Cryptographers' World
 

Jonathan Katz


Author's Web Page Link

56 papers and 1 book in database with 3205 citations StarStarStar

Editor of 1 conference proceedings book

H-number: 28

Books

 
1. Jonathan KatzYehuda LindellIntroduction to Modern Cryptography: Principles and Protocols. Chapman & Hall / CRC, 2007. ISBN 978-1-584-88551-1.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[Cited 19 times ]


Conference Proceedings

 
1. Jonathan KatzMoti Yung, editors, Applied Cryptography and Network Security, 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings. Springer, 2007. ISBN 3-540-72737-X.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Jonathan Katz,  Yehuda Lindell,  Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs, Journal of Cryptology, Volume 21(3), pp. 303 - 349, Springer, 2008.

[Cited 4 times ]

2. Eu-Jin Goh,  Stanislaw Jarecki,  Jonathan Katz,  Nan Wang,  Efficient Signature Schemes with Tight Reductions to the Diffie-Hellman Problems, Journal of Cryptology, Volume 20(4), pp. 493 - 514, Springer, 2007.

[Cited 5 times ]

3. Ran Canetti,  Shai Halevi,  Jonathan Katz,  A Forward-Secure Public-Key Encryption Scheme, Journal of Cryptology, Volume 20(3), pp. 265 - 294, Springer, 2007.

[Cited 225 times Red StarRed Star]

4. Jonathan Katz,  Moti Yung,  Scalable Protocols for Authenticated Group Key Exchange, Journal of Cryptology, Volume 20(1), pp. 85 - 113, Springer, 2007.

[Cited 162 times Red StarRed Star]

5. Jonathan Katz,  Moti Yung,  Characterization of Security Notions for Probabilistic Private-Key Encryption, Journal of Cryptology, Volume 19(1), pp. 67 - 95, Springer, 2006.

[Cited 89 times Red Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Jonathan Katz,  Vinod Vaikuntanathan,  Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices, pp. 636 - 652, ASIACRYPT 2009.

[Electronic Edition][Cited 6 times ]

2. Giuseppe Ateniese,  Seny Kamara,  Jonathan Katz,  Proofs of Storage from Homomorphic Identification Protocols, pp. 319 - 333, ASIACRYPT 2009.

[Electronic Edition][Cited 4 times ]

3. Jonathan Katz,  Vinod Vaikuntanathan,  Signature Schemes with Bounded Leakage Resilience, pp. 703 - 720, ASIACRYPT 2009.

[Electronic Edition][Cited 34 times ]

4. Jonathan Katz,  Arkady Yerukhimovich,  On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations, pp. 197 - 213, ASIACRYPT 2009.

[Electronic Edition][No citation]

5. Joël Alwen,  Jonathan Katz,  Yehuda Lindell,  Giuseppe Persiano,  Abhi Shelat,  Ivan Visconti,  Collusion-Free Multiparty Computation in the Mediated Model, pp. 524 - 540, CRYPTO 2009.

[Electronic Edition][Cited 2 times ]

6. Yevgeniy Dodis,  Jonathan Katz,  Adam Smith,  Shabsi Walfish,  Composability and On-Line Deniability of Authentication, pp. 146 - 162, TCC 2009.

[Electronic Edition][Cited 1 times ]

7. S. Dov Gordon,  Jonathan Katz,  Complete Fairness in Multi-party Computation without an Honest Majority, pp. 19 - 35, TCC 2009.

[Electronic Edition][Cited 6 times ]

8. Dan Boneh,  David Freeman,  Jonathan Katz,  Brent Waters,  Signing a Linear Subspace: Signature Schemes for Network Coding, pp. 68 - 87, PKC 2009.

[Electronic Edition][Cited 22 times ]

9. S. Dov Gordon,  Carmit Hazay,  Jonathan Katz,  Yehuda Lindell,  Complete fairness in secure two-party computation, pp. 413 - 422, STOC 2008.

[Electronic Edition][Cited 25 times ]

10. Jonathan Katz,  Amit Sahai,  Brent Waters,  Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products, pp. 146 - 162, EUROCRYPT 2008.

[Electronic Edition][Cited 99 times Red Star]

11. Jonathan Katz,  Yehuda Lindell,  Aggregate Message Authentication Codes, pp. 155 - 169, CT-RSA 2008.

[Electronic Edition][Cited 25 times ]

12. Jonathan Katz,  Bridging Game Theory and Cryptography: Recent Results and Future Directions, pp. 251 - 272, TCC 2008.

[Electronic Edition][Cited 24 times ]

13. Jonathan Katz,  Which Languages Have 4-Round Zero-Knowledge Proofs?, pp. 73 - 88, TCC 2008.

[Electronic Edition][Cited 7 times ]

14. Vipul Goyal,  Jonathan Katz,  Universally Composable Multi-party Computation with an Unreliable Common Reference String, pp. 142 - 154, TCC 2008.

[Electronic Edition][Cited 3 times ]

15. Seny Kamara,  Jonathan Katz,  How to Encrypt with a Malicious Random Number Generator, pp. 303 - 315, FSE 2008.

[Electronic Edition][Cited 2 times ]

16. Juan A. Garay,  Jonathan Katz,  Chiu-Yuen Koo,  Rafail Ostrovsky,  Round Complexity of Authenticated Broadcast with a Dishonest Majority, pp. 658 - 668, FOCS 2007.

[Electronic Edition][Cited 5 times ]

17. Jonathan Katz,  On achieving the "best of both worlds" in secure multiparty computation, pp. 11 - 20, STOC 2007.

[Electronic Edition][Cited 13 times ]

18. Jonathan Katz,  Chiu-Yuen Koo,  Round-Efficient Secure Computation in Point-to-Point Networks, pp. 311 - 328, EUROCRYPT 2007.

[Electronic Edition][Cited 16 times ]

19. Jonathan Katz,  Universally Composable Multi-party Computation Using Tamper-Proof Hardware, pp. 115 - 128, EUROCRYPT 2007.

[Electronic Edition][Cited 39 times ]

20. Carmit Hazay,  Jonathan Katz,  Chiu-Yuen Koo,  Yehuda Lindell,  Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions, pp. 323 - 341, TCC 2007.

[Electronic Edition][Cited 22 times ]

21. Omer Horvitz,  Jonathan Katz,  Universally-Composable Two-Party Computation in Two Rounds, pp. 111 - 129, CRYPTO 2007.

[Electronic Edition][Cited 8 times ]

22. Jonathan Katz,  Ji Sun Shin,  Parallel and Concurrent Security of the HB and HB, pp. 73 - 87, EUROCRYPT 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 87 times Red Star]

23. Adam Bender,  Jonathan Katz,  Ruggero Morselli,  Ring Signatures: Stronger Definitions, and Constructions Without Random Oracles, pp. 60 - 79, TCC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 114 times Red StarRed Star]

24. Yevgeniy Dodis,  Jonathan Katz,  Leonid Reyzin,  Adam Smith,  Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets, pp. 232 - 250, CRYPTO 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 48 times ]

25. Jonathan Katz,  Chiu-Yuen Koo,  On Expected Constant-Round Protocols for Byzantine Agreement, pp. 445 - 462, CRYPTO 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 33 times ]

26. Jonathan Katz,  Philip D. MacKenzie,  Gelareh Taban,  Virgil D. Gligor,  Two-Server Password-Only Authenticated Key Exchange, pp. 1 - 16, ACNS 2005.

[Electronic Edition][Cited 15 times ]

27. Xavier Boyen,  Yevgeniy Dodis,  Jonathan Katz,  Rafail Ostrovsky,  Adam Smith,  Secure Remote Authentication Using Biometric Data, pp. 147 - 163, EUROCRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 100 times Red StarRed Star]

28. Iftach Haitner,  Omer Horvitz,  Jonathan Katz,  Chiu-Yuen Koo,  Ruggero Morselli,  Ronen Shaltiel,  Reducing Complexity Assumptions for Statistically-Hiding Commitment, pp. 58 - 77, EUROCRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 35 times ]

29. Ran Canetti,  Shai Halevi,  Jonathan Katz,  Yehuda Lindell,  Philip D. MacKenzie,  Universally Composable Password-Based Key Exchange, pp. 404 - 421, EUROCRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 87 times Red Star]

30. Dan Boneh,  Jonathan Katz,  Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption, pp. 87 - 103, CT-RSA 2005.

[Electronic Edition][Cited 159 times Red StarRed Star]

31. Yevgeniy Dodis,  Jonathan Katz,  Chosen-Ciphertext Security of Multiple Encryption, pp. 188 - 209, TCC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 75 times Red Star]

32. Jonathan Katz,  Yehuda Lindell,  Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs, pp. 128 - 149, TCC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 8 times ]

33. Ran Canetti,  Shai Halevi,  Jonathan Katz,  Adaptively-Secure, Non-interactive Public-Key Encryption, pp. 150 - 168, TCC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 21 times ]

34. Jonathan Katz,  Rafail Ostrovsky,  Round-Optimal Secure Two-Party Computation, pp. 335 - 354, CRYPTO 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 46 times ]

35. Ik Rae Jeong,  Jonathan Katz,  Dong Hoon Lee,  One-Round Protocols for Two-Party Authenticated Key Exchange, pp. 220 - 232, ACNS 2004.

[Electronic Edition][Cited 48 times ]

36. Ran Canetti,  Shai Halevi,  Jonathan Katz,  Chosen-Ciphertext Security from Identity-Based Encryption, pp. 207 - 222, EUROCRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 314 times Red StarRed StarRed Star]

37. Yevgeniy Dodis,  Matthew K. Franklin,  Jonathan Katz,  Atsuko Miyaji,  Moti Yung,  A Generic Construction for Intrusion-Resilient Public-Key Encryption, pp. 81 - 98, CT-RSA 2004.

[Electronic Edition][Cited 34 times ]

38. Jonathan Katz,  Moti Yung,  Scalable Protocols for Authenticated Group Key Exchange, pp. 110 - 125, CRYPTO 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 231 times Red StarRed Star]

39. Rosario Gennaro,  Yael Gertner,  Jonathan Katz,  Lower bounds on the efficiency of encryption and digital signature schemes, pp. 417 - 425, STOC 2003.

[Electronic Edition][Cited 17 times ]

40. Jonathan Katz,  Efficient and Non-malleable Proofs of Plaintext Knowledge and Applications, pp. 211 - 228, EUROCRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 34 times ]

41. Jonathan Katz,  Rafail Ostrovsky,  Adam Smith,  Round Efficiency of Multi-party Computation with a Dishonest Majority, pp. 578 - 595, EUROCRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 38 times ]

42. Ran Canetti,  Shai Halevi,  Jonathan Katz,  A Forward-Secure Public-Key Encryption Scheme, pp. 255 - 271, EUROCRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 332 times Red StarRed StarRed Star]

43. Yevgeniy Dodis,  Matthew K. Franklin,  Jonathan Katz,  Atsuko Miyaji,  Moti Yung,  Intrusion-Resilient Public-Key Encryption, pp. 19 - 32, CT-RSA 2003.

[Electronic Edition][Cited 66 times Red Star]

44. Yevgeniy Dodis,  Jonathan Katz,  Shouhuai Xu,  Moti Yung,  Strong Key-Insulated Signature Schemes, pp. 130 - 144, PKC 2003.

[Electronic Edition][Cited 151 times Red StarRed Star]

45. Jonathan Katz,  Moti Yung,  Threshold Cryptosystems Based on Factoring, pp. 192 - 205, ASIACRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 19 times ]

46. Yevgeniy Dodis,  Jonathan Katz,  Shouhuai Xu,  Moti Yung,  Key-Insulated Public Key Cryptosystems, pp. 65 - 82, EUROCRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 214 times Red StarRed Star]

47. Giovanni Di Crescenzo,  Jonathan Katz,  Rafail Ostrovsky,  Adam Smith,  Efficient and Non-interactive Non-malleable Commitment, pp. 40 - 59, EUROCRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 68 times Red Star]

48. Jonathan Katz,  Steven Myers,  Rafail Ostrovsky,  Cryptographic Counters and Applications to Electronic Voting, pp. 78 - 92, EUROCRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 41 times ]

49. Jonathan Katz,  Rafail Ostrovsky,  Moti Yung,  Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords, pp. 475 - 494, EUROCRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 230 times Red StarRed Star]

50. Enrico Buonanno,  Jonathan Katz,  Moti Yung,  Incremental Unforgeable Encryption, pp. 109 - 124, FSE 2001.

[Electronic Edition][Cited 2 times ]

51. Jonathan Katz,  Moti Yung,  Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation, pp. 284 - 299, FSE 2000.

[Electronic Edition][Cited 62 times Red Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...