Jump to Content
Philip MacKenzie

Philip MacKenzie

Authored Publications
Google Publications
Other Publications
Sort By
  • Title
  • Title, descending
  • Year
  • Year, descending
    A Method for Making Password-Based Key Exchange Resilient to Server Compromise
    Craig Gentry
    Zulfikar Ramzan
    Advances in Cryptology - CRYPTO 2006, Springer, pp. 142-159
    Preview
    Resource Fairness and Composability of Cryptographic Protocols
    Juan Garay
    Manoj Prabhakaran
    Ke Yang
    Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Springer, pp. 404-428
    Preview
    Resource Fairness and Composability of Cryptographic Protocols
    Juan A. Garay
    Manoj Prabhakaran
    Ke Yang
    TCC (2006), pp. 404-428
    Strengthening Zero-Knowledge Protocols Using Signatures
    Juan A. Garay
    Ke Yang
    J. Cryptology, vol. 19 (2006), pp. 169-209
    Password authenticated key exchange using hidden smooth subgroups
    Craig Gentry
    Zulfikar Ramzan
    ACM Conference on Computer and Communications Security (2005), pp. 299-309
    On Simulation-Sound Trapdoor Commitments
    Ke Yang
    EUROCRYPT (2004), pp. 382-400
    Alternatives to Non-malleability: Definitions, Constructions, and Applications (Extended Abstract)
    Michael K. Reiter
    Ke Yang
    Theory of Cryptography: First Theory of Cryptography Conference, TCC 2006, Springer (2004), pp. 171-190
    Strengthening Zero-Knowledge Protocols Using Signatures
    Juan A. Garay
    Ke Yang
    EUROCRYPT, Springer (2003), pp. 177-194
    Adaptively secure distributed public-key systems
    Yair Frankel
    Theor. Comput. Sci., vol. 287 (2002), pp. 535-561
    Adaptive Security for the Additive-Sharing Based Proactive RSA
    Yair Frankel
    PKC '01: Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography, Springer-Verlag, London, UK (2001), pp. 240-263
    "Psyeudorandom Intermixing": A Tool for Shared Cryptography
    Yair Frankel
    PKC '00: Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography, Springer-Verlag, London, UK (2000), pp. 306-325
    Adaptively-Secure Optimal-Resilience Proactive RSA
    Yair Frankel
    ASIACRYPT '99: Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security, Springer-Verlag, London, UK (1999), pp. 180-194
    Adaptively-Secure Distributed Public-Key Systems
    Yair Frankel
    ESA '99: Proceedings of the 7th Annual European Symposium on Algorithms, Springer-Verlag, London, UK (1999), pp. 4-27
    Robust efficient distributed RSA-key generation
    Yair Frankel
    PODC '98: Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing, ACM, New York, NY, USA (1998), pp. 320
    Robust efficient distributed RSA-key generation
    Yair Frankel
    STOC '98: Proceedings of the thirtieth annual ACM symposium on Theory of computing, ACM, New York, NY, USA (1998), pp. 663-672
    Proactive RSA
    Yair Frankel
    Peter Gemmell
    CRYPTO '97: Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology, Springer-Verlag, London, UK (1997), pp. 440-454