Follow
Jonathan Katz
Jonathan Katz
Professor of Computer Science, University of Maryland
Verified email at cs.umd.edu
Title
Cited by
Cited by
Year
Introduction to modern cryptography: Principles & protocols (Cryptography & network security series)
J KATZ, Y LINDELL
4449*2007
Introduction to Modern Cryptography (Chapman 8 Hall/Crc Cryptography and Network Security Series)
J Katz, Y Lindell
Chapman, 2007
4275*2007
Introduction to modern cryptography
Y Lindell, J Katz
Chapman and Hall/CRC, 2014
4269*2014
Introduction to modern cryptography
J Katz, Y Lindell
CRC Press, 2008
4269*2008
Introduction to Modern Cryptography
J Katz, Y Lindell
4269*2006
A pairwise key predistribution scheme for wireless sensor networks
W Du, J Deng, YS Han, PK Varshney, J Katz, A Khalili
ACM Transactions on Information and System Security (TISSEC) 8 (2), 228-258, 2005
25062005
Predicate encryption supporting disjunctions, polynomial eguations, and inner products
J Katz
Proc. EUROCRYPT 2008, l46-162, 2008
1513*2008
Predicate encryption supporting disjunctions, polynomial equations, and inner products
J Katz, A Sahai, B Waters
Advances in Cryptology–EUROCRYPT 2008, 146-162, 2008
13652008
Chosen-ciphertext security from identity-based encryption
R Canetti, S Halevi, J Katz
Advances in Cryptology-Eurocrypt 2004, 207-222, 2004
10992004
A forward-secure public-key encryption scheme
R Canetti, S Halevi, J Katz
Advances in Cryptology—Eurocrypt 2003, 646-646, 2003
10142003
Faster Secure Two-Party Computation Using Garbled Circuits
D Evans, L Malka, J Katz, Y Huang
7972011
Faster secure two-party computation using garbled circuits
Y Huang, D Evans, J Katz, L Malka
USENIX Security Symposium, 2011
7932011
Efficient password-authenticated key exchange using human-memorable passwords
J Katz, R Ostrovsky, M Yung
Advances in Cryptology—EUROCRYPT 2001, 475-494, 2001
5692001
Key-insulated public key cryptosystems
Y Dodis, J Katz, S Xu, M Yung
Advances in Cryptology—Eurocrypt 2002, 65-82, 2002
5572002
Scalable protocols for authenticated group key exchange
J Katz, M Yung
Advances in Cryptology-CRYPTO 2003, 110-125, 2003
5272003
All your queries are belong to us: The power of file-injection attacks on searchable encryption
Y Zhang, J Katz, C Papamanthou
25th {USENIX} Security Symposium ({USENIX} Security 16), 707-720, 2016
5162016
Proofs of storage from homomorphic identification protocols
G Ateniese, S Kamara, J Katz
Advances in Cryptology–ASIACRYPT 2009, 319-333, 2009
4972009
Toward Secure Key Distribution in Truly Ad Hoc Networks
A Khalili, J Katz, W Arbaugh
Proceedings of the IEEE Workshop on Security and Assurance in Ad hoc …, 2003
4942003
Private set intersection: Are garbled circuits better than custom protocols?
Y Huang, D Evans, J Katz
NDSS, 2012
4622012
Signing a linear subspace: Signature schemes for network coding
D Boneh, D Freeman, J Katz, B Waters
Public Key Cryptography–PKC 2009, 68-87, 2009
4222009
The system can't perform the operation now. Try again later.
Articles 1–20