Leonid Reyzin
Leonid Reyzin
Professor of Computer Science, Boston University
Verified email at - Homepage
Cited by
Cited by
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
Y Dodis, L Reyzin, A Smith
Advances In Cryptology-EUROCRYPT 2004: International Conference On The …, 2004
Physically observable cryptography
S Micali, L Reyzin
Theory of Cryptography: First Theory of Cryptography Conference, TCC 2004 …, 2004
Dynamic authenticated index structures for outsourced databases
F Li, M Hadjieleftheriou, G Kollios, L Reyzin
Proceedings of the 2006 ACM SIGMOD international conference on Management of …, 2006
Sequential aggregate signatures from trapdoor permutations
A Lysyanskaya, S Micali, L Reyzin, H Shacham
Advances in Cryptology-EUROCRYPT 2004: International Conference on the …, 2004
Better than BiBa: Short one-time signatures with fast signing and verifying
L Reyzin, N Reyzin
Australasian Conference on Information Security and Privacy, 144-153, 2002
Accountable-subgroup multisignatures
S Micali, K Ohta, L Reyzin
Proceedings of the 8th ACM Conference on Computer and Communications …, 2001
Forward-secure signatures with optimal signing and verifying
G Itkis, L Reyzin
Advances in Cryptology—CRYPTO 2001: 21st Annual International Cryptology …, 2001
A new forward-secure digital signature scheme
M Abdalla, L Reyzin
Advances in Cryptology—ASIACRYPT 2000: 6th International Conference on the …, 2000
Robust fuzzy extractors and authenticated key agreement from close secrets
Y Dodis, J Katz, L Reyzin, A Smith
Advances in Cryptology-CRYPTO 2006: 26th Annual International Cryptology …, 2006
Physical access control
S Micali, D Engberg, P Libin, L Reyzin, A Sinelnikov
US Patent 7,353,396, 2008
SiBIR: Signer-base intrusion-resilient signatures
G Itkis, L Reyzin
Advances in Cryptology—CRYPTO 2002: 22nd Annual International Cryptology …, 2002
Protecting circuits from leakage: the computationally-bounded and noisy cases
S Faust, T Rabin, L Reyzin, E Tromer, V Vaikuntanathan
Advances in Cryptology–EUROCRYPT 2010: 29th Annual International Conference …, 2010
Breaking and repairing optimistic fair exchange from PODC 2003
Y Dodis, L Reyzin
Proceedings of the 3rd ACM workshop on Digital rights management, 47-54, 2003
Forward-secure signatures with fast key update
A Kozlov, L Reyzin
Security in Communication Networks: Third International Conference, SCN 2002 …, 2003
Reusable fuzzy extractors for low-entropy distributions
R Canetti, B Fuller, O Paneth, L Reyzin, A Smith
Journal of Cryptology 34, 1-33, 2021
Soundness in the public-key model
S Micali, L Reyzin
Advances in Cryptology—CRYPTO 2001: 21st Annual International Cryptology …, 2001
Authenticated index structures for aggregation queries
F Li, M Hadjieleftheriou, G Kollios, L Reyzin
ACM Transactions on Information and System Security (TISSEC) 13 (4), 1-35, 2010
Computational fuzzy extractors
B Fuller, X Meng, L Reyzin
Information and Computation 275, 104602, 2020
Conditional computational entropy, or toward separating pseudoentropy from compressibility
CY Hsiao, CJ Lu, L Reyzin
Advances in Cryptology-EUROCRYPT 2007: 26th Annual International Conference …, 2007
Can a public blockchain keep a secret?
F Benhamouda, C Gentry, S Gorbunov, S Halevi, H Krawczyk, C Lin, ...
Theory of Cryptography: 18th International Conference, TCC 2020, Durham, NC …, 2020
The system can't perform the operation now. Try again later.
Articles 1–20