default search action
Moses D. Liskov
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i6]Scott L. Dyer, Christian A. Femrite, Joshua D. Guttman, Julian P. Lanson, Moses D. Liskov:
Cryptographically Assured Information Flow: Assured Remote Execution. CoRR abs/2402.02630 (2024)
2010 – 2019
- 2019
- [c16]Moses D. Liskov, Joshua D. Guttman, John D. Ramsdell, Paul D. Rowe, F. Javier Thayer:
Enrich-by-Need Protocol Analysis for Diffie-Hellman. Foundations of Security, Protocols, and Equational Reasoning 2019: 135-155 - 2018
- [j6]Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Moses D. Liskov, Nancy A. Lynch, Olivier Pereira, Roberto Segala:
Task-structured probabilistic I/O automata. J. Comput. Syst. Sci. 94: 63-97 (2018) - [i5]Moses D. Liskov, Joshua D. Guttman, John D. Ramsdell, Paul D. Rowe, F. Javier Thayer:
Enrich-by-need Protocol Analysis for Diffie-Hellman (Extended Version). CoRR abs/1804.05713 (2018) - 2017
- [i4]Moses D. Liskov:
A practical, perfectly secure password scheme in the bounded retrieval model. IACR Cryptol. ePrint Arch. 2017: 917 (2017) - 2016
- [j5]Paul D. Rowe, Joshua D. Guttman, Moses D. Liskov:
Measuring protocol strength with security goals. Int. J. Inf. Sec. 15(6): 575-596 (2016) - 2015
- [c15]Joshua D. Guttman, Moses D. Liskov, John D. Ramsdell, Paul D. Rowe:
Formal Support for Standardizing Protocols with State. SSR 2015: 246-265 - [i3]Joshua D. Guttman, Moses D. Liskov, John D. Ramsdell, Paul D. Rowe:
Formal Support for Standardizing Protocols with State. CoRR abs/1509.07552 (2015) - 2014
- [c14]Moses D. Liskov, F. Javier Thayer:
Modeling Diffie-Hellman Derivability for Automated Analysis. CSF 2014: 232-243 - [c13]Joshua D. Guttman, Moses D. Liskov, Paul D. Rowe:
Security Goals and Evolving Standards. SSR 2014: 93-110 - 2012
- [j4]Rodrigo Rodrigues, Barbara Liskov, Kathryn Chen, Moses D. Liskov, David A. Schultz:
Automatic Reconfiguration for Large-Scale Reliable Storage Systems. IEEE Trans. Dependable Secur. Comput. 9(2): 145-158 (2012) - 2011
- [j3]Moses D. Liskov, Ronald L. Rivest, David A. Wagner:
Tweakable Block Ciphers. J. Cryptol. 24(3): 588-613 (2011) - [r8]Moses D. Liskov:
Fermat Primality Test. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 455-456 - [r7]Moses D. Liskov:
Fermat's Little Theorem. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 456 - [r6]Moses D. Liskov:
Maurer's Method. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 762-763 - [r5]Moses D. Liskov:
Miller-Rabin Probabilistic Primality Test. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 784-785 - 2010
- [j2]David A. Schultz, Barbara Liskov, Moses D. Liskov:
MPSS: Mobile Proactive Secret Sharing. ACM Trans. Inf. Syst. Secur. 13(4): 34:1-34:32 (2010) - [c12]David Goldenberg, Moses D. Liskov:
On Related-Secret Pseudorandomness. TCC 2010: 255-272
2000 – 2009
- 2008
- [j1]Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Moses D. Liskov, Nancy A. Lynch, Olivier Pereira, Roberto Segala:
Analyzing Security Protocols Using Time-Bounded Task-PIOAs. Discret. Event Dyn. Syst. 18(1): 111-159 (2008) - [c11]Moses D. Liskov, Silvio Micali:
Online-Untransferable Signatures. Public Key Cryptography 2008: 248-267 - [c10]David A. Schultz, Barbara Liskov, Moses D. Liskov:
Mobile proactive secret sharing. PODC 2008: 458 - 2007
- [c9]David Goldenberg, Susan Hohenberger, Moses D. Liskov, Elizabeth Crump Schwartz, Hakan Seyalioglu:
On Tweaking Luby-Rackoff Blockciphers. ASIACRYPT 2007: 342-356 - [i2]David Goldenberg, Susan Hohenberger, Moses D. Liskov, Elizabeth Crump Schwartz, Hakan Seyalioglu:
On Tweaking Luby-Rackoff Blockciphers. IACR Cryptol. ePrint Arch. 2007: 350 (2007) - 2006
- [c8]Moses D. Liskov:
Constructing an Ideal Hash Function from Weak Ideal Compression Functions. Selected Areas in Cryptography 2006: 358-375 - [c7]Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Moses D. Liskov, Nancy A. Lynch, Olivier Pereira, Roberto Segala:
Time-Bounded Task-PIOAs: A Framework for Analyzing Security Protocols. DISC 2006: 238-253 - 2005
- [c6]Moses D. Liskov:
Updatable Zero-Knowledge Databases. ASIACRYPT 2005: 174-198 - [r4]Moses D. Liskov:
Fermat Primality Test. Encyclopedia of Cryptography and Security 2005 - [r3]Moses D. Liskov:
Fermat's Little Theorem. Encyclopedia of Cryptography and Security 2005 - [r2]Moses D. Liskov:
Maurer's Method. Encyclopedia of Cryptography and Security 2005 - [r1]Moses D. Liskov:
Miller-Rabin Probabilistic Primality Test. Encyclopedia of Cryptography and Security 2005 - [i1]Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Moses D. Liskov, Nancy A. Lynch, Olivier Pereira, Roberto Segala:
Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol. IACR Cryptol. ePrint Arch. 2005: 452 (2005) - 2004
- [b1]Moses D. Liskov:
New tools in cryptography: mutually independent commitments, tweakable block ciphers, and plaintext awareness via key registration. Massachusetts Institute of Technology, Cambridge, MA, USA, 2004 - 2003
- [c5]Jonathan Herzog, Moses D. Liskov, Silvio Micali:
Plaintext Awareness via Key Registration. CRYPTO 2003: 548-564 - 2002
- [c4]Moses D. Liskov, Ronald L. Rivest, David A. Wagner:
Tweakable Block Ciphers. CRYPTO 2002: 31-46 - 2001
- [c3]Moses D. Liskov, Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Adam D. Smith:
Mutually Independent Commitments. ASIACRYPT 2001: 385-401 - [c2]Moses D. Liskov, Silvio Micali:
Amortized E-Cash. Financial Cryptography 2001: 1-20
1990 – 1999
- 1999
- [c1]Burton S. Kaliski Jr., Moses D. Liskov:
Efficient Finite Field Basis Conversion Involving Dual Bases. CHES 1999: 135-143
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint