Anna Lysyanskaya
Person information
- affiliation: Brown University, Providence, RI, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2018
- [c53]Megumi Ando, Anna Lysyanskaya, Eli Upfal:
Practical and Provably Secure Onion Routing. ICALP 2018: 144:1-144:14 - [i35]Elizabeth C. Crites, Anna Lysyanskaya:
Delegatable Anonymous Credentials from Mercurial Signatures. IACR Cryptology ePrint Archive 2018: 923 (2018) - 2017
- [c52]Foteini Baldimtsi, Jan Camenisch, Maria Dubovitskaya, Anna Lysyanskaya, Leonid Reyzin, Kai Samelin, Sophia Yakoubov:
Accumulators with Applications to Anonymity-Preserving Revocation. EuroS&P 2017: 301-315 - [i34]Megumi Ando, Anna Lysyanskaya, Eli Upfal:
Scalable and Provably Secure P2P Communication Protocols. CoRR abs/1706.05367 (2017) - [i33]Foteini Baldimtsi, Jan Camenisch, Maria Dubovitskaya, Anna Lysyanskaya, Leonid Reyzin, Kai Samelin, Sophia Yakoubov:
Accumulators with Applications to Anonymity-Preserving Revocation. IACR Cryptology ePrint Archive 2017: 43 (2017) - 2015
- [i32]Jan Camenisch, Anja Lehmann, Anna Lysyanskaya, Gregory Neven:
A Single Password for Everything? ERCIM News 2015(100) (2015) - [i31]Dana Dachman-Soled, Nils Fleischhacker, Jonathan Katz, Anna Lysyanskaya, Dominique Schröder:
Feasibility and Infeasibility of Secure Computation with Malicious PUFs. IACR Cryptology ePrint Archive 2015: 405 (2015) - [i30]Mihir Bellare, Anna Lysyanskaya:
Symmetric and Dual PRFs from Standard Assumptions: A Generic Validation of an HMAC Assumption. IACR Cryptology ePrint Archive 2015: 1198 (2015) - 2014
- [c51]Jan Camenisch, Anja Lehmann, Anna Lysyanskaya, Gregory Neven:
Memento: How to Reconstruct Your Secrets from a Single Password in a Hostile Environment. CRYPTO (2) 2014: 256-275 - [c50]Dana Dachman-Soled, Nils Fleischhacker, Jonathan Katz, Anna Lysyanskaya, Dominique Schröder:
Feasibility and Infeasibility of Secure Computation with Malicious PUFs. CRYPTO (2) 2014: 405-420 - [c49]Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn:
Malleable Signatures: New Definitions and Delegatable Anonymous Credentials. CSF 2014: 199-213 - [i29]Jan Camenisch, Anja Lehmann, Anna Lysyanskaya, Gregory Neven:
Memento: How to Reconstruct your Secrets from a Single Password in a Hostile Environment. IACR Cryptology ePrint Archive 2014: 429 (2014) - 2013
- [j5]Melissa Chase, Alexander Healy, Anna Lysyanskaya, Tal Malkin, Leonid Reyzin:
Mercurial Commitments with Applications to Zero-Knowledge Sets. J. Cryptology 26(2): 251-279 (2013) - [c48]Foteini Baldimtsi, Anna Lysyanskaya:
On the Security of One-Witness Blind Signature Schemes. ASIACRYPT (2) 2013: 82-99 - [c47]Foteini Baldimtsi, Anna Lysyanskaya:
Anonymous credentials light. ACM Conference on Computer and Communications Security 2013: 1087-1098 - [c46]Gesine Hinterwälder, Christian T. Zenger, Foteini Baldimtsi, Anna Lysyanskaya, Christof Paar, Wayne P. Burleson:
Efficient E-Cash in Practice: NFC-Based Payments for Public Transportation Systems. Privacy Enhancing Technologies 2013: 40-59 - [c45]Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn:
Verifiable Elections That Scale for Free. Public Key Cryptography 2013: 479-496 - [c44]Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn:
Succinct Malleable NIZKs and an Application to Compact Shuffles. TCC 2013: 100-119 - [i28]Mira Belenkiy, Melissa Chase, C. Christopher Erway, John Jannotti, Alptekin Küpçü, Anna Lysyanskaya:
Incentivizing Outsourced Computation. IACR Cryptology ePrint Archive 2013: 156 (2013) - [i27]Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn:
Malleable Signatures: Complex Unary Transformations and Delegatable Anonymous Credentials. IACR Cryptology ePrint Archive 2013: 179 (2013) - 2012
- [j4]Alptekin Küpçü, Anna Lysyanskaya:
Usable optimistic fair exchange. Computer Networks 56(1): 50-63 (2012) - [c43]Jan Camenisch, Anna Lysyanskaya, Gregory Neven:
Practical yet universally composable two-server password-authenticated secret sharing. ACM Conference on Computer and Communications Security 2012: 525-536 - [c42]Feng-Hao Liu, Anna Lysyanskaya:
Tamper and Leakage Resilience in the Split-State Model. CRYPTO 2012: 517-532 - [c41]Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn:
Malleable Proof Systems and Applications. EUROCRYPT 2012: 281-300 - [i26]Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn:
Malleable Proof Systems and Applications. IACR Cryptology ePrint Archive 2012: 12 (2012) - [i25]Foteini Baldimtsi, Anna Lysyanskaya:
On The Security of One-Witness Blind Signature Schemes. IACR Cryptology ePrint Archive 2012: 197 (2012) - [i24]Sarah Meiklejohn, C. Christopher Erway, Alptekin Küpçü, Theodora Hinkle, Anna Lysyanskaya:
ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash. IACR Cryptology ePrint Archive 2012: 226 (2012) - [i23]Feng-Hao Liu, Anna Lysyanskaya:
Tamper and Leakage Resilience in the Split-State Model. IACR Cryptology ePrint Archive 2012: 297 (2012) - [i22]Foteini Baldimtsi, Anna Lysyanskaya:
Anonymous Credentials Light. IACR Cryptology ePrint Archive 2012: 298 (2012) - [i21]Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn:
Succinct Malleable NIZKs and an Application to Compact Shuffles. IACR Cryptology ePrint Archive 2012: 506 (2012) - [i20]Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn:
Verifiable Elections That Scale for Free. IACR Cryptology ePrint Archive 2012: 697 (2012) - [i19]Jan Camenisch, Anna Lysyanskaya, Gregory Neven:
Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing. IACR Cryptology ePrint Archive 2012: 717 (2012) - 2011
- [i18]Marc Fischlin, Anna Lysyanskaya, Ueli Maurer, Alexander May:
Public-Key Cryptography (Dagstuhl Seminar 11391). Dagstuhl Reports 1(9): 76-94 (2011) - 2010
- [j3]Anna Lysyanskaya, Roberto Tamassia, Nikos Triandopoulos:
Authenticated error-correcting codes with applications to multicast authentication. ACM Trans. Inf. Syst. Secur. 13(2): 17:1-17:34 (2010) - [c40]
- [c39]Alptekin Küpçü, Anna Lysyanskaya:
Optimistic Fair Exchange with Multiple Arbiters. ESORICS 2010: 488-507 - [c38]Feng-Hao Liu, Anna Lysyanskaya:
Algorithmic Tamper-Proof Security under Probing Attacks. SCN 2010: 106-120 - [c37]Sarah Meiklejohn, C. Christopher Erway, Alptekin Küpçü, Theodora Hinkle, Anna Lysyanskaya:
ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash. USENIX Security Symposium 2010: 193-206 - [i17]Anna Lysyanskaya, Aaron Segal:
Rational Secret Sharing with Side Information in Point-to-Point Networks via Time-Delayed Encryption. IACR Cryptology ePrint Archive 2010: 540 (2010)
2000 – 2009
- 2009
- [c36]Mira Belenkiy, Jan Camenisch, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Hovav Shacham:
Randomizable Proofs and Delegatable Anonymous Credentials. CRYPTO 2009: 108-125 - [c35]Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya:
Compact E-Cash and Simulatable VRFs Revisited. Pairing 2009: 114-131 - [c34]Alptekin Küpçü, Anna Lysyanskaya:
Brief announcement: impossibility results for optimistic fair exchange with multiple autonomous arbiters. PODC 2009: 336-337 - [i16]Alptekin Küpçü, Anna Lysyanskaya:
Optimistic Fair Exchange with Multiple Arbiters. IACR Cryptology ePrint Archive 2009: 69 (2009) - [i15]Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya:
Compact E-Cash and Simulatable VRFs Revisited. IACR Cryptology ePrint Archive 2009: 107 (2009) - 2008
- [c33]Mira Belenkiy, Melissa Chase, C. Christopher Erway, John Jannotti, Alptekin Küpçü, Anna Lysyanskaya:
Incentivizing outsourced computation. NetEcon 2008: 85-90 - [c32]Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya:
P-signatures and Noninteractive Anonymous Credentials. TCC 2008: 356-374 - [i14]Mira Belenkiy, Jan Camenisch, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Hovav Shacham:
Delegatable Anonymous Credentials. IACR Cryptology ePrint Archive 2008: 428 (2008) - [i13]Alptekin Küpçü, Anna Lysyanskaya:
Usable Optimistic Fair Exchange. IACR Cryptology ePrint Archive 2008: 431 (2008) - 2007
- [j2]
- [c31]Melissa Chase, Anna Lysyanskaya:
Simulatable VRFs with Applications to Multi-theorem NIZK. CRYPTO 2007: 303-322 - [c30]Jan Camenisch, Anna Lysyanskaya, Mira Meyerovich:
Endorsed E-Cash. IEEE Symposium on Security and Privacy 2007: 101-115 - [c29]Mira Belenkiy, Melissa Chase, C. Christopher Erway, John Jannotti, Alptekin Küpçü, Anna Lysyanskaya, Eric Rachlin:
Making p2p accountable without losing privacy. WPES 2007: 31-40 - [i12]Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya:
Non-Interactive Anonymous Credentials. IACR Cryptology ePrint Archive 2007: 384 (2007) - 2006
- [j1]Yehuda Lindell, Anna Lysyanskaya, Tal Rabin:
On the composition of authenticated Byzantine Agreement. J. ACM 53(6): 881-917 (2006) - [c28]Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, Mira Meyerovich:
How to win the clonewars: efficient periodic n-times anonymous authentication. ACM Conference on Computer and Communications Security 2006: 201-210 - [c27]
- [c26]Anna Lysyanskaya, Nikos Triandopoulos:
Rationality and Adversarial Behavior in Multi-party Computation. CRYPTO 2006: 180-197 - [c25]Anna Lysyanskaya, Mira Meyerovich:
Provably Secure Steganography with Imperfect Sampling. Public Key Cryptography 2006: 123-139 - [c24]Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya:
Balancing Accountability and Privacy Using E-Cash (Extended Abstract). SCN 2006: 141-155 - [i11]Melissa Chase, Anna Lysyanskaya:
On Signatures of Knowledge. IACR Cryptology ePrint Archive 2006: 184 (2006) - [i10]Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, Mira Meyerovich:
How to Win the Clone Wars: Efficient Periodic n-Times Anonymous Authentication. IACR Cryptology ePrint Archive 2006: 454 (2006) - 2005
- [c23]
- [c22]
- [c21]Melissa Chase, Alexander Healy, Anna Lysyanskaya, Tal Malkin, Leonid Reyzin:
Mercurial Commitments with Applications to Zero-Knowledge Sets. EUROCRYPT 2005: 422-439 - [c20]Susan Hohenberger, Anna Lysyanskaya:
How to Securely Outsource Cryptographic Computations. TCC 2005: 264-282 - [i9]Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya:
Compact E-Cash. IACR Cryptology ePrint Archive 2005: 60 (2005) - [i8]Anna Lysyanskaya, Maria Meyerovich:
Steganography with Imperfect Samplers. IACR Cryptology ePrint Archive 2005: 305 (2005) - 2004
- [c19]Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya:
ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption. ACM Conference on Computer and Communications Security 2004: 354-363 - [c18]Jan Camenisch, Anna Lysyanskaya:
Signature Schemes and Anonymous Credentials from Bilinear Maps. CRYPTO 2004: 56-72 - [c17]Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Hovav Shacham:
Sequential Aggregate Signatures from Trapdoor Permutations. EUROCRYPT 2004: 74-90 - [c16]Anna Lysyanskaya, Roberto Tamassia, Nikos Triandopoulos:
Multicast Authentication in Fully Adversarial Networks. IEEE Symposium on Security and Privacy 2004: 241- - [c15]Endre Bangerter, Jan Camenisch, Anna Lysyanskaya:
A Cryptographic Framework for the Controlled Release of Certified Data. Security Protocols Workshop 2004: 20-42 - [c14]Rosario Gennaro, Anna Lysyanskaya, Tal Malkin, Silvio Micali, Tal Rabin:
Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering. TCC 2004: 258-277 - [i7]Yehuda Lindell, Anna Lysyanskaya, Tal Rabin:
On the Composition of Authenticated Byzantine Agreement. IACR Cryptology ePrint Archive 2004: 181 (2004) - [i6]Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya:
ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption. IACR Cryptology ePrint Archive 2004: 212 (2004) - 2003
- [i5]Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Hovav Shacham:
Sequential Aggregate Signatures from Trapdoor Permutations. IACR Cryptology ePrint Archive 2003: 91 (2003) - 2002
- [b1]Anna Lysyanskaya:
Signature schemes and applications to cryptographic protocol design. Massachusetts Institute of Technology, Cambridge, MA, USA 2002 - [c13]Christian Cachin, Klaus Kursawe, Anna Lysyanskaya, Reto Strobl:
Asynchronous verifiable secret sharing and proactive cryptosystems. ACM Conference on Computer and Communications Security 2002: 88-97 - [c12]Jan Camenisch, Anna Lysyanskaya:
Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials. CRYPTO 2002: 61-76 - [c11]Anna Lysyanskaya:
Unique Signatures and Verifiable Random Functions from the DH-DDH Separation. CRYPTO 2002: 597-612 - [c10]Yehuda Lindell, Anna Lysyanskaya, Tal Rabin:
Sequential composition of protocols without simultaneous termination. PODC 2002: 203-212 - [c9]
- [c8]Yehuda Lindell, Anna Lysyanskaya, Tal Rabin:
On the composition of authenticated byzantine agreement. STOC 2002: 514-523 - [i4]Christian Cachin, Klaus Kursawe, Anna Lysyanskaya, Reto Strobl:
Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems. IACR Cryptology ePrint Archive 2002: 134 (2002) - 2001
- [c7]Anna Lysyanskaya, Chris Peikert:
Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes. ASIACRYPT 2001: 331-350 - [c6]Moses Liskov, Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Adam D. Smith:
Mutually Independent Commitments. ASIACRYPT 2001: 385-401 - [c5]Jan Camenisch, Anna Lysyanskaya:
An Identity Escrow Scheme with Appointed Verifiers. CRYPTO 2001: 388-407 - [c4]Jan Camenisch, Anna Lysyanskaya:
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. EUROCRYPT 2001: 93-118 - [i3]Jan Camenisch, Anna Lysyanskaya:
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. IACR Cryptology ePrint Archive 2001: 19 (2001) - [i2]Jan Camenisch, Anna Lysyanskaya:
Efficient Revocation of Anonymous Group Membership. IACR Cryptology ePrint Archive 2001: 113 (2001) - 2000
- [c3]Stanislaw Jarecki, Anna Lysyanskaya:
Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures. EUROCRYPT 2000: 221-242 - [i1]Anna Lysyanskaya:
Threshold Cryptography Secure Against the Adaptive Adversary, Concurrently. IACR Cryptology ePrint Archive 2000: 19 (2000)
1990 – 1999
- 1999
- [c2]Anna Lysyanskaya, Ronald L. Rivest, Amit Sahai, Stefan Wolf:
Pseudonym Systems. Selected Areas in Cryptography 1999: 184-199 - 1998
- [c1]Anna Lysyanskaya, Zulfikar Ramzan:
Group Blind Digital Signatures: A Scalable Solution to Electronic Cash. Financial Cryptography 1998: 184-197
Coauthor Index
last updated on 2018-11-15 21:12 CET by the dblp team
data released under the ODC-BY 1.0 license
see also: Terms of Use | Privacy Policy | Imprint