Volgen
Hoeteck Wee
Hoeteck Wee
Geverifieerd e-mailadres voor di.ens.fr
Titel
Geciteerd door
Geciteerd door
Jaar
Attribute-based encryption for circuits
S Gorbunov, V Vaikuntanathan, H Wee
Journal of the ACM (JACM) 62 (6), 1-33, 2015
5742015
Toward privacy in public databases
S Chawla, C Dwork, F McSherry, A Smith, H Wee
Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005 …, 2005
3902005
Functional encryption with bounded collusions via multi-party computation
S Gorbunov, V Vaikuntanathan, H Wee
Advances in Cryptology–CRYPTO 2012: 32nd Annual Cryptology Conference, Santa …, 2012
3422012
On obfuscating point functions
H Wee
Proceedings of the thirty-seventh annual ACM symposium on Theory of …, 2005
3412005
On the security of the TLS protocol: A systematic analysis
H Krawczyk, KG Paterson, H Wee
Annual Cryptology Conference, 429-448, 2013
2832013
Predicate encryption for circuits from LWE
S Gorbunov, V Vaikuntanathan, H Wee
Annual Cryptology Conference, 503-523, 2015
2792015
Improved dual system ABE in prime-order groups via predicate encodings
J Chen, R Gay, H Wee
Annual International Conference on the Theory and Applications of …, 2015
2482015
Fully,(almost) tightly secure IBE and dual system groups
J Chen, H Wee
Annual Cryptology Conference, 435-460, 2013
239*2013
Functional encryption for threshold functions (or fuzzy IBE) from lattices
S Agrawal, X Boyen, V Vaikuntanathan, P Voulgaris, H Wee
Public Key Cryptography–PKC 2012: 15th International Conference on Practice …, 2012
219*2012
Selfish caching in distributed systems: a game-theoretic analysis
BG Chun, K Chaudhuri, H Wee, M Barreno, CH Papadimitriou, ...
Proceedings of the twenty-third annual ACM symposium on Principles of …, 2004
2192004
Functional encryption: New perspectives and lower bounds
S Agrawal, S Gorbunov, V Vaikuntanathan, H Wee
Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013
2042013
Dual system encryption via predicate encodings
H Wee
Theory of Cryptography Conference, 616-637, 2014
2022014
Multi-input inner-product functional encryption from pairings
M Abdalla, R Gay, M Raykova, H Wee
Annual International Conference on the Theory and Applications of …, 2017
1702017
Quasi-adaptive NIZK for linear subspaces revisited
E Kiltz, H Wee
Annual International Conference on the Theory and Applications of …, 2015
1402015
The OPTLS protocol and TLS 1.3
H Krawczyk, H Wee
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 81-96, 2016
1382016
Pebbling and proofs of work
C Dwork, M Naor, H Wee
Advances in Cryptology–CRYPTO 2005: 25th Annual International Cryptology …, 2005
1382005
Black-box, round-efficient secure computation via non-malleability amplification
H Wee
2010 IEEE 51st Annual Symposium on Foundations of Computer Science, 531-540, 2010
1272010
Black-box constructions of two-party protocols from one-way functions
R Pass, H Wee
Theory of Cryptography: 6th Theory of Cryptography Conference, TCC 2009, San …, 2009
1252009
Tightly CCA-secure encryption without pairings
R Gay, D Hofheinz, E Kiltz, H Wee
Annual International Conference on the Theory and Applications of …, 2016
1212016
Shorter IBE and signatures via asymmetric pairings
J Chen, HW Lim, S Ling, H Wang, H Wee
Pairing-Based Cryptography–Pairing 2012, 122-140, 2012
111*2012
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20