Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Allison Bishop
@article{DBLP:journals/iacr/BhandariB23, author = {Anindya Bhandari and Allison Bishop}, title = {What If Alice Wants Her Story Told?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {900}, year = {2023}, url = {https://eprint.iacr.org/2023/900}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BhandariB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AmericoBCGMMORS23, author = {Arthur Am{\'{e}}rico and Allison Bishop and Paul Cesaretti and Garrison Grogan and Adam McKoy and Robert Moss and Lisa Oakley and Marcel Ribeiro and Mohammad Shokri}, title = {Defining and Controlling Information Leakage in {US} Equities Trading}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {971}, year = {2023}, url = {https://eprint.iacr.org/2023/971}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AmericoBCGMMORS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/AlmashaqbehBC20, author = {Ghada Almashaqbeh and Allison Bishop and Justin Cappos}, editor = {Joseph Bonneau and Nadia Heninger}, title = {MicroCash: Practical Concurrent Processing of Micropayments}, booktitle = {Financial Cryptography and Data Security - 24th International Conference, {FC} 2020, Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12059}, pages = {227--244}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-51280-4\_13}, doi = {10.1007/978-3-030-51280-4\_13}, timestamp = {Wed, 22 Jul 2020 12:13:31 +0200}, biburl = {https://dblp.org/rec/conf/fc/AlmashaqbehBC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BienstockBGGL20, author = {Alexander Bienstock and Allison Bishop and Eli Goldin and Garrison Grogan and Victor Lecomte}, title = {From discrete-log to lattices: maybe the real lessons were our broken schemes along the way?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {164}, year = {2020}, url = {https://eprint.iacr.org/2020/164}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BienstockBGGL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AlmashaqbehKBC19, author = {Ghada Almashaqbeh and Kevin Kelley and Allison Bishop and Justin Cappos}, title = {CAPnet: {A} Defense Against Cache Accounting Attacks on Content Distribution Networks}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {250--258}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802825}, doi = {10.1109/CNS.2019.8802825}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/AlmashaqbehKBC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/AlmashaqbehBC19, author = {Ghada Almashaqbeh and Allison Bishop and Justin Cappos}, title = {{ABC:} {A} Cryptocurrency-Focused Threat Modeling Framework}, booktitle = {{IEEE} {INFOCOM} 2019 - {IEEE} Conference on Computer Communications Workshops, {INFOCOM} Workshops 2019, Paris, France, April 29 - May 2, 2019}, pages = {859--864}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/INFCOMW.2019.8845101}, doi = {10.1109/INFCOMW.2019.8845101}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/AlmashaqbehBC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1903-03422, author = {Ghada Almashaqbeh and Allison Bishop and Justin Cappos}, title = {{ABC:} {A} Cryptocurrency-Focused Threat Modeling Framework}, journal = {CoRR}, volume = {abs/1903.03422}, year = {2019}, url = {http://arxiv.org/abs/1903.03422}, eprinttype = {arXiv}, eprint = {1903.03422}, timestamp = {Sun, 31 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1903-03422.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-03231, author = {Kevin Shi and Daniel Hsu and Allison Bishop}, title = {A cryptographic approach to black box adversarial machine learning}, journal = {CoRR}, volume = {abs/1906.03231}, year = {2019}, url = {http://arxiv.org/abs/1906.03231}, eprinttype = {arXiv}, eprint = {1906.03231}, timestamp = {Fri, 14 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-03231.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-10272, author = {Ghada Almashaqbeh and Kevin Kelley and Allison Bishop and Justin Cappos}, title = {CAPnet: {A} Defense Against Cache Accounting Attacks on Content Distribution Networks}, journal = {CoRR}, volume = {abs/1906.10272}, year = {2019}, url = {http://arxiv.org/abs/1906.10272}, eprinttype = {arXiv}, eprint = {1906.10272}, timestamp = {Thu, 27 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-10272.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-08520, author = {Ghada Almashaqbeh and Allison Bishop and Justin Cappos}, title = {MicroCash: Practical Concurrent Processing of Micropayments}, journal = {CoRR}, volume = {abs/1911.08520}, year = {2019}, url = {http://arxiv.org/abs/1911.08520}, eprinttype = {arXiv}, eprint = {1911.08520}, timestamp = {Tue, 03 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-08520.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BishopKMPRS19, author = {Allison Bishop and Lucas Kowalczyk and Tal Malkin and Valerio Pastro and Mariana Raykova and Kevin Shi}, title = {In Pursuit of Clarity In Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {463}, year = {2019}, url = {https://eprint.iacr.org/2019/463}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BishopKMPRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BishopKMP0S18, author = {Allison Bishop and Lucas Kowalczyk and Tal Malkin and Valerio Pastro and Mariana Raykova and Kevin Shi}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {A Simple Obfuscation Scheme for Pattern-Matching with Wildcards}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10993}, pages = {731--752}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96878-0\_25}, doi = {10.1007/978-3-319-96878-0\_25}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BishopKMP0S18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BishopKMP0S18, author = {Allison Bishop and Lucas Kowalczyk and Tal Malkin and Valerio Pastro and Mariana Raykova and Kevin Shi}, title = {A Simple Obfuscation Scheme for Pattern-Matching with Wildcards}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {210}, year = {2018}, url = {http://eprint.iacr.org/2018/210}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BishopKMP0S18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BishopPRW16, author = {Allison Bishop and Valerio Pastro and Rajmohan Rajaraman and Daniel Wichs}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Essentially Optimal Robust Secret Sharing with Maximal Corruptions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {58--86}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_3}, doi = {10.1007/978-3-662-49890-3\_3}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BishopPRW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BishopP16, author = {Allison Bishop and Valerio Pastro}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {Robust Secret Sharing Schemes Against Local Adversaries}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9615}, pages = {327--356}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49387-8\_13}, doi = {10.1007/978-3-662-49387-8\_13}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BishopP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BishopD16, author = {Allison Bishop and Yevgeniy Dodis}, editor = {Eyal Kushilevitz and Tal Malkin}, title = {Interactive Coding for Interactive Proofs}, booktitle = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9563}, pages = {352--366}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49099-0\_13}, doi = {10.1007/978-3-662-49099-0\_13}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BishopD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dc/LewkoL15, author = {Allison B. Lewko and Mark Lewko}, title = {On the complexity of asynchronous agreement against powerful adversaries}, journal = {Distributed Comput.}, volume = {28}, number = {6}, pages = {377--389}, year = {2015}, url = {https://doi.org/10.1007/s00446-014-0224-5}, doi = {10.1007/S00446-014-0224-5}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dc/LewkoL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Bishop0K15, author = {Allison Bishop and Abhishek Jain and Lucas Kowalczyk}, editor = {Tetsu Iwata and Jung Hee Cheon}, title = {Function-Hiding Inner Product Encryption}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9452}, pages = {470--491}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48797-6\_20}, doi = {10.1007/978-3-662-48797-6\_20}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Bishop0K15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BishopHW15, author = {Allison Bishop and Susan Hohenberger and Brent Waters}, editor = {Tetsu Iwata and Jung Hee Cheon}, title = {New Circular Security Counterexamples from Decision Linear and Learning with Errors}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9453}, pages = {776--800}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48800-3\_32}, doi = {10.1007/978-3-662-48800-3\_32}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BishopHW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KowalczykL15, author = {Lucas Kowalczyk and Allison Bishop Lewko}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Bilinear Entropy Expansion from the Decisional Linear Assumption}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {524--541}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_26}, doi = {10.1007/978-3-662-48000-7\_26}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KowalczykL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/GentryLSW15, author = {Craig Gentry and Allison Bishop Lewko and Amit Sahai and Brent Waters}, editor = {Venkatesan Guruswami}, title = {Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption}, booktitle = {{IEEE} 56th Annual Symposium on Foundations of Computer Science, {FOCS} 2015, Berkeley, CA, USA, 17-20 October, 2015}, pages = {151--170}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/FOCS.2015.19}, doi = {10.1109/FOCS.2015.19}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/GentryLSW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/0002KL15, author = {Abhishek Jain and Yael Tauman Kalai and Allison Bishop Lewko}, editor = {Tim Roughgarden}, title = {Interactive Coding for Multiparty Protocols}, booktitle = {Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, {ITCS} 2015, Rehovot, Israel, January 11-13, 2015}, pages = {1--10}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2688073.2688109}, doi = {10.1145/2688073.2688109}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/innovations/0002KL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LewkoM15, author = {Allison B. Lewko and Sarah Meiklejohn}, editor = {Jonathan Katz}, title = {A Profitable Sub-prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {377--398}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_17}, doi = {10.1007/978-3-662-46447-2\_17}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LewkoM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/KoppulaLW15, author = {Venkata Koppula and Allison Bishop Lewko and Brent Waters}, editor = {Rocco A. Servedio and Ronitt Rubinfeld}, title = {Indistinguishability Obfuscation for Turing Machines with Unbounded Memory}, booktitle = {Proceedings of the Forty-Seventh Annual {ACM} on Symposium on Theory of Computing, {STOC} 2015, Portland, OR, USA, June 14-17, 2015}, pages = {419--428}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2746539.2746614}, doi = {10.1145/2746539.2746614}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/KoppulaLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2015, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7}, doi = {10.1007/978-3-319-28166-7}, isbn = {978-3-319-28165-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/LewkoV15, author = {Allison B. Lewko and Ellen Vitercik}, title = {Balancing Communication for Multi-party Interactive Coding}, journal = {CoRR}, volume = {abs/1503.06381}, year = {2015}, url = {http://arxiv.org/abs/1503.06381}, eprinttype = {arXiv}, eprint = {1503.06381}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/LewkoV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BishopJK15, author = {Allison Bishop and Abhishek Jain and Lucas Kowalczyk}, title = {Function-Hiding Inner Product Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {672}, year = {2015}, url = {http://eprint.iacr.org/2015/672}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BishopJK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BishopHW15, author = {Allison Bishop and Susan Hohenberger and Brent Waters}, title = {New Circular Security Counterexamples from Decision Linear and Learning with Errors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {715}, year = {2015}, url = {http://eprint.iacr.org/2015/715}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BishopHW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BishopPRW15, author = {Allison Bishop and Valerio Pastro and Rajmohan Rajaraman and Daniel Wichs}, title = {Essentially Optimal Robust Secret Sharing with Maximal Corruptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1032}, year = {2015}, url = {http://eprint.iacr.org/2015/1032}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BishopPRW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GentryLW14, author = {Craig Gentry and Allison B. Lewko and Brent Waters}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Witness Encryption from Instance Independent Assumptions}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {426--443}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_24}, doi = {10.1007/978-3-662-44371-2\_24}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GentryLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LewkoW14, author = {Allison B. Lewko and Brent Waters}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Why Proving {HIBE} Systems Secure Is Difficult}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {58--76}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_4}, doi = {10.1007/978-3-642-55220-5\_4}, timestamp = {Thu, 14 Oct 2021 09:58:16 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LewkoW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryLW14, author = {Craig Gentry and Allison Bishop Lewko and Brent Waters}, title = {Witness Encryption from Instance Independent Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {273}, year = {2014}, url = {http://eprint.iacr.org/2014/273}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryLSW14, author = {Craig Gentry and Allison B. Lewko and Amit Sahai and Brent Waters}, title = {Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {309}, year = {2014}, url = {http://eprint.iacr.org/2014/309}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryLSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KowalczykL14, author = {Lucas Kowalczyk and Allison Bishop Lewko}, title = {Bilinear Entropy Expansion from the Decisional Linear Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {754}, year = {2014}, url = {http://eprint.iacr.org/2014/754}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KowalczykL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisL14, author = {Yevgeniy Dodis and Allison Bishop Lewko}, title = {Interactive Coding for Interactive Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {827}, year = {2014}, url = {http://eprint.iacr.org/2014/827}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LewkoP14, author = {Allison Bishop Lewko and Valerio Pastro}, title = {Robust Secret Sharing Schemes Against Local Adversaries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {909}, year = {2014}, url = {http://eprint.iacr.org/2014/909}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LewkoP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KoppulaLW14, author = {Venkata Koppula and Allison Bishop Lewko and Brent Waters}, title = {Indistinguishability Obfuscation for Turing Machines with Unbounded Memory}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {925}, year = {2014}, url = {http://eprint.iacr.org/2014/925}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KoppulaLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/LewkoL13, author = {Allison B. Lewko and Mark Lewko}, editor = {Panagiota Fatourou and Gadi Taubenfeld}, title = {On the complexity of asynchronous agreement against powerful adversaries}, booktitle = {{ACM} Symposium on Principles of Distributed Computing, {PODC} '13, Montreal, QC, Canada, July 22-24, 2013}, pages = {280--289}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484239.2484250}, doi = {10.1145/2484239.2484250}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/LewkoL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1301-3223, author = {Allison B. Lewko and Mark Lewko}, title = {On the Complexity of Asynchronous Agreement Against Powerful Adversaries}, journal = {CoRR}, volume = {abs/1301.3223}, year = {2013}, url = {http://arxiv.org/abs/1301.3223}, eprinttype = {arXiv}, eprint = {1301.3223}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1301-3223.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LewkoW13, author = {Allison B. Lewko and Brent Waters}, title = {Why Proving {HIBE} Systems Secure is Difficult}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {68}, year = {2013}, url = {http://eprint.iacr.org/2013/068}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LewkoW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LewkoM13, author = {Allison B. Lewko and Sarah Meiklejohn}, title = {A Profitable Sub-Prime Loan: Obtaining the Advantages of Composite-Order in Prime-Order Bilinear Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {300}, year = {2013}, url = {http://eprint.iacr.org/2013/300}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LewkoM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GerbushLOW12, author = {Michael Gerbush and Allison B. Lewko and Adam O'Neill and Brent Waters}, editor = {Xiaoyun Wang and Kazue Sako}, title = {Dual Form Signatures: An Approach for Proving Security from Static Assumptions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7658}, pages = {25--42}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34961-4\_4}, doi = {10.1007/978-3-642-34961-4\_4}, timestamp = {Mon, 25 Nov 2019 15:32:14 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/GerbushLOW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LewkoW12, author = {Allison B. Lewko and Brent Waters}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {180--198}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_12}, doi = {10.1007/978-3-642-32009-5\_12}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LewkoW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Lewko12, author = {Allison B. Lewko}, editor = {David Pointcheval and Thomas Johansson}, title = {Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {318--335}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_20}, doi = {10.1007/978-3-642-29011-4\_20}, timestamp = {Sun, 12 Nov 2023 02:15:08 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/Lewko12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HohenbergerLW12, author = {Susan Hohenberger and Allison B. Lewko and Brent Waters}, editor = {David Pointcheval and Thomas Johansson}, title = {Detecting Dangerous Queries: {A} New Approach for Chosen Ciphertext Security}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {663--681}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_39}, doi = {10.1007/978-3-642-29011-4\_39}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HohenbergerLW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/KalaiLR12, author = {Yael Tauman Kalai and Allison B. Lewko and Anup Rao}, title = {Formulas Resilient to Short-Circuit Errors}, booktitle = {53rd Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS} 2012, New Brunswick, NJ, USA, October 20-23, 2012}, pages = {490--499}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/FOCS.2012.69}, doi = {10.1109/FOCS.2012.69}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/KalaiLR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GoldwasserLW12, author = {Shafi Goldwasser and Allison B. Lewko and David A. Wilson}, editor = {Ronald Cramer}, title = {Bounded-Collusion {IBE} from Key Homomorphism}, booktitle = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC} 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7194}, pages = {564--581}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28914-9\_32}, doi = {10.1007/978-3-642-28914-9\_32}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GoldwasserLW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HohenbergerLW12, author = {Susan Hohenberger and Allison B. Lewko and Brent Waters}, title = {Detecting Dangerous Queries: {A} New Approach for Chosen Ciphertext Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {6}, year = {2012}, url = {http://eprint.iacr.org/2012/006}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HohenbergerLW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GerbushLOW12, author = {Michael Gerbush and Allison B. Lewko and Adam O'Neill and Brent Waters}, title = {Dual Form Signatures: An Approach for Proving Security from Static Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {261}, year = {2012}, url = {http://eprint.iacr.org/2012/261}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GerbushLOW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LewkoW12, author = {Allison B. Lewko and Brent Waters}, title = {New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {326}, year = {2012}, url = {http://eprint.iacr.org/2012/326}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LewkoW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejc/LewkoL11, author = {Allison B. Lewko and Mark Lewko}, title = {On the structure of sets of large doubling}, journal = {Eur. J. Comb.}, volume = {32}, number = {5}, pages = {688--708}, year = {2011}, url = {https://doi.org/10.1016/j.ejc.2011.03.001}, doi = {10.1016/J.EJC.2011.03.001}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejc/LewkoL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LewkoW11, author = {Allison B. Lewko and Brent Waters}, editor = {Kenneth G. Paterson}, title = {Unbounded {HIBE} and Attribute-Based Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {547--567}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_30}, doi = {10.1007/978-3-642-20465-4\_30}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LewkoW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LewkoW11a, author = {Allison B. Lewko and Brent Waters}, editor = {Kenneth G. Paterson}, title = {Decentralizing Attribute-Based Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {568--588}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_31}, doi = {10.1007/978-3-642-20465-4\_31}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LewkoW11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/DodisLWW11, author = {Yevgeniy Dodis and Allison B. Lewko and Brent Waters and Daniel Wichs}, editor = {Rafail Ostrovsky}, title = {Storing Secrets on Continually Leaky Devices}, booktitle = {{IEEE} 52nd Annual Symposium on Foundations of Computer Science, {FOCS} 2011, Palm Springs, CA, USA, October 22-25, 2011}, pages = {688--697}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/FOCS.2011.35}, doi = {10.1109/FOCS.2011.35}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/DodisLWW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/LewkoLW11, author = {Allison B. Lewko and Mark Lewko and Brent Waters}, editor = {Lance Fortnow and Salil P. Vadhan}, title = {How to leak on key updates}, booktitle = {Proceedings of the 43rd {ACM} Symposium on Theory of Computing, {STOC} 2011, San Jose, CA, USA, 6-8 June 2011}, pages = {725--734}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1993636.1993732}, doi = {10.1145/1993636.1993732}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/LewkoLW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/LewkoRW11, author = {Allison B. Lewko and Yannis Rouselakis and Brent Waters}, editor = {Yuval Ishai}, title = {Achieving Leakage Resilience through Dual System Encryption}, booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC} 2011, Providence, RI, USA, March 28-30, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6597}, pages = {70--88}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19571-6\_6}, doi = {10.1007/978-3-642-19571-6\_6}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/LewkoRW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wdag/Lewko11, author = {Allison B. Lewko}, editor = {David Peleg}, title = {The Contest between Simplicity and Efficiency in Asynchronous Byzantine Agreement}, booktitle = {Distributed Computing - 25th International Symposium, {DISC} 2011, Rome, Italy, September 20-22, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6950}, pages = {348--362}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24100-0\_35}, doi = {10.1007/978-3-642-24100-0\_35}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/wdag/Lewko11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1106-5170, author = {Allison B. Lewko}, title = {The Contest Between Simplicity and Efficiency in Asynchronous Byzantine Agreement}, journal = {CoRR}, volume = {abs/1106.5170}, year = {2011}, url = {http://arxiv.org/abs/1106.5170}, eprinttype = {arXiv}, eprint = {1106.5170}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1106-5170.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LewkoW11, author = {Allison B. Lewko and Brent Waters}, title = {Unbounded {HIBE} and Attribute-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {49}, year = {2011}, url = {http://eprint.iacr.org/2011/049}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LewkoW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisLWW11, author = {Yevgeniy Dodis and Allison B. Lewko and Brent Waters and Daniel Wichs}, title = {Storing Secrets on Continually Leaky Devices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {369}, year = {2011}, url = {http://eprint.iacr.org/2011/369}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisLWW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lewko11, author = {Allison B. Lewko}, title = {Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {490}, year = {2011}, url = {http://eprint.iacr.org/2011/490}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lewko11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LewkoOSTW10, author = {Allison B. Lewko and Tatsuaki Okamoto and Amit Sahai and Katsuyuki Takashima and Brent Waters}, editor = {Henri Gilbert}, title = {Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6110}, pages = {62--91}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13190-5\_4}, doi = {10.1007/978-3-642-13190-5\_4}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LewkoOSTW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/LewkoW10, author = {Allison B. Lewko and Brent Waters}, title = {On the Insecurity of Parallel Repetition for Leakage Resilience}, booktitle = {51th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS} 2010, October 23-26, 2010, Las Vegas, Nevada, {USA}}, pages = {521--530}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/FOCS.2010.57}, doi = {10.1109/FOCS.2010.57}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/LewkoW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LewkoSW10, author = {Allison B. Lewko and Amit Sahai and Brent Waters}, title = {Revocation Systems with Very Small Private Keys}, booktitle = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May 2010, Berleley/Oakland, California, {USA}}, pages = {273--285}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SP.2010.23}, doi = {10.1109/SP.2010.23}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/LewkoSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/LewkoW10, author = {Allison B. Lewko and Brent Waters}, editor = {Daniele Micciancio}, title = {New Techniques for Dual System Encryption and Fully Secure {HIBE} with Short Ciphertexts}, booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC} 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5978}, pages = {455--479}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11799-2\_27}, doi = {10.1007/978-3-642-11799-2\_27}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/LewkoW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LewkoOSTW10, author = {Allison B. Lewko and Tatsuaki Okamoto and Amit Sahai and Katsuyuki Takashima and Brent Waters}, title = {Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {110}, year = {2010}, url = {http://eprint.iacr.org/2010/110}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LewkoOSTW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LewkoW10, author = {Allison B. Lewko and Brent Waters}, title = {Decentralizing Attribute-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {351}, year = {2010}, url = {http://eprint.iacr.org/2010/351}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LewkoW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LewkoW10a, author = {Allison B. Lewko and Brent Waters}, title = {On the Insecurity of Parallel Repetition for Leakage Resilience}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {404}, year = {2010}, url = {http://eprint.iacr.org/2010/404}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LewkoW10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LewkoRW10, author = {Allison B. Lewko and Yannis Rouselakis and Brent Waters}, title = {Achieving Leakage Resilience Through Dual System Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {438}, year = {2010}, url = {http://eprint.iacr.org/2010/438}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LewkoRW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LewkoLW10, author = {Allison B. Lewko and Mark Lewko and Brent Waters}, title = {How to Leak on Key Updates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {562}, year = {2010}, url = {http://eprint.iacr.org/2010/562}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LewkoLW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LewkoW09, author = {Allison B. Lewko and Brent Waters}, editor = {Ehab Al{-}Shaer and Somesh Jha and Angelos D. Keromytis}, title = {Efficient pseudorandom functions from the decisional linear assumption and weaker variants}, booktitle = {Proceedings of the 2009 {ACM} Conference on Computer and Communications Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009}, pages = {112--120}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1653662.1653677}, doi = {10.1145/1653662.1653677}, timestamp = {Tue, 10 Nov 2020 19:58:07 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LewkoW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LewkoW09, author = {Allison B. Lewko and Brent Waters}, title = {New Techniques for Dual System Encryption and Fully Secure {HIBE} with Short Ciphertexts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {482}, year = {2009}, url = {http://eprint.iacr.org/2009/482}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LewkoW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LewkoW09a, author = {Allison B. Lewko and Brent Waters}, title = {Efficient Pseudorandom Functions From the Decisional Linear Assumption and Weaker Variants}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {486}, year = {2009}, url = {http://eprint.iacr.org/2009/486}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LewkoW09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LewkoSW08, author = {Allison B. Lewko and Amit Sahai and Brent Waters}, title = {Revocation Systems with Very Small Private Keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {309}, year = {2008}, url = {http://eprint.iacr.org/2008/309}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LewkoSW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.