Cryptographers' World
 

Ron Steinfeld


Author's Web Page Link

14 papers in database with 590 citations Star

H-number: 10

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Joonsang Baek,  Ron Steinfeld,  Yuliang Zheng,  Formal Proofs for the Security of Signcryption, Journal of Cryptology, Volume 20(2), pp. 203 - 235, Springer, 2007.

[Cited 111 times Red StarRed Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Damien Stehlé,  Ron Steinfeld,  Keisuke Tanaka,  Keita Xagawa,  Efficient Public Key Encryption Based on Ideal Lattices, pp. 617 - 635, ASIACRYPT 2009.

[Electronic Edition][Cited 18 times ]

2. Ron Steinfeld,  Scott Contini,  Krystian Matusiewicz,  Josef Pieprzyk,  Jian Guo,  San Ling,  Huaxiong Wang,  Cryptanalysis of LASH, pp. 207 - 223, FSE 2008.

[Electronic Edition][Cited 5 times ]

3. Ron Steinfeld,  Josef Pieprzyk,  Huaxiong Wang,  How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature, pp. 357 - 371, CT-RSA 2007.

[Electronic Edition][Cited 18 times ]

4. Yvo Desmedt,  Josef Pieprzyk,  Ron Steinfeld,  Huaxiong Wang,  On Secure Multi-party Computation in Black-Box Groups, pp. 591 - 612, CRYPTO 2007.

[Electronic Edition][Cited 4 times ]

5. Scott Contini,  Arjen K. Lenstra,  Ron Steinfeld,  VSH, an Efficient and Provable Collision-Resistant Hash Function, pp. 165 - 182, EUROCRYPT 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 67 times Red Star]

6. Ron Steinfeld,  Josef Pieprzyk,  Huaxiong Wang,  Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption, pp. 157 - 173, PKC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 1 times ]

7. Ron Steinfeld,  Josef Pieprzyk,  Huaxiong Wang,  On the Provable Security of an Efficient RSA-Based Pseudorandom Generator, pp. 194 - 209, ASIACRYPT 2006.

[Electronic Edition][Cited 16 times ]

8. Ron Steinfeld,  Scott Contini,  Huaxiong Wang,  Josef Pieprzyk,  Converse Results to the Wiener Attack on RSA, pp. 184 - 198, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 10 times ]

9. Ron Steinfeld,  Huaxiong Wang,  Josef Pieprzyk,  Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes, pp. 170 - 186, ASIACRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 14 times ]

10. Ron Steinfeld,  Huaxiong Wang,  Josef Pieprzyk,  Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures, pp. 86 - 100, PKC 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 70 times Red Star]

11. Ron Steinfeld,  Laurence Bull,  Huaxiong Wang,  Josef Pieprzyk,  Universal Designated-Verifier Signatures, pp. 523 - 542, ASIACRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 140 times Red StarRed Star]

12. Joonsang Baek,  Ron Steinfeld,  Yuliang Zheng,  Formal Proofs for the Security of Signcryption, pp. 80 - 98, PKC 2002.

[Electronic Edition][Cited 204 times Red StarRed Star]

13. Ron Steinfeld,  Yuliang Zheng,  An Advantage of Low-Exponent RSA with Modulus Primes Sharing Least Significant Bits, pp. 52 - 62, CT-RSA 2001.

[Electronic Edition][Cited 23 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...