Cryptographers' World
 

Shai Halevi


Author's Web Page Link

36 papers in database with 2724 citations StarStarStar

Editor of 2 conference proceedings books

H-number: 25

Conference Proceedings

 
1. Shai Halevi, editor, Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings. Springer, 2009. ISBN 978-3-642-03355-1.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

2. Shai HaleviTal Rabin, editors, Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings. Springer, 2006. ISBN 3-540-32731-2.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Don Coppersmith,  Jean-Sébastien Coron,  François Grieu,  Shai Halevi,  Charanjit S. Jutla,  David Naccache,  Julien P. Stern,  Cryptanalysis of ISO/IEC 9796-1, Journal of Cryptology, Volume 21(1), pp. 27 - 51, Springer, 2008.

[Cited 3 times ]

2. Ran Canetti,  Shai Halevi,  Jonathan Katz,  A Forward-Secure Public-Key Encryption Scheme, Journal of Cryptology, Volume 20(3), pp. 265 - 294, Springer, 2007.

[Cited 225 times Red StarRed Star]

3. Ran Canetti,  Shai Halevi,  Amir Herzberg,  Maintaining Authenticated Communication in the Presence of Break-Ins, Journal of Cryptology, Volume 13(1), pp. 61 - 105, Springer, 2000.

[Cited 67 times Red Star]

4. Shai Halevi,  Efficient Commitment Schemes with Bounded Sender and Unbounded Receiver, Journal of Cryptology, Volume 12(2), pp. 77 - 89, Springer, 1999.

[Cited 12 times ]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Craig Gentry,  Shai Halevi,  Hierarchical Identity Based Encryption with Polynomially Many Levels, pp. 437 - 456, TCC 2009.

[Electronic Edition][Cited 25 times ]

2. Dan Boneh,  Shai Halevi,  Michael Hamburg,  Rafail Ostrovsky,  Circular-Secure Encryption from Decision Diffie-Hellman, pp. 108 - 125, CRYPTO 2008.

[Electronic Edition][Cited 37 times ]

3. Rosario Gennaro,  Shai Halevi,  Hugo Krawczyk,  Tal Rabin,  Threshold RSA for Dynamic and Ad-Hoc Groups, pp. 88 - 107, EUROCRYPT 2008.

[Electronic Edition][Cited 13 times ]

4. Shai Halevi,  Steven Myers,  Charles Rackoff,  On Seed-Incompressible Functions, pp. 19 - 36, TCC 2008.

[Electronic Edition][Cited 6 times ]

5. Shai Halevi,  Tal Rabin,  Degradation and Amplification of Computational Hardness, pp. 626 - 643, TCC 2008.

[Electronic Edition][Cited 8 times ]

6. Shai Halevi,  Invertible Universal Hashing and the TET Encryption Mode, pp. 412 - 429, CRYPTO 2007.

[Electronic Edition][Cited 21 times ]

7. Dan Boneh,  Xavier Boyen,  Shai Halevi,  Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles, pp. 226 - 243, CT-RSA 2006.

[Electronic Edition][Cited 44 times ]

8. Shai Halevi,  Hugo Krawczyk,  Strengthening Digital Signatures Via Randomized Hashing, pp. 41 - 59, CRYPTO 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 95 times Red Star]

9. Ran Canetti,  Shai Halevi,  Michael Steiner,  Mitigating Dictionary Attacks on Password-Protected Local Storage, pp. 160 - 179, CRYPTO 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 15 times ]

10. Ran Canetti,  Shai Halevi,  Jonathan Katz,  Yehuda Lindell,  Philip D. MacKenzie,  Universally Composable Password-Based Key Exchange, pp. 404 - 421, EUROCRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 87 times Red Star]

11. Ran Canetti,  Shai Halevi,  Jonathan Katz,  Adaptively-Secure, Non-interactive Public-Key Encryption, pp. 150 - 168, TCC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 21 times ]

12. Ran Canetti,  Shai Halevi,  Michael Steiner,  Hardness Amplification of Weakly Verifiable Puzzles, pp. 17 - 33, TCC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 25 times ]

13. Shai Halevi,  EME∗: Extending EME to handle arbitrary-length messages with associated data, pp. 315 - 327, INDOCRYPT 2004.

[Electronic Edition][Cited 40 times ]

14. Ran Canetti,  Shai Halevi,  Jonathan Katz,  Chosen-Ciphertext Security from Identity-Based Encryption, pp. 207 - 222, EUROCRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 314 times Red StarRed StarRed Star]

15. Ran Canetti,  Oded Goldreich,  Shai Halevi,  On the Random-Oracle Methodology as Applied to Length-Restricted Signature Schemes, pp. 40 - 57, TCC 2004.

[Electronic Edition][Cited 42 times ]

16. Shai Halevi,  Phillip Rogaway,  A Parallelizable Enciphering Mode, pp. 292 - 304, CT-RSA 2004.

[Electronic Edition][Cited 93 times Red Star]

17. Shai Halevi,  Phillip Rogaway,  A Tweakable Enciphering Mode, pp. 482 - 499, CRYPTO 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 105 times Red StarRed Star]

18. Ran Canetti,  Shai Halevi,  Jonathan Katz,  A Forward-Secure Public-Key Encryption Scheme, pp. 255 - 271, EUROCRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 332 times Red StarRed StarRed Star]

19. Don Coppersmith,  Shai Halevi,  Charanjit S. Jutla,  Cryptanalysis of Stream Ciphers with Linear Masking, pp. 515 - 532, CRYPTO 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 91 times Red Star]

20. Shai Halevi,  Don Coppersmith,  Charanjit S. Jutla,  Scream: A Software-Efficient Stream Cipher, pp. 195 - 209, FSE 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 39 times ]

21. Dan Boneh,  Shai Halevi,  Nick Howgrave-Graham,  The Modular Inversion Hidden Number Problem, pp. 36 - 51, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 29 times ]

22. Yevgeniy Dodis,  Shai Halevi,  Tal Rabin,  A Cryptographic Solution to a Game Theoretic Problem, pp. 112 - 130, CRYPTO 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 66 times Red Star]

23. Ran Canetti,  Yevgeniy Dodis,  Shai Halevi,  Eyal Kushilevitz,  Amit Sahai,  Exposure-Resilient Functions and All-or-Nothing Transforms, pp. 453 - 469, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 115 times Red StarRed Star]

24. Dario Catalano,  Rosario Gennaro,  Shai Halevi,  Computing Inverses over a Shared Secret Modulus, pp. 190 - 206, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 46 times ]

25. John Black,  Shai Halevi,  Hugo Krawczyk,  Ted Krovetz,  Phillip Rogaway,  UMAC: Fast and Secure Message Authentication, pp. 216 - 233, CRYPTO 1999.

[Electronic Edition][Cited 227 times Red StarRed Star]

26. Rosario Gennaro,  Shai Halevi,  Tal Rabin,  Secure Hash-and-Sign Signatures Without the Random Oracle, pp. 123 - 139, EUROCRYPT 1999.

[Electronic Edition][Cited 219 times Red StarRed Star]

27. Mihir Bellare,  Shai Halevi,  Amit Sahai,  Salil P. Vadhan,  Many-to-One Trapdoor Functions and Their Relation to Public-Key Cryptosystems, pp. 283 - 298, CRYPTO 1998.

[Electronic Edition][Cited 37 times ]

28. Oded Goldreich,  Shafi Goldwasser,  Shai Halevi,  Public-Key Cryptosystems from Lattice Reduction Problems, pp. 112 - 131, CRYPTO 1997.

[Electronic Edition][Cited 214 times Red StarRed Star]

29. Oded Goldreich,  Shafi Goldwasser,  Shai Halevi,  Eliminating Decryption Errors in the Ajtai-Dwork Cryptosystem, pp. 105 - 111, CRYPTO 1997.

[Electronic Edition][Cited 46 times ]

30. Shai Halevi,  Hugo Krawczyk,  MMH: Software Message Authentication in the Gbit/Second Rates, pp. 172 - 189, FSE 1997.

[Electronic Edition][Cited 92 times Red Star]

31. Shai Halevi,  Silvio Micali,  Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing, pp. 201 - 215, CRYPTO 1996.

[Electronic Edition][Cited 95 times Red Star]

32. Shai Halevi,  Efficient Commitment Schemes with Bounded Sender and Unbounded Receiver, pp. 84 - 96, CRYPTO 1995.

[Electronic Edition][Cited 15 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...