Cryptographers' World
 

Charles Rackoff


Author's Web Page Link

11 papers in database with 1107 citations StarStar

H-number: 7

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Erez Petrank,  Charles Rackoff,  CBC MAC for Real-Time Data Sources, Journal of Cryptology, Volume 13(3), pp. 315 - 338, Springer, 2000.

[Cited 84 times Red Star]

2. Michael J. Fischer,  Silvio Micali,  Charles Rackoff,  A Secure Protocol for the Oblivious Transfer (Extended Abstract), Journal of Cryptology, Volume 9(3), pp. 191 - 195, Springer, 1996.

[Cited 46 times ]

3. Michael Luby,  Charles Rackoff,  A Study of Password Security, Journal of Cryptology, Volume 1(3), pp. 151 - 158, Springer, 1989.

[Cited 15 times ]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Dan Boneh,  Periklis A. Papakonstantinou,  Charles Rackoff,  Yevgeniy Vahlis,  Brent Waters,  On the Impossibility of Basing Identity Based Encryption on Trapdoor Permutations, pp. 283 - 292, FOCS 2008.

[Electronic Edition][Cited 7 times ]

2. Shai Halevi,  Steven Myers,  Charles Rackoff,  On Seed-Incompressible Functions, pp. 19 - 36, TCC 2008.

[Electronic Edition][Cited 6 times ]

3. Vladimir Kolesnikov,  Charles Rackoff,  Key Exchange Using Passwords and Long Keys, pp. 100 - 119, TCC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 8 times ]

4. Charles Rackoff,  Daniel R. Simon,  Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack, pp. 433 - 444, CRYPTO 1991.

[Electronic Edition][Cited 669 times Red StarRed StarRed StarRed Star]

5. Charles Rackoff,  A Basic Theory of Public and Private Cryptosystems, pp. 249 - 255, CRYPTO 1988.

[Electronic Edition][Cited 5 times ]

6. Michael Luby,  Charles Rackoff,  A Study of Password Security, pp. 392 - 397, CRYPTO 1987.

[Electronic Edition][Cited 18 times ]

7. Silvio Micali,  Charles Rackoff,  Bob Sloan,  The Notion of Security for Probabilistic Cryptosystems, pp. 381 - 392, CRYPTO 1986.

[Electronic Edition][Cited 162 times Red StarRed Star]

8. Michael Luby,  Charles Rackoff,  How to Construct Pseudo-Random Permutations from Pseudo-Random Functions (Abstract), pp. 447 - 447, CRYPTO 1985.

[Electronic Edition][Cited 102 times Red StarRed Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...