UMAC: Message authentication code using universal hashing T Krovetz | 125 | 2006 |
Strong accumulators from collision-resistant hashing P Camacho, A Hevia, M Kiwi, R Opazo Information Security: 11th International Conference, ISC 2008, Taipei …, 2008 | 90* | 2008 |
Method and apparatus for authentication of data streams with adaptively controlled losses C Gentry, A Hevia, R Kumar, T Kawahara, Z Ramzan US Patent App. 10/543,640, 2006 | 89 | 2006 |
An indistinguishability-based characterization of anonymous channels A Hevia, D Micciancio International Symposium on Privacy Enhancing Technologies Symposium, 24-43, 2008 | 72 | 2008 |
A practice-oriented treatment of pseudorandom number generators A Desai, A Hevia, YL Yin International Conference on the Theory and Applications of Cryptographic …, 2002 | 69 | 2002 |
Latent semantic analysis and keyword extraction for phishing classification G L'Huillier, A Hevia, R Weber, S Rios 2010 IEEE international conference on intelligence and security informatics …, 2010 | 68 | 2010 |
Surviving Internet Catastrophes. FP Junqueira, R Bhagwan, A Hevia, K Marzullo, GM Voelker USENIX Annual Technical Conference, General Track, 45-60, 2005 | 62 | 2005 |
Strength of two data encryption standard implementations under timing attacks A Hevia, M Kiwi ACM Transactions on Information and System Security (TISSEC) 2 (4), 416-437, 1999 | 60 | 1999 |
The provable security of graph-based one-time signatures and extensions to algebraic signature schemes A Hevia, D Micciancio Advances in Cryptology—ASIACRYPT 2002: 8th International Conference on the …, 2002 | 51 | 2002 |
On the impossibility of batch update for cryptographic accumulators P Camacho, A Hevia Progress in Cryptology–LATINCRYPT 2010: First International Conference on …, 2010 | 39 | 2010 |
QA-NIZK arguments in asymmetric groups: new tools and new constructions A González, A Hevia, C Ràfols International Conference on the Theory and Application of Cryptology and …, 2015 | 37 | 2015 |
Short transitive signatures for directed trees P Camacho, A Hevia Cryptographers’ Track at the RSA Conference, 35-50, 2012 | 31 | 2012 |
Electronic jury voting protocols A Hevia, M Kiwi Theoretical Computer Science 321 (1), 73-94, 2004 | 28 | 2004 |
End-to-end security in the presence of intelligent data adapting proxies: The case of authenticating transcoded streaming media C Gentry, A Hevia, R Jain, T Kawahara, Z Ramzan IEEE Journal on Selected Areas in Communications 23 (2), 464-473, 2005 | 27 | 2005 |
Electronic jury voting protocols A Hevia, M Kiwi Latin American Symposium on Theoretical Informatics, 415-429, 2002 | 20* | 2002 |
Strength of two data encryption standard implementations under timing attacks A Hevia, M Kiwi Latin American Symposium on Theoretical Informatics, 192-205, 1998 | 19 | 1998 |
Beating the birthday paradox in dining cryptographer networks P García, J van de Graaf, A Hevia, A Viola Progress in Cryptology-LATINCRYPT 2014: Third International Conference on …, 2015 | 16 | 2015 |
Simultaneous broadcast revisited A Hevia, D Micciancio Proceedings of the twenty-fourth annual ACM symposium on Principles of …, 2005 | 16 | 2005 |
A three-layer approach for protecting smart-citizens privacy in crowdsensing projects S Blasco, J Bustos-Jimenez, G Font, A Hevia, MG Prato 2015 34th International Conference of the Chilean Computer Science Society …, 2015 | 13 | 2015 |
Enhanced ANSI X9. 17 pseudorandom number generators with forward security A Desai, Y Yin, A Hevia US Patent 7,227,951, 2007 | 13 | 2007 |