Building Blocks

  • M. Jakobsson, E. Shriver, B. K. Hillyer, and A. Juels, “A practical secure physical random bit generator,” in Ccs ’98: proceedings of the 5th acm conference on computer and communications security, New York, NY, USA, 1998, pp. 103-111.
    [Bibtex]
    @inproceedings{random-bit-gen,
    address = {New York, NY, USA},
    author = {Jakobsson, Markus and Shriver, Elizabeth and Hillyer, Bruce K. and Juels, Ari},
    booktitle = {CCS '98: Proceedings of the 5th ACM conference on Computer and communications security},
    citeulike-article-id = {7845799},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ccs98.pdf},
    keywords = {building-blocks, most-downloaded, publications},
    location = {San Francisco, California, United States},
    pages = {103--111},
    posted-at = {2010-09-17 03:17:24},
    priority = {0},
    publisher = {ACM},
    title = {A practical secure physical random bit generator},
    url = {http://markus-jakobsson.com/papers/jakobsson-ccs98.pdf},
    year = {1998}
    }
  • G. Di Crescenzo, N. Ferguson, R. Impagliazzo, and M. Jakobsson, “How to forget a secret,” in Stacs’99: proceedings of the 16th annual conference on theoretical aspects of computer science, Berlin, Heidelberg, 1999, pp. 500-509.
    [Bibtex]
    @inproceedings{forget-secret,
    address = {Berlin, Heidelberg},
    author = {Di Crescenzo, Giovanni and Ferguson, Niels and Impagliazzo, Russell and Jakobsson, Markus},
    booktitle = {STACS'99: Proceedings of the 16th annual conference on Theoretical aspects of computer science},
    citeulike-article-id = {7845798},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-stacs99.pdf},
    keywords = {building-blocks, privacy, publications},
    location = {Trier, Germany},
    pages = {500--509},
    posted-at = {2010-09-17 03:17:24},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {How to forget a secret},
    url = {http://markus-jakobsson.com/papers/jakobsson-stacs99.pdf},
    year = {1999}
    }
  • D. Coppersmith and M. Jakobsson, “Almost optimal hash sequence traversal,” in Fc’02: proceedings of the 6th international conference on financial cryptography, Berlin, Heidelberg, 2003, pp. 102-119.
    [Bibtex]
    @inproceedings{coppersmith-jakobsson,
    address = {Berlin, Heidelberg},
    author = {Coppersmith, Don and Jakobsson, Markus},
    booktitle = {FC'02: Proceedings of the 6th international conference on Financial cryptography},
    citeulike-article-id = {7845797},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-fc02-aohash.pdf},
    keywords = {building-blocks, mobile, most-downloaded, privacy, publications},
    location = {Southampton, Bermuda},
    pages = {102--119},
    posted-at = {2010-09-17 03:17:24},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Almost optimal hash sequence traversal},
    url = {http://markus-jakobsson.com/papers/jakobsson-fc02-aohash.pdf},
    year = {2003}
    }
  • M. Jakobsson, “Fractal hash sequence representation and traversal,” in Proceedings of the 2002 ieee international symposium on information theory (isit `02), Palais de Beaulieu, Lausanne, Switzerland, 2002, pp. 437-444.
    [Bibtex]
    @inproceedings{Jakobsson02,
    address = {Palais de Beaulieu, Lausanne, Switzerland},
    author = {Jakobsson, M.},
    booktitle = {Proceedings of the 2002 IEEE International Symposium on Information Theory (ISIT `02)},
    citeulike-article-id = {7845796},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-isit02.pdf},
    keywords = {building-blocks, mobile, publications},
    month = jun,
    organization = {IEEE},
    pages = {437--444},
    posted-at = {2010-09-17 03:17:24},
    priority = {0},
    title = {Fractal Hash Sequence Representation and Traversal},
    url = {http://markus-jakobsson.com/papers/jakobsson-isit02.pdf},
    year = {2002}
    }
  • A. Boldyreva and M. Jakobsson, “Theft-Protected proprietary certificates,” in Digital rights management ’02: acm ccs-9 workshop, London, UK, 2002, pp. 208-220.
    [Bibtex]
    @inproceedings{JW01,
    address = {London, UK},
    author = {Boldyreva, Alexandra and Jakobsson, Markus},
    booktitle = {Digital Rights Management '02: ACM CCS-9 Workshop},
    citeulike-article-id = {7845795},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-drm02.pdf},
    comment = {LNCS 2696},
    keywords = {building-blocks, publications},
    pages = {208--220},
    posted-at = {2010-09-17 03:17:24},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {{Theft-Protected} Proprietary Certificates},
    url = {http://markus-jakobsson.com/papers/jakobsson-drm02.pdf},
    year = {2002}
    }
  • M. Jakobsson, T. Leighton, S. Micali, and M. Szydlo, “Fractal merkle tree representation and traversal,” in Ct-rsa’03: proceedings of the 2003 rsa conference on the cryptographers’ track, Berlin, Heidelberg, 2003, pp. 314-326.
    [Bibtex]
    @inproceedings{merkle-tree,
    address = {Berlin, Heidelberg},
    author = {Jakobsson, Markus and Leighton, Tom and Micali, Silvio and Szydlo, Michael},
    booktitle = {CT-RSA'03: Proceedings of the 2003 RSA conference on The cryptographers' track},
    citeulike-article-id = {7845794},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ctrsa03.pdf},
    keywords = {building-blocks, mobile, publications},
    location = {San Francisco, CA, USA},
    pages = {314--326},
    posted-at = {2010-09-17 03:17:24},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Fractal Merkle tree representation and traversal},
    url = {http://markus-jakobsson.com/papers/jakobsson-ctrsa03.pdf},
    year = {2003}
    }
  • P. Golle and M. Jakobsson, “Reusable anonymous return channels,” in Wpes ’03: proceedings of the 2003 acm workshop on privacy in the electronic society, New York, NY, USA, 2003, pp. 94-100.
    [Bibtex]
    @inproceedings{reusable-anonymous,
    address = {New York, NY, USA},
    author = {Golle, Philippe and Jakobsson, Markus},
    booktitle = {WPES '03: Proceedings of the 2003 ACM workshop on Privacy in the electronic society},
    citeulike-article-id = {7845793},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ctrsa04.pdf},
    citeulike-linkout-1 = {http://markus-jakobsson.com/papers/jakobsson-wpes03.pdf},
    keywords = {building-blocks, distributed-computing, encryption, privacy, publications},
    location = {Washington, DC},
    pages = {94--100},
    posted-at = {2010-09-17 03:17:24},
    priority = {0},
    publisher = {ACM},
    title = {Reusable anonymous return channels},
    url = {http://markus-jakobsson.com/papers/jakobsson-wpes03.pdf},
    year = {2003}
    }
  • Y. Hu, A. Perrig, and M. Jakobsson, “Efficient constructions for one-way hash chains.,” in Applied cryptography and network security, New York, NY, 2005.
    [Bibtex]
    @inproceedings{HPJ-ACNS05,
    address = {New York, NY},
    author = {Hu, Yih-Chun and Perrig, Andiran and Jakobsson, Markus},
    booktitle = {Applied Cryptography and Network Security},
    citeulike-article-id = {7845792},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-acns05.pdf},
    keywords = {building-blocks, encryption, publications},
    month = jun,
    posted-at = {2010-09-17 03:17:24},
    priority = {0},
    title = {Efficient Constructions for One-way Hash Chains.},
    url = {http://markus-jakobsson.com/papers/jakobsson-acns05.pdf},
    year = {2005}
    }
  • P. Golle, M. Jakobsson, A. Juels, and P. Syverson, “Universal re-encryption for mixnets,” in Topics in cryptology ct-rsa 2004, London, UK, 2004, pp. 163-178.
    [Bibtex]
    @inproceedings{GJJS04,
    address = {London, UK},
    author = {Golle, Philippe and Jakobsson, Markus and Juels, Ari and Syverson, Paul},
    booktitle = {Topics in Cryptology CT-RSA 2004},
    citeulike-article-id = {7845791},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ctrsa04.pdf},
    comment = {LNCS 2964},
    keywords = {building-blocks, distributed-computing, encryption, privacy, publications},
    pages = {163--178},
    posted-at = {2010-09-17 03:17:24},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Universal Re-encryption for Mixnets},
    url = {http://markus-jakobsson.com/papers/jakobsson-ctrsa04.pdf},
    year = {2004}
    }
  • A. Ambainis, M. Jakobsson, and H. Lipmaa, “Cryptographic randomized response techniques,” in Public key cryptography: 7th international workshop on theory and practice in public key cryptography, London, UK, 2004, pp. 425-438.
    [Bibtex]
    @inproceedings{JY98,
    address = {London, UK},
    author = {Ambainis, Andris and Jakobsson, Markus and Lipmaa, Helger},
    booktitle = {Public Key Cryptography: 7th International Workshop on Theory and Practice in Public Key Cryptography},
    citeulike-article-id = {7845790},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-pkc04.pdf},
    comment = {LNCS 2947},
    keywords = {building-blocks, publications},
    pages = {425--438},
    posted-at = {2010-09-17 03:17:24},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Cryptographic Randomized Response Techniques},
    url = {http://markus-jakobsson.com/papers/jakobsson-pkc04.pdf},
    year = {2004}
    }
  • R. Chow, P. Golle, M. Jakobsson, L. Wang, and X. Wang, “Making CAPTCHAs clickable,” in Hotmobile ’08: proceedings of the 9th workshop on mobile computing systems and applications, New York, NY, USA, 2008, pp. 91-94.
    [Bibtex]
    @inproceedings{click-captcha,
    address = {New York, NY, USA},
    author = {Chow, Richard and Golle, Philippe and Jakobsson, Markus and Wang, Lusha and Wang, XiaoFeng},
    booktitle = {HotMobile '08: Proceedings of the 9th workshop on Mobile computing systems and applications},
    citeulike-article-id = {7845789},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-hotmobile08.pdf},
    keywords = {building-blocks, captcha, mobile, publications},
    location = {Napa Valley, California},
    pages = {91--94},
    posted-at = {2010-09-17 03:17:24},
    priority = {0},
    publisher = {ACM},
    title = {Making {CAPTCHAs} clickable},
    url = {http://markus-jakobsson.com/papers/jakobsson-hotmobile08.pdf},
    year = {2008}
    }
  • A. Juels, M. Jakobsson, E. Shriver, and B. Hillyer, “How to turn loaded dice into fair coins,” Ieeetit: ieee transactions on information theory, vol. 46, iss. 3, pp. 911-921, 2000.
    [Bibtex]
    @article{JJSH00,
    author = {Juels, A. and Jakobsson, M. and Shriver, E. and Hillyer, B.},
    citeulike-article-id = {7845788},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ieeeit00.pdf},
    journal = {IEEETIT: IEEE Transactions on Information Theory},
    keywords = {building-blocks, publications},
    number = {3},
    pages = {911--921},
    posted-at = {2010-09-17 03:17:24},
    priority = {0},
    title = {How to Turn Loaded Dice into Fair Coins},
    url = {http://markus-jakobsson.com/papers/jakobsson-ieeeit00.pdf},
    volume = {46},
    year = {2000}
    }
  • M. Jakobsson, K. Sako, and R. Impagliazzo, “Designated verifier proofs and their applications,” in Eurocrypt’96: proceedings of the 15th annual international conference on theory and application of cryptographic techniques, Berlin, Heidelberg, 1996, pp. 143-154.
    [Bibtex]
    @inproceedings{verifier-proofs,
    address = {Berlin, Heidelberg},
    author = {Jakobsson, Markus and Sako, Kazue and Impagliazzo, Russell},
    booktitle = {EUROCRYPT'96: Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques},
    citeulike-article-id = {7845775},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-eurocrypt96.pdf},
    keywords = {authentication, building-blocks, most-downloaded, privacy, publications},
    location = {Saragossa, Spain},
    pages = {143--154},
    posted-at = {2010-09-17 03:11:48},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Designated verifier proofs and their applications},
    url = {http://markus-jakobsson.com/papers/jakobsson-eurocrypt96.pdf},
    year = {1996}
    }
  • M. Jakobsson and M. Yung, “Proving without knowing: on oblivious, agnostic and blindolded provers,” in Crypto ’96: proceedings of the 16th annual international cryptology conference on advances in cryptology, London, UK, 1996, pp. 186-200.
    [Bibtex]
    @inproceedings{proving-without-know,
    address = {London, UK},
    author = {Jakobsson, Markus and Yung, Moti},
    booktitle = {CRYPTO '96: Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology},
    citeulike-article-id = {7845774},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-crypto96.pdf},
    keywords = {authentication, building-blocks, privacy, publications},
    pages = {186--200},
    posted-at = {2010-09-17 03:11:48},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Proving Without Knowing: On Oblivious, Agnostic and Blindolded Provers},
    url = {http://markus-jakobsson.com/papers/jakobsson-crypto96.pdf},
    year = {1996}
    }
  • J. A. Garay, M. Jakobsson, and P. D. MacKenzie, “Abuse-Free optimistic contract signing,” in Crypto ’99: proceedings of the 19th annual international cryptology conference on advances in cryptology, London, UK, 1999, pp. 449-466.
    [Bibtex]
    @inproceedings{abuse-free-contract,
    address = {London, UK},
    author = {Garay, Juan A. and Jakobsson, Markus and MacKenzie, Philip D.},
    booktitle = {CRYPTO '99: Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology},
    citeulike-article-id = {7845769},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-crypto99.pdf},
    keywords = {authentication, building-blocks, encryption, publications},
    pages = {449--466},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {{Abuse-Free} Optimistic Contract Signing},
    url = {http://markus-jakobsson.com/papers/jakobsson-crypto99.pdf},
    year = {1999}
    }

Comments are closed.