Follow
Jonathan Katz
Jonathan Katz
Professor of Computer Science, University of Maryland
Verified email at cs.umd.edu
Title
Cited by
Cited by
Year
Introduction to modern cryptography: Principles & protocols (Cryptography & network security series)
J KATZ, Y LINDELL
5030*2007
A pairwise key predistribution scheme for wireless sensor networks
W Du, J Deng, YS Han, PK Varshney, J Katz, A Khalili
ACM Transactions on Information and System Security (TISSEC) 8 (2), 228-258, 2005
25112005
Predicate encryption supporting disjunctions, polynomial eguations, and inner products
J Katz
Proc. EUROCRYPT 2008, l46-162, 2008
1616*2008
Predicate encryption supporting disjunctions, polynomial equations, and inner products
J Katz, A Sahai, B Waters
Advances in Cryptology–EUROCRYPT 2008, 146-162, 2008
14682008
Chosen-ciphertext security from identity-based encryption
R Canetti, S Halevi, J Katz
Advances in Cryptology-Eurocrypt 2004, 207-222, 2004
11312004
A forward-secure public-key encryption scheme
R Canetti, S Halevi, J Katz
Advances in Cryptology—Eurocrypt 2003, 646-646, 2003
10742003
Faster Secure Two-Party Computation Using Garbled Circuits
D Evans, L Malka, J Katz, Y Huang
8382011
Faster secure two-party computation using garbled circuits
Y Huang, D Evans, J Katz, L Malka
USENIX Security Symposium, 2011
8382011
All your queries are belong to us: The power of file-injection attacks on searchable encryption
Y Zhang, J Katz, C Papamanthou
25th {USENIX} Security Symposium ({USENIX} Security 16), 707-720, 2016
6052016
Efficient password-authenticated key exchange using human-memorable passwords
J Katz, R Ostrovsky, M Yung
Advances in Cryptology—EUROCRYPT 2001, 475-494, 2001
5892001
A watermark for large language models
J Kirchenbauer, J Geiping, Y Wen, J Katz, I Miers, T Goldstein
International Conference on Machine Learning, 17061-17084, 2023
5782023
Key-insulated public key cryptosystems
Y Dodis, J Katz, S Xu, M Yung
Advances in Cryptology—Eurocrypt 2002, 65-82, 2002
5652002
Scalable protocols for authenticated group key exchange
J Katz, M Yung
Advances in Cryptology-CRYPTO 2003, 110-125, 2003
5362003
Private set intersection: Are garbled circuits better than custom protocols?
Y Huang, D Evans, J Katz
NDSS, 2012
5142012
Proofs of storage from homomorphic identification protocols
G Ateniese, S Kamara, J Katz
Advances in Cryptology–ASIACRYPT 2009, 319-333, 2009
5112009
Toward Secure Key Distribution in Truly Ad Hoc Networks
A Khalili, J Katz, W Arbaugh
Proceedings of the IEEE Workshop on Security and Assurance in Ad hoc …, 2003
4972003
Multi-input functional encryption
S Goldwasser, SD Gordon, V Goyal, A Jain, J Katz, FH Liu, A Sahai, E Shi, ...
Advances in Cryptology–EUROCRYPT 2014, 578-602, 2014
4552014
Signing a linear subspace: Signature schemes for network coding
D Boneh, D Freeman, J Katz, B Waters
Public Key Cryptography–PKC 2009, 68-87, 2009
4492009
Chosen-ciphertext security from identity-based encryption
D Boneh, R Canetti, S Halevi, J Katz
SIAM Journal on Computing 36 (5), 1301-1328, 2007
4272007
Permacoin: Repurposing Bitcoin Work for Data Preservation
A Miller, A Juels, E Shi, B Parno, J Katz
426*
The system can't perform the operation now. Try again later.
Articles 1–20