Cryptographers' World
 

Amir Herzberg


Author's Web Page Link

10 papers in database with 1700 citations StarStarStar

H-number: 9

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Ran Canetti,  Shai Halevi,  Amir Herzberg,  Maintaining Authenticated Communication in the Presence of Break-Ins, Journal of Cryptology, Volume 13(1), pp. 61 - 105, Springer, 2000.

[Cited 67 times Red Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Amir Herzberg,  Igal Yoffe,  The Layered Games Framework for Specifications and Analysis of Security Protocols, pp. 125 - 141, TCC 2008.

[Electronic Edition][Cited 4 times ]

2. Amir Herzberg,  On Tolerant Cryptographic Constructions, pp. 172 - 190, CT-RSA 2005.

[Electronic Edition][Cited 23 times ]

3. Amir Herzberg,  Yosi Mass,  Relying Party Credentials Framework, pp. 328 - 343, CT-RSA 2001.

[Electronic Edition][Cited 30 times ]

4. Amir Herzberg,  Stanislaw Jarecki,  Hugo Krawczyk,  Moti Yung,  Proactive Secret Sharing Or: How to Cope With Perpetual Leakage, pp. 339 - 352, CRYPTO 1995.

[Electronic Edition][Cited 480 times Red StarRed StarRed Star]

5. Ran Canetti,  Amir Herzberg,  Maintaining Security in the Presence of Transient Faults, pp. 425 - 438, CRYPTO 1994.

[Electronic Edition][Cited 96 times Red Star]

6. Carlo Blundo,  Alfredo De Santis,  Amir Herzberg,  Shay Kutten,  Ugo Vaccaro,  Moti Yung,  Perfectly-Secure Key Distribution for Dynamic Conferences, pp. 471 - 486, CRYPTO 1992.

[Electronic Edition][Cited 786 times Red StarRed StarRed StarRed Star]

7. Amir Herzberg,  Michael Luby,  Public Randomness in Cryptography, pp. 421 - 432, CRYPTO 1992.

[Electronic Edition][Cited 22 times ]

8. Ray Bird,  Inder S. Gopal,  Amir Herzberg,  Philippe A. Janson,  Shay Kutten,  Refik Molva,  Moti Yung,  Systematic Design of Two-Party Authentication Protocols, pp. 44 - 61, CRYPTO 1991.

[Electronic Edition][Cited 150 times Red StarRed Star]

9. Amir Herzberg,  Shlomit S. Pinter,  Public Protection of Software, pp. 158 - 179, CRYPTO 1985.

[Electronic Edition][Cited 42 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...