Follow
Rafail Ostrovsky
Rafail Ostrovsky
Norman E. Friedman Distinguished Professor of Computer Science and Mathematics
Verified email at cs.ucla.edu - Homepage
Title
Cited by
Cited by
Year
Public key encryption with keyword search
D Boneh, G Di Crescenzo, R Ostrovsky, G Persiano
Advances in Cryptology-EUROCRYPT 2004: International Conference on the …, 2004
39562004
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
Y Dodis, R Ostrovsky, L Reyzin, A Smith
SIAM journal on computing 38 (1), 97-139, 2008
3882*2008
Searchable symmetric encryption: improved definitions and efficient constructions
R Curtmola, J Garay, S Kamara, R Ostrovsky
Proceedings of the 13th ACM conference on Computer and communications …, 2006
30802006
Software protection and simulation on oblivious RAMs
O Goldreich, R Ostrovsky
Journal of the ACM (JACM) 43 (3), 431-473, 1996
19381996
Attribute-based encryption with non-monotonic access structures
R Ostrovsky, A Sahai, B Waters
Proceedings of the 14th ACM conference on Computer and communications …, 2007
14812007
Replication is not needed: Single database, computationally-private information retrieval
E Kushilevitz, R Ostrovsky
Proceedings 38th annual symposium on foundations of computer science, 364-373, 1997
12431997
Universally composable two-party and multi-party secure computation
R Canetti, Y Lindell, R Ostrovsky, A Sahai
Proceedings of the thiry-fourth annual ACM symposium on Theory of computing …, 2002
8892002
How to withstand mobile virus attacks
R Ostrovsky, M Yung
Proceedings of the tenth annual ACM symposium on Principles of distributed …, 1991
7541991
Efficient search for approximate nearest neighbor in high dimensional spaces
E Kushilevitz, R Ostrovsky, Y Rabani
SIAM Journal on Computing 30 (2), 457-474, 2000
7012000
The effectiveness of lloyd-type methods for the k-means problem
R Ostrovsky, Y Rabani, LJ Schulman, C Swamy
Journal of the ACM (JACM) 59 (6), 28, 2012
5642012
Efficient password-authenticated key exchange using human-memorable passwords
J Katz, R Ostrovsky, M Yung
International Conference on the Theory and Applications of Cryptographic …, 2001
5632001
Deniable encryption
R Canetti¹, C Dwork, M Naor, R Ostrovsky
Advances in Cryptology-CRYPTO'97: 17th Annual International Cryptology …, 1997
5471997
Sequential aggregate signatures and multisignatures without random oracles
S Lu, R Ostrovsky, A Sahai, H Shacham, B Waters
Advances in Cryptology-EUROCRYPT 2006: 24th Annual International Conference …, 2006
4182006
Perfect noninteractive zero-knowledge for NP
J Groth, R Ostrovsky, A Sahai
4152005
Zero-knowledge from secure multiparty computation
Y Ishai, E Kushilevitz, R Ostrovsky, A Sahai
Proceedings of the thirty-ninth annual ACM symposium on Theory of computing …, 2007
3692007
Public key encryption that allows PIR queries
D Boneh, E Kushilevitz, R Ostrovsky, WE Skeith
Advances in Cryptology-CRYPTO 2007: 27th Annual International Cryptology …, 2007
3672007
A survey of single-database private information retrieval: Techniques and applications
R Ostrovsky, WE Skeith III
Public key cryptography 4450, 393-411, 2007
3592007
Succinct non-interactive arguments via linear interactive proofs
N Bitansky, A Chiesa, Y Ishai, R Ostrovsky, O Paneth
Theory of Cryptography, 315-333, 2013
3492013
Robust non-interactive zero knowledge
A De Santis, G Di Crescenzo, R Ostrovsky, G Persiano, A Sahai
Advances in Cryptology—CRYPTO 2001: 21st Annual International Cryptology …, 2001
3472001
Security of blind digital signatures
A Juels¹, MLR Ostrovsky
Advances in Cryptology-CRYPTO'97: 17th Annual International Cryptology …, 1997
3291997
The system can't perform the operation now. Try again later.
Articles 1–20