default search action
Alejandro Hevia
Person information
- affiliation: University of Chile, Santiago, Chile
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c22]Alejandro Hevia, Ilana Mergudich-Thal:
Implementing Secure Reporting of Sexual Misconduct - Revisiting WhoToo. LATINCRYPT 2021: 341-362 - 2020
- [j7]Alejandro Hevia, Camilo Gómez:
Why me?: shedding light on random processes via randomness beacons. Commun. ACM 63(11): 49-50 (2020) - [c21]Daniel Soto, Alexandre Bergel, Alejandro Hevia:
Fuzzing to Estimate Gas Costs of Ethereum Contracts. ICSME 2020: 687-691
2010 – 2019
- 2018
- [j6]Alonso González, Alejandro Hevia:
A second note on the feasibility of generalized universal composability. Math. Struct. Comput. Sci. 28(2): 141-154 (2018) - 2017
- [c20]Maite González, Benjamín Holloway, Alejandro Hevia, Sandra Céspedes, Javier Bustos-Jiménez:
Coordination of Autonomous Vehicles at Intersections with V2V (decentralized) communication. SSN 2017: 38-41 - 2016
- [c19]Francisco Cifuentes, Alejandro Hevia, Francisco Montoto, Tomás Barros, Victor Ramiro, Javier Bustos-Jiménez:
Poor Man's Hardware Security Module (pmHSM): A Threshold Cryptographic Backend for DNSSEC. LANC 2016: 59-64 - [c18]Benjamín Holloway, Sandra Céspedes, Alejandro Hevia:
Analisys of Attacks to Automated Vehicular Coordination Systems at Intersections. SSN 2016: 38-40 - [e3]Sandra Céspedes, Javier Bustos-Jiménez, Alejandro Hevia:
Proceedings of the II Spring School on Networks 2016, Santiago, Chile, November 21-22, 2016. CEUR Workshop Proceedings 1727, CEUR-WS.org 2016 [contents] - 2015
- [c17]Alonso González, Alejandro Hevia, Carla Ràfols:
QA-NIZK Arguments in Asymmetric Groups: New Tools and New Constructions. ASIACRYPT (1) 2015: 605-629 - [c16]Sebastian Blasco, Javier Bustos-Jiménez, Giselle Font, Alejandro Hevia, María Grazia Prato:
A three-layer approach for protecting smart-citizens privacy in crowdsensing projects. SCCC 2015: 1-5 - [i4]Alonso González, Alejandro Hevia, Carla Ràfols:
QA-NIZK Arguments in Asymmetric Groups: New Tools and New Constructions. IACR Cryptol. ePrint Arch. 2015: 910 (2015) - 2014
- [j5]Jorge Bahamonde, Alejandro Hevia, Giselle Font, Javier Bustos-Jiménez, Camila Montero:
Mining Private Information from Public Data: The Transantiago Case. IEEE Pervasive Comput. 13(2): 37-43 (2014) - [c15]Giselle Font, Javier Bustos-Jiménez, Sebastian Blasco, Alejandro Hevia:
Location privacy for a quality of access to mobile Internet monitoring system. CNS 2014: 518-519 - [c14]Pablo García, Jeroen van de Graaf, Alejandro Hevia, Alfredo Viola:
Beating the Birthday Paradox in Dining Cryptographer Networks. LATINCRYPT 2014: 179-198 - [i3]Alonso Gonzalez-Ulloa, Alejandro Hevia:
Online Deniability for Multiparty Protocols with Applications to Externally Anonymous Authentication. IACR Cryptol. ePrint Arch. 2014: 753 (2014) - 2012
- [j4]Philippe Camacho, Alejandro Hevia, Marcos A. Kiwi, Roberto Opazo:
Strong accumulators from collision-resistant hashing. Int. J. Inf. Sec. 11(5): 349-363 (2012) - [c13]Philippe Camacho, Alejandro Hevia:
Short Transitive Signatures for Directed Trees. CT-RSA 2012: 35-50 - [e2]Alejandro Hevia, Gregory Neven:
Progress in Cryptology - LATINCRYPT 2012 - 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012. Proceedings. Lecture Notes in Computer Science 7533, Springer 2012, ISBN 978-3-642-33480-1 [contents] - 2011
- [i2]Philippe Camacho, Alejandro Hevia:
Short Transitive Signatures for Directed Trees. IACR Cryptol. ePrint Arch. 2011: 438 (2011) - 2010
- [c12]Gilles Barthe, Alejandro Hevia, Zhengqin Luo, Tamara Rezk, Bogdan Warinschi:
Robustness Guarantees for Anonymity. CSF 2010: 91-106 - [c11]Gaston L'Huillier, Alejandro Hevia, Richard Weber, Sebastián A. Ríos:
Latent semantic analysis and keyword extraction for phishing classification. ISI 2010: 129-131 - [c10]Philippe Camacho, Alejandro Hevia:
On the Impossibility of Batch Update for Cryptographic Accumulators. LATINCRYPT 2010: 178-188
2000 – 2009
- 2008
- [c9]Philippe Camacho, Alejandro Hevia, Marcos A. Kiwi, Roberto Opazo:
Strong Accumulators from Collision-Resistant Hashing. ISC 2008: 471-486 - [c8]Alejandro Hevia, Daniele Micciancio:
An Indistinguishability-Based Characterization of Anonymous Channels. Privacy Enhancing Technologies 2008: 24-43 - 2006
- [b1]Alejandro Hevia:
Anonymity and independence in multiparty protocols. University of California, San Diego, USA, 2006 - [c7]Alejandro Hevia:
Universally Composable Simultaneous Broadcast. SCN 2006: 18-33 - [e1]José R. Correa, Alejandro Hevia, Marcos A. Kiwi:
LATIN 2006: Theoretical Informatics, 7th Latin American Symposium, Valdivia, Chile, March 20-24, 2006, Proceedings. Lecture Notes in Computer Science 3887, Springer 2006, ISBN 3-540-32755-X [contents] - 2005
- [j3]Craig Gentry, Alejandro Hevia, Ravi Jain, Toshiro Kawahara, Zulfikar Ramzan:
End-to-end security in the presence of intelligent data adapting proxies: the case of authenticating transcoded streaming media. IEEE J. Sel. Areas Commun. 23(2): 464-473 (2005) - [c6]Alejandro Hevia, Daniele Micciancio:
Simultaneous broadcast revisited. PODC 2005: 324-333 - [c5]Flavio Paiva Junqueira, Ranjita Bhagwan, Alejandro Hevia, Keith Marzullo, Geoffrey M. Voelker:
Surviving Internet Catastrophes. USENIX ATC, General Track 2005: 45-60 - 2004
- [j2]Alejandro Hevia, Marcos A. Kiwi:
Electronic jury voting protocols. Theor. Comput. Sci. 321(1): 73-94 (2004) - 2002
- [c4]Alejandro Hevia, Daniele Micciancio:
The Provable Security of Graph-Based One-Time Signatures and Extensions to Algebraic Signature Schemes. ASIACRYPT 2002: 379-396 - [c3]Anand Desai, Alejandro Hevia, Yiqun Lisa Yin:
A Practice-Oriented Treatment of Pseudorandom Number Generators. EUROCRYPT 2002: 368-383 - [c2]Alejandro Hevia, Marcos A. Kiwi:
Electronic Jury Voting Protocols. LATIN 2002: 415-429 - 2000
- [i1]Alejandro Hevia, Marcos A. Kiwi:
Electronic Jury Voting Protocols. IACR Cryptol. ePrint Arch. 2000: 35 (2000)
1990 – 1999
- 1999
- [j1]Alejandro Hevia, Marcos A. Kiwi:
Strength of two data encryption standard implementations under timing attacks. ACM Trans. Inf. Syst. Secur. 2(4): 416-437 (1999) - 1998
- [c1]Alejandro Hevia, Marcos A. Kiwi:
Strength of Two Data Encryption Standard Implementations under Timing Attacks. LATIN 1998: 192-205
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:15 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint