Cryptographers' World
 

Matthew K. Franklin


Author's Web Page Link

25 papers in database with 4661 citations StarStarStarStar

Editor of 2 conference proceedings books

H-number: 16

Conference Proceedings

 
1. Matthew K. Franklin, editor, Advances in Cryptology - CRYPTO 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings. Springer, 2004. ISBN 3-540-22668-0.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

2. Matthew K. Franklin, editor, Financial Cryptography, Third International Conference, FC'99, Anguilla, British West Indies, February 1999, Proceedings. Springer, 1999. ISBN 3-540-66362-2.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Jeffrey Considine,  Matthias Fitzi,  Matthew K. Franklin,  Leonid A. Levin,  Ueli M. Maurer,  David Metcalf,  Byzantine Agreement Given Partial Broadcast, Journal of Cryptology, Volume 18(3), pp. 191 - 217, Springer, 2005.

[Cited 7 times ]

2. Matthew K. Franklin,  Rebecca N. Wright,  Secure Communication in Minimal Connectivity Models, Journal of Cryptology, Volume 13(1), pp. 9 - 30, Springer, 2000.

[Cited 75 times Red Star]

3. Matthew K. Franklin,  Stuart Haber,  Joint Encryption and Message-Efficient Secure Computation, Journal of Cryptology, Volume 9(4), pp. 217 - 232, Springer, 1996.

[Cited 60 times Red Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Matthew K. Franklin,  Mark Gondree,  Payman Mohassel,  Improved Efficiency for Private Stable Matching, pp. 163 - 177, CT-RSA 2007.

[Electronic Edition][Cited 6 times ]

2. Eike Kiltz,  Payman Mohassel,  Enav Weinreb,  Matthew K. Franklin,  Secure Linear Algebra Using Linearly Recurrent Sequences, pp. 291 - 310, TCC 2007.

[Electronic Edition][Cited 12 times ]

3. Amos Beimel,  Matthew K. Franklin,  Weakly-Private Secret Sharing Schemes, pp. 253 - 272, TCC 2007.

[Electronic Edition][Cited 5 times ]

4. Matthias Fitzi,  Matthew K. Franklin,  Juan A. Garay,  S. Harsha Vardhan,  Towards Optimal and Efficient Perfectly Secure Message Transmission, pp. 311 - 322, TCC 2007.

[Electronic Edition][Cited 27 times ]

5. Matthew K. Franklin,  Mark Gondree,  Payman Mohassel,  Multi-party Indirect Indexing and Applications, pp. 283 - 297, ASIACRYPT 2007.

[Electronic Edition][Cited 3 times ]

6. Payman Mohassel,  Matthew K. Franklin,  Efficiency Tradeoffs for Malicious Two-Party Computation, pp. 458 - 473, PKC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 21 times ]

7. Payman Mohassel,  Matthew K. Franklin,  Efficient Polynomial Operations in the Shared-Coefficients Setting, pp. 44 - 57, PKC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 8 times ]

8. Yevgeniy Dodis,  Matthew K. Franklin,  Jonathan Katz,  Atsuko Miyaji,  Moti Yung,  A Generic Construction for Intrusion-Resilient Public-Key Encryption, pp. 81 - 98, CT-RSA 2004.

[Electronic Edition][Cited 34 times ]

9. Yevgeniy Dodis,  Matthew K. Franklin,  Jonathan Katz,  Atsuko Miyaji,  Moti Yung,  Intrusion-Resilient Public-Key Encryption, pp. 19 - 32, CT-RSA 2003.

[Electronic Edition][Cited 66 times Red Star]

10. Dan Boneh,  Matthew K. Franklin,  Identity-Based Encryption from the Weil Pairing, pp. 213 - 229, CRYPTO 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 2977 times Red StarRed StarRed StarRed StarRed StarRed Star]

11. Dan Boneh,  Glenn Durfee,  Matthew K. Franklin,  Lower Bounds for Multicast Message Authentication, pp. 437 - 452, EUROCRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 56 times Red Star]

12. Matthew K. Franklin,  Tomas Sander,  Commital Deniable Proofs and Electronic Campaign Finance, pp. 373 - 387, ASIACRYPT 2000.

[Electronic Edition][Cited 3 times ]

13. Dan Boneh,  Matthew K. Franklin,  An Efficient Public Key Traitor Tracing Scheme, pp. 338 - 353, CRYPTO 1999.

[Electronic Edition][Cited 259 times Red StarRed StarRed Star]

14. Matthew K. Franklin,  Rebecca N. Wright,  Secure Communications in Minimal Connectivity Models, pp. 346 - 360, EUROCRYPT 1998.

[Electronic Edition][Cited 74 times Red Star]

15. Matthew K. Franklin,  Gene Tsudik,  Secure Group Barter: Multi-party Fair Exchange with Semi-Trusted Neutral Parties, pp. 90 - 102, FC 1998.

[Electronic Edition][Cited 63 times Red Star]

16. Dan Boneh,  Matthew K. Franklin,  Efficient Generation of Shared RSA Keys (Extended Abstract), pp. 425 - 439, CRYPTO 1997.

[Electronic Edition][Cited 351 times Red StarRed StarRed Star]

17. Matthew K. Franklin,  Dahlia Malkhi,  Auditable Metering with Lightweight Security, pp. 151 - 160, FC 1997.

[Electronic Edition][Cited 72 times Red Star]

18. Ronald Cramer,  Matthew K. Franklin,  Berry Schoenmakers,  Moti Yung,  Multi-Authority Secret-Ballot Elections with Linear Work, pp. 72 - 83, EUROCRYPT 1996.

[Electronic Edition][Cited 256 times Red StarRed StarRed Star]

19. Don Coppersmith,  Matthew K. Franklin,  Jacques Patarin,  Michael K. Reiter,  Low-Exponent RSA with Related Messages, pp. 1 - 9, EUROCRYPT 1996.

[Electronic Edition][Cited 151 times Red StarRed Star]

20. Matthew K. Franklin,  Michael K. Reiter,  Verifiable Signature Sharing, pp. 50 - 63, EUROCRYPT 1995.

[Electronic Edition][Cited 54 times Red Star]

21. Matthew K. Franklin,  Moti Yung,  The Blinding of Weak Signatures (Extended Abstract), pp. 67 - 76, EUROCRYPT 1994.

[Electronic Edition][Cited 10 times ]

22. Matthew K. Franklin,  Stuart Haber,  Joint Encryption and Message-Efficient Secure Computation, pp. 266 - 277, CRYPTO 1993.

[Electronic Edition][Cited 71 times Red Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...