Ran Canetti
Ran Canetti
Professor of Computer Science, Boston University and Tel Aviv University
Verified email at tau.ac.il
TitleCited byYear
HMAC: Keyed-hashing for message authentication
H Krawczyk, R Canetti, M Bellare
29661997
Universally Composable Security: A New Paradigm for Cryptographic Protocols
R Canetti
26282000
Keying hash functions for message authentication
M Bellare, R Canetti, H Krawczyk
Annual international cryptology conference, 1-15, 1996
20661996
The random oracle methodology, revisited
R Canetti, O Goldreich, S Halevi
Journal of the ACM (JACM) 51 (4), 557-594, 2004
18742004
Analysis of key-exchange protocols and their use for building secure channels
R Canetti, H Krawczyk
International Conference on the Theory and Applications of Cryptographic …, 2001
13872001
Efficient authentication and signing of multicast streams over lossy channels
A Perrig, R Canetti, JD Tygar, D Song
Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 56-73, 2000
12472000
Security and composition of multiparty cryptographic protocols
R Canetti
Journal of CRYPTOLOGY 13 (1), 143-202, 2000
11442000
The TESLA broadcast authentication protocol
A Perrig, R Canetti, JD Tygar, D Song
Rsa Cryptobytes 5 (2), 2-13, 2002
11052002
Multicast security: A taxonomy and some efficient constructions
R Canetti, J Garay, G Itkis, D Micciancio, M Naor, B Pinkas
IEEE INFOCOM'99. Conference on Computer Communications. Proceedings …, 1999
10391999
Chosen-ciphertext security from identity-based encryption
R Canetti, S Halevi, J Katz
International Conference on the Theory and Applications of Cryptographic …, 2004
9022004
Efficient and secure source authentication for multicast
A Perrig, R Canetti, D Song, JD Tygar
Network and Distributed System Security Symposium, NDSS 1 (2001), 35-46, 2001
8922001
A forward-secure public-key encryption scheme
R Canetti, S Halevi, J Katz
International Conference on the Theory and Applications of Cryptographic …, 2003
8292003
Universally composable two-party and multi-party secure computation
R Canetti, Y Lindell, R Ostrovsky, R Ostrovsky, A Sahai
Proceedings of the thiry-fourth annual ACM symposium on Theory of computing …, 2002
6962002
A modular approach to the design and analysis of authentication and key exchange protocols
M Bellare, R Canetti, H Krawczyk
STOC 98 (50), 419-428, 1998
6661998
Universally composable commitments
R Canetti, M Fischlin
Annual International Cryptology Conference, 19-40, 2001
5962001
Chosen-ciphertext secure proxy re-encryption
R Canetti, S Hohenberger
Proceedings of the 14th ACM conference on Computer and communications …, 2007
5362007
Adaptively secure multi-party computation
R Canetti, U Friege, O Goldreich, M Naor
Massachusetts Institute of Technology, 1996
4981996
Deniable encryption
R Canetti, C Dwork, M Naor, R Ostrovsky
Annual International Cryptology Conference, 90-104, 1997
4131997
Towards realizing random oracles: Hash functions that hide all partial information
R Canetti
Annual International Cryptology Conference, 455-469, 1997
4061997
Universally composable notions of key exchange and secure channels
R Canetti, H Krawczyk
International Conference on the Theory and Applications of Cryptographic …, 2002
4052002
The system can't perform the operation now. Try again later.
Articles 1–20