Universally composable security: A new paradigm for cryptographic protocols R Canetti Proceedings 42nd IEEE Symposium on Foundations of Computer Science, 136-145, 2001 | 3491 | 2001 |
Universally Composable Security: A New Paradigm for Cryptographic Protocols R Canetti | 3491 | 2000 |
HMAC: Keyed-hashing for message authentication H Krawczyk, M Bellare, R Canetti | 3421 | 1997 |
Keying hash functions for message authentication M Bellare, R Canetti, H Krawczyk Annual international cryptology conference, 1-15, 1996 | 2331 | 1996 |
The random oracle methodology, revisited R Canetti, O Goldreich, S Halevi Journal of the ACM (JACM) 51 (4), 557-594, 2004 | 2190 | 2004 |
Analysis of key-exchange protocols and their use for building secure channels R Canetti, H Krawczyk International conference on the theory and applications of cryptographic …, 2001 | 1752 | 2001 |
Security and composition of multiparty cryptographic protocols R Canetti Journal of CRYPTOLOGY 13 (1), 143-202, 2000 | 1423 | 2000 |
Efficient authentication and signing of multicast streams over lossy channels A Perrig, R Canetti, JD Tygar, D Song Proceeding 2000 IEEE symposium on security and privacy. S&P 2000, 56-73, 2000 | 1386 | 2000 |
TESLA broadcast authentication A Perrig, JD Tygar Secure Broadcast Communication, 29-53, 2003 | 1298 | 2003 |
Multicast security: A taxonomy and some efficient constructions R Canetti, J Garay, G Itkis, D Micciancio, M Naor, B Pinkas IEEE INFOCOM'99. Conference on Computer Communications. Proceedings …, 1999 | 1131 | 1999 |
Chosen-ciphertext security from identity-based encryption R Canetti, S Halevi, J Katz International conference on the theory and applications of cryptographic …, 2004 | 1045 | 2004 |
A forward-secure public-key encryption scheme R Canetti, S Halevi, J Katz International Conference on the Theory and Applications of Cryptographic …, 2003 | 945 | 2003 |
Efficient and secure source authentication for multicast A Perrig, R Canetti, D Song, JD Tygar Network and Distributed System Security Symposium, NDSS 1 (2001), 35-46, 2001 | 945 | 2001 |
Universally composable two-party and multi-party secure computation R Canetti, Y Lindell, R Ostrovsky, A Sahai Proceedings of the thiry-fourth annual ACM symposium on Theory of computing …, 2002 | 849 | 2002 |
Universally composable commitments R Canetti, M Fischlin Annual International Cryptology Conference, 19-40, 2001 | 737 | 2001 |
A modular approach to the design and analysis of authentication and key exchange protocols M Bellare, R Canetti, H Krawczyk Proceedings of the thirtieth annual ACM symposium on Theory of computing …, 1998 | 731 | 1998 |
Chosen-ciphertext secure proxy re-encryption R Canetti, S Hohenberger Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 652 | 2007 |
Adaptively secure multi-party computation R Canetti, U Feige, O Goldreich, M Naor Proceedings of the twenty-eighth annual ACM symposium on Theory of computing …, 1996 | 634 | 1996 |
Universally composable notions of key exchange and secure channels R Canetti, H Krawczyk International Conference on the Theory and Applications of Cryptographic …, 2002 | 587 | 2002 |
Deniable encryption R Canetti, C Dwork, M Naor, R Ostrovsky Annual International Cryptology Conference, 90-104, 1997 | 519 | 1997 |