Publication Probabilistically Checkable Arguments Yael Tauman Kalai, Ran Raz Advances in Cryptology – CRYPTO 2009; Lecture Notes in Computer Science, 2009 | January 2009
Publication Formally Certifying the Security of Digital Signature Schemes Santiago Zanella-Béguelin, Benjamin Grégoire, Gilles Barthe, Federico Olmedo 30th IEEE Symposium on Security and Privacy, S&P 2009 | January 2009
Publication Formal Certification of Code-Based Cryptographic Proofs Gilles Barthe, Benjamin Grégoire, Santiago Zanella-Béguelin 36th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2009 | January 2009 ISBN: 978-1-60558-379-2
Publication An observation about variations of the Diffie-Hellman assumption Raghav Bhaskar, Kathekeyan Chandrasekaran, Satya Lokam, Peter Montgomery, Ramarathnam Venkatesan, Yacov Yacobi Serdica Journal of Computing | January 2009
Publication Gatekeeper: Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code Salvatore Guarnieri, Ben Livshits Proceedings of the Usenix Security Symposium | January 2009
Publication Formal certification of ElGamal encryption. A gentle introduction to CertiCrypt Gilles Barthe, Benjamin Grégoire, Sylvain Heraud, Santiago Zanella-Béguelin 5th International Workshop on Formal Aspects in Security and Trust, FAST 2008 | January 2009 5th International Workshop on Formal Aspects in Security and Trust, FAST 2008 ISBN: 978-3-642-01464-2
Publication 2-Source Extractors Under Computational Assumptions and Cryptography with Defective Randomness Yael Tauman Kalai, Xin Li, Anup Rao In Proc. 50th IEEE Symposium on Foundations of Computer Science (FOCS) | January 2009
Publication Compact E-Cash and Simulatable VRFs Revisited Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya January 2009
Publication Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data Jan Camenisch, Markulf Kohlweiss, Alfredo Rial, Caroline Sheedy January 2009
Publication Heat-ray: Combating Identity Snowball Attacks Using Machine Learning, Combinatorial Optimization and Attack Graphs John Dunagan, Alice Zheng, Daniel R. Simon ACM Symposium on Operating Systems Principles | January 2009