default search action
Matthew K. Franklin
Person information
- affiliation: University of California, Davis, USA
- award (2013): Gödel Prize
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [j18]Mun-Kyu Lee, Jin Bok Kim, Matthew K. Franklin:
Enhancing the Security of Personal Identification Numbers with Three-Dimensional Displays. Mob. Inf. Syst. 2016: 8019830:1-8019830:9 (2016) - 2015
- [j17]Matthew K. Franklin, Ran Gelles, Rafail Ostrovsky, Leonard J. Schulman:
Optimal Coding for Streaming Authentication and Interactive Communication. IEEE Trans. Inf. Theory 61(1): 133-145 (2015) - 2014
- [c53]Sherman S. M. Chow, Matthew K. Franklin, Haibin Zhang:
Practical Dual-Receiver Encryption - Soundness, Complete Non-malleability, and Applications. CT-RSA 2014: 85-105 - [c52]Mun-Kyu Lee, Jin Bok Kim, Matthew K. Franklin:
3DPIN: Enhancing security with 3D display. GCCE 2014: 129-130 - 2013
- [c51]Matthew K. Franklin, Ran Gelles, Rafail Ostrovsky, Leonard J. Schulman:
Optimal Coding for Streaming Authentication and Interactive Communication. CRYPTO (2) 2013: 258-276 - [c50]Matthew K. Franklin, Haibin Zhang:
Unique Ring Signatures: A Practical Construction. Financial Cryptography 2013: 162-170 - [i9]Sherman S. M. Chow, Matthew K. Franklin, Haibin Zhang:
Practical Dual-Receiver Encryption - Soundness, Complete Non-Malleability, and Applications. IACR Cryptol. ePrint Arch. 2013: 858 (2013) - 2012
- [c49]Benjamin Davis, Hao Chen, Matthew K. Franklin:
Privacy-preserving alibi systems. AsiaCCS 2012: 34-35 - [c48]Matthew K. Franklin, Haibin Zhang:
Unique Group Signatures. ESORICS 2012: 643-660 - [i8]Matthew K. Franklin, Ran Gelles, Rafail Ostrovsky, Leonard J. Schulman:
Optimal Coding for Streaming Authentication and Interactive Communication. Electron. Colloquium Comput. Complex. TR12 (2012) - [i7]Matthew K. Franklin, Haibin Zhang:
Unique Group Signatures. IACR Cryptol. ePrint Arch. 2012: 204 (2012) - [i6]Matthew K. Franklin, Haibin Zhang:
A Framework for Unique Ring Signatures. IACR Cryptol. ePrint Arch. 2012: 577 (2012) - 2011
- [r2]Matthew K. Franklin:
Mix Networks. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 786-788 - 2010
- [j16]Jeongdae Hong, Jinil Kim, Jihye Kim, Matthew K. Franklin, Kunsoo Park:
Fair threshold decryption with semi-trusted third parties. Int. J. Appl. Cryptogr. 2(2): 139-153 (2010) - [c47]Matthew K. Franklin, Payman Mohassel:
Efficient and Secure Evaluation of Multivariate Polynomials and Applications. ACNS 2010: 236-254
2000 – 2009
- 2009
- [c46]Jeongdae Hong, Jinil Kim, Jihye Kim, Matthew K. Franklin, Kunsoo Park:
Fair Threshold Decryption with Semi-Trusted Third Parties. ACISP 2009: 309-326 - [c45]Matthew K. Franklin, Mark A. Gondree, Payman Mohassel:
Communication-Efficient Private Protocols for Longest Common Subsequence. CT-RSA 2009: 265-278 - [i5]Matthew K. Franklin, Mark A. Gondree, Payman Mohassel:
Communication-Efficient Private Protocols for Longest Common Subsequence. IACR Cryptol. ePrint Arch. 2009: 19 (2009) - 2008
- [e3]Matthew K. Franklin, Lucas Chi Kwong Hui, Duncan S. Wong:
Cryptology and Network Security, 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings. Lecture Notes in Computer Science 5339, Springer 2008, ISBN 978-3-540-89640-1 [contents] - 2007
- [c44]Matthew K. Franklin, Mark A. Gondree, Payman Mohassel:
Multi-party Indirect Indexing and Applications. ASIACRYPT 2007: 283-297 - [c43]Matthew K. Franklin, Mark A. Gondree, Payman Mohassel:
Improved Efficiency for Private Stable Matching. CT-RSA 2007: 163-177 - [c42]Amos Beimel, Matthew K. Franklin:
Weakly-Private Secret Sharing Schemes. TCC 2007: 253-272 - [c41]Eike Kiltz, Payman Mohassel, Enav Weinreb, Matthew K. Franklin:
Secure Linear Algebra Using Linearly Recurrent Sequences. TCC 2007: 291-310 - [c40]Matthias Fitzi, Matthew K. Franklin, Juan A. Garay, Harsha Vardhan Simhadri:
Towards Optimal and Efficient Perfectly Secure Message Transmission. TCC 2007: 311-322 - [i4]Matthew K. Franklin, Mark A. Gondree, Payman Mohassel:
Multi-Party Indirect Indexing and Applications. IACR Cryptol. ePrint Arch. 2007: 341 (2007) - 2006
- [j15]Matthew K. Franklin:
A survey of key evolving cryptosystems. Int. J. Secur. Networks 1(1/2): 46-53 (2006) - [c39]Payman Mohassel, Matthew K. Franklin:
Efficient Polynomial Operations in the Shared-Coefficients Setting. Public Key Cryptography 2006: 44-57 - [c38]Payman Mohassel, Matthew K. Franklin:
Efficiency Tradeoffs for Malicious Two-Party Computation. Public Key Cryptography 2006: 458-473 - [c37]Amos Beimel, Matthew K. Franklin:
Edge Eavesdropping Games. SCN 2006: 1-17 - [i3]Matthew K. Franklin, Mark A. Gondree, Payman Mohassel:
Improved Efficiency for Private Stable Matching. IACR Cryptol. ePrint Arch. 2006: 332 (2006) - 2005
- [j14]Jeffrey Considine, Matthias Fitzi, Matthew K. Franklin, Leonid A. Levin, Ueli M. Maurer, David Metcalf:
Byzantine Agreement Given Partial Broadcast. J. Cryptol. 18(3): 191-217 (2005) - [r1]Matthew K. Franklin:
Mix Networks. Encyclopedia of Cryptography and Security 2005 - 2004
- [j13]Matthew K. Franklin, Moti Yung:
Secure Hypergraphs: Privacy from Partial Broadcast. SIAM J. Discret. Math. 18(3): 437-450 (2004) - [c36]Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz, Atsuko Miyaji, Moti Yung:
A Generic Construction for Intrusion-Resilient Public-Key Encryption. CT-RSA 2004: 81-98 - [e2]Matthew K. Franklin:
Advances in Cryptology - CRYPTO 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings. Lecture Notes in Computer Science 3152, Springer 2004, ISBN 3-540-22668-0 [contents] - 2003
- [j12]Dan Boneh, Matthew K. Franklin:
Identity-Based Encryption from the Weil Pairing. SIAM J. Comput. 32(3): 586-615 (2003) - [c35]Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz, Atsuko Miyaji, Moti Yung:
Intrusion-Resilient Public-Key Encryption. CT-RSA 2003: 19-32 - 2002
- [j11]Drew Dean, Matthew K. Franklin, Adam Stubblefield:
An algebraic approach to IP traceback. ACM Trans. Inf. Syst. Secur. 5(2): 119-137 (2002) - [c34]Jessica Staddon, Sara K. Miner, Matthew K. Franklin, Dirk Balfanz, Michael Malkin, Drew Dean:
Self-Healing Key Distribution with Revocation. S&P 2002: 241-257 - 2001
- [j10]Dan Boneh, Matthew K. Franklin:
Efficient generation of shared RSA keys. J. ACM 48(4): 702-722 (2001) - [c33]Dan Boneh, Matthew K. Franklin:
Identity-Based Encryption from the Weil Pairing. CRYPTO 2001: 213-229 - [c32]Dan Boneh, Glenn Durfee, Matthew K. Franklin:
Lower Bounds for Multicast Message Authentication. EUROCRYPT 2001: 437-452 - [c31]Tom Berson, Drew Dean, Matthew K. Franklin, Diana K. Smetters, Mike Spreitzer:
Cryptology As a Network Service. NDSS 2001 - [c30]Drew Dean, Matthew K. Franklin, Adam Stubblefield:
An Algebraic Approach to IP Traceback. NDSS 2001 - [i2]Dan Boneh, Matthew K. Franklin:
Identity Based Encryption From the Weil Pairing. IACR Cryptol. ePrint Arch. 2001: 90 (2001) - 2000
- [j9]Matthew K. Franklin, Zvi Galil, Moti Yung:
Eavesdropping games: a graph-theoretic approach to privacy in distributed systems. J. ACM 47(2): 225-243 (2000) - [j8]Matthew K. Franklin, Rebecca N. Wright:
Secure Communication in Minimal Connectivity Models. J. Cryptol. 13(1): 9-30 (2000) - [c29]Matthew K. Franklin, Tomas Sander:
Commital Deniable Proofs and Electronic Campaign Finance. ASIACRYPT 2000: 373-387 - [c28]Glenn Durfee, Matthew K. Franklin:
Distribution chain security. CCS 2000: 63-70 - [c27]Matthew K. Franklin, Tomas Sander:
Deniable payments and electronic campaign finance. CFP 2000: 67-68 - [c26]Tad Hogg, Bernardo A. Huberman, Matthew K. Franklin:
Protecting privacy while sharing information in electronic communities. CFP 2000: 73-75
1990 – 1999
- 1999
- [j7]Harry Buhrman, Matthew K. Franklin, Juan A. Garay, Jaap-Henk Hoepman, John Tromp, Paul M. B. Vitányi:
Mutual Search. J. ACM 46(4): 517-536 (1999) - [j6]Amos Beimel, Matthew K. Franklin:
Reliable Communication over Partially Authenticated Networks. Theor. Comput. Sci. 220(1): 185-210 (1999) - [c25]Dan Boneh, Matthew K. Franklin:
Anonymous Authentication with Subset Queries (extended abstract). CCS 1999: 113-119 - [c24]Dan Boneh, Matthew K. Franklin:
An Efficient Public Key Traitor Tracing Scheme. CRYPTO 1999: 338-353 - [c23]Bernardo A. Huberman, Matthew K. Franklin, Tad Hogg:
Enhancing privacy and trust in electronic communities. EC 1999: 78-86 - [c22]Matthew K. Franklin, Juan A. Garay, Moti Yung:
Self-Testing/Correcting Protocols (Extended Abstract). DISC 1999: 269-283 - [e1]Matthew K. Franklin:
Financial Cryptography, Third International Conference, FC'99, Anguilla, British West Indies, February 1999, Proceedings. Lecture Notes in Computer Science 1648, Springer 1999, ISBN 3-540-66362-2 [contents] - [i1]Harry Buhrman, Matthew K. Franklin, Juan A. Garay, Jaap-Henk Hoepman, John Tromp, Paul M. B. Vitányi:
Mutual Search. CoRR cs.DS/9902005 (1999) - 1998
- [j5]Matthew K. Franklin, Dahlia Malkhi:
Auditable Metering with Lightweight Security. J. Comput. Secur. 6(4): 237-256 (1998) - [c21]Matthew K. Franklin, Rebecca N. Wright:
Secure Communications in Minimal Connectivity Models. EUROCRYPT 1998: 346-360 - [c20]Matthew K. Franklin, Gene Tsudik:
Secure Group Barter: Multi-party Fair Exchange with Semi-Trusted Neutral Parties. Financial Cryptography 1998: 90-102 - [c19]Harry Buhrman, Matthew K. Franklin, Juan A. Garay, Jaap-Henk Hoepman, John Tromp, Paul M. B. Vitányi:
Mutual Search (Extended Abstract). SODA 1998: 481-489 - 1997
- [c18]Matthew K. Franklin, Michael K. Reiter:
Fair Exchange with a Semi-Trusted Third Party (extended abstract). CCS 1997: 1-6 - [c17]Dan Boneh, Matthew K. Franklin:
Efficient Generation of Shared RSA Keys (Extended Abstract). CRYPTO 1997: 425-439 - [c16]Matthew K. Franklin, Dahlia Malkhi:
Auditable Metering with Lightweight Security. Financial Cryptography 1997: 151-160 - [c15]Amos Beimel, Matthew K. Franklin:
Reliable Communication over Partially Authenticated Networks. WDAG 1997: 245-259 - 1996
- [j4]Michael K. Reiter, Matthew K. Franklin, John B. Lacy, Rebecca N. Wright:
The Omega Key Management Service. J. Comput. Secur. 4(4): 267-288 (1996) - [j3]Matthew K. Franklin, Stuart Haber:
Joint Encryption and Message-Efficient Secure Computation. J. Cryptol. 9(4): 217-232 (1996) - [j2]Matthew K. Franklin, Michael K. Reiter:
The Design and Implementation of a Secure Auction Service. IEEE Trans. Software Eng. 22(5): 302-312 (1996) - [c14]Michael K. Reiter, Matthew K. Franklin, John B. Lacy, Rebecca N. Wright:
The Omega Key Management Service. CCS 1996: 38-47 - [c13]Don Coppersmith, Matthew K. Franklin, Jacques Patarin, Michael K. Reiter:
Low-Exponent RSA with Related Messages. EUROCRYPT 1996: 1-9 - [c12]Ronald Cramer, Matthew K. Franklin, Berry Schoenmakers, Moti Yung:
Multi-Autority Secret-Ballot Elections with Linear Work. EUROCRYPT 1996: 72-83 - 1995
- [c11]Matthew K. Franklin, Michael K. Reiter:
Verifiable Signature Sharing. EUROCRYPT 1995: 50-63 - [c10]Matthew K. Franklin, Michael K. Reiter:
The design and implementation of a secure auction service. S&P 1995: 2-14 - [c9]Matthew K. Franklin, Moti Yung:
Secure hypergraphs: privacy from partial broadcast (Extended Abstract). STOC 1995: 36-44 - 1994
- [c8]Matthew K. Franklin, Moti Yung:
The Blinding of Weak Signatures (Extended Abstract). EUROCRYPT 1994: 67-76 - 1993
- [c7]Matthew K. Franklin, Stuart Haber:
Joint Encryption and Message-Efficient Secure Computation. CRYPTO 1993: 266-277 - [c6]Matthew K. Franklin, Zvi Galil, Moti Yung:
Eavesdropping Games: A Graph-Theoretic Approach to Privacy in Distributed Systems. FOCS 1993: 670-679 - [c5]Matthew K. Franklin, Moti Yung:
Secure and Efficient Off-Line Digital Money (Extended Abstract). ICALP 1993: 265-276 - 1992
- [c4]Matthew K. Franklin, Moti Yung:
Communication Complexity of Secure Computation (Extended Abstract). STOC 1992: 699-710 - 1991
- [j1]Armen Gabrielian, Matthew K. Franklin:
Multilevel Specification of Real Time Systems. Commun. ACM 34(5): 50-60 (1991) - 1990
- [c3]Armen Gabrielian, Matthew K. Franklin:
Multi-Level Specification and Verification of Real-Time Software. ICSE 1990: 52-62
1980 – 1989
- 1989
- [c2]Matthew K. Franklin, Armen Gabrielian:
A Transformational Method for Verifying Safety Properties in Real-Time Systems. RTSS 1989: 112-123 - 1988
- [c1]Armen Gabrielian, Matthew K. Franklin:
State-Based Specification of Complex Real-Time Systems. RTSS 1988: 2-11
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint