Cryptographers' World
 

Richard J. Lipton


Author's Web Page Link

9 papers in database with 1214 citations StarStar

H-number: 9

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Dan Boneh,  Richard A. DeMillo,  Richard J. Lipton,  On the Importance of Eliminating Errors in Cryptographic Computations, Journal of Cryptology, Volume 14(2), pp. 101 - 119, Springer, 2001.

[Cited 125 times Red StarRed Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. David Cash,  Yan Zong Ding,  Yevgeniy Dodis,  Wenke Lee,  Richard J. Lipton,  Shabsi Walfish,  Intrusion-Resilient Key Exchange in the Bounded Retrieval Model, pp. 479 - 498, TCC 2007.

[Electronic Edition][Cited 21 times ]

2. Giovanni Di Crescenzo,  Richard J. Lipton,  Shabsi Walfish,  Perfectly Secure Password Protocols in the Bounded Retrieval Model, pp. 225 - 244, TCC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 45 times ]

3. David Dagon,  Wenke Lee,  Richard J. Lipton,  Protecting Secret Data from Insider Attacks, pp. 16 - 30, FC 2005.

[Electronic Edition][Cited 13 times ]

4. Richard J. Lipton,  Rafail Ostrovsky,  Micro-payments via Efficient Coin-Flipping, pp. 1 - 15, FC 1998.

[Electronic Edition][Cited 42 times ]

5. Dan Boneh,  Richard A. DeMillo,  Richard J. Lipton,  On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract), pp. 37 - 51, EUROCRYPT 1997.

[Electronic Edition][Cited 636 times Red StarRed StarRed StarRed Star]

6. Dan Boneh,  Richard J. Lipton,  Algorithms for Black-Box Fields and their Application to Cryptography (Extended Abstract), pp. 283 - 297, CRYPTO 1996.

[Electronic Edition][Cited 140 times Red StarRed Star]

7. Dan Boneh,  Richard J. Lipton,  Quantum Cryptanalysis of Hidden Linear Functions (Extended Abstract), pp. 424 - 437, CRYPTO 1995.

[Electronic Edition][Cited 91 times Red Star]

8. Avrim Blum,  Merrick L. Furst,  Michael J. Kearns,  Richard J. Lipton,  Cryptographic Primitives Based on Hard Learning Problems, pp. 278 - 291, CRYPTO 1993.

[Electronic Edition][Cited 101 times Red StarRed Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...