What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Ran Canetti
Google Scholar
99
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Differentially Private Release of Israel's National Registry of Live Births.
Shlomi Hod
Ran Canetti
2024
conf/tcc
Towards General-Purpose Program Obfuscation via Local Mixing.
Ran Canetti
Claudio Chamon
Eduardo R. Mucciolo
Andrei E. Ruckenstein
2023
conf/eurosp
SoK: Data Sovereignty.
Jens Ernstberger
Jan Lauinger
Fatima Elsheimy
Liyi Zhou
Sebastian Steinhorst
Ran Canetti
Andrew Miller
Arthur Gervais
Dawn Song
2023
conf/tcc
Taming Adaptivity in YOSO Protocols: The Modular Way.
Ran Canetti
Sebastian Kolby
Divya Ravi
Eduardo Soria-Vazquez
Sophia Yakoubov
2022
conf/crypto
Universally Composable End-to-End Secure Messaging.
Ran Canetti
Palak Jain
Marika Swanberg
Mayank Varia
2022
conf/eurocrypt
Unclonable Polymers and Their Cryptographic Applications.
Ghada Almashaqbeh
Ran Canetti
Yaniv Erlich
Jonathan Gershoni
Tal Malkin
Itsik Pe'er
Anna Roitburd-Berman
Eran Tromer
2022
conf/eurocrypt
COA-Secure Obfuscation and Applications.
Ran Canetti
Suvradip Chakraborty
Dakshita Khurana
Nishant Kumar
Oxana Poburinnaya
Manoj Prabhakaran
2022
conf/asiacrypt
Triply Adaptive UC NIZK.
Ran Canetti
Pratik Sarkar
Xiao Wang
2021
journals/joc
Reusable Fuzzy Extractors for Low-Entropy Distributions.
Ran Canetti
Benjamin Fuller
Omer Paneth
Leonid Reyzin
Adam D. Smith
2021
conf/tcc
Covert Learning: How to Learn with an Untrusted Intermediary.
Ran Canetti
Ari Karchmer
2020
conf/ccs
UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts.
Ran Canetti
Rosario Gennaro
Steven Goldfeder
Nikolaos Makriyannis
Udi Peled
2020
conf/crypto
Fully Deniable Interactive Encryption.
Ran Canetti
Sunoo Park
Oxana Poburinnaya
2020
conf/pkc
Blazing Fast OT for Three-Round UC OT Extension.
Ran Canetti
Pratik Sarkar
Xiao Wang
2020
conf/ctrsa
Universally Composable Accumulators.
Foteini Baldimtsi
Ran Canetti
Sophia Yakoubov
2020
conf/asiacrypt
Efficient and Round-Optimal Oblivious Transfer and Commitment with Adaptive Security.
Ran Canetti
Pratik Sarkar
Xiao Wang
2020
conf/tcc
Universal Composition with Global Subroutines: Capturing Global Setup Within Plain UC.
Christian Badertscher
Ran Canetti
Julia Hesse
Björn Tackmann
Vassilis Zikas
2020
conf/tcc
Towards Multiparty Computation Withstanding Coercion of All Parties.
Ran Canetti
Oxana Poburinnaya
2018
conf/eurocrypt
Fiat-Shamir and Correlation Intractability from Strong KDM-Secure Encryption.
Ran Canetti
Yilei Chen
Leonid Reyzin
Ron D. Rothblum
2018
conf/tcc
Certifying Trapdoor Permutations, Revisited.
Ran Canetti
Amit Lichtenberg
2017
journals/joc
The Hunting of the SNARK.
Nir Bitansky
Ran Canetti
Alessandro Chiesa
Shafi Goldwasser
Huijia Lin
Aviad Rubinstein
Eran Tromer
2017
conf/pkc
Better Two-Round Adaptive Multi-party Computation.
Ran Canetti
Oxana Poburinnaya
Muthuramakrishnan Venkitasubramaniam
2017
conf/pkc
Chosen-Ciphertext Secure Fully Homomorphic Encryption.
Ran Canetti
Srinivasan Raghuraman
Silas Richelson
Vinod Vaikuntanathan
2017
conf/eurocrypt
Constraint-Hiding Constrained PRFs for NC<sup>1</sup> from LWE.
Ran Canetti
Yilei Chen
2017
conf/asiacrypt
Optimal-Rate Non-Committing Encryption.
Ran Canetti
Oxana Poburinnaya
Mariana Raykova
2017
conf/tcc
Towards Doubly Efficient Private Information Retrieval.
Ran Canetti
Justin Holmgren
Silas Richelson
2016
journals/joc
Toward a Game Theoretic View of Secure Computation.
Gilad Asharov
Ran Canetti
Carmit Hazay
2016
conf/pkc
Universally Composable Authentication and Key-Exchange with Global PKI.
Ran Canetti
Daniel Shahaf
Margarita Vald
2016
conf/eurocrypt
Reusable Fuzzy Extractors for Low-Entropy Distributions.
Ran Canetti
Benjamin Fuller
Omer Paneth
Leonid Reyzin
Adam D. Smith
2016
conf/tcc
Adaptive Succinct Garbled RAM or: How to Delegate Your Database.
Ran Canetti
Yilei Chen
Justin Holmgren
Mariana Raykova
2016
conf/tcc
On the Correlation Intractability of Obfuscated Pseudorandom Functions.
Ran Canetti
Yilei Chen
Leonid Reyzin
2015
conf/crypto
A Simpler Variant of Universally Composable Security for Standard Multiparty Computation.
Ran Canetti
Asaf Cohen
Yehuda Lindell
2015
conf/crypto
Concurrent Secure Computation with Optimal Query Complexity.
Ran Canetti
Vipul Goyal
Abhishek Jain
2015
conf/tcc
Adaptively Secure Two-Party Computation from Indistinguishability Obfuscation.
Ran Canetti
Shafi Goldwasser
Oxana Poburinnaya
2015
conf/tcc
On Obfuscation with Random Oracles.
Ran Canetti
Yael Tauman Kalai
Omer Paneth
2015
conf/tcc
Obfuscation of Probabilistic Circuits and Applications.
Ran Canetti
Huijia Lin
Stefano Tessaro
Vinod Vaikuntanathan
2014
journals/joc
On Strong Simulation and Composable Point Obfuscation.
Nir Bitansky
Ran Canetti
2014
conf/ccs
Practical UC security with a Global Random Oracle.
Ran Canetti
Abhishek Jain
Alessandra Scafuro
2014
conf/crypto
On Virtual Grey Box Obfuscation for General Circuits.
Nir Bitansky
Ran Canetti
Yael Tauman Kalai
Omer Paneth
2014
conf/crypto
Client-Server Concurrent Zero Knowledge with Constant Rounds and Guaranteed Complexity.
Ran Canetti
Abhishek Jain
Omer Paneth
2014
conf/crypto
The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator.
Nir Bitansky
Ran Canetti
Henry Cohn
Shafi Goldwasser
Yael Tauman Kalai
Omer Paneth
Alon Rosen
2014
conf/pkc
Verifiable Set Operations over Outsourced Databases.
Ran Canetti
Omer Paneth
Dimitrios Papadopoulos
Nikos Triandopoulos
2014
conf/tcc
Obfuscation for Evasive Functions.
Boaz Barak
Nir Bitansky
Ran Canetti
Yael Tauman Kalai
Omer Paneth
Amit Sahai
2013
conf/tcc
Public-Coin Concurrent Zero-Knowledge in the Global Hash Model.
Ran Canetti
Huijia Lin
Omer Paneth
2012
conf/pkc
Efficient Password Authenticated Key Exchange via Oblivious Transfer.
Ran Canetti
Dana Dachman-Soled
Vinod Vaikuntanathan
Hoeteck Wee
2012
conf/tcc
Leakage-Tolerant Interactive Protocols.
Nir Bitansky
Ran Canetti
Shai Halevi
2011
journals/joc
Universally Composable Symbolic Security Analysis.
Ran Canetti
Jonathan Herzog
2011
journals/joc
Secure Computation Without Authentication.
Boaz Barak
Ran Canetti
Yehuda Lindell
Rafael Pass
Tal Rabin
2011
conf/ccs
Practical delegation of computation using multiple servers.
Ran Canetti
Ben Riva
Guy N. Rothblum
2011
conf/acns
Composable Security Analysis of OS Services.
Ran Canetti
Suresh Chari
Shai Halevi
Birgit Pfitzmann
Arnab Roy
Michael Steiner
Wietse Z. Venema
2011
conf/eurocrypt
Towards a Game Theoretic View of Secure Computation.
Gilad Asharov
Ran Canetti
Carmit Hazay
2011
conf/asiacrypt
Program Obfuscation with Leaky Hardware.
Nir Bitansky
Ran Canetti
Shafi Goldwasser
Shai Halevi
Yael Tauman Kalai
Guy N. Rothblum
2010
conf/crypto
On Strong Simulation and Composable Point Obfuscation.
Nir Bitansky
Ran Canetti
2010
conf/tcc
On Symmetric Encryption and Point Obfuscation.
Ran Canetti
Yael Tauman Kalai
Mayank Varia
Daniel Wichs
2010
conf/tcc
Obfuscation of Hyperplane Membership.
Ran Canetti
Guy N. Rothblum
Mayank Varia
2009
conf/tcc
Towards a Theory of Extractable Functions.
Ran Canetti
Ronny Ramzi Dakdouk
2009
conf/tcc
Non-malleable Obfuscation.
Ran Canetti
Mayank Varia
2008
conf/ccs
POSH: a generalized captcha with security applications.
Waseem Daher
Ran Canetti
2008
conf/eurocrypt
Obfuscating Point Functions with Multibit Output.
Ran Canetti
Ronny Ramzi Dakdouk
2007
journals/joc
A Forward-Secure Public-Key Encryption Scheme.
Ran Canetti
Shai Halevi
Jonathan Katz
2007
conf/ccs
Chosen-ciphertext secure proxy re-encryption.
Ran Canetti
Susan Hohenberger
2007
conf/crypto
Amplifying Collision Resistance: A Complexity-Theoretic Treatment.
Ran Canetti
Ronald L. Rivest
Madhu Sudan
Luca Trevisan
Salil P. Vadhan
Hoeteck Wee
2007
conf/asiacrypt
Obtaining Universally Compoable Security: Towards the Bare Bones of Trust.
Ran Canetti
2007
conf/tcc
Universally Composable Security with Global Setup.
Ran Canetti
Yevgeniy Dodis
Rafael Pass
Shabsi Walfish
2006
journals/joc
On the Limitations of Universally Composable Two-Party Computation Without Set-Up Assumptions.
Ran Canetti
Eyal Kushilevitz
Yehuda Lindell
2006
conf/crypto
Mitigating Dictionary Attacks on Password-Protected Local Storage.
Ran Canetti
Shai Halevi
Michael Steiner
2006
conf/tcc
Universally Composable Symbolic Analysis of Mutual Authentication and Key-Exchange Protocols.
Ran Canetti
Jonathan Herzog
2005
journals/joc
Preface.
Ran Canetti
2005
conf/crypto
Secure Computation Without Authentication.
Boaz Barak
Ran Canetti
Yehuda Lindell
Rafael Pass
Tal Rabin
2005
conf/eurocrypt
Universally Composable Password-Based Key Exchange.
Ran Canetti
Shai Halevi
Jonathan Katz
Yehuda Lindell
Philip D. MacKenzie
2005
conf/tcc
Adaptively-Secure, Non-interactive Public-Key Encryption.
Ran Canetti
Shai Halevi
Jonathan Katz
2005
conf/tcc
Hardness Amplification of Weakly Verifiable Puzzles.
Ran Canetti
Shai Halevi
Michael Steiner
2004
journals/joc
Adaptive versus Non-Adaptive Security of Multi-Party Protocols.
Ran Canetti
Ivan Damgård
Stefan Dziembowski
Yuval Ishai
Tal Malkin
2004
conf/eurocrypt
Chosen-Ciphertext Security from Identity-Based Encryption.
Ran Canetti
Shai Halevi
Jonathan Katz
2004
conf/tcc
On the Random-Oracle Methodology as Applied to Length-Restricted Signature Schemes.
Ran Canetti
Oded Goldreich
Shai Halevi
2003
conf/crypto
Universal Composition with Joint State.
Ran Canetti
Tal Rabin
2003
conf/crypto
Relaxing Chosen-Ciphertext Security.
Ran Canetti
Hugo Krawczyk
Jesper Buus Nielsen
2003
conf/esorics
Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card.
Helmut Scherzer
Ran Canetti
Paul A. Karger
Hugo Krawczyk
Tal Rabin
David C. Toll
2003
conf/eurocrypt
A Forward-Secure Public-Key Encryption Scheme.
Ran Canetti
Shai Halevi
Jonathan Katz
2003
conf/eurocrypt
On the Limitations of Universally Composable Two-Party Computation without Set-up Assumptions.
Ran Canetti
Eyal Kushilevitz
Yehuda Lindell
2002
conf/ccs
Efficient, DoS-resistant, secure key exchange for internet protocols.
William Aiello
Steven M. Bellovin
Matt Blaze
John Ioannidis
Omer Reingold
Ran Canetti
Angelos D. Keromytis
2002
conf/crypto
Security Analysis of IKE's Signature-Based Key-Exchange Protocol.
Ran Canetti
Hugo Krawczyk
2002
conf/eurocrypt
Universally Composable Notions of Key Exchange and Secure Channels.
Ran Canetti
Hugo Krawczyk
2001
conf/crypto
Universally Composable Commitments.
Ran Canetti
Marc Fischlin
2001
conf/ndss
Efficient and Secure Source Authentication for Multicast.
Adrian Perrig
Ran Canetti
Dawn Xiaodong Song
J. D. Tygar
2001
conf/eurocrypt
On Adaptive vs. Non-adaptive Security of Multiparty Protocols.
Ran Canetti
Ivan Damgård
Stefan Dziembowski
Yuval Ishai
Tal Malkin
2001
conf/eurocrypt
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels.
Ran Canetti
Hugo Krawczyk
2000
journals/joc
Maintaining Authenticated Communication in the Presence of Break-Ins.
Ran Canetti
Shai Halevi
Amir Herzberg
2000
journals/joc
Security and Composition of Multiparty Cryptographic Protocols.
Ran Canetti
2000
journals/joc
Randomness versus Fault-Tolerance.
Ran Canetti
Eyal Kushilevitz
Rafail Ostrovsky
Adi Rosén
2000
conf/sp
Efficient Authentication and Signing of Multicast Streams over Lossy Channels.
Adrian Perrig
Ran Canetti
J. D. Tygar
Dawn Xiaodong Song
2000
conf/ndss
An IPSec-based Host Architecture for Secure Internet Multicast.
Ran Canetti
Pau-Chen Cheng
Frederique Giraud
Dimitrios E. Pendarakis
Josyula R. Rao
Pankaj Rohatgi
Debanjan Saha
2000
conf/eurocrypt
Exposure-Resilient Functions and All-or-Nothing Transforms.
Ran Canetti
Yevgeniy Dodis
Shai Halevi
Eyal Kushilevitz
Amit Sahai
1999
conf/crypto
Adaptive Security for Threshold Cryptosystems.
Ran Canetti
Rosario Gennaro
Stanislaw Jarecki
Hugo Krawczyk
Tal Rabin
1999
conf/eurocrypt
Efficient Communication-Storage Tradeoffs for Multicast Encryption.
Ran Canetti
Tal Malkin
Kobbi Nissim
1999
conf/eurocrypt
Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack.
Ran Canetti
Shafi Goldwasser
1997
conf/crypto
Deniable Encryption.
Ran Canetti
Cynthia Dwork
Moni Naor
Rafail Ostrovsky
1997
conf/crypto
Towards Realizing Random Oracles: Hash Functions That Hide All Partial Information.
Ran Canetti
1996
conf/crypto
Keying Hash Functions for Message Authentication.
Mihir Bellare
Ran Canetti
Hugo Krawczyk
1994
conf/crypto
Maintaining Security in the Presence of Transient Faults.
Ran Canetti
Amir Herzberg
Coauthors
Abhishek Jain
(3)
Adam D. Smith
(2)
Adi Rosén
(1)
Adrian Perrig
(2)
Alessandra Scafuro
(1)
Alessandro Chiesa
(1)
Alon Rosen
(1)
Amir Herzberg
(2)
Amit Lichtenberg
(1)
Amit Sahai
(2)
Andrei E. Ruckenstein
(1)
Andrew Miller
(1)
Angelos D. Keromytis
(1)
Anna Roitburd-Berman
(1)
Ari Karchmer
(1)
Arnab Roy
(1)
Arthur Gervais
(1)
Asaf Cohen
(1)
Aviad Rubinstein
(1)
Ben Riva
(1)
Benjamin Fuller
(2)
Birgit Pfitzmann
(1)
Björn Tackmann
(1)
Boaz Barak
(3)
Carmit Hazay
(2)
Christian Badertscher
(1)
Claudio Chamon
(1)
Cynthia Dwork
(1)
Dakshita Khurana
(1)
Dana Dachman-Soled
(1)
Daniel Shahaf
(1)
Daniel Wichs
(1)
David C. Toll
(1)
Dawn Song
(1)
Dawn Xiaodong Song
(2)
Debanjan Saha
(1)
Dimitrios E. Pendarakis
(1)
Dimitrios Papadopoulos
(1)
Divya Ravi
(1)
Eduardo R. Mucciolo
(1)
Eduardo Soria-Vazquez
(1)
Eran Tromer
(2)
Eyal Kushilevitz
(4)
Fatima Elsheimy
(1)
Foteini Baldimtsi
(1)
Frederique Giraud
(1)
Ghada Almashaqbeh
(1)
Gilad Asharov
(2)
Guy N. Rothblum
(3)
Helmut Scherzer
(1)
Henry Cohn
(1)
Hoeteck Wee
(2)
Hugo Krawczyk
(7)
Huijia Lin
(3)
Itsik Pe'er
(1)
Ivan Damgård
(2)
J. D. Tygar
(2)
Jan Lauinger
(1)
Jens Ernstberger
(1)
Jesper Buus Nielsen
(1)
John Ioannidis
(1)
Jonathan Gershoni
(1)
Jonathan Herzog
(2)
Jonathan Katz
(5)
Josyula R. Rao
(1)
Julia Hesse
(1)
Justin Holmgren
(2)
Kobbi Nissim
(1)
Leonid Reyzin
(4)
Liyi Zhou
(1)
Luca Trevisan
(1)
Madhu Sudan
(1)
Manoj Prabhakaran
(1)
Marc Fischlin
(1)
Margarita Vald
(1)
Mariana Raykova
(2)
Marika Swanberg
(1)
Matt Blaze
(1)
Mayank Varia
(4)
Michael Steiner
(3)
Mihir Bellare
(1)
Moni Naor
(1)
Muthuramakrishnan Venkitasubramaniam
(1)
Nikolaos Makriyannis
(1)
Nikos Triandopoulos
(1)
Nir Bitansky
(8)
Nishant Kumar
(1)
Oded Goldreich
(1)
Omer Paneth
(9)
Omer Reingold
(1)
Oxana Poburinnaya
(6)
Palak Jain
(1)
Pankaj Rohatgi
(1)
Pau-Chen Cheng
(1)
Paul A. Karger
(1)
Philip D. MacKenzie
(1)
Pratik Sarkar
(3)
Rafael Pass
(3)
Rafail Ostrovsky
(2)
Ran Canetti
(99)
Ron D. Rothblum
(1)
Ronald L. Rivest
(1)
Ronny Ramzi Dakdouk
(2)
Rosario Gennaro
(2)
Salil P. Vadhan
(1)
Sebastian Kolby
(1)
Sebastian Steinhorst
(1)
Shabsi Walfish
(1)
Shafi Goldwasser
(5)
Shai Halevi
(13)
Shlomi Hod
(1)
Silas Richelson
(2)
Sophia Yakoubov
(2)
Srinivasan Raghuraman
(1)
Stanislaw Jarecki
(1)
Stefan Dziembowski
(2)
Stefano Tessaro
(1)
Steven Goldfeder
(1)
Steven M. Bellovin
(1)
Sunoo Park
(1)
Suresh Chari
(1)
Susan Hohenberger
(1)
Suvradip Chakraborty
(1)
Tal Malkin
(4)
Tal Rabin
(5)
Udi Peled
(1)
Vassilis Zikas
(1)
Vinod Vaikuntanathan
(3)
Vipul Goyal
(1)
Waseem Daher
(1)
Wietse Z. Venema
(1)
William Aiello
(1)
Xiao Wang
(3)
Yael Tauman Kalai
(6)
Yaniv Erlich
(1)
Yehuda Lindell
(6)
Yevgeniy Dodis
(2)
Yilei Chen
(4)
Yuval Ishai
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to