Follow
Hoeteck Wee
Hoeteck Wee
Verified email at di.ens.fr
Title
Cited by
Cited by
Year
Attribute-based encryption for circuits
S Gorbunov, V Vaikuntanathan, H Wee
Journal of the ACM (JACM) 62 (6), 1-33, 2015
4902015
Toward privacy in public databases
S Chawla, C Dwork, F McSherry, A Smith, H Wee
Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005 …, 2005
3722005
On obfuscating point functions
H Wee
Proceedings of the thirty-seventh annual ACM symposium on Theory of …, 2005
3252005
Functional encryption with bounded collusions via multi-party computation
S Gorbunov, V Vaikuntanathan, H Wee
Advances in Cryptology–CRYPTO 2012: 32nd Annual Cryptology Conference, Santa …, 2012
3002012
On the security of the TLS protocol: A systematic analysis
H Krawczyk, KG Paterson, H Wee
Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013
2542013
Predicate encryption for circuits from LWE
S Gorbunov, V Vaikuntanathan, H Wee
Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015
2232015
Selfish caching in distributed systems: a game-theoretic analysis
BG Chun, K Chaudhuri, H Wee, M Barreno, CH Papadimitriou, ...
Proceedings of the twenty-third annual ACM symposium on Principles of …, 2004
2112004
Fully,(almost) tightly secure IBE and dual system groups
J Chen, H Wee
Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013
209*2013
Improved dual system ABE in prime-order groups via predicate encodings
J Chen, R Gay, H Wee
Advances in Cryptology-EUROCRYPT 2015: 34th Annual International Conference …, 2015
1992015
Functional encryption: New perspectives and lower bounds
S Agrawal, S Gorbunov, V Vaikuntanathan, H Wee
Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013
1852013
Functional encryption for threshold functions (or fuzzy IBE) from lattices
S Agrawal, X Boyen, V Vaikuntanathan, P Voulgaris, H Wee
Public Key Cryptography–PKC 2012: 15th International Conference on Practice …, 2012
182*2012
Dual system encryption via predicate encodings
H Wee
Theory of Cryptography: 11th Theory of Cryptography Conference, TCC 2014 …, 2014
1732014
Multi-input inner-product functional encryption from pairings
M Abdalla, R Gay, M Raykova, H Wee
Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017
1302017
The OPTLS protocol and TLS 1.3
H Krawczyk, H Wee
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 81-96, 2016
1232016
Pebbling and proofs of work
C Dwork, M Naor, H Wee
Advances in Cryptology–CRYPTO 2005: 25th Annual International Cryptology …, 2005
1222005
Black-box, round-efficient secure computation via non-malleability amplification
H Wee
2010 IEEE 51st Annual Symposium on Foundations of Computer Science, 531-540, 2010
1192010
Quasi-adaptive NIZK for linear subspaces revisited
E Kiltz, H Wee
Advances in Cryptology-EUROCRYPT 2015: 34th Annual International Conference …, 2015
1162015
Black-box constructions of two-party protocols from one-way functions
R Pass, H Wee
Theory of Cryptography: 6th Theory of Cryptography Conference, TCC 2009, San …, 2009
1142009
Public key encryption against related key attacks
H Wee
Public Key Cryptography–PKC 2012: 15th International Conference on Practice …, 2012
1092012
Tightly CCA-secure encryption without pairings
R Gay, D Hofheinz, E Kiltz, H Wee
Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016
1012016
The system can't perform the operation now. Try again later.
Articles 1–20