Follow
Leonid Reyzin
Leonid Reyzin
Professor of Computer Science, Boston University
Verified email at cs.bu.edu - Homepage
Title
Cited by
Cited by
Year
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
Y Dodis, L Reyzin, A Smith
Advances in Cryptology-EUROCRYPT 2004: International Conference on the …, 2004
3938*2004
Physically observable cryptography
S Micali, L Reyzin
TCC 2951, 278-296, 2004
6142004
Dynamic authenticated index structures for outsourced databases
F Li, M Hadjieleftheriou, G Kollios, L Reyzin
Proceedings of the 2006 ACM SIGMOD international conference on Management of …, 2006
5542006
Sequential aggregate signatures from trapdoor permutations
A Lysyanskaya, S Micali, L Reyzin, H Shacham
Advances in Cryptology-EUROCRYPT 2004: International Conference on the …, 2004
4252004
Better than BiBa: Short one-time signatures with fast signing and verifying
L Reyzin, N Reyzin
Information Security and Privacy: 7th Australasian Conference, ACISP 2002 …, 2002
4242002
Forward-secure signatures with optimal signing and verifying
G Itkis, L Reyzin
Advances in Cryptology—CRYPTO 2001: 21st Annual International Cryptology …, 2001
3822001
A new forward-secure digital signature scheme
M Abdalla, L Reyzin
Advances in Cryptology—ASIACRYPT 2000: 6th International Conference on the …, 2000
3762000
Accountable-subgroup multisignatures
S Micali, K Ohta, L Reyzin
Proceedings of the 8th ACM Conference on Computer and Communications …, 2001
3702001
Physical access control
S Micali, D Engberg, P Libin, L Reyzin, A Sinelnikov
US Patent 7,353,396, 2008
2302008
Robust fuzzy extractors and authenticated key agreement from close secrets
Y Dodis, J Katz, L Reyzin, A Smith
CRYPTO 4117, 232-250, 2006
2272006
SiBIR: Signer-base intrusion-resilient signatures
G Itkis, L Reyzin
Cryptology ePrint Archive, 2002
1962002
Breaking and repairing optimistic fair exchange from PODC 2003
Y Dodis, L Reyzin
Proceedings of the 3rd ACM workshop on Digital rights management, 47-54, 2003
1792003
Forward-secure signatures with fast key update
A Kozlov, L Reyzin
Security in Communication Networks: Third International Conference, SCN 2002 …, 2003
1772003
Protecting circuits from leakage: the computationally-bounded and noisy cases
S Faust, T Rabin, L Reyzin, E Tromer, V Vaikuntanathan
Advances in Cryptology–EUROCRYPT 2010: 29th Annual International Conference …, 2010
1652010
Reusable fuzzy extractors for low-entropy distributions
R Canetti, B Fuller, O Paneth, L Reyzin, A Smith
Journal of Cryptology 34, 1-33, 2021
1272021
Soundness in the public-key model
S Micali, L Reyzin
Advances in Cryptology—CRYPTO 2001: 21st Annual International Cryptology …, 2001
1222001
Authenticated index structures for aggregation queries
F Li, M Hadjieleftheriou, G Kollios, L Reyzin
ACM Transactions on Information and System Security (TISSEC) 13 (4), 1-35, 2010
1182010
Conditional computational entropy, or toward separating pseudoentropy from compressibility
CY Hsiao, CJ Lu, L Reyzin
Advances in Cryptology-EUROCRYPT 2007: 26th Annual International Conference …, 2007
1082007
Computational fuzzy extractors
B Fuller, X Meng, L Reyzin
Information and Computation 275, 104602, 2020
1042020
Finding collisions on a public road, or do secure hash functions need secret coins?
CY Hsiao, L Reyzin
CRYPTO 4, 92-105, 2004
1042004
The system can't perform the operation now. Try again later.
Articles 1–20