Charles Rackoff

Affiliations:
  • University of Toronto, Canada


According to our database1, Charles Rackoff authored at least 42 papers between 1972 and 2019.

Collaborative distances:
  • Dijkstra number2 of two.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2019
The knowledge complexity of interactive proof-systems.
Proceedings of the Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali, 2019

2013
Rethinking Definitions of Security for Session Key Agreement.
IACR Cryptol. ePrint Arch., 2013

Secure Key Exchange and Sessions Without Credentials.
IACR Cryptol. ePrint Arch., 2013

2012
How powerful are the DDH hard groups?
Electron. Colloquium Comput. Complex., 2012

2011
On "identities", "names", "NAMES", "ROLES" and Security: A Manifesto.
IACR Cryptol. ePrint Arch., 2011

2010
Characterizing sets of jobs that admit optimal greedy-like algorithms.
J. Sched., 2010

2009
The Black-Box Query Complexity of Polynomial Summation.
Comput. Complex., 2009

2008
Password Mistyping in Two-Factor-Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2008

On Seed-Incompressible Functions.
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008

On the Impossibility of Basing Identity Based Encryption on Trapdoor Permutations.
Proceedings of the 49th Annual IEEE Symposium on Foundations of Computer Science, 2008

2006
Key Exchange Using Passwords and Long Keys.
IACR Cryptol. ePrint Arch., 2006

2005
Simple permutations mix well.
Theor. Comput. Sci., 2005

Lower Bounds For Concurrent Zero Knowledge*.
Comb., 2005

2004
Efficient Consistency Proofs for Generalized Queries on a Committed Database.
IACR Cryptol. ePrint Arch., 2004

2003
(Incremental) Priority Algorithms.
Algorithmica, 2003

2000
CBC MAC for Real-Time Data Sources.
J. Cryptol., 2000

Efficiently Approximable Real-Valued Functions
Electron. Colloquium Comput. Complex., 2000

1998
Lower Bounds for Zero Knowledge on the Internet.
Proceedings of the 39th Annual Symposium on Foundations of Computer Science, 1998

1996
A Secure Protocol for the Oblivious Transfer (Extended Abstract).
J. Cryptol., 1996

1993
Cryptographic defense against traffic analysis.
Proceedings of the Twenty-Fifth Annual ACM Symposium on Theory of Computing, 1993

1992
Some definitions, protocols and proofs about secure authentication.
Proceedings of the 1992 Conference of the Centre for Advanced Studies on Collaborative Research, 1992

1991
Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack.
Proceedings of the Advances in Cryptology, 1991

1989
The Knowledge Complexity of Interactive Proof Systems.
SIAM J. Comput., 1989

A Study of Password Security.
J. Cryptol., 1989

Secret Bit Transmission Using a Random Deal of Cards.
Proceedings of the Distributed Computing And Cryptography, 1989

1988
The Notion of Security for Probabilistic Cryptosystems.
SIAM J. Comput., 1988

How to Construct Pseudorandom Permutations from Pseudorandom Functions.
SIAM J. Comput., 1988

A Basic Theory of Public and Private Cryptosystems.
Proceedings of the Advances in Cryptology, 1988

1986
Pseudo-random Permutation Generators and Cryptographic Composition
Proceedings of the 18th Annual ACM Symposium on Theory of Computing, 1986

1985
The Knowledge Complexity of Interactive Proof-Systems (Extended Abstract)
Proceedings of the 17th Annual ACM Symposium on Theory of Computing, 1985

How to Construct Pseudo-Random Permutations from Pseudo-Random Functions (Abstract).
Proceedings of the Advances in Cryptology, 1985

1983
Fast Parallel Computation of Polynomials Using Few Processors.
SIAM J. Comput., 1983

How to Simultaneously Exchange a Secret Bit by Flipping a Symmetrically-Biased Coin
Proceedings of the 24th Annual Symposium on Foundations of Computer Science, 1983

1982
Relativized Questions Involving Probabilistic Algorithms.
J. ACM, 1982

1981
Limitations on Separating Nondeterministic Complexity Classes.
SIAM J. Comput., 1981

1980
Space Lower Bounds for Maze Threadability on Restricted Machines.
SIAM J. Comput., 1980

1979
Random Walks, Universal Traversal Sequences, and the Complexity of Maze Problems
Proceedings of the 20th Annual Symposium on Foundations of Computer Science, 1979

1978
The Covering and Boundedness Problems for Vector Addition Systems.
Theor. Comput. Sci., 1978

1976
On the Complexity of the Theories of Weak Direct Powers.
J. Symb. Log., 1976

1975
A Decision Procedure for the First Order Theory of Real Addition with Order.
SIAM J. Comput., 1975

1974
On the Complexity of the Theories of Weak Direct Products: A Preliminary Report
Proceedings of the 6th Annual ACM Symposium on Theory of Computing, April 30, 1974

1972
The Emptiness Problem for Automata on Infinite Trees
Proceedings of the 13th Annual Symposium on Switching and Automata Theory, 1972


  Loading...