Publication How to Encrypt with a Malicious Random Number Generator Seny Kamara, Jonathan Katz 15th Annual IACR workshop on Fast Software Encryption (FSE ’08) | February 2008
Publication How to Encrypt with a Malicious Random Number Generator Seny Kamara, Jonathan Katz 15th Annual IACR workshop on Fast Software Encryption (FSE ’08) | February 2008
Publication How to Encrypt with a Malicious Random Number Generator Seny Kamara, Jonathan Katz IACR workshop on Fast Software Encryption (FSE ’08) | February 2008
Publication Cryptographically Sound Implementations for Typed Information-Flow Security Cédric Fournet, Tamara Rezk 35th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL’08) | January 2008
Publication One-Time Programs Shafi Goldwasser, Yael Tauman Kalai, Guy N. Rothblum Advances in Cryptology – CRYPTO 2008: Lecture Notes in Computer Science | January 2008
Publication Interactive PCP 2008 Yael Tauman Kalai, Ran Raz Automata, Languages and Programming; Lecture Notes in Computer Science, 2008 | January 2008
Publication Randomizable Proofs and Delegatable Anonymous Credentials Mira Belenkiy, Jan Camenisch, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Hovav Shacham CRYPTO 2009 | January 2008
Publication The Role of Abduction in Declarative Authorization Policies Mo Becker 10th International Symposium on Practical Aspects of Declarative Languages (PADL) | January 2008 10th International Symposium on Practical Aspects of Declarative Languages (PADL)
Publication Analysis on AACS’ Traitor Tracing Against Mix-and-Match Attacks Bin Benjamin Zhu, Min Feng, Fen Liu, Lei Hu IEEE Consumer Communications and Networking Conference | January 2008
Publication The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences Kristin Lauter, Katherine Stange Selected Areas in Cryptography 2008 | January 2008 Project