Cryptographers' World
 

Stanislaw Jarecki


Author's Web Page Link

25 papers in database with 1972 citations StarStarStar

Editor of 1 conference proceedings book

H-number: 14

Conference Proceedings

 
1. Stanislaw JareckiGene Tsudik, editors, Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings. Springer, 2009. ISBN 978-3-642-00467-4.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Eu-Jin Goh,  Stanislaw Jarecki,  Jonathan Katz,  Nan Wang,  Efficient Signature Schemes with Tight Reductions to the Diffie-Hellman Problems, Journal of Cryptology, Volume 20(4), pp. 493 - 514, Springer, 2007.

[Cited 5 times ]

2. Rosario Gennaro,  Tal Rabin,  Stanislaw Jarecki,  Hugo Krawczyk,  Robust and Efficient Sharing of RSA Functions, Journal of Cryptology, Volume 20(3), pp. 393 - 0, Springer, 2007.

[Cited 185 times Red StarRed Star]

3. Rosario Gennaro,  Stanislaw Jarecki,  Hugo Krawczyk,  Tal Rabin,  Secure Distributed Key Generation for Discrete-Log Based Cryptosystems, Journal of Cryptology, Volume 20(1), pp. 51 - 83, Springer, 2007.

[Cited 246 times Red StarRed Star]

4. Rosario Gennaro,  Tal Rabin,  Stanislaw Jarecki,  Hugo Krawczyk,  Robust and Efficient Sharing of RSA Functions, Journal of Cryptology, Volume 13(2), pp. 273 - 300, Springer, 2000.

[Cited 185 times Red StarRed Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Stanislaw Jarecki,  Xiaomin Liu,  Private Mutual Authentication and Conditional Oblivious Transfer, pp. 90 - 107, CRYPTO 2009.

[Electronic Edition][Cited 4 times ]

2. Stanislaw Jarecki,  Xiaomin Liu,  Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection, pp. 577 - 594, TCC 2009.

[Electronic Edition][Cited 38 times ]

3. Stanislaw Jarecki,  Jihye Kim,  Gene Tsudik,  Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange, pp. 352 - 369, CT-RSA 2008.

[Electronic Edition][Cited 12 times ]

4. Stanislaw Jarecki,  Xiaomin Liu,  Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes, pp. 270 - 287, ACNS 2007.

[Electronic Edition][Cited 14 times ]

5. Stanislaw Jarecki,  Jihye Kim,  Gene Tsudik,  Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement, pp. 287 - 308, CT-RSA 2007.

[Electronic Edition][Cited 12 times ]

6. Stanislaw Jarecki,  Vitaly Shmatikov,  Efficient Two-Party Secure Computation on Committed Inputs, pp. 97 - 114, EUROCRYPT 2007.

[Electronic Edition][Cited 47 times ]

7. Stanislaw Jarecki,  Jihye Kim,  Gene Tsudik,  Authentication for Paranoids: Multi-party Secret Handshakes, pp. 325 - 339, ACNS 2006.

[Electronic Edition][Cited 11 times ]

8. Stanislaw Jarecki,  Vitaly Shmatikov,  Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure, pp. 172 - 187, FC 2005.

[Electronic Edition][Cited 1 times ]

9. Stanislaw Jarecki,  Nitesh Saxena,  Further Simplifications in Proactive RSA Signatures, pp. 510 - 528, TCC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 10 times ]

10. Claude Castelluccia,  Stanislaw Jarecki,  Gene Tsudik,  Secret Handshakes from CA-Oblivious Encryption, pp. 293 - 307, ASIACRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 68 times Red Star]

11. Stanislaw Jarecki,  Vitaly Shmatikov,  Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme, pp. 590 - 608, EUROCRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 20 times ]

12. Eu-Jin Goh,  Stanislaw Jarecki,  A Signature Scheme as Secure as the Diffie-Hellman Problem, pp. 401 - 415, EUROCRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 66 times Red Star]

13. Rosario Gennaro,  Stanislaw Jarecki,  Hugo Krawczyk,  Tal Rabin,  Secure Applications of Pedersen's Distributed Key Generation Protocol, pp. 373 - 390, CT-RSA 2003.

[Electronic Edition][Cited 20 times ]

14. Philippe Golle,  Stanislaw Jarecki,  Ilya Mironov,  Cryptographic Primitives Enforcing Communication and Storage Complexity, pp. 120 - 135, FC 2002.

[Electronic Edition][Cited 21 times ]

15. Stanislaw Jarecki,  Anna Lysyanskaya,  Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures, pp. 221 - 242, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 62 times Red Star]

16. Ran Canetti,  Rosario Gennaro,  Stanislaw Jarecki,  Hugo Krawczyk,  Tal Rabin,  Adaptive Security for Threshold Cryptosystems, pp. 98 - 115, CRYPTO 1999.

[Electronic Edition][Cited 106 times Red StarRed Star]

17. Rosario Gennaro,  Stanislaw Jarecki,  Hugo Krawczyk,  Tal Rabin,  Secure Distributed Key Generation for Discrete-Log Based Cryptosystems, pp. 295 - 310, EUROCRYPT 1999.

[Electronic Edition][Cited 312 times Red StarRed StarRed Star]

18. Stanislaw Jarecki,  Andrew M. Odlyzko,  An Efficient Micropayment System Based on Probabilistic Polling, pp. 173 - 192, FC 1997.

[Electronic Edition][Cited 61 times Red Star]

19. Rosario Gennaro,  Stanislaw Jarecki,  Hugo Krawczyk,  Tal Rabin,  Robust and Efficient Sharing of RSA Functions, pp. 157 - 172, CRYPTO 1996.

[Electronic Edition][Cited 229 times Red StarRed Star]

20. Rosario Gennaro,  Stanislaw Jarecki,  Hugo Krawczyk,  Tal Rabin,  Robust Threshold DSS Signatures, pp. 354 - 371, EUROCRYPT 1996.

[Electronic Edition][Cited 373 times Red StarRed StarRed Star]

21. Amir Herzberg,  Stanislaw Jarecki,  Hugo Krawczyk,  Moti Yung,  Proactive Secret Sharing Or: How to Cope With Perpetual Leakage, pp. 339 - 352, CRYPTO 1995.

[Electronic Edition][Cited 480 times Red StarRed StarRed Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...