Attribute-based encryption for circuits S Gorbunov, V Vaikuntanathan, H Wee Journal of the ACM (JACM) 62 (6), 1-33, 2015 | 461 | 2015 |
Toward privacy in public databases S Chawla, C Dwork, F McSherry, A Smith, H Wee Theory of Cryptography Conference, 363-385, 2005 | 362 | 2005 |
On obfuscating point functions H Wee Proceedings of the thirty-seventh annual ACM symposium on Theory of …, 2005 | 319 | 2005 |
Functional encryption with bounded collusions via multi-party computation S Gorbunov, V Vaikuntanathan, H Wee Annual Cryptology Conference, 162-179, 2012 | 281 | 2012 |
On the security of the TLS protocol: A systematic analysis H Krawczyk, KG Paterson, H Wee Annual Cryptology Conference, 429-448, 2013 | 244 | 2013 |
Selfish caching in distributed systems: a game-theoretic analysis BG Chun, K Chaudhuri, H Wee, M Barreno, CH Papadimitriou, ... Proceedings of the twenty-third annual ACM symposium on Principles of …, 2004 | 211 | 2004 |
Fully,(almost) tightly secure IBE and dual system groups J Chen, H Wee Annual Cryptology Conference, 435-460, 2013 | 203* | 2013 |
Predicate encryption for circuits from LWE S Gorbunov, V Vaikuntanathan, H Wee Annual Cryptology Conference, 503-523, 2015 | 202 | 2015 |
Functional encryption: New perspectives and lower bounds S Agrawal, S Gorbunov, V Vaikuntanathan, H Wee Annual Cryptology Conference, 500-518, 2013 | 178 | 2013 |
Improved dual system ABE in prime-order groups via predicate encodings J Chen, R Gay, H Wee Annual International Conference on the Theory and Applications of …, 2015 | 174 | 2015 |
Functional encryption for threshold functions (or fuzzy IBE) from lattices S Agrawal, X Boyen, V Vaikuntanathan, P Voulgaris, H Wee International Workshop on Public Key Cryptography, 280-297, 2012 | 174* | 2012 |
Dual system encryption via predicate encodings H Wee Theory of Cryptography Conference, 616-637, 2014 | 162 | 2014 |
Pebbling and proofs of work C Dwork, M Naor, H Wee Annual International Cryptology Conference, 37-54, 2005 | 119 | 2005 |
Quasi-adaptive NIZK for linear subspaces revisited E Kiltz, H Wee Annual International Conference on the Theory and Applications of …, 2015 | 113 | 2015 |
Black-box, round-efficient secure computation via non-malleability amplification H Wee 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, 531-540, 2010 | 113 | 2010 |
Multi-input inner-product functional encryption from pairings M Abdalla, R Gay, M Raykova, H Wee Annual International Conference on the Theory and Applications of …, 2017 | 111 | 2017 |
The OPTLS protocol and TLS 1.3 H Krawczyk, H Wee 2016 IEEE European Symposium on Security and Privacy (EuroS&P), 81-96, 2016 | 110 | 2016 |
Black-box constructions of two-party protocols from one-way functions R Pass, H Wee Theory of Cryptography Conference, 403-418, 2009 | 109 | 2009 |
Public key encryption against related key attacks H Wee International Workshop on Public Key Cryptography, 262-279, 2012 | 103 | 2012 |
Tightly CCA-secure encryption without pairings R Gay, D Hofheinz, E Kiltz, H Wee Annual International Conference on the Theory and Applications of …, 2016 | 90 | 2016 |