Publication On The Security Of Querying Encrypted Data Arvind Arasu, Raghav Kaushik, Ravi Ramamurthy January 2012
Publication Secure Database Commitments and Universal Arguments of Quasi Knowledge Melissa Chase, Ivan Visconti Crypto 2012 | January 2012
Publication A Parallel Repetition Theorem for Leakage Resilience Zvika Brakerski, Yael Tauman Kalai In Proceedings of the 9th Theory of Cryptography Conference (TCC) | January 2012
Publication Smooth Projective Hashing and Two-Message Oblivious Transfer Shai Halevi, Yael Tauman Kalai Journal of Cryptology | January 2012, Vol 25: pp. 158-193
Publication Full Proof Cryptography: Verifiable Compilation of Efficient Zero-Knowledge Protocols José Bacelar Almeida, Manuel Barbosa, Endre Bangerter, Gilles Barthe, Stephen Krenn, Santiago Zanella-Béguelin 19th ACM Conference on Computer and Communications Security, CCS 2012 | January 2012 19th ACM Conference on Computer and Communications Security, CCS 2012
Publication Modular polynomials via isogeny volcanoes Reinier Broker, Kristin Lauter, Andrew V. Sutherland Mathematics of Computation 81 (2012), 1201-1231 | January 2012, Vol 81 Project
Publication Symbolic Finite State Transducers: Algorithms and Applications Margus Veanes, Pieter Hooimeijer, David Molnar, Nikolaj Bjorner, Ben Livshits POPL’12 | January 2012
Publication Improved CRT Algorithm for Class Polynomials in Genus 2 Kristin Lauter, Damien Robert Algorithmic Number Theory Symposium, ANTS-X 2012 | January 2012 Project
Publication A Research Agenda Acknowledging the Persistence of Passwords Cormac Herley, Paul van Oorschot IEEE Security & Privacy Magazine | January 2012
Publication Foundations of trust management Mo Becker IEEE Symposium on Security and Privacy | January 2012