default search action
Anna Lysyanskaya
Person information
- affiliation: Brown University, Providence, RI, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j9]Scott Griffy, Anna Lysyanskaya:
PACIFIC: Privacy-preserving automated contact tracing featuring integrity against cloning. IACR Commun. Cryptol. 1(2): 12 (2024) - [j8]Mihir Bellare, Anna Lysyanskaya:
Symmetric and Dual PRFs from Standard Assumptions: A Generic Validation of a Prevailing Assumption. J. Cryptol. 37(4): 33 (2024) - [i55]Victor Youdom Kemmoe, Anna Lysyanskaya:
RSA-Based Dynamic Accumulator without Hashing into Primes. IACR Cryptol. ePrint Arch. 2024: 505 (2024) - [i54]Scott Griffy, Markulf Kohlweiss, Anna Lysyanskaya, Meghna Sengupta:
Olympic Privacy-Preserving Blueprints: Faster Communication, Highly Functional, Stronger Security. IACR Cryptol. ePrint Arch. 2024: 675 (2024) - [i53]Megumi Ando, Anna Lysyanskaya, Eli Upfal:
Bruisable Onions: Anonymous Communication in the Asynchronous Model. IACR Cryptol. ePrint Arch. 2024: 885 (2024) - [i52]Scott Griffy, Anna Lysyanskaya, Omid Mir, Octavio Perez Kempner, Daniel Slamanig:
Delegatable Anonymous Credentials From Mercurial Signatures With Stronger Privacy. IACR Cryptol. ePrint Arch. 2024: 1216 (2024) - 2023
- [c63]Omid Mir, Balthazar Bauer, Scott Griffy, Anna Lysyanskaya, Daniel Slamanig:
Aggregate Signatures with Versatile Randomization and Issuer-Hiding Multi-Authority Anonymous Credentials. CCS 2023: 30-44 - [c62]Markulf Kohlweiss, Anna Lysyanskaya, An Nguyen:
Privacy-Preserving Blueprints. EUROCRYPT (2) 2023: 594-625 - [c61]Anna Lysyanskaya:
Security Analysis of RSA-BSSA. Public Key Cryptography (1) 2023: 251-280 - [e5]Helena Handschuh, Anna Lysyanskaya:
Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part I. Lecture Notes in Computer Science 14081, Springer 2023, ISBN 978-3-031-38556-8 [contents] - [e4]Helena Handschuh, Anna Lysyanskaya:
Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part II. Lecture Notes in Computer Science 14082, Springer 2023, ISBN 978-3-031-38544-5 [contents] - [e3]Helena Handschuh, Anna Lysyanskaya:
Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part III. Lecture Notes in Computer Science 14083, Springer 2023, ISBN 978-3-031-38547-6 [contents] - [e2]Helena Handschuh, Anna Lysyanskaya:
Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part IV. Lecture Notes in Computer Science 14084, Springer 2023, ISBN 978-3-031-38550-6 [contents] - [e1]Helena Handschuh, Anna Lysyanskaya:
Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part V. Lecture Notes in Computer Science 14085, Springer 2023, ISBN 978-3-031-38553-7 [contents] - [i51]Scott Griffy, Anna Lysyanskaya:
PACIFIC: Privacy-preserving automated contact tracing scheme featuring integrity against cloning. IACR Cryptol. ePrint Arch. 2023: 371 (2023) - [i50]Qiqi Lai, Feng-Hao Liu, Anna Lysyanskaya, Zhedong Wang:
Lattice-based Commit-Transferrable Signatures and Applications to Anonymous Credentials. IACR Cryptol. ePrint Arch. 2023: 766 (2023) - [i49]Omid Mir, Balthazar Bauer, Scott Griffy, Anna Lysyanskaya, Daniel Slamanig:
Aggregate Signatures with Versatile Randomization and Issuer-Hiding Multi-Authority Anonymous Credentials. IACR Cryptol. ePrint Arch. 2023: 1016 (2023) - 2022
- [c60]Rutchathon Chairattana-Apirom, Lucjan Hanzlik, Julian Loss, Anna Lysyanskaya, Benedikt Wagner:
PI-Cut-Choo and Friends: Compact Blind Signatures via Parallel Instance Cut-and-Choose and More. CRYPTO (3) 2022: 3-31 - [c59]Anna Lysyanskaya, Leah Namisa Rosenbloom:
Universally Composable $\varSigma $-protocols in the Global Random-Oracle Model. TCC (1) 2022: 203-233 - [c58]Megumi Ando, Miranda Christ, Anna Lysyanskaya, Tal Malkin:
Poly Onions: Achieving Anonymity in the Presence of Churn. TCC (2) 2022: 715-746 - [i48]Rutchathon Chairattana-Apirom, Anna Lysyanskaya:
Compact Cut-and-Choose: Boosting the Security of Blind Signature Schemes, Compactly. IACR Cryptol. ePrint Arch. 2022: 3 (2022) - [i47]Anna Lysyanskaya, Leah Namisa Rosenbloom:
Universally Composable Sigma-protocols in the Global Random-Oracle Model. IACR Cryptol. ePrint Arch. 2022: 290 (2022) - [i46]Megumi Ando, Miranda Christ, Anna Lysyanskaya, Tal Malkin:
Poly Onions: Achieving Anonymity in the Presence of Churn. IACR Cryptol. ePrint Arch. 2022: 392 (2022) - [i45]Anna Lysyanskaya:
Security Analysis of RSA-BSSA. IACR Cryptol. ePrint Arch. 2022: 895 (2022) - [i44]Anna Lysyanskaya, Leah Namisa Rosenbloom:
Efficient and Universally Composable Non-Interactive Zero-Knowledge Proofs of Knowledge with Security Against Adaptive Corruptions. IACR Cryptol. ePrint Arch. 2022: 1484 (2022) - [i43]Markulf Kohlweiss, Anna Lysyanskaya, An Nguyen:
Privacy-Preserving Blueprints. IACR Cryptol. ePrint Arch. 2022: 1536 (2022) - 2021
- [j7]Elizabeth C. Crites, Anna Lysyanskaya:
Mercurial Signatures for Variable-Length Messages. Proc. Priv. Enhancing Technol. 2021(4): 441-463 (2021) - [c57]Megumi Ando, Anna Lysyanskaya, Eli Upfal:
On the Complexity of Anonymous Communication Through Public Networks. ITC 2021: 9:1-9:25 - [c56]Megumi Ando, Anna Lysyanskaya:
Cryptographic Shallots: A Formal Treatment of Repliable Onion Encryption. TCC (3) 2021: 188-221 - [i42]Abhishek Singh, Ramesh Raskar, Anna Lysyanskaya:
Safepaths: Vaccine Diary Protocol and Decentralized Vaccine Coordination System using a Privacy Preserving User Centric Experience. CoRR abs/2103.01754 (2021) - 2020
- [j6]Dana Dachman-Soled, Nils Fleischhacker, Jonathan Katz, Anna Lysyanskaya, Dominique Schröder:
Feasibility and Infeasibility of Secure Computation with Malicious PUFs. J. Cryptol. 33(2): 595-617 (2020) - [i41]Megumi Ando, Anna Lysyanskaya:
Cryptographic Shallots: A Formal Treatment of Repliable Onion Encryption. IACR Cryptol. ePrint Arch. 2020: 215 (2020) - [i40]Ran Canetti, Yael Tauman Kalai, Anna Lysyanskaya, Ronald L. Rivest, Adi Shamir, Emily Shen, Ari Trachtenberg, Mayank Varia, Daniel J. Weitzner:
Privacy-Preserving Automated Exposure Notification. IACR Cryptol. ePrint Arch. 2020: 863 (2020) - [i39]Elizabeth C. Crites, Anna Lysyanskaya:
Mercurial Signatures for Variable-Length Messages. IACR Cryptol. ePrint Arch. 2020: 979 (2020)
2010 – 2019
- 2019
- [c55]Elizabeth C. Crites, Anna Lysyanskaya:
Delegatable Anonymous Credentials from Mercurial Signatures. CT-RSA 2019: 535-555 - [c54]Prabhanjan Ananth, Apoorvaa Deshpande, Yael Tauman Kalai, Anna Lysyanskaya:
Fully Homomorphic NIZK and NIWI Proofs. TCC (2) 2019: 356-385 - [i38]Megumi Ando, Anna Lysyanskaya, Eli Upfal:
On the Complexity of Anonymous Communication Through Public Networks. CoRR abs/1902.06306 (2019) - [i37]Jan Camenisch, Ralf Küsters, Anna Lysyanskaya, Alessandra Scafuro:
Practical Yet Composably Secure Cryptographic Protocols (Dagstuhl Seminar 19042). Dagstuhl Reports 9(1): 88-103 (2019) - [i36]Prabhanjan Ananth, Apoorvaa Deshpande, Yael Tauman Kalai, Anna Lysyanskaya:
Fully Homomorphic NIZK and NIWI Proofs. IACR Cryptol. ePrint Arch. 2019: 732 (2019) - 2018
- [c53]Megumi Ando, Anna Lysyanskaya, Eli Upfal:
Practical and Provably Secure Onion Routing. ICALP 2018: 144:1-144:14 - [i35]Elizabeth C. Crites, Anna Lysyanskaya:
Delegatable Anonymous Credentials from Mercurial Signatures. IACR Cryptol. ePrint Arch. 2018: 923 (2018) - 2017
- [c52]Foteini Baldimtsi, Jan Camenisch, Maria Dubovitskaya, Anna Lysyanskaya, Leonid Reyzin, Kai Samelin, Sophia Yakoubov:
Accumulators with Applications to Anonymity-Preserving Revocation. EuroS&P 2017: 301-315 - [i34]Megumi Ando, Anna Lysyanskaya, Eli Upfal:
Scalable and Provably Secure P2P Communication Protocols. CoRR abs/1706.05367 (2017) - [i33]Foteini Baldimtsi, Jan Camenisch, Maria Dubovitskaya, Anna Lysyanskaya, Leonid Reyzin, Kai Samelin, Sophia Yakoubov:
Accumulators with Applications to Anonymity-Preserving Revocation. IACR Cryptol. ePrint Arch. 2017: 43 (2017) - 2015
- [i32]Jan Camenisch, Anja Lehmann, Anna Lysyanskaya, Gregory Neven:
A Single Password for Everything? ERCIM News 2015(100) (2015) - [i31]Dana Dachman-Soled, Nils Fleischhacker, Jonathan Katz, Anna Lysyanskaya, Dominique Schröder:
Feasibility and Infeasibility of Secure Computation with Malicious PUFs. IACR Cryptol. ePrint Arch. 2015: 405 (2015) - [i30]Mihir Bellare, Anna Lysyanskaya:
Symmetric and Dual PRFs from Standard Assumptions: A Generic Validation of an HMAC Assumption. IACR Cryptol. ePrint Arch. 2015: 1198 (2015) - 2014
- [c51]Jan Camenisch, Anja Lehmann, Anna Lysyanskaya, Gregory Neven:
Memento: How to Reconstruct Your Secrets from a Single Password in a Hostile Environment. CRYPTO (2) 2014: 256-275 - [c50]Dana Dachman-Soled, Nils Fleischhacker, Jonathan Katz, Anna Lysyanskaya, Dominique Schröder:
Feasibility and Infeasibility of Secure Computation with Malicious PUFs. CRYPTO (2) 2014: 405-420 - [c49]Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn:
Malleable Signatures: New Definitions and Delegatable Anonymous Credentials. CSF 2014: 199-213 - [i29]Jan Camenisch, Anja Lehmann, Anna Lysyanskaya, Gregory Neven:
Memento: How to Reconstruct your Secrets from a Single Password in a Hostile Environment. IACR Cryptol. ePrint Arch. 2014: 429 (2014) - 2013
- [j5]Melissa Chase, Alexander Healy, Anna Lysyanskaya, Tal Malkin, Leonid Reyzin:
Mercurial Commitments with Applications to Zero-Knowledge Sets. J. Cryptol. 26(2): 251-279 (2013) - [c48]Foteini Baldimtsi, Anna Lysyanskaya:
On the Security of One-Witness Blind Signature Schemes. ASIACRYPT (2) 2013: 82-99 - [c47]Foteini Baldimtsi, Anna Lysyanskaya:
Anonymous credentials light. CCS 2013: 1087-1098 - [c46]Gesine Hinterwälder, Christian T. Zenger, Foteini Baldimtsi, Anna Lysyanskaya, Christof Paar, Wayne P. Burleson:
Efficient E-Cash in Practice: NFC-Based Payments for Public Transportation Systems. Privacy Enhancing Technologies 2013: 40-59 - [c45]Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn:
Verifiable Elections That Scale for Free. Public Key Cryptography 2013: 479-496 - [c44]Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn:
Succinct Malleable NIZKs and an Application to Compact Shuffles. TCC 2013: 100-119 - [i28]Mira Belenkiy, Melissa Chase, C. Christopher Erway, John Jannotti, Alptekin Küpçü, Anna Lysyanskaya:
Incentivizing Outsourced Computation. IACR Cryptol. ePrint Arch. 2013: 156 (2013) - [i27]Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn:
Malleable Signatures: Complex Unary Transformations and Delegatable Anonymous Credentials. IACR Cryptol. ePrint Arch. 2013: 179 (2013) - 2012
- [j4]Alptekin Küpçü, Anna Lysyanskaya:
Usable optimistic fair exchange. Comput. Networks 56(1): 50-63 (2012) - [c43]Jan Camenisch, Anna Lysyanskaya, Gregory Neven:
Practical yet universally composable two-server password-authenticated secret sharing. CCS 2012: 525-536 - [c42]Feng-Hao Liu, Anna Lysyanskaya:
Tamper and Leakage Resilience in the Split-State Model. CRYPTO 2012: 517-532 - [c41]Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn:
Malleable Proof Systems and Applications. EUROCRYPT 2012: 281-300 - [i26]Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn:
Malleable Proof Systems and Applications. IACR Cryptol. ePrint Arch. 2012: 12 (2012) - [i25]Foteini Baldimtsi, Anna Lysyanskaya:
On The Security of One-Witness Blind Signature Schemes. IACR Cryptol. ePrint Arch. 2012: 197 (2012) - [i24]Sarah Meiklejohn, C. Christopher Erway, Alptekin Küpçü, Theodora Hinkle, Anna Lysyanskaya:
ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash. IACR Cryptol. ePrint Arch. 2012: 226 (2012) - [i23]Feng-Hao Liu, Anna Lysyanskaya:
Tamper and Leakage Resilience in the Split-State Model. IACR Cryptol. ePrint Arch. 2012: 297 (2012) - [i22]Foteini Baldimtsi, Anna Lysyanskaya:
Anonymous Credentials Light. IACR Cryptol. ePrint Arch. 2012: 298 (2012) - [i21]Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn:
Succinct Malleable NIZKs and an Application to Compact Shuffles. IACR Cryptol. ePrint Arch. 2012: 506 (2012) - [i20]Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn:
Verifiable Elections That Scale for Free. IACR Cryptol. ePrint Arch. 2012: 697 (2012) - [i19]Jan Camenisch, Anna Lysyanskaya, Gregory Neven:
Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing. IACR Cryptol. ePrint Arch. 2012: 717 (2012) - 2011
- [i18]Marc Fischlin, Anna Lysyanskaya, Ueli Maurer, Alexander May:
Public-Key Cryptography (Dagstuhl Seminar 11391). Dagstuhl Reports 1(9): 76-94 (2011) - 2010
- [j3]Anna Lysyanskaya, Roberto Tamassia, Nikos Triandopoulos:
Authenticated error-correcting codes with applications to multicast authentication. ACM Trans. Inf. Syst. Secur. 13(2): 17:1-17:34 (2010) - [c40]Alptekin Küpçü, Anna Lysyanskaya:
Usable Optimistic Fair Exchange. CT-RSA 2010: 252-267 - [c39]Alptekin Küpçü, Anna Lysyanskaya:
Optimistic Fair Exchange with Multiple Arbiters. ESORICS 2010: 488-507 - [c38]Feng-Hao Liu, Anna Lysyanskaya:
Algorithmic Tamper-Proof Security under Probing Attacks. SCN 2010: 106-120 - [c37]Sarah Meiklejohn, C. Christopher Erway, Alptekin Küpçü, Theodora Hinkle, Anna Lysyanskaya:
ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash. USENIX Security Symposium 2010: 193-206 - [i17]Anna Lysyanskaya, Aaron Segal:
Rational Secret Sharing with Side Information in Point-to-Point Networks via Time-Delayed Encryption. IACR Cryptol. ePrint Arch. 2010: 540 (2010)
2000 – 2009
- 2009
- [c36]Mira Belenkiy, Jan Camenisch, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Hovav Shacham:
Randomizable Proofs and Delegatable Anonymous Credentials. CRYPTO 2009: 108-125 - [c35]Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya:
Compact E-Cash and Simulatable VRFs Revisited. Pairing 2009: 114-131 - [c34]Alptekin Küpçü, Anna Lysyanskaya:
Brief announcement: impossibility results for optimistic fair exchange with multiple autonomous arbiters. PODC 2009: 336-337 - [p1]Danfeng (Daphne) Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya:
Forward-Secure Hierarchical IBE with Applications to Broadcast Encryption. Identity-Based Cryptography 2009: 100-118 - [i16]Alptekin Küpçü, Anna Lysyanskaya:
Optimistic Fair Exchange with Multiple Arbiters. IACR Cryptol. ePrint Arch. 2009: 69 (2009) - [i15]Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya:
Compact E-Cash and Simulatable VRFs Revisited. IACR Cryptol. ePrint Arch. 2009: 107 (2009) - 2008
- [c33]Mira Belenkiy, Melissa Chase, C. Christopher Erway, John Jannotti, Alptekin Küpçü, Anna Lysyanskaya:
Incentivizing outsourced computation. NetEcon 2008: 85-90 - [c32]Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya:
P-signatures and Noninteractive Anonymous Credentials. TCC 2008: 356-374 - [i14]Mira Belenkiy, Jan Camenisch, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Hovav Shacham:
Delegatable Anonymous Credentials. IACR Cryptol. ePrint Arch. 2008: 428 (2008) - [i13]Alptekin Küpçü, Anna Lysyanskaya:
Usable Optimistic Fair Exchange. IACR Cryptol. ePrint Arch. 2008: 431 (2008) - 2007
- [j2]Anna Lysyanskaya:
Authentication without Identification. IEEE Secur. Priv. 5(3): 69-71 (2007) - [c31]Melissa Chase, Anna Lysyanskaya:
Simulatable VRFs with Applications to Multi-theorem NIZK. CRYPTO 2007: 303-322 - [c30]Jan Camenisch, Anna Lysyanskaya, Mira Meyerovich:
Endorsed E-Cash. S&P 2007: 101-115 - [c29]Mira Belenkiy, Melissa Chase, C. Christopher Erway, John Jannotti, Alptekin Küpçü, Anna Lysyanskaya, Eric Rachlin:
Making p2p accountable without losing privacy. WPES 2007: 31-40 - [i12]Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya:
Non-Interactive Anonymous Credentials. IACR Cryptol. ePrint Arch. 2007: 384 (2007) - 2006
- [j1]Yehuda Lindell, Anna Lysyanskaya, Tal Rabin:
On the composition of authenticated Byzantine Agreement. J. ACM 53(6): 881-917 (2006) - [c28]Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, Mira Meyerovich:
How to win the clonewars: efficient periodic n-times anonymous authentication. CCS 2006: 201-210 - [c27]Melissa Chase, Anna Lysyanskaya:
On Signatures of Knowledge. CRYPTO 2006: 78-96 - [c26]Anna Lysyanskaya, Nikos Triandopoulos:
Rationality and Adversarial Behavior in Multi-party Computation. CRYPTO 2006: 180-197 - [c25]Anna Lysyanskaya, Mira Meyerovich:
Provably Secure Steganography with Imperfect Sampling. Public Key Cryptography 2006: 123-139 - [c24]Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya:
Balancing Accountability and Privacy Using E-Cash (Extended Abstract). SCN 2006: 141-155 - [i11]Melissa Chase, Anna Lysyanskaya:
On Signatures of Knowledge. IACR Cryptol. ePrint Arch. 2006: 184 (2006) - [i10]Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, Mira Meyerovich:
How to Win the Clone Wars: Efficient Periodic n-Times Anonymous Authentication. IACR Cryptol. ePrint Arch. 2006: 454 (2006) - 2005
- [c23]Jan Camenisch, Anna Lysyanskaya:
A Formal Treatment of Onion Routing. CRYPTO 2005: 169-187 - [c22]Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya:
Compact E-Cash. EUROCRYPT 2005: 302-321 - [c21]Melissa Chase, Alexander Healy, Anna Lysyanskaya, Tal Malkin, Leonid Reyzin:
Mercurial Commitments with Applications to Zero-Knowledge Sets. EUROCRYPT 2005: 422-439 - [c20]Susan Hohenberger, Anna Lysyanskaya:
How to Securely Outsource Cryptographic Computations. TCC 2005: 264-282 - [i9]Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya:
Compact E-Cash. IACR Cryptol. ePrint Arch. 2005: 60 (2005) - [i8]Anna Lysyanskaya, Maria Meyerovich:
Steganography with Imperfect Samplers. IACR Cryptol. ePrint Arch. 2005: 305 (2005) - 2004
- [c19]Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya:
ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption. CCS 2004: 354-363 - [c18]Jan Camenisch, Anna Lysyanskaya:
Signature Schemes and Anonymous Credentials from Bilinear Maps. CRYPTO 2004: 56-72 - [c17]Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Hovav Shacham:
Sequential Aggregate Signatures from Trapdoor Permutations. EUROCRYPT 2004: 74-90 - [c16]Anna Lysyanskaya, Roberto Tamassia, Nikos Triandopoulos:
Multicast Authentication in Fully Adversarial Networks. S&P 2004: 241- - [c15]Endre Bangerter, Jan Camenisch, Anna Lysyanskaya:
A Cryptographic Framework for the Controlled Release of Certified Data. Security Protocols Workshop 2004: 20-42 - [c14]Rosario Gennaro, Anna Lysyanskaya, Tal Malkin, Silvio Micali, Tal Rabin:
Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering. TCC 2004: 258-277 - [i7]Yehuda Lindell, Anna Lysyanskaya, Tal Rabin:
On the Composition of Authenticated Byzantine Agreement. IACR Cryptol. ePrint Arch. 2004: 181 (2004) - [i6]Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya:
ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption. IACR Cryptol. ePrint Arch. 2004: 212 (2004) - 2003
- [i5]Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Hovav Shacham:
Sequential Aggregate Signatures from Trapdoor Permutations. IACR Cryptol. ePrint Arch. 2003: 91 (2003) - 2002
- [b1]Anna Lysyanskaya:
Signature schemes and applications to cryptographic protocol design. Massachusetts Institute of Technology, Cambridge, MA, USA, 2002 - [c13]Christian Cachin, Klaus Kursawe, Anna Lysyanskaya, Reto Strobl:
Asynchronous verifiable secret sharing and proactive cryptosystems. CCS 2002: 88-97 - [c12]Jan Camenisch, Anna Lysyanskaya:
Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials. CRYPTO 2002: 61-76 - [c11]Anna Lysyanskaya:
Unique Signatures and Verifiable Random Functions from the DH-DDH Separation. CRYPTO 2002: 597-612 - [c10]