Publications

Export 7148 results:
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
K
Katz J, Koo CY.  2007.  Round-efficient secure computation in point-to-point networks. Advances in Cryptology-EUROCRYPT 2007. :311-328.
Katz J, Shin J S.  2005.  Modeling insider attacks on group key-exchange protocols. Proceedings of the 12th ACM conference on Computer and communications security. :180-189.
Katz J, MacKenzie P, Taban G, Gligor V.  2005.  Two-server password-only authenticated key exchange. Applied Cryptography and Network Security. :175-206.
Katz J.  2008.  Which languages have 4-round zero-knowledge proofs? Theory of Cryptography. :73-88.
Katz J.  2008.  Bridging game theory and cryptography: recent results and future directions. Proceedings of the 5th conference on Theory of cryptography. :251-272.
Katz J, Smith A.  2006.  Analyzing the HB and HB+ protocols in the “large error” case. IACR ePrint report. 326:2006-2006.
Katz J.  2004.  Secure routing in ad hoc networks. Workshop on Security of ad hoc and Sensor Networks: Proceedings of the 2 nd ACM workshop on Security of ad hoc and sensor networks.
Katz B, Felshin S, Yuret D, Ibrahim A, Jimmy Lin, Marton G, Jerome McFarland A, Temelkuran B.  2002.  Omnibase: Uniform access to heterogeneous data for question answering. Natural Language Processing and Information Systems. :230-234.
Katz J, Lindell Y.  2008.  Introduction to Modern Cryptography.
Katz J, Yerukhimovich A.  2009.  On black-box constructions of predicate encryption from trapdoor permutations. Advances in Cryptology–ASIACRYPT 2009. :197-213.
Katz J.  2007.  Review of "Probability and Computing: Randomized Algorithms and Probabilitic Analysis by Michael Mitzenmacher and Eli Upfal", Cambridge University Press, 2005. SIGACT News. 38(3):20-22.
Katz J, Yung M.  2007.  Scalable protocols for authenticated group key exchange. Journal of Cryptology. 20(1):85-113.
Katz J.  2003.  Efficient and non-malleable proofs of plaintext knowledge and applications. Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques. :211-228.
Katz J, Ostrovsky R, Yung M.  2001.  Efficient password-authenticated key exchange using human-memorable passwords. Advances in Cryptology—EUROCRYPT 2001. :475-494.
Katz J, Trevisan L.  2000.  On the efficiency of local decoding procedures for error-correcting codes. Proceedings of the thirty-second annual ACM symposium on Theory of computing. :80-86.
Katz J.  2007.  Universally composable multi-party computation using tamper-proof hardware. Advances in Cryptology-EUROCRYPT 2007. :115-128.
Katz J.  2007.  Efficient cryptographic protocols based on the hardness of learning parity with noise. Proceedings of the 11th IMA international conference on Cryptography and coding. :1-15.
Katz J, Ostrovsky R, Yung M.  2003.  Forward secrecy in password-only key exchange protocols. Proceedings of the 3rd international conference on Security in communication networks. :29-44.
Katz B, Jimmy Lin, Felshin S.  2002.  The START multimedia information system: Current technology and future directions. In Proceedings of the International Workshop on Multimedia Information Systems (MIS 2002).
Katz J.  2010.  Public-Key Cryptography. Handbook of Information and Communication Security. :21-34.
Katz J, Yung M.  2003.  Scalable protocols for authenticated group key exchange. Advances in Cryptology-CRYPTO 2003. :110-125.
Katz B, Jimmy Lin.  2002.  Annotating the semantic web using natural language. Proceedings of the 2nd workshop on NLP and XML - Volume 17. :1-8.
Katz J, MacKenzie P, Taban G, Gligor V.  2012.  Two-server password-only authenticated key exchange. Journal of Computer and System Sciences. 78(2):651-669.
Katz J, Yung M.  2007.  Applied cryptography and network security: 5th international conference, ACNS 2007, Zhuhai, China, June 5-8, 2007: proceedings. 4521
Katz J, Vaikuntanathan V.  2009.  Smooth projective hashing and password-based authenticated key exchange from lattices. Advances in Cryptology–ASIACRYPT 2009. :636-652.

Pages