Author pages are created from data sourced from our academic publisher partnerships and public sources.
- Publications
- Influence
Universally composable security: a new paradigm for cryptographic protocols
- R. Canetti
- Computer Science
- Proceedings IEEE International Conference on…
- 14 October 2001
TLDR
Keying Hash Functions for Message Authentication
- M. Bellare, R. Canetti, H. Krawczyk
- Computer Science
- CRYPTO
- 18 August 1996
TLDR
HMAC: Keyed-Hashing for Message Authentication
- H. Krawczyk, M. Bellare, R. Canetti
- Computer Science
- RFC
- 1 February 1997
TLDR
Efficient authentication and signing of multicast streams over lossy channels
- A. Perrig, R. Canetti, J. Tygar, D. Song
- Computer Science
- Proceeding IEEE Symposium on Security and…
- 14 May 2000
TLDR
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
- R. Canetti, H. Krawczyk
- Computer Science
- EUROCRYPT
- 6 May 2001
TLDR
The TESLA Broadcast Authentication Protocol
- A. Perrig, R. Canetti, J. Tygar, D. Song
- Computer Science
- 2002
TLDR
- 959
- 122
- PDF
Security and Composition of Multiparty Cryptographic Protocols
- R. Canetti
- Computer Science, Mathematics
- Journal of Cryptology
- 2000
TLDR
Chosen-Ciphertext Security from Identity-Based Encryption
- R. Canetti, S. Halevi, Jonathan Katz
- Computer Science, Mathematics
- EUROCRYPT
- 2 May 2004
TLDR
Chosen-ciphertext secure proxy re-encryption
- R. Canetti, S. Hohenberger
- Computer Science
- CCS '07
- 28 October 2007
TLDR
Efficient and Secure Source Authentication for Multicast
- A. Perrig, R. Canetti, D. Song, J. Tygar
- Computer Science
- NDSS
- 2001
TLDR