Cryptographers' World
 

Stuart Haber


Author's Web Page Link

9 papers in database with 616 citations Star

H-number: 5

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Matthew K. Franklin,  Stuart Haber,  Joint Encryption and Message-Efficient Secure Computation, Journal of Cryptology, Volume 9(4), pp. 217 - 232, Springer, 1996.

[Cited 60 times Red Star]

2. Stuart Haber,  W. Scott Stornetta,  How to Time-Stamp a Digital Document, Journal of Cryptology, Volume 3(2), pp. 99 - 111, Springer, 1991.

[Cited 339 times Red StarRed StarRed Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. William Aiello,  Stuart Haber,  Ramarathnam Venkatesan,  New Constructions for Secure Hash Functions, pp. 150 - 167, FSE 1998.

[Electronic Edition][Cited 9 times ]

2. Matthew K. Franklin,  Stuart Haber,  Joint Encryption and Message-Efficient Secure Computation, pp. 266 - 277, CRYPTO 1993.

[Electronic Edition][Cited 71 times Red Star]

3. Donald Beaver,  Stuart Haber,  Cryptographic Protocols Provably Secure Against Dynamic Adversaries, pp. 307 - 323, EUROCRYPT 1992.

[Electronic Edition][Cited 91 times Red Star]

4. Stuart Haber,  W. Scott Stornetta,  How to Time-Stamp a Digital Document, pp. 437 - 455, CRYPTO 1990.

[Electronic Edition][Cited 421 times Red StarRed StarRed Star]

5. Zvi Galil,  Stuart Haber,  Moti Yung,  A Secure Public-key Authentication Scheme, pp. 3 - 15, EUROCRYPT 1989.

[Electronic Edition][Cited 2 times ]

6. Zvi Galil,  Stuart Haber,  Moti Yung,  Cryptographic Computation: Secure Fault-Tolerant Protocols and the Public-Key Model, pp. 135 - 155, CRYPTO 1987.

[Electronic Edition][Cited 4 times ]

7. Zvi Galil,  Stuart Haber,  Moti Yung,  Symmetric Public-Key Encryption, pp. 128 - 137, CRYPTO 1985.

[Electronic Edition][Cited 18 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...