): 313-332 (2013) - [c31]Sareh Emami, Cameron McDonald, Josef Pieprzyk, Ron Steinfeld:
Truncated Differential Analysis of Reduced-Round LBlock. CANS 2013: 291-308 - [c30]Mohammad Ali Orumiehchiha, Josef Pieprzyk, Elham Shakour, Ron Steinfeld:
Security Evaluation of Rakaposhi Stream Cipher. ISPEC 2013: 361-371 - [c29]Hassan Jameel Asghar, Shujun Li, Ron Steinfeld, Josef Pieprzyk:
Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks. NDSS 2013 - [c28]Mohammad Ali Orumiehchiha, Josef Pieprzyk, Elham Shakour, Ron Steinfeld:
Cryptanalysis of RC4(n, m) stream cipher. SIN 2013: 165-172 - [i16]Damien Stehlé, Ron Steinfeld:
Making NTRUEncrypt and NTRUSign as Secure as Standard Worst-Case Problems over Ideal Lattices. IACR Cryptol. ePrint Arch. 2013: 4 (2013) - [i15]Mohammad Ali Orumiehchiha, Josef Pieprzyk, Elham Shakour, Ron Steinfeld:
Cryptanalysis of RC4(n, m) Stream Cipher. IACR Cryptol. ePrint Arch. 2013: 178 (2013) - [i14]Mohammad Ali Orumiehchiha, Josef Pieprzyk, Ron Steinfeld, Harry Bartlett:
Security Analysis of Linearly Filtered NLFSRs. IACR Cryptol. ePrint Arch. 2013: 185 (2013) - [i13]Mohammad Ali Orumiehchiha, Josef Pieprzyk, Ron Steinfeld:
Breaking NLM-MAC Generator. IACR Cryptol. ePrint Arch. 2013: 202 (2013) - 2012
- [j11]Mohammad Ali Orumiehchiha, Josef Pieprzyk, Ron Steinfeld:
Cryptanalysis of WG-7: a lightweight stream cipher. Cryptogr. Commun. 4(3-4): 277-285 (2012) - [j10]Hossein Ghodosi, Josef Pieprzyk, Ron Steinfeld:
Multi-party computation with conversion of secret sharing. Des. Codes Cryptogr. 62(3): 259-272 (2012) - [j9]Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Xiaoming Sun, Christophe Tartary, Huaxiong Wang, Andrew Chi-Chih Yao:
Graph Coloring Applied to Secure Computation in Non-Abelian Groups. J. Cryptol. 25(4): 557-600 (2012) - [j8]San Ling, Igor E. Shparlinski, Ron Steinfeld, Huaxiong Wang:
On the modular inversion hidden number problem. J. Symb. Comput. 47(4): 358-367 (2012) - [c27]Mohammad Ali Orumiehchiha, Josef Pieprzyk, Ron Steinfeld:
Cryptanalysis of RC4-Based Hash Function. AISC 2012: 33-38 - [c26]Ron Steinfeld, San Ling, Josef Pieprzyk, Christophe Tartary, Huaxiong Wang:
NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model. Public Key Cryptography 2012: 353-371 - [c25]Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld:
Active Security in Multiparty Computation over Black-Box Groups. SCN 2012: 503-521 - [i12]Mohammad Ali Orumiehchiha, Josef Pieprzyk, Elham Shakour, Ron Steinfeld:
Security Evaluation of Rakaposhi Stream Cipher. IACR Cryptol. ePrint Arch. 2012: 656 (2012) - [i11]Hassan Jameel Asghar, Shujun Li, Ron Steinfeld, Josef Pieprzyk:
Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks. IACR Cryptol. ePrint Arch. 2012: 659 (2012) - 2011
- [c24]Reza Sepahi, Ron Steinfeld, Josef Pieprzyk:
Lattice-Based Completely Non-malleable PKE in the Standard Model (Poster). ACISP 2011: 407-411 - [c23]Damien Stehlé, Ron Steinfeld:
Making NTRU as Secure as Worst-Case Problems over Ideal Lattices. EUROCRYPT 2011: 27-47 - [i10]Mohammad Ali Orumiehchiha, Josef Pieprzyk, Ron Steinfeld:
Cryptanalysis of WG-7 (A Lightweight Stream Cipher for RFID Encryption). IACR Cryptol. ePrint Arch. 2011: 687 (2011) - 2010
- [c22]Damien Stehlé, Ron Steinfeld:
Faster Fully Homomorphic Encryption. ASIACRYPT 2010: 377-394 - [c21]Ivica Nikolic, Josef Pieprzyk, Przemyslaw Sokolowski, Ron Steinfeld:
Known and Chosen Key Differential Distinguishers for Block Ciphers. ICISC 2010: 29-48 - [p1]Joonsang Baek, Ron Steinfeld:
Security for Signcryption: The Multi-User Model. Practical Signcryption 2010: 43-53 - [e1]Ron Steinfeld, Philip Hawkes:
Information Security and Privacy - 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings. Lecture Notes in Computer Science 6168, Springer 2010, ISBN 978-3-642-14080-8 [contents] - [i9]Damien Stehlé, Ron Steinfeld:
Faster Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2010: 299 (2010)
2000 – 2009
- 2009
- [c20]Damien Stehlé, Ron Steinfeld, Keisuke Tanaka, Keita Xagawa:
Efficient Public Key Encryption Based on Ideal Lattices. ASIACRYPT 2009: 617-635 - [c19]Qingsong Ye, Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang:
Efficient Fuzzy Matching and Intersection on Private Datasets. ICISC 2009: 211-228 - [i8]Damien Stehlé, Ron Steinfeld, Keisuke Tanaka, Keita Xagawa:
Efficient Public Key Encryption Based on Ideal Lattices. IACR Cryptol. ePrint Arch. 2009: 285 (2009) - 2008
- [c18]Hung-Min Sun, Mu-En Wu, Ron Steinfeld, Jian Guo, Huaxiong Wang:
Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits. CANS 2008: 49-63 - [c17]Ron Steinfeld, Scott Contini, Krystian Matusiewicz, Josef Pieprzyk, Jian Guo, San Ling, Huaxiong Wang:
Cryptanalysis of LASH. FSE 2008: 207-223 - [i7]Hung-Min Sun, Mu-En Wu, Ron Steinfeld, Jian Guo, Huaxiong Wang:
Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits. IACR Cryptol. ePrint Arch. 2008: 296 (2008) - 2007
- [j7]Henk van Tilborg, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang:
New constructions of anonymous membership broadcasting schemes. Adv. Math. Commun. 1(1): 29-44 (2007) - [j6]Joonsang Baek, Ron Steinfeld, Yuliang Zheng:
Formal Proofs for the Security of Signcryption. J. Cryptol. 20(2): 203-235 (2007) - [j5]Igor E. Shparlinski, Ron Steinfeld:
Chinese Remaindering with Multiplicative Noise. Theory Comput. Syst. 40(1): 33-41 (2007) - [j4]Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang:
Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes. IEEE Trans. Inf. Theory 53(7): 2542-2559 (2007) - [c16]Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang:
On Secure Multi-party Computation in Black-Box Groups. CRYPTO 2007: 591-612 - [c15]Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang:
How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature. CT-RSA 2007: 357-371 - [i6]Scott Contini, Krystian Matusiewicz, Josef Pieprzyk, Ron Steinfeld, Jian Guo, San Ling, Huaxiong Wang:
Cryptanalysis of LASH. IACR Cryptol. ePrint Arch. 2007: 430 (2007) - 2006
- [j3]Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang:
Lattice-based threshold-changeability for standard CRT secret-sharing schemes. Finite Fields Their Appl. 12(4): 653-680 (2006) - [c14]Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang:
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator. ASIACRYPT 2006: 194-209 - [c13]Scott Contini, Arjen K. Lenstra, Ron Steinfeld:
VSH, an Efficient and Provable Collision-Resistant Hash Function. EUROCRYPT 2006: 165-182 - [c12]Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang:
A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders. ISC 2006: 459-475 - [c11]Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang:
Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption. Public Key Cryptography 2006: 157-173 - [i5]Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang:
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator. IACR Cryptol. ePrint Arch. 2006: 206 (2006) - 2005
- [c10]Ron Steinfeld, Scott Contini, Huaxiong Wang, Josef Pieprzyk:
Converse Results to the Wiener Attack on RSA. Public Key Cryptography 2005: 184-198 - [i4]Scott Contini, Arjen K. Lenstra, Ron Steinfeld:
VSH, an Efficient and Provable Collision Resistant Hash Function. IACR Cryptol. ePrint Arch. 2005: 193 (2005) - 2004
- [j2]Ron Steinfeld, Yuliang Zheng:
On the Security of RSA with Primes Sharing Least-Significant Bits. Appl. Algebra Eng. Commun. Comput. 15(3-4): 179-200 (2004) - [j1]Igor E. Shparlinski, Ron Steinfeld:
Noisy Chinese remaindering in the Lee norm. J. Complex. 20(2-3): 423-437 (2004) - [c9]Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk:
Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes. ASIACRYPT 2004: 170-186 - [c8]Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk:
Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures. Public Key Cryptography 2004: 86-100 - 2003
- [c7]Ron Steinfeld, Laurence Bull, Huaxiong Wang, Josef Pieprzyk:
Universal Designated-Verifier Signatures. ASIACRYPT 2003: 523-542 - [i3]Ron Steinfeld, Laurence Bull, Huaxiong Wang, Josef Pieprzyk:
Universal Designated-Verifier Signatures. IACR Cryptol. ePrint Arch. 2003: 192 (2003) - [i2]Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk:
Efficient Extension of Standard Schnorr/RSA signatures into Universal Designated-Verifier Signatures. IACR Cryptol. ePrint Arch. 2003: 193 (2003) - 2002
- [c6]Ron Steinfeld, Joonsang Baek, Yuliang Zheng:
On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes. ACISP 2002: 241-256 - [c5]Igor E. Shparlinski, Ron Steinfeld:
Chinese Remaindering for Algebraic Numbers in a Hidden Field. ANTS 2002: 349-356 - [c4]Joonsang Baek, Ron Steinfeld, Yuliang Zheng:
Formal Proofs for the Security of Signcryption. Public Key Cryptography 2002: 80-98 - [i1]Ron Steinfeld, Laurence Bull, Yuliang Zheng:
Content Extraction Signatures. IACR Cryptol. ePrint Arch. 2002: 16 (2002) - 2001
- [c3]Ron Steinfeld, Yuliang Zheng:
An Advantage of Low-Exponent RSA with Modulus Primes Sharing Least Significant Bits. CT-RSA 2001: 52-62 - [c2]Ron Steinfeld, Laurence Bull, Yuliang Zheng:
Content Extraction Signatures. ICISC 2001: 285-304 - 2000
- [c1]Ron Steinfeld, Yuliang Zheng:
A Signcryption Scheme Based on Integer Factorization. ISW 2000: 308-322
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 20:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint