Publications

Search
Export 481 results:
[ Author(Desc)] Title Type Year
Filters: First Letter Of Last Name is K  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
K
Katz J, Myers S, Ostrovsky R.  2001.  Cryptographic counters and applications to electronic voting. Advances in Cryptology—Eurocrypt 2001. :78-92.
Katz J.  2007.  On achieving the "best of both worlds" in secure multiparty computation. Proceedings of the thirty-ninth annual ACM symposium on Theory of computing. :11-20.
Katz J.  2012.  Review of efficient secure two-party protocols: techniques and constructions by Carmit Hazay and Yehuda Lindell. SIGACT News. 43(1):21-23.
Katz J, Koo C-Y, Kumaresan R.  2009.  Improving the round complexity of VSS in point-to-point networks. Information and Computation. 207(8):889-899.
Katz B, Jimmy Lin.  2000.  REXTOR: a system for generating relations from natural language. Proceedings of the ACL-2000 workshop on Recent advances in natural language processing and information retrieval: held in conjunction with the 38th Annual Meeting of the Association for Computational Linguistics - Volume 11. :67-77.
Katz J, Yung M.  2007.  Applied cryptography and network security: 5th international conference, ACNS 2007, Zhuhai, China, June 5-8, 2007: proceedings. 4521
Katz J, Yung M.  2007.  Scalable protocols for authenticated group key exchange. Journal of Cryptology. 20(1):85-113.
Katz J, Vaikuntanathan V.  2009.  Smooth projective hashing and password-based authenticated key exchange from lattices. Advances in Cryptology–ASIACRYPT 2009. :636-652.
Katz J.  2003.  Efficient and non-malleable proofs of plaintext knowledge and applications. Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques. :211-228.
Katz J, Koo CY, Kumaresan R.  2008.  Improving the round complexity of vss in point-to-point networks. Automata, Languages and Programming. :499-510.
Katz B, Jimmy Lin, Felshin S.  2002.  The START multimedia information system: Current technology and future directions. In Proceedings of the International Workshop on Multimedia Information Systems (MIS 2002).
Katz J, Ostrovsky R, Rabin M.  2005.  Identity-based zero-knowledge. Security in Communication Networks. :180-192.
Katz J, Lindell A.  2008.  Aggregate message authentication codes. Topics in Cryptology–CT-RSA 2008. :155-169.
Katz J.  2012.  Which Languages Have 4-Round Zero-Knowledge Proofs? Journal of cryptology. 25(1):41-56.
Katz J, Yung M.  2003.  Scalable protocols for authenticated group key exchange. Advances in Cryptology-CRYPTO 2003. :110-125.
Katz J.  1989.  Rational Common Ground in the Sociology of Knowledge. Philosophy of the social sciences. 19(3):257-271.
Katz J, Yung M.  2002.  Threshold cryptosystems based on factoring. Advances in Cryptology—ASIACRYPT 2002. :139-147.
Katz J, Sahai A, Waters B.  2008.  Predicate encryption supporting disjunctions, polynomial equations, and inner products. Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology. :146-162.
Katz J.  2007.  Review of "Probability and Computing: Randomized Algorithms and Probabilitic Analysis by Michael Mitzenmacher and Eli Upfal", Cambridge University Press, 2005. SIGACT News. 38(3):20-22.
Katz J, Smith A.  2006.  Analyzing the HB and HB+ protocols in the “large error” case. IACR ePrint report. 326:2006-2006.
Katz B, Jimmy Lin.  2002.  Annotating the semantic web using natural language. Proceedings of the 2nd workshop on NLP and XML - Volume 17. :1-8.
Katz J, Maurer U, Tackmann B, Zikas V.  2011.  Universally composable synchronous computation.
Katz J, Yung M.  2006.  Characterization of security notions for probabilistic private-key encryption. Journal of Cryptology. 19(1):67-95.
Katz J, Vaikuntanathan V.  2009.  Signature schemes with bounded leakage resilience. Advances in Cryptology–ASIACRYPT 2009. :703-720.
Katz J, Malka L.  2010.  Secure text processing with applications to private DNA matching. Proceedings of the 17th ACM conference on Computer and communications security. :485-492.

Pages