Attribute-based encryption for circuits S Gorbunov, V Vaikuntanathan, H Wee Journal of the ACM (JACM) 62 (6), 1-33, 2015 | 490 | 2015 |
Toward privacy in public databases S Chawla, C Dwork, F McSherry, A Smith, H Wee Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005 …, 2005 | 372 | 2005 |
On obfuscating point functions H Wee Proceedings of the thirty-seventh annual ACM symposium on Theory of …, 2005 | 325 | 2005 |
Functional encryption with bounded collusions via multi-party computation S Gorbunov, V Vaikuntanathan, H Wee Advances in Cryptology–CRYPTO 2012: 32nd Annual Cryptology Conference, Santa …, 2012 | 300 | 2012 |
On the security of the TLS protocol: A systematic analysis H Krawczyk, KG Paterson, H Wee Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013 | 254 | 2013 |
Predicate encryption for circuits from LWE S Gorbunov, V Vaikuntanathan, H Wee Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015 | 223 | 2015 |
Selfish caching in distributed systems: a game-theoretic analysis BG Chun, K Chaudhuri, H Wee, M Barreno, CH Papadimitriou, ... Proceedings of the twenty-third annual ACM symposium on Principles of …, 2004 | 211 | 2004 |
Fully,(almost) tightly secure IBE and dual system groups J Chen, H Wee Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013 | 209* | 2013 |
Improved dual system ABE in prime-order groups via predicate encodings J Chen, R Gay, H Wee Advances in Cryptology-EUROCRYPT 2015: 34th Annual International Conference …, 2015 | 199 | 2015 |
Functional encryption: New perspectives and lower bounds S Agrawal, S Gorbunov, V Vaikuntanathan, H Wee Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013 | 185 | 2013 |
Functional encryption for threshold functions (or fuzzy IBE) from lattices S Agrawal, X Boyen, V Vaikuntanathan, P Voulgaris, H Wee Public Key Cryptography–PKC 2012: 15th International Conference on Practice …, 2012 | 182* | 2012 |
Dual system encryption via predicate encodings H Wee Theory of Cryptography: 11th Theory of Cryptography Conference, TCC 2014 …, 2014 | 173 | 2014 |
Multi-input inner-product functional encryption from pairings M Abdalla, R Gay, M Raykova, H Wee Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017 | 130 | 2017 |
The OPTLS protocol and TLS 1.3 H Krawczyk, H Wee 2016 IEEE European Symposium on Security and Privacy (EuroS&P), 81-96, 2016 | 123 | 2016 |
Pebbling and proofs of work C Dwork, M Naor, H Wee Advances in Cryptology–CRYPTO 2005: 25th Annual International Cryptology …, 2005 | 122 | 2005 |
Black-box, round-efficient secure computation via non-malleability amplification H Wee 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, 531-540, 2010 | 119 | 2010 |
Quasi-adaptive NIZK for linear subspaces revisited E Kiltz, H Wee Advances in Cryptology-EUROCRYPT 2015: 34th Annual International Conference …, 2015 | 116 | 2015 |
Black-box constructions of two-party protocols from one-way functions R Pass, H Wee Theory of Cryptography: 6th Theory of Cryptography Conference, TCC 2009, San …, 2009 | 114 | 2009 |
Public key encryption against related key attacks H Wee Public Key Cryptography–PKC 2012: 15th International Conference on Practice …, 2012 | 109 | 2012 |
Tightly CCA-secure encryption without pairings R Gay, D Hofheinz, E Kiltz, H Wee Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016 | 101 | 2016 |