Cryptographers' World
 

Ke Yang


Author's Web Page Link

7 papers in database with 619 citations Star

H-number: 6

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Juan A. Garay,  Philip D. MacKenzie,  Ke Yang,  Strengthening Zero-Knowledge Protocols Using Signatures, Journal of Cryptology, Volume 19(2), pp. 169 - 209, Springer, 2006.

[Cited 42 times ]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Juan A. Garay,  Philip D. MacKenzie,  Manoj Prabhakaran,  Ke Yang,  Resource Fairness and Composability of Cryptographic Protocols, pp. 404 - 428, TCC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 18 times ]

2. Lea Kissner,  Alina Oprea,  Michael K. Reiter,  Dawn Xiaodong Song,  Ke Yang,  Private Keyword-Based Push and Pull with Applications to Anonymous Communication, pp. 16 - 30, ACNS 2004.

[Electronic Edition][Cited 12 times ]

3. Philip D. MacKenzie,  Ke Yang,  On Simulation-Sound Trapdoor Commitments, pp. 382 - 400, EUROCRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 60 times Red Star]

4. Philip D. MacKenzie,  Michael K. Reiter,  Ke Yang,  Alternatives to Non-malleability: Definitions, Constructions, and Applications (Extended Abstract), pp. 171 - 190, TCC 2004.

[Electronic Edition][Cited 30 times ]

5. Juan A. Garay,  Philip D. MacKenzie,  Ke Yang,  Strengthening Zero-Knowledge Protocols Using Signatures, pp. 177 - 194, EUROCRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 58 times Red Star]

6. Boaz Barak,  Oded Goldreich,  Russell Impagliazzo,  Steven Rudich,  Amit Sahai,  Salil P. Vadhan,  Ke Yang,  On the (Im)possibility of Obfuscating Programs, pp. 1 - 18, CRYPTO 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 441 times Red StarRed StarRed Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...