Anna Lysyanskaya
Anna Lysyanskaya
Professor of Computer Science, Brown University
Verified email at cs.brown.edu - Homepage
Title
Cited by
Cited by
Year
An efficient system for non-transferable anonymous credentials with optional anonymity revocation
J Camenisch, A Lysyanskaya
International conference on the theory and applications of cryptographic …, 2001
13912001
Signature schemes and anonymous credentials from bilinear maps
J Camenisch, A Lysyanskaya
Annual International Cryptology Conference, 56-72, 2004
9682004
Dynamic accumulators and application to efficient revocation of anonymous credentials
J Camenisch, A Lysyanskaya
Annual International Cryptology Conference, 61-76, 2002
8602002
A signature scheme with efficient protocols
J Camenisch, A Lysyanskaya
International Conference on Security in Communication Networks, 268-289, 2002
8042002
Pseudonym systems
A Lysyanskaya, RL Rivest, A Sahai, S Wolf
International Workshop on Selected Areas in Cryptography, 184-199, 1999
6151999
Compact e-cash
J Camenisch, S Hohenberger, A Lysyanskaya
Annual International Conference on the Theory and Applications of …, 2005
4792005
How to securely outsource cryptographic computations
S Hohenberger, A Lysyanskaya
Theory of Cryptography Conference, 264-282, 2005
3732005
Sequential aggregate signatures from trapdoor permutations
A Lysyanskaya, S Micali, L Reyzin, H Shacham
International Conference on the Theory and Applications of Cryptographic …, 2004
3522004
Group blind digital signatures: A scalable solution to electronic cash
A Lysyanskaya, Z Ramzan
International Conference on Financial Cryptography, 184-197, 1998
2991998
Randomizable proofs and delegatable anonymous credentials
M Belenkiy, J Camenisch, M Chase, M Kohlweiss, A Lysyanskaya, ...
Annual International Cryptology Conference, 108-125, 2009
2852009
How to win the clonewars: efficient periodic n-times anonymous authentication
J Camenisch, S Hohenberger, M Kohlweiss, A Lysyanskaya, ...
Proceedings of the 13th ACM conference on Computer and communications …, 2006
2732006
P-signatures and noninteractive anonymous credentials
M Belenkiy, M Chase, M Kohlweiss, A Lysyanskaya
Theory of Cryptography Conference, 356-374, 2008
2292008
Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering
R Gennaro, A Lysyanskaya, T Malkin, S Micali, T Rabin
Theory of Cryptography Conference, 258-277, 2004
2112004
Asynchronous verifiable secret sharing and proactive cryptosystems
C Cachin, K Kursawe, A Lysyanskaya, R Strobl
Proceedings of the 9th ACM Conference on Computer and Communications …, 2002
1942002
Unique signatures and verifiable random functions from the DH-DDH separation
A Lysyanskaya
Annual International Cryptology Conference, 597-612, 2002
1922002
ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption
D Yao, N Fazio, Y Dodis, A Lysyanskaya
Proceedings of the 11th ACM conference on Computer and communications …, 2004
1742004
A formal treatment of onion routing
J Camenisch, A Lysyanskaya
Annual International Cryptology Conference, 169-187, 2005
1732005
Rationality and adversarial behavior in multi-party computation
A Lysyanskaya, N Triandopoulos
Annual International Cryptology Conference, 180-197, 2006
1632006
On signatures of knowledge
M Chase, A Lysyanskaya
Annual International Cryptology Conference, 78-96, 2006
1572006
Adaptively secure threshold cryptography: Introducing concurrency, removing erasures
S Jarecki, A Lysyanskaya
International Conference on the Theory and Applications of Cryptographic …, 2000
1342000
The system can't perform the operation now. Try again later.
Articles 1–20