Cryptographers' World
 

Ran Canetti


Author's Web Page Link

39 papers in database with 4852 citations StarStarStarStar

Editor of 1 conference proceedings book

H-number: 25

Conference Proceedings

 
1. Ran Canetti, editor, Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008.. Springer, 2008. ISBN 978-3-540-78523-1.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Ran Canetti,  Shai Halevi,  Jonathan Katz,  A Forward-Secure Public-Key Encryption Scheme, Journal of Cryptology, Volume 20(3), pp. 265 - 294, Springer, 2007.

[Cited 225 times Red StarRed Star]

2. Ran Canetti,  Eyal Kushilevitz,  Yehuda Lindell,  On the Limitations of Universally Composable Two-Party Computation Without Set-Up Assumptions, Journal of Cryptology, Volume 19(2), pp. 135 - 167, Springer, 2006.

[Cited 79 times Red Star]

3. Ran Canetti,  Ivan Damgard,  Stefan Dziembowski,  Yuval Ishai,  Tal Malkin,  Adaptive versus Non-Adaptive Security of Multi-Party Protocols, Journal of Cryptology, Volume 17(3), pp. 153 - 207, Springer, 2004.

[Cited 4 times ]

4. Ran Canetti,  Security and Composition of Multiparty Cryptographic Protocols, Journal of Cryptology, Volume 13(1), pp. 143 - 202, Springer, 2000.

[Cited 407 times Red StarRed StarRed Star]

5. Ran Canetti,  Shai Halevi,  Amir Herzberg,  Maintaining Authenticated Communication in the Presence of Break-Ins, Journal of Cryptology, Volume 13(1), pp. 61 - 105, Springer, 2000.

[Cited 67 times Red Star]

6. Ran Canetti,  Eyal Kushilevitz,  Rafail Ostrovsky,  Adi Rosén,  Randomness versus Fault-Tolerance, Journal of Cryptology, Volume 13(1), pp. 107 - 142, Springer, 2000.

[Cited 5 times ]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Ran Canetti,  Ronny Ramzi Dakdouk,  Towards a Theory of Extractable Functions, pp. 595 - 613, TCC 2009.

[Electronic Edition][Cited 2 times ]

2. Ran Canetti,  Mayank Varia,  Non-malleable Obfuscation, pp. 73 - 90, TCC 2009.

[Electronic Edition][Cited 7 times ]

3. Ran Canetti,  Ronny Ramzi Dakdouk,  Obfuscating Point Functions with Multibit Output, pp. 489 - 508, EUROCRYPT 2008.

[Electronic Edition][Cited 14 times ]

4. Ran Canetti,  Rafael Pass,  Abhi Shelat,  Cryptography from Sunspots: How to Use an Imperfect Reference String, pp. 249 - 259, FOCS 2007.

[Electronic Edition][Cited 6 times ]

5. Ran Canetti,  Yevgeniy Dodis,  Rafael Pass,  Shabsi Walfish,  Universally Composable Security with Global Setup, pp. 61 - 85, TCC 2007.

[Electronic Edition][Cited 40 times ]

6. Ran Canetti,  Obtaining Universally Composable Security: Towards the Bare Bones of Trust, pp. 88 - 112, ASIACRYPT 2007.

[Electronic Edition][Cited 14 times ]

7. Ran Canetti,  Ronald L. Rivest,  Madhu Sudan,  Luca Trevisan,  Salil P. Vadhan,  Hoeteck Wee,  Amplifying Collision Resistance: A Complexity-Theoretic Treatment, pp. 264 - 283, CRYPTO 2007.

[Electronic Edition][Cited 12 times ]

8. Ran Canetti,  Jonathan Herzog,  Universally Composable Symbolic Analysis of Mutual Authentication and Key-Exchange Protocols, pp. 380 - 403, TCC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 81 times Red Star]

9. Ran Canetti,  Shai Halevi,  Michael Steiner,  Mitigating Dictionary Attacks on Password-Protected Local Storage, pp. 160 - 179, CRYPTO 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 15 times ]

10. Boaz Barak,  Ran Canetti,  Yehuda Lindell,  Rafael Pass,  Tal Rabin,  Secure Computation Without Authentication, pp. 361 - 377, CRYPTO 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 35 times ]

11. Ran Canetti,  Shai Halevi,  Jonathan Katz,  Yehuda Lindell,  Philip D. MacKenzie,  Universally Composable Password-Based Key Exchange, pp. 404 - 421, EUROCRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 87 times Red Star]

12. Ran Canetti,  Shai Halevi,  Jonathan Katz,  Adaptively-Secure, Non-interactive Public-Key Encryption, pp. 150 - 168, TCC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 21 times ]

13. Ran Canetti,  Shai Halevi,  Michael Steiner,  Hardness Amplification of Weakly Verifiable Puzzles, pp. 17 - 33, TCC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 25 times ]

14. Boaz Barak,  Ran Canetti,  Jesper Buus Nielsen,  Rafael Pass,  Universally Composable Protocols with Relaxed Set-Up Assumptions, pp. 186 - 195, FOCS 2004.

[Electronic Edition][Cited 73 times Red Star]

15. Ran Canetti,  Shai Halevi,  Jonathan Katz,  Chosen-Ciphertext Security from Identity-Based Encryption, pp. 207 - 222, EUROCRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 314 times Red StarRed StarRed Star]

16. Ran Canetti,  Oded Goldreich,  Shai Halevi,  On the Random-Oracle Methodology as Applied to Length-Restricted Signature Schemes, pp. 40 - 57, TCC 2004.

[Electronic Edition][Cited 42 times ]

17. Ran Canetti,  Tal Rabin,  Universal Composition with Joint State, pp. 265 - 281, CRYPTO 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 113 times Red StarRed Star]

18. Ran Canetti,  Hugo Krawczyk,  Jesper Buus Nielsen,  Relaxing Chosen-Ciphertext Security, pp. 565 - 582, CRYPTO 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 85 times Red Star]

19. Ran Canetti,  Shai Halevi,  Jonathan Katz,  A Forward-Secure Public-Key Encryption Scheme, pp. 255 - 271, EUROCRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 332 times Red StarRed StarRed Star]

20. Ran Canetti,  Eyal Kushilevitz,  Yehuda Lindell,  On the Limitations of Universally Composable Two-Party Computation without Set-up Assumptions, pp. 68 - 86, EUROCRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 104 times Red StarRed Star]

21. Ran Canetti,  Hugo Krawczyk,  Security Analysis of IKE's Signature-Based Key-Exchange Protocol, pp. 143 - 161, CRYPTO 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 96 times Red Star]

22. Ran Canetti,  Hugo Krawczyk,  Universally Composable Notions of Key Exchange and Secure Channels, pp. 337 - 351, EUROCRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 218 times Red StarRed Star]

23. Ran Canetti,  Marc Fischlin,  Universally Composable Commitments, pp. 19 - 40, CRYPTO 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 254 times Red StarRed StarRed Star]

24. Ran Canetti,  Ivan Damgard,  Stefan Dziembowski,  Yuval Ishai,  Tal Malkin,  On Adaptive vs. Non-adaptive Security of Multiparty Protocols, pp. 262 - 279, EUROCRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 17 times ]

25. Ran Canetti,  Hugo Krawczyk,  Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels, pp. 453 - 474, EUROCRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 524 times Red StarRed StarRed StarRed Star]

26. Ran Canetti,  Yevgeniy Dodis,  Shai Halevi,  Eyal Kushilevitz,  Amit Sahai,  Exposure-Resilient Functions and All-or-Nothing Transforms, pp. 453 - 469, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 115 times Red StarRed Star]

27. Ran Canetti,  Rosario Gennaro,  Stanislaw Jarecki,  Hugo Krawczyk,  Tal Rabin,  Adaptive Security for Threshold Cryptosystems, pp. 98 - 115, CRYPTO 1999.

[Electronic Edition][Cited 106 times Red StarRed Star]

28. Ran Canetti,  Tal Malkin,  Kobbi Nissim,  Efficient Communication-Storage Tradeoffs for Multicast Encryption, pp. 459 - 474, EUROCRYPT 1999.

[Electronic Edition][Cited 194 times Red StarRed Star]

29. Ran Canetti,  Shafi Goldwasser,  An Efficient Threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack, pp. 90 - 106, EUROCRYPT 1999.

[Electronic Edition][Cited 92 times Red Star]

30. Ran Canetti,  Cynthia Dwork,  Moni Naor,  Rafail Ostrovsky,  Deniable Encryption, pp. 90 - 104, CRYPTO 1997.

[Electronic Edition][Cited 141 times Red StarRed Star]

31. Ran Canetti,  Towards Realizing Random Oracles: Hash Functions That Hide All Partial Information, pp. 455 - 469, CRYPTO 1997.

[Electronic Edition][Cited 181 times Red StarRed Star]

32. Mihir Bellare,  Ran Canetti,  Hugo Krawczyk,  Keying Hash Functions for Message Authentication, pp. 1 - 15, CRYPTO 1996.

[Electronic Edition][Cited 913 times Red StarRed StarRed StarRed Star]

33. Ran Canetti,  Amir Herzberg,  Maintaining Security in the Presence of Transient Faults, pp. 425 - 438, CRYPTO 1994.

[Electronic Edition][Cited 96 times Red Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...