Cryptographers' World
 

Philip D. MacKenzie


Author's Web Page Link

25 papers in database with 1550 citations StarStarStar

H-number: 16

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Juan A. Garay,  Philip D. MacKenzie,  Ke Yang,  Strengthening Zero-Knowledge Protocols Using Signatures, Journal of Cryptology, Volume 19(2), pp. 169 - 209, Springer, 2006.

[Cited 42 times ]

2. Philip D. MacKenzie,  Thomas Shrimpton,  Markus Jakobsson,  Threshold Password-Authenticated Key Exchange, Journal of Cryptology, Volume 19(1), pp. 27 - 66, Springer, 2006.

[Cited 56 times Red Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Juan A. Garay,  Philip D. MacKenzie,  Manoj Prabhakaran,  Ke Yang,  Resource Fairness and Composability of Cryptographic Protocols, pp. 404 - 428, TCC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 18 times ]

2. Craig Gentry,  Philip D. MacKenzie,  Zulfikar Ramzan,  A Method for Making Password-Based Key Exchange Resilient to Server Compromise, pp. 142 - 159, CRYPTO 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 14 times ]

3. Jonathan Katz,  Philip D. MacKenzie,  Gelareh Taban,  Virgil D. Gligor,  Two-Server Password-Only Authenticated Key Exchange, pp. 1 - 16, ACNS 2005.

[Electronic Edition][Cited 15 times ]

4. Ran Canetti,  Shai Halevi,  Jonathan Katz,  Yehuda Lindell,  Philip D. MacKenzie,  Universally Composable Password-Based Key Exchange, pp. 404 - 421, EUROCRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 87 times Red Star]

5. Philip D. MacKenzie,  Sarvar Patel,  Hard Bits of the Discrete Log with Applications to Password Authentication, pp. 209 - 226, CT-RSA 2005.

[Electronic Edition][Cited 2 times ]

6. Philip D. MacKenzie,  Ke Yang,  On Simulation-Sound Trapdoor Commitments, pp. 382 - 400, EUROCRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 60 times Red Star]

7. Philip D. MacKenzie,  Michael K. Reiter,  Ke Yang,  Alternatives to Non-malleability: Definitions, Constructions, and Applications (Extended Abstract), pp. 171 - 190, TCC 2004.

[Electronic Edition][Cited 30 times ]

8. Juan A. Garay,  Philip D. MacKenzie,  Ke Yang,  Strengthening Zero-Knowledge Protocols Using Signatures, pp. 177 - 194, EUROCRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 58 times Red Star]

9. Philip D. MacKenzie,  An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack, pp. 47 - 61, PKC 2003.

[Electronic Edition][Cited 5 times ]

10. Philip D. MacKenzie,  Thomas Shrimpton,  Markus Jakobsson,  Threshold Password-Authenticated Key Exchange, pp. 385 - 400, CRYPTO 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 73 times Red Star]

11. Philip D. MacKenzie,  Michael K. Reiter,  Two-Party Generation of DSA Signatures, pp. 137 - 154, CRYPTO 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 53 times Red Star]

12. Philip D. MacKenzie,  More Efficient Password-Authenticated Key Exchange, pp. 361 - 377, CT-RSA 2001.

[Electronic Edition][Cited 68 times Red Star]

13. Yair Frankel,  Philip D. MacKenzie,  Moti Yung,  Adaptive Security for the Additive-Sharing Based Proactive RSA, pp. 240 - 263, PKC 2001.

[Electronic Edition][Cited 20 times ]

14. Philip D. MacKenzie,  Sarvar Patel,  Ram Swaminathan,  Password-Authenticated Key Exchange Based on RSA, pp. 599 - 613, ASIACRYPT 2000.

[Electronic Edition][Cited 120 times Red StarRed Star]

15. Victor Boyko,  Philip D. MacKenzie,  Sarvar Patel,  Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman, pp. 156 - 171, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 393 times Red StarRed StarRed Star]

16. Ronald Cramer,  Ivan Damgard,  Philip D. MacKenzie,  Efficient Zero-Knowledge Proofs of Knowledge Without Intractability Assumptions, pp. 354 - 372, PKC 2000.

[Electronic Edition][Cited 57 times Red Star]

17. Irene Gassko,  Peter Gemmell,  Philip D. MacKenzie,  Efficient and Fresh Certification, pp. 342 - 353, PKC 2000.

[Electronic Edition][Cited 65 times Red Star]

18. Yair Frankel,  Philip D. MacKenzie,  Moti Yung,  "Pseudorandom Intermixing": A Tool for Shared Cryptography, pp. 306 - 325, PKC 2000.

[Electronic Edition][Cited 2 times ]

19. Yair Frankel,  Philip D. MacKenzie,  Moti Yung,  Adaptively-Secure Optimal-Resilience Proactive RSA, pp. 180 - 194, ASIACRYPT 1999.

[Electronic Edition][Cited 28 times ]

20. Juan A. Garay,  Markus Jakobsson,  Philip D. MacKenzie,  Abuse-Free Optimistic Contract Signing, pp. 449 - 466, CRYPTO 1999.

[Electronic Edition][Cited 182 times Red StarRed Star]

21. Philip D. MacKenzie,  Jeffrey S. Sorensen,  Anonymous Investing: Hiding the Identities of Stockholders, pp. 212 - 229, FC 1999.

[Electronic Edition][Cited 8 times ]

22. Yair Frankel,  Peter Gemmell,  Philip D. MacKenzie,  Moti Yung,  Proactive RSA, pp. 440 - 454, CRYPTO 1997.

[Electronic Edition][Cited 176 times Red StarRed Star]

23. Agnes Hui Chan,  Yair Frankel,  Philip D. MacKenzie,  Yiannis Tsiounis,  Mis-representation of Identities in E-cash Schemes and how to Prevent it, pp. 276 - 285, ASIACRYPT 1996.

[Electronic Edition][Cited 16 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...