Cryptographers' World
 

Anna Lysyanskaya


Author's Web Page Link

22 papers in database with 2249 citations StarStarStar

H-number: 18

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Mira Belenkiy,  Jan Camenisch,  Melissa Chase,  Markulf Kohlweiss,  Anna Lysyanskaya,  Hovav Shacham,  Randomizable Proofs and Delegatable Anonymous Credentials, pp. 108 - 125, CRYPTO 2009.

[Electronic Edition][Cited 50 times Red Star]

2. Mira Belenkiy,  Melissa Chase,  Markulf Kohlweiss,  Anna Lysyanskaya,  P-signatures and Noninteractive Anonymous Credentials, pp. 356 - 374, TCC 2008.

[Electronic Edition][Cited 61 times Red Star]

3. Melissa Chase,  Anna Lysyanskaya,  Simulatable VRFs with Applications to Multi-theorem NIZK, pp. 303 - 322, CRYPTO 2007.

[Electronic Edition][Cited 15 times ]

4. Anna Lysyanskaya,  Mira Meyerovich,  Provably Secure Steganography with Imperfect Sampling, pp. 123 - 139, PKC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 6 times ]

5. Anna Lysyanskaya,  Nikos Triandopoulos,  Rationality and Adversarial Behavior in Multi-party Computation, pp. 180 - 197, CRYPTO 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 36 times ]

6. Melissa Chase,  Anna Lysyanskaya,  On Signatures of Knowledge, pp. 78 - 96, CRYPTO 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 35 times ]

7. Jan Camenisch,  Anna Lysyanskaya,  A Formal Treatment of Onion Routing, pp. 169 - 187, CRYPTO 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 54 times Red Star]

8. Melissa Chase,  Alexander Healy,  Anna Lysyanskaya,  Tal Malkin,  Leonid Reyzin,  Mercurial Commitments with Applications to Zero-Knowledge Sets, pp. 422 - 439, EUROCRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 36 times ]

9. Jan Camenisch,  Susan Hohenberger,  Anna Lysyanskaya,  Compact E-Cash, pp. 302 - 321, EUROCRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 136 times Red StarRed Star]

10. Susan Hohenberger,  Anna Lysyanskaya,  How to Securely Outsource Cryptographic Computations, pp. 264 - 282, TCC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 31 times ]

11. Jan Camenisch,  Anna Lysyanskaya,  Signature Schemes and Anonymous Credentials from Bilinear Maps, pp. 56 - 72, CRYPTO 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 266 times Red StarRed StarRed Star]

12. Anna Lysyanskaya,  Silvio Micali,  Leonid Reyzin,  Hovav Shacham,  Sequential Aggregate Signatures from Trapdoor Permutations, pp. 74 - 90, EUROCRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 139 times Red StarRed Star]

13. Rosario Gennaro,  Anna Lysyanskaya,  Tal Malkin,  Silvio Micali,  Tal Rabin,  Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering, pp. 258 - 277, TCC 2004.

[Electronic Edition][Cited 53 times Red Star]

14. Anna Lysyanskaya,  Unique Signatures and Verifiable Random Functions from the DH-DDH Separation, pp. 597 - 612, CRYPTO 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 59 times Red Star]

15. Jan Camenisch,  Anna Lysyanskaya,  Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials, pp. 61 - 76, CRYPTO 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 297 times Red StarRed StarRed Star]

16. Anna Lysyanskaya,  Chris Peikert,  Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes, pp. 331 - 350, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 18 times ]

17. Moses Liskov,  Anna Lysyanskaya,  Silvio Micali,  Leonid Reyzin,  Adam Smith,  Mutually Independent Commitments, pp. 385 - 401, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 10 times ]

18. Jan Camenisch,  Anna Lysyanskaya,  An Identity Escrow Scheme with Appointed Verifiers, pp. 388 - 407, CRYPTO 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 39 times ]

19. Jan Camenisch,  Anna Lysyanskaya,  An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation, pp. 93 - 118, EUROCRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 398 times Red StarRed StarRed Star]

20. Stanislaw Jarecki,  Anna Lysyanskaya,  Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures, pp. 221 - 242, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 62 times Red Star]

21. Anna Lysyanskaya,  Ronald L. Rivest,  Amit Sahai,  Stefan Wolf,  Pseudonym Systems, pp. 184 - 199, SAC 1999.

[Electronic Edition][Cited 289 times Red StarRed StarRed Star]

22. Anna Lysyanskaya,  Zulfikar Ramzan,  Group Blind Digital Signatures: A Scalable Solution to Electronic Cash, pp. 184 - 197, FC 1998.

[Electronic Edition][Cited 159 times Red StarRed Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...