Cryptographers' World
 

Craig Gentry


Author's Web Page Link

21 papers in database with 2174 citations StarStarStar

H-number: 15

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Craig Gentry,  Brent Waters,  Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts), pp. 171 - 188, EUROCRYPT 2009.

[Electronic Edition][Cited 27 times ]

2. Craig Gentry,  Shai Halevi,  Hierarchical Identity Based Encryption with Polynomially Many Levels, pp. 437 - 456, TCC 2009.

[Electronic Edition][Cited 25 times ]

3. Craig Gentry,  Chris Peikert,  Vinod Vaikuntanathan,  Trapdoors for hard lattices and new cryptographic constructions, pp. 197 - 206, STOC 2008.

[Electronic Edition][Cited 136 times Red StarRed Star]

4. Dan Boneh,  Craig Gentry,  Michael Hamburg,  Space-Efficient Identity Based Encryption Without Pairings, pp. 647 - 657, FOCS 2007.

[Electronic Edition][Cited 67 times Red Star]

5. Craig Gentry,  Zulfikar Ramzan,  David P. Woodruff,  Explicit Exclusive Set Systems with Applications to Broadcast Encryption, pp. 27 - 38, FOCS 2006.

[Electronic Edition][Cited 3 times ]

6. Craig Gentry,  Practical Identity-Based Encryption Without Random Oracles, pp. 445 - 464, EUROCRYPT 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 259 times Red StarRed StarRed Star]

7. Craig Gentry,  Zulfikar Ramzan,  Identity-Based Aggregate Signatures, pp. 257 - 273, PKC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 56 times Red Star]

8. Craig Gentry,  Philip D. MacKenzie,  Zulfikar Ramzan,  A Method for Making Password-Based Key Exchange Resilient to Server Compromise, pp. 142 - 159, CRYPTO 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 14 times ]

9. Craig Gentry,  David Molnar,  Zulfikar Ramzan,  Efficient Designated Confirmer Signatures Without Random Oracles or General Zero-Knowledge Proofs, pp. 662 - 681, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 24 times ]

10. Dan Boneh,  Craig Gentry,  Brent Waters,  Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys, pp. 258 - 275, CRYPTO 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 232 times Red StarRed Star]

11. Craig Gentry,  Zulfikar Ramzan,  Stuart G. Stubblebine,  Secure Distributed Human Computation, pp. 328 - 332, FC 2005.

[Electronic Edition][Cited 29 times ]

12. Craig Gentry,  Zulfikar Ramzan,  Eliminating Random Permutation Oracles in the Even-Mansour Cipher, pp. 32 - 47, ASIACRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 2 times ]

13. Craig Gentry,  How to Compress Rabin Ciphertexts and Signatures (and More), pp. 179 - 200, CRYPTO 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 9 times ]

14. Farid F. Elwailly,  Craig Gentry,  Zulfikar Ramzan,  QuasiModo: Efficient Certificate Validation and Revocation, pp. 375 - 388, PKC 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 5 times ]

15. Craig Gentry,  Zulfikar Ramzan,  Microcredits for Verifiable Foreign Service Provider Metering, pp. 9 - 23, FC 2004.

[Electronic Edition][Cited 3 times ]

16. Craig Gentry,  Certificate-Based Encryption and the Certificate Revocation Problem, pp. 272 - 293, EUROCRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 200 times Red StarRed Star]

17. Dan Boneh,  Craig Gentry,  Ben Lynn,  Hovav Shacham,  Aggregate and Verifiably Encrypted Signatures from Bilinear Maps, pp. 416 - 432, EUROCRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 525 times Red StarRed StarRed StarRed Star]

18. Craig Gentry,  Alice Silverberg,  Hierarchical ID-Based Cryptography, pp. 548 - 566, ASIACRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 453 times Red StarRed StarRed Star]

19. Craig Gentry,  Michael Szydlo,  Cryptanalysis of the Revised NTRU Signature Scheme, pp. 299 - 320, EUROCRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 47 times ]

20. Craig Gentry,  Jakob Jonsson,  Jacques Stern,  Michael Szydlo,  Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001, pp. 1 - 20, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 20 times ]

21. Craig Gentry,  Key Recovery and Message Attacks on NTRU-Composite, pp. 182 - 194, EUROCRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 38 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...