Publication How to Encrypt with a Malicious Random Number Generator Seny Kamara, Jonathan Katz 15th Annual IACR workshop on Fast Software Encryption (FSE ’08) | February 2008
Publication How to Encrypt with a Malicious Random Number Generator Seny Kamara, Jonathan Katz 15th Annual IACR workshop on Fast Software Encryption (FSE ’08) | February 2008
Publication How to Encrypt with a Malicious Random Number Generator Seny Kamara, Jonathan Katz IACR workshop on Fast Software Encryption (FSE ’08) | February 2008
Publication Cryptographically Sound Implementations for Typed Information-Flow Security Cédric Fournet, Tamara Rezk 35th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL’08) | January 2008
Publication One-Time Programs Shafi Goldwasser, Yael Tauman Kalai, Guy N. Rothblum Advances in Cryptology – CRYPTO 2008: Lecture Notes in Computer Science | January 2008
Publication Interactive PCP 2008 Yael Tauman Kalai, Ran Raz Automata, Languages and Programming; Lecture Notes in Computer Science, 2008 | January 2008
Publication Randomizable Proofs and Delegatable Anonymous Credentials Mira Belenkiy, Jan Camenisch, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Hovav Shacham CRYPTO 2009 | January 2008
Publication The Role of Abduction in Declarative Authorization Policies Mo Becker 10th International Symposium on Practical Aspects of Declarative Languages (PADL) | January 2008 10th International Symposium on Practical Aspects of Declarative Languages (PADL)
Publication Ascertaining the Reality of Network Neutrality Violation in Backbone ISPs Ying Zhang, Z. Morley Mao, Ming Zhang HotNets | January 2008 HotNets
Publication P-signatures and Noninteractive Anonymous Credentials Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya Theory of Cryptography Conference 2008 | January 2008