Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Leonid
    Last name: Reyzin
    DBLP: r/LeonidReyzin
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 25 of 93  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Dimitrios Papadopoulos, Duane Wessels, Shumon Huque, Moni Naor, Jan Vcelák, Leonid Reyzin, Sharon Goldberg.
    Can NSEC5 be practical for DNSSEC deployments?
    IACR Cryptology ePrint Archive 2017, Volume 2017 (0) 2017
    Conference paper
    Foteini Baldimtsi, Jan Camenisch, Maria Dubovitskaya, Anna Lysyanskaya, Leonid Reyzin, Kai Samelin, Sophia Yakoubov.
    Accumulators with Applications to Anonymity-Preserving Revocation.
    IACR Cryptology ePrint Archive 2017, Volume 2017 (0) 2017
    Conference paper
    Joël Alwen, Binyi Chen, Krzysztof Pietrzak, Leonid Reyzin, Stefano Tessaro.
    Scrypt Is Maximally Memory-Hard.
    Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III 2017 (0) 2017
    Conference paper
    Foteini Baldimtsi, Jan Camenisch, Maria Dubovitskaya, Anna Lysyanskaya, Leonid Reyzin, Kai Samelin, Sophia Yakoubov.
    Accumulators with Applications to Anonymity-Preserving Revocation.
    2017 IEEE European Symposium on Security and Privacy, EuroSP 2017, Paris, France, April 26-28, 2017 2017 (0) 2017
    Conference paper
    Ran Canetti, Yilei Chen, Leonid Reyzin.
    On the Correlation Intractability of Obfuscated Pseudorandom Functions.
    Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I 2016 (0) 2016
    Conference paper
    Sharon Goldberg, Moni Naor, Dimitrios Papadopoulos, Leonid Reyzin.
    NSEC5 from Elliptic Curves: Provably Preventing DNSSEC Zone Enumeration with Shorter Responses.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Ran Canetti, Benjamin Fuller, Omer Paneth, Leonid Reyzin, Adam D. Smith.
    Reusable Fuzzy Extractors for Low-Entropy Distributions.
    Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I 2016 (0) 2016
    Conference paper
    Leonid Reyzin, Sophia Yakoubov.
    Efficient Asynchronous Accumulators for Distributed PKI.
    Security and Cryptography for Networks - 10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings 2016 (0) 2016
    Conference paper
    Joël Alwen, Peter Gazi, Chethan Kamath, Karen Klein, Georg Osang, Krzysztof Pietrzak, Leonid Reyzin, Michal Rolinek, Michal Rybár.
    On the Memory-Hardness of Data-Independent Password-Hashing Functions.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Leonid Reyzin, Dmitry Meshkov, Alexander Chepurnoy, Sasha Ivanov.
    Improving Authenticated Dynamic Dictionaries, with Applications to Cryptocurrencies.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Joël Alwen, Binyi Chen, Krzysztof Pietrzak, Leonid Reyzin, Stefano Tessaro.
    Scrypt is Maximally Memory-Hard.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Benjamin Fuller, Leonid Reyzin, Adam D. Smith.
    When Are Fuzzy Extractors Possible?
    Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I 2016 (0) 2016
    Conference paper
    Sharon Goldberg, Moni Naor, Dimitrios Papadopoulos, Leonid Reyzin, Sachin Vasant, Asaf Ziv.
    NSEC5: Provably Preventing DNSSEC Zone Enumeration.
    22nd Annual Network and Distributed System Security Symposium, NDSS 2015, San Diego, California, USA, February 8-11, 2015 2015 (0) 2015
    Conference paper
    Ran Canetti, Yilei Chen, Leonid Reyzin.
    On the Correlation Intractability of Obfuscated Pseudorandom Functions.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Conference paper
    Benjamin Fuller, Adam O'Neill, Leonid Reyzin.
    A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy.
    J. Cryptology 2015, Volume 28 (0) 2015
    Conference paper
    Leonid Reyzin, Sophia Yakoubov.
    Efficient Asynchronous Accumulators for Distributed PKI.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Conference paper
    Ran Canetti, Benjamin Fuller, Omer Paneth, Leonid Reyzin.
    Key Derivation From Noisy Sources With More Errors Than Entropy.
    IACR Cryptology ePrint Archive 2014, Volume 2014 (0) 2014
    Conference paper
    Divesh Aggarwal, Yevgeniy Dodis, Zahra Jafargholi, Eric Miles, Leonid Reyzin.
    Amplifying Privacy in Privacy Amplification.
    Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part II 2014 (0) 2014
    Conference paper
    Ethan Heilman, Danny Cooper, Leonid Reyzin, Sharon Goldberg.
    From the consent of the routed: improving the transparency of the RPKI.
    ACM SIGCOMM 2014 Conference, SIGCOMM'14, Chicago, IL, USA, August 17-22, 2014 2014 (0) 2014
    Conference paper
    Sharon Goldberg, Moni Naor, Dimitrios Papadopoulos, Leonid Reyzin, Sachin Vasant, Asaf Ziv.
    NSEC5: Provably Preventing DNSSEC Zone Enumeration.
    IACR Cryptology ePrint Archive 2014, Volume 2014 (0) 2014
    Conference paper
    Sebastian Faust, Tal Rabin, Leonid Reyzin, Eran Tromer, Vinod Vaikuntanathan.
    Protecting Circuits from Computationally Bounded and Noisy Leakage.
    SIAM J. Comput. 2014, Volume 43 (0) 2014
    Journal article
    Kyle Brogle, Sharon Goldberg, Leonid Reyzin.
    Sequential aggregate signatures with lazy verification from trapdoor permutations.
    Inf. Comput. 2014, Volume 239 (0) 2014
    Conference paper
    Benjamin Fuller, Adam D. Smith, Leonid Reyzin.
    Where are Fuzzy Extractors Possible?
    IACR Cryptology ePrint Archive 2014, Volume 2014 (0) 2014
    Conference paper
    Nishanth Chandran, Bhavana Kanukurthi, Rafail Ostrovsky, Leonid Reyzin.
    Privacy amplification with asymptotically optimal entropy loss.
    J. ACM 2014, Volume 61 (0) 2014
    Conference paper
    Melissa Chase, Alexander Healy, Anna Lysyanskaya, Tal Malkin, Leonid Reyzin.
    Mercurial Commitments with Applications to Zero-Knowledge Sets.
    J. Cryptology 2013, Volume 26 (0) 2013
    Show item 1 to 25 of 93  

    Your query returned 93 matches in the database.