default search action
Anna Lysyanskaya
Person information
- affiliation: Brown University, Providence, RI, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Scott Griffy, Anna Lysyanskaya:
PACIFIC: Privacy-preserving automated contact tracing featuring integrity against cloning. IACR Commun. Cryptol. 1(2): 12 (2024) - [j8]Mihir Bellare, Anna Lysyanskaya:
Symmetric and Dual PRFs from Standard Assumptions: A Generic Validation of a Prevailing Assumption. J. Cryptol. 37(4): 33 (2024) - [i55]Victor Youdom Kemmoe, Anna Lysyanskaya:
RSA-Based Dynamic Accumulator without Hashing into Primes. IACR Cryptol. ePrint Arch. 2024: 505 (2024) - [i54]Scott Griffy, Markulf Kohlweiss, Anna Lysyanskaya, Meghna Sengupta:
Olympic Privacy-Preserving Blueprints: Faster Communication, Highly Functional, Stronger Security. IACR Cryptol. ePrint Arch. 2024: 675 (2024) - [i53]Megumi Ando, Anna Lysyanskaya, Eli Upfal:
Bruisable Onions: Anonymous Communication in the Asynchronous Model. IACR Cryptol. ePrint Arch. 2024: 885 (2024) - [i52]Scott Griffy, Anna Lysyanskaya, Omid Mir, Octavio Perez Kempner, Daniel Slamanig:
Delegatable Anonymous Credentials From Mercurial Signatures With Stronger Privacy. IACR Cryptol. ePrint Arch. 2024: 1216 (2024) - 2023
- [c63]Omid Mir, Balthazar Bauer, Scott Griffy, Anna Lysyanskaya, Daniel Slamanig:
Aggregate Signatures with Versatile Randomization and Issuer-Hiding Multi-Authority Anonymous Credentials. CCS 2023: 30-44 - [c62]Markulf Kohlweiss, Anna Lysyanskaya, An Nguyen:
Privacy-Preserving Blueprints. EUROCRYPT (2) 2023: 594-625 - [c61]Anna Lysyanskaya:
Security Analysis of RSA-BSSA. Public Key Cryptography (1) 2023: 251-280 - [e5]Helena Handschuh, Anna Lysyanskaya:
Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part I. Lecture Notes in Computer Science 14081, Springer 2023, ISBN 978-3-031-38556-8 [contents] - [e4]Helena Handschuh, Anna Lysyanskaya:
Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part II. Lecture Notes in Computer Science 14082, Springer 2023, ISBN 978-3-031-38544-5 [contents] - [e3]Helena Handschuh, Anna Lysyanskaya:
Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part III. Lecture Notes in Computer Science 14083, Springer 2023, ISBN 978-3-031-38547-6 [contents] - [e2]Helena Handschuh, Anna Lysyanskaya:
Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part IV. Lecture Notes in Computer Science 14084, Springer 2023, ISBN 978-3-031-38550-6 [contents] - [e1]Helena Handschuh, Anna Lysyanskaya:
Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part V. Lecture Notes in Computer Science 14085, Springer 2023, ISBN 978-3-031-38553-7 [contents] - [i51]Scott Griffy, Anna Lysyanskaya:
PACIFIC: Privacy-preserving automated contact tracing scheme featuring integrity against cloning. IACR Cryptol. ePrint Arch. 2023: 371 (2023) - [i50]Qiqi Lai, Feng-Hao Liu, Anna Lysyanskaya, Zhedong Wang:
Lattice-based Commit-Transferrable Signatures and Applications to Anonymous Credentials. IACR Cryptol. ePrint Arch. 2023: 766 (2023) - [i49]Omid Mir, Balthazar Bauer, Scott Griffy, Anna Lysyanskaya, Daniel Slamanig:
Aggregate Signatures with Versatile Randomization and Issuer-Hiding Multi-Authority Anonymous Credentials. IACR Cryptol. ePrint Arch. 2023: 1016 (2023) - 2022
- [c60]Rutchathon Chairattana-Apirom, Lucjan Hanzlik, Julian Loss, Anna Lysyanskaya, Benedikt Wagner:
PI-Cut-Choo and Friends: Compact Blind Signatures via Parallel Instance Cut-and-Choose and More. CRYPTO (3) 2022: 3-31 - [c59]Anna Lysyanskaya, Leah Namisa Rosenbloom:
Universally Composable $\varSigma $-protocols in the Global Random-Oracle Model. TCC (1) 2022: 203-233 - [c58]Megumi Ando, Miranda Christ, Anna Lysyanskaya, Tal Malkin:
Poly Onions: Achieving Anonymity in the Presence of Churn. TCC (2) 2022: 715-746 - [i48]Rutchathon Chairattana-Apirom, Anna Lysyanskaya:
Compact Cut-and-Choose: Boosting the Security of Blind Signature Schemes, Compactly. IACR Cryptol. ePrint Arch. 2022: 3 (2022) - [i47]Anna Lysyanskaya, Leah Namisa Rosenbloom:
Universally Composable Sigma-protocols in the Global Random-Oracle Model. IACR Cryptol. ePrint Arch. 2022: 290 (2022) - [i46]Megumi Ando, Miranda Christ, Anna Lysyanskaya, Tal Malkin:
Poly Onions: Achieving Anonymity in the Presence of Churn. IACR Cryptol. ePrint Arch. 2022: 392 (2022) - [i45]Anna Lysyanskaya:
Security Analysis of RSA-BSSA. IACR Cryptol. ePrint Arch. 2022: 895 (2022) - [i44]Anna Lysyanskaya, Leah Namisa Rosenbloom:
Efficient and Universally Composable Non-Interactive Zero-Knowledge Proofs of Knowledge with Security Against Adaptive Corruptions. IACR Cryptol. ePrint Arch. 2022: 1484 (2022) - [i43]Markulf Kohlweiss, Anna Lysyanskaya, An Nguyen:
Privacy-Preserving Blueprints. IACR Cryptol. ePrint Arch. 2022: 1536 (2022) - 2021
- [j7]Elizabeth C. Crites, Anna Lysyanskaya:
Mercurial Signatures for Variable-Length Messages. Proc. Priv. Enhancing Technol. 2021(4): 441-463 (2021) - [c57]Megumi Ando, Anna Lysyanskaya, Eli Upfal:
On the Complexity of Anonymous Communication Through Public Networks. ITC 2021: 9:1-9:25 - [c56]Megumi Ando, Anna Lysyanskaya:
Cryptographic Shallots: A Formal Treatment of Repliable Onion Encryption. TCC (3) 2021: 188-221 - [i42]Abhishek Singh, Ramesh Raskar, Anna Lysyanskaya:
Safepaths: Vaccine Diary Protocol and Decentralized Vaccine Coordination System using a Privacy Preserving User Centric Experience. CoRR abs/2103.01754 (2021) - 2020
- [j6]Dana Dachman-Soled, Nils Fleischhacker, Jonathan Katz, Anna Lysyanskaya, Dominique Schröder:
Feasibility and Infeasibility of Secure Computation with Malicious PUFs. J. Cryptol. 33(2): 595-617 (2020) - [i41]Megumi Ando, Anna Lysyanskaya:
Cryptographic Shallots: A Formal Treatment of Repliable Onion Encryption. IACR Cryptol. ePrint Arch. 2020: 215 (2020) - [i40]Ran Canetti, Yael Tauman Kalai, Anna Lysyanskaya, Ronald L. Rivest, Adi Shamir, Emily Shen, Ari Trachtenberg, Mayank Varia, Daniel J. Weitzner:
Privacy-Preserving Automated Exposure Notification. IACR Cryptol. ePrint Arch. 2020: 863 (2020) - [i39]Elizabeth C. Crites, Anna Lysyanskaya:
Mercurial Signatures for Variable-Length Messages. IACR Cryptol. ePrint Arch. 2020: 979 (2020)
2010 – 2019
- 2019
- [c55]Elizabeth C. Crites, Anna Lysyanskaya:
Delegatable Anonymous Credentials from Mercurial Signatures. CT-RSA 2019: 535-555 - [c54]Prabhanjan Ananth, Apoorvaa Deshpande, Yael Tauman Kalai, Anna Lysyanskaya:
Fully Homomorphic NIZK and NIWI Proofs. TCC (2) 2019: 356-385 - [i38]Megumi Ando, Anna Lysyanskaya, Eli Upfal:
On the Complexity of Anonymous Communication Through Public Networks. CoRR abs/1902.06306 (2019) - [i37]Jan Camenisch, Ralf Küsters, Anna Lysyanskaya, Alessandra Scafuro:
Practical Yet Composably Secure Cryptographic Protocols (Dagstuhl Seminar 19042). Dagstuhl Reports 9(1): 88-103 (2019) - [i36]Prabhanjan Ananth, Apoorvaa Deshpande, Yael Tauman Kalai, Anna Lysyanskaya:
Fully Homomorphic NIZK and NIWI Proofs. IACR Cryptol. ePrint Arch. 2019: 732 (2019) - 2018
- [c53]Megumi Ando, Anna Lysyanskaya, Eli Upfal:
Practical and Provably Secure Onion Routing. ICALP 2018: 144:1-144:14 - [i35]Elizabeth C. Crites, Anna Lysyanskaya:
Delegatable Anonymous Credentials from Mercurial Signatures. IACR Cryptol. ePrint Arch. 2018: 923 (2018) - 2017
- [c52]Foteini Baldimtsi, Jan Camenisch, Maria Dubovitskaya, Anna Lysyanskaya, Leonid Reyzin, Kai Samelin, Sophia Yakoubov:
Accumulators with Applications to Anonymity-Preserving Revocation. EuroS&P 2017: 301-315 - [i34]Megumi Ando, Anna Lysyanskaya, Eli Upfal:
Scalable and Provably Secure P2P Communication Protocols. CoRR abs/1706.05367 (2017) - [i33]Foteini Baldimtsi, Jan Camenisch, Maria Dubovitskaya, Anna Lysyanskaya, Leonid Reyzin, Kai Samelin, Sophia Yakoubov:
Accumulators with Applications to Anonymity-Preserving Revocation. IACR Cryptol. ePrint Arch. 2017: 43 (2017) - 2015
- [i32]Jan Camenisch, Anja Lehmann, Anna Lysyanskaya, Gregory Neven:
A Single Password for Everything? ERCIM News 2015(100) (2015) - [i31]Dana Dachman-Soled, Nils Fleischhacker, Jonathan Katz, Anna Lysyanskaya, Dominique Schröder:
Feasibility and Infeasibility of Secure Computation with Malicious PUFs. IACR Cryptol. ePrint Arch. 2015: 405 (2015) - [i30]Mihir Bellare, Anna Lysyanskaya:
Symmetric and Dual PRFs from Standard Assumptions: A Generic Validation of an HMAC Assumption. IACR Cryptol. ePrint Arch. 2015: 1198 (2015) - 2014
- [c51]Jan Camenisch, Anja Lehmann, Anna Lysyanskaya, Gregory Neven:
Memento: How to Reconstruct Your Secrets from a Single Password in a Hostile Environment. CRYPTO (2) 2014: 256-275 - [c50]Dana Dachman-Soled, Nils Fleischhacker, Jonathan Katz, Anna Lysyanskaya, Dominique Schröder:
Feasibility and Infeasibility of Secure Computation with Malicious PUFs. CRYPTO (2) 2014: 405-420 - [c49]Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn:
Malleable Signatures: New Definitions and Delegatable Anonymous Credentials. CSF 2014: 199-213 - [i29]Jan Camenisch, Anja Lehmann, Anna Lysyanskaya, Gregory Neven:
Memento: How to Reconstruct your Secrets from a Single Password in a Hostile Environment. IACR Cryptol. ePrint Arch. 2014: 429 (2014) - 2013
- [j5]Melissa Chase, Alexander Healy, Anna Lysyanskaya, Tal Malkin, Leonid Reyzin:
Mercurial Commitments with Applications to Zero-Knowledge Sets. J. Cryptol. 26(2): 251-279 (2013) - [c48]Foteini Baldimtsi, Anna Lysyanskaya:
On the Security of One-Witness Blind Signature Schemes. ASIACRYPT (2) 2013: 82-99 - [c47]Foteini Baldimtsi, Anna Lysyanskaya:
Anonymous credentials light. CCS 2013: 1087-1098 - [c46]Gesine Hinterwälder, Christian T. Zenger, Foteini Baldimtsi, Anna Lysyanskaya, Christof Paar, Wayne P. Burleson:
Efficient E-Cash in Practice: NFC-Based Payments for Public Transportation Systems. Privacy Enhancing Technologies 2013: 40-59 - [c45]Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn:
Verifiable Elections That Scale for Free. Public Key Cryptography 2013: 479-496 - [c44]Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn:
Succinct Malleable NIZKs and an Application to Compact Shuffles. TCC 2013: 100-119 - [i28]Mira Belenkiy, Melissa Chase, C. Christopher Erway, John Jannotti, Alptekin Küpçü, Anna Lysyanskaya:
Incentivizing Outsourced Computation. IACR Cryptol. ePrint Arch. 2013: 156 (2013) - [i27]Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn:
Malleable Signatures: Complex Unary Transformations and Delegatable Anonymous Credentials. IACR Cryptol. ePrint Arch. 2013: 179 (2013) - 2012
- [j4]Alptekin Küpçü, Anna Lysyanskaya:
Usable optimistic fair exchange. Comput. Networks 56(1): 50-63 (2012) - [c43]Jan Camenisch, Anna Lysyanskaya, Gregory Neven:
Practical yet universally composable two-server password-authenticated secret sharing. CCS 2012: 525-536 - [c42]Feng-Hao Liu, Anna Lysyanskaya:
Tamper and Leakage Resilience in the Split-State Model. CRYPTO 2012: 517-532 - [c41]Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn:
Malleable Proof Systems and Applications. EUROCRYPT 2012: 281-300 - [i26]Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn:
Malleable Proof Systems and Applications. IACR Cryptol. ePrint Arch. 2012: 12 (2012) - [i25]Foteini Baldimtsi, Anna Lysyanskaya:
On The Security of One-Witness Blind Signature Schemes. IACR Cryptol. ePrint Arch. 2012: 197 (2012) - [i24]Sarah Meiklejohn, C. Christopher Erway, Alptekin Küpçü, Theodora Hinkle, Anna Lysyanskaya:
ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash. IACR Cryptol. ePrint Arch. 2012: 226 (2012) - [i23]Feng-Hao Liu, Anna Lysyanskaya:
Tamper and Leakage Resilience in the Split-State Model. IACR Cryptol. ePrint Arch. 2012: 297 (2012) - [i22]Foteini Baldimtsi, Anna Lysyanskaya:
Anonymous Credentials Light. IACR Cryptol. ePrint Arch. 2012: 298 (2012) - [i21]Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn:
Succinct Malleable NIZKs and an Application to Compact Shuffles. IACR Cryptol. ePrint Arch. 2012: 506 (2012) - [i20]Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn:
Verifiable Elections That Scale for Free. IACR Cryptol. ePrint Arch. 2012: 697 (2012) - [i19]Jan Camenisch, Anna Lysyanskaya, Gregory Neven:
Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing. IACR Cryptol. ePrint Arch. 2012: 717 (2012) - 2011
- [i18]Marc Fischlin, Anna Lysyanskaya, Ueli Maurer, Alexander May:
Public-Key Cryptography (Dagstuhl Seminar 11391). Dagstuhl Reports 1(9): 76-94 (2011) - 2010
- [j3]Anna Lysyanskaya, Roberto Tamassia, Nikos Triandopoulos:
Authenticated error-correcting codes with applications to multicast authentication. ACM Trans. Inf. Syst. Secur. 13(2): 17:1-17:34 (2010) - [c40]Alptekin Küpçü, Anna Lysyanskaya:
Usable Optimistic Fair Exchange. CT-RSA 2010: 252-267 - [c39]Alptekin Küpçü, Anna Lysyanskaya:
Optimistic Fair Exchange with Multiple Arbiters. ESORICS 2010: 488-507 - [c38]Feng-Hao Liu, Anna Lysyanskaya:
Algorithmic Tamper-Proof Security under Probing Attacks. SCN 2010: 106-120 - [c37]Sarah Meiklejohn, C. Christopher Erway, Alptekin Küpçü, Theodora Hinkle, Anna Lysyanskaya:
ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash. USENIX Security Symposium 2010: 193-206 - [i17]Anna Lysyanskaya, Aaron Segal:
Rational Secret Sharing with Side Information in Point-to-Point Networks via Time-Delayed Encryption. IACR Cryptol. ePrint Arch. 2010: 540 (2010)
2000 – 2009
- 2009
- [c36]Mira Belenkiy, Jan Camenisch, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Hovav Shacham:
Randomizable Proofs and Delegatable Anonymous Credentials. CRYPTO 2009: 108-125 - [c35]Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya:
Compact E-Cash and Simulatable VRFs Revisited. Pairing 2009: 114-131 - [c34]Alptekin Küpçü, Anna Lysyanskaya:
Brief announcement: impossibility results for optimistic fair exchange with multiple autonomous arbiters. PODC 2009: 336-337 - [p1]Danfeng (Daphne) Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya:
Forward-Secure Hierarchical IBE with Applications to Broadcast Encryption. Identity-Based Cryptography 2009: 100-118 - [i16]Alptekin Küpçü, Anna Lysyanskaya:
Optimistic Fair Exchange with Multiple Arbiters. IACR Cryptol. ePrint Arch. 2009: 69 (2009) - [i15]Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya:
Compact E-Cash and Simulatable VRFs Revisited. IACR Cryptol. ePrint Arch. 2009: 107 (2009) - 2008
- [c33]Mira Belenkiy, Melissa Chase, C. Christopher Erway, John Jannotti, Alptekin Küpçü, Anna Lysyanskaya:
Incentivizing outsourced computation. NetEcon 2008: 85-90 - [c32]Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya:
P-signatures and Noninteractive Anonymous Credentials. TCC 2008: 356-374 - [i14]Mira Belenkiy, Jan Camenisch, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Hovav Shacham:
Delegatable Anonymous Credentials. IACR Cryptol. ePrint Arch. 2008: 428 (2008) - [i13]Alptekin Küpçü, Anna Lysyanskaya:
Usable Optimistic Fair Exchange. IACR Cryptol. ePrint Arch. 2008: 431 (2008) - 2007
- [j2]Anna Lysyanskaya:
Authentication without Identification. IEEE Secur. Priv. 5(3): 69-71 (2007) - [c31]Melissa Chase, Anna Lysyanskaya:
Simulatable VRFs with Applications to Multi-theorem NIZK. CRYPTO 2007: 303-322 - [c30]Jan Camenisch, Anna Lysyanskaya, Mira Meyerovich:
Endorsed E-Cash. S&P 2007: 101-115 - [c29]Mira Belenkiy, Melissa Chase, C. Christopher Erway, John Jannotti, Alptekin Küpçü, Anna Lysyanskaya, Eric Rachlin:
Making p2p accountable without losing privacy. WPES 2007: 31-40 - [i12]Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya:
Non-Interactive Anonymous Credentials. IACR Cryptol. ePrint Arch. 2007: 384 (2007) - 2006
- [j1]Yehuda Lindell, Anna Lysyanskaya, Tal Rabin:
On the composition of authenticated Byzantine Agreement. J. ACM 53(6): 881-917 (2006) - [c28]Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, Mira Meyerovich:
How to win the clonewars: efficient periodic n-times anonymous authentication. CCS 2006: 201-210 - [c27]Melissa Chase, Anna Lysyanskaya:
On Signatures of Knowledge. CRYPTO 2006: 78-96 - [c26]Anna Lysyanskaya, Nikos Triandopoulos:
Rationality and Adversarial Behavior in Multi-party Computation. CRYPTO 2006: 180-197 - [c25]Anna Lysyanskaya, Mira Meyerovich:
Provably Secure Steganography with Imperfect Sampling. Public Key Cryptography 2006: 123-139 - [c24]Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya:
Balancing Accountability and Privacy Using E-Cash (Extended Abstract). SCN 2006: 141-155 - [i11]Melissa Chase, Anna Lysyanskaya:
On Signatures of Knowledge. IACR Cryptol. ePrint Arch. 2006: 184 (2006) - [i10]Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, Mira Meyerovich:
How to Win the Clone Wars: Efficient Periodic n-Times Anonymous Authentication. IACR Cryptol. ePrint Arch. 2006: 454 (2006) - 2005
- [c23]Jan Camenisch, Anna Lysyanskaya:
A Formal Treatment of Onion Routing. CRYPTO 2005: 169-187 - [c22]Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya:
Compact E-Cash. EUROCRYPT 2005: 302-321 - [c21]Melissa Chase, Alexander Healy, Anna Lysyanskaya, Tal Malkin, Leonid Reyzin:
Mercurial Commitments with Applications to Zero-Knowledge Sets. EUROCRYPT 2005: 422-439 - [c20]Susan Hohenberger, Anna Lysyanskaya:
How to Securely Outsource Cryptographic Computations. TCC 2005: 264-282 - [i9]Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya:
Compact E-Cash. IACR Cryptol. ePrint Arch. 2005: 60 (2005) - [i8]Anna Lysyanskaya, Maria Meyerovich:
Steganography with Imperfect Samplers. IACR Cryptol. ePrint Arch. 2005: 305 (2005) - 2004
- [c19]Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya:
ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption. CCS 2004: 354-363 - [c18]Jan Camenisch, Anna Lysyanskaya:
Signature Schemes and Anonymous Credentials from Bilinear Maps. CRYPTO 2004: 56-72 - [c17]Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Hovav Shacham:
Sequential Aggregate Signatures from Trapdoor Permutations. EUROCRYPT 2004: 74-90 - [c16]Anna Lysyanskaya, Roberto Tamassia, Nikos Triandopoulos:
Multicast Authentication in Fully Adversarial Networks. S&P 2004: 241- - [c15]Endre Bangerter, Jan Camenisch, Anna Lysyanskaya:
A Cryptographic Framework for the Controlled Release of Certified Data. Security Protocols Workshop 2004: 20-42 - [c14]Rosario Gennaro, Anna Lysyanskaya, Tal Malkin, Silvio Micali, Tal Rabin:
Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering. TCC 2004: 258-277 - [i7]Yehuda Lindell, Anna Lysyanskaya, Tal Rabin:
On the Composition of Authenticated Byzantine Agreement. IACR Cryptol. ePrint Arch. 2004: 181 (2004) - [i6]Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya:
ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption. IACR Cryptol. ePrint Arch. 2004: 212 (2004) - 2003
- [i5]Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Hovav Shacham:
Sequential Aggregate Signatures from Trapdoor Permutations. IACR Cryptol. ePrint Arch. 2003: 91 (2003) - 2002
- [b1]Anna Lysyanskaya:
Signature schemes and applications to cryptographic protocol design. Massachusetts Institute of Technology, Cambridge, MA, USA, 2002 - [c13]Christian Cachin, Klaus Kursawe, Anna Lysyanskaya, Reto Strobl:
Asynchronous verifiable secret sharing and proactive cryptosystems. CCS 2002: 88-97 - [c12]Jan Camenisch, Anna Lysyanskaya:
Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials. CRYPTO 2002: 61-76 - [c11]Anna Lysyanskaya:
Unique Signatures and Verifiable Random Functions from the DH-DDH Separation. CRYPTO 2002: 597-612 - [c10]Yehuda Lindell, Anna Lysyanskaya, Tal Rabin:
Sequential composition of protocols without simultaneous termination. PODC 2002: 203-212 - [c9]Jan Camenisch, Anna Lysyanskaya:
A Signature Scheme with Efficient Protocols. SCN 2002: 268-289 - [c8]Yehuda Lindell, Anna Lysyanskaya, Tal Rabin:
On the composition of authenticated byzantine agreement. STOC 2002: 514-523 - [i4]Christian Cachin, Klaus Kursawe, Anna Lysyanskaya, Reto Strobl:
Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems. IACR Cryptol. ePrint Arch. 2002: 134 (2002) - 2001
- [c7]Anna Lysyanskaya, Chris Peikert:
Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes. ASIACRYPT 2001: 331-350 - [c6]Moses D. Liskov, Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Adam D. Smith:
Mutually Independent Commitments. ASIACRYPT 2001: 385-401 - [c5]Jan Camenisch, Anna Lysyanskaya:
An Identity Escrow Scheme with Appointed Verifiers. CRYPTO 2001: 388-407 - [c4]Jan Camenisch, Anna Lysyanskaya:
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. EUROCRYPT 2001: 93-118 - [i3]Jan Camenisch, Anna Lysyanskaya:
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. IACR Cryptol. ePrint Arch. 2001: 19 (2001) - [i2]Jan Camenisch, Anna Lysyanskaya:
Efficient Revocation of Anonymous Group Membership. IACR Cryptol. ePrint Arch. 2001: 113 (2001) - 2000
- [c3]Stanislaw Jarecki, Anna Lysyanskaya:
Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures. EUROCRYPT 2000: 221-242 - [i1]Anna Lysyanskaya:
Threshold Cryptography Secure Against the Adaptive Adversary, Concurrently. IACR Cryptol. ePrint Arch. 2000: 19 (2000)
1990 – 1999
- 1999
- [c2]Anna Lysyanskaya, Ronald L. Rivest, Amit Sahai, Stefan Wolf:
Pseudonym Systems. Selected Areas in Cryptography 1999: 184-199 - 1998
- [c1]Anna Lysyanskaya, Zulfikar Ramzan:
Group Blind Digital Signatures: A Scalable Solution to Electronic Cash. Financial Cryptography 1998: 184-197
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint