Jonathan Katz
Orcid: 0000-0001-6084-9303Affiliations:
- University of Maryland, College Park, USA
According to our database1,
Jonathan Katz
authored at least 272 papers
between 2000 and 2025.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2021, "For contributions to cryptographic protocol design and cryptography education".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on cs.umd.edu
-
on isni.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2025
IACR Cryptol. ePrint Arch., 2025
Fair Exchange for Decentralized Autonomous Organizations via Threshold Adaptor Signatures.
IACR Cryptol. ePrint Arch., 2025
Honest-Majority Threshold ECDSA with Batch Generation of Key-Independent Presignatures.
IACR Commun. Cryptol., 2025
Proceedings of the IEEE Symposium on Security and Privacy, 2025
Hash-Prune-Invert: Improved Differentially Private Heavy-Hitter Detection in the Two-Server Model.
Proceedings of the IEEE Symposium on Security and Privacy, 2025
Proceedings of the 10th IEEE European Symposium on Security and Privacy, 2025
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
A Quantum "Lifting Theorem" for Constructions of Pseudorandom Generators from Random Oracles.
CoRR, 2024
Proceedings of the 38th International Symposium on Distributed Computing, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the Post-Quantum Cryptography - 15th International Workshop, 2024
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Manticore: A Framework for Efficient Multiparty Computation Supporting Real Number and Boolean Arithmetic.
J. Cryptol., July, 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the International Conference on Machine Learning, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023
2022
Found. Trends Priv. Secur., 2022
Proceedings of the Security and Cryptography for Networks - 13th International Conference, 2022
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
Private Anomaly Detection in Linear Controllers: Garbled Circuits vs. Homomorphic Encryption.
Proceedings of the 61st IEEE Conference on Decision and Control, 2022
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022
Spreading the Privacy Blanket: - Differentially Oblivious Shuffling for Differential Privacy.
Proceedings of the Applied Cryptography and Network Security, 2022
2021
IEEE Trans. Dependable Secur. Comput., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications to Machine Learning.
Proceedings of the 30th USENIX Security Symposium, 2021
Wolverine: Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the AAMAS '21: 20th International Conference on Autonomous Agents and Multiagent Systems, 2021
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
2020
Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Theory of Cryptography - 18th International Conference, 2020
Proceedings of the Theory of Cryptography - 18th International Conference, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
2019
Proceedings of the Theory of Cryptography - 17th International Conference, 2019
Proceedings of the Post-Quantum Cryptography - 10th International Conference, 2019
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019
Proceedings of the 2019 American Control Conference, 2019
Proceedings of the 1st ACM Conference on Advances in Financial Technologies, 2019
2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
Provable Security of (Tweakable) Block Ciphers Based on Substitution-Permutation Networks.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Authenticated Garbling and Communication-Efficient, Constant-Round, Secure Two-Party Computation.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the Financial Cryptography and Data Security, 2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017
Experimentation for Developing Evidence-Based UI Standards of Mobile Survey Questionnaires.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017
2016
Faster Two-Party Computation Secure Against Malicious Adversaries in the Single-Execution Setting.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 25th USENIX Security Symposium, 2016
All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption.
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the Security Standardisation Research - Third International Conference, 2016
A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
2015
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015
Adaptively Secure, Universally Composable, Multiparty Computation in Constant Rounds.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015
Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing, 2015
Proceedings of the Topics in Cryptology, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
SIGACT News, 2014
IACR Cryptol. ePrint Arch., 2014
Adaptively Secure, Universally Composable, Multi-Party Computation in Constant Rounds.
IACR Cryptol. ePrint Arch., 2014
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens.
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Proceedings of the 41st Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2014
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2014
Proceedings of the Public-Key Cryptography - PKC 2014, 2014
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Cryptography.
Proceedings of the Computing Handbook, 2014
CRC Press, ISBN: 9781466570269, 2014
2013
SIGACT News, 2013
Review of Applied Information Security by David Basin, Patrick Schaller, and Michael Schläpfer.
SIGACT News, 2013
Electron. Colloquium Comput. Complex., 2013
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013
Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures, 2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013
Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013
Proceedings of the 54th Annual IEEE Symposium on Foundations of Computer Science, 2013
Coupled-Worlds Privacy: Exploiting Adversarial Uncertainty in Statistical Data Privacy.
Proceedings of the 54th Annual IEEE Symposium on Foundations of Computer Science, 2013
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013
2012
Review of efficient secure two-party protocols: techniques and constructions by Carmit Hazay and Yehuda Lindell.
SIGACT News, 2012
Special Section on the Forty-First Annual ACM Symposium on Theory of Computing (STOC 2009).
SIAM J. Comput., 2012
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Proceedings of the 2012 Workshop on Programming Languages and Analysis for Security, 2012
Proceedings of the Public Key Cryptography - PKC 2012, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the Automata, Languages, and Programming - 39th International Colloquium, 2012
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012
Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line Marketplaces.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
SIAM J. Comput., 2011
Proceedings of the 20th USENIX Security Symposium, 2011
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011
Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, 2011
Proceedings of the Network and Distributed System Security Symposium, 2011
Proceedings of the Information Systems Security - 7th International Conference, 2011
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011
2010
Proceedings of the Handbook of Information and Communication Security, 2010
J. Cryptol., 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2010
Proceedings of the Public Key Cryptography, 2010
Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage.
Proceedings of the 51th Annual IEEE Symposium on Foundations of Computer Science, 2010
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010
2009
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009
Proceedings of the Public Key Cryptography, 2009
Proceedings of the Advances in Cryptology, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
Proceedings of the Advances in Cryptology, 2009
Proceedings of the Advances in Cryptology, 2009
Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices.
Proceedings of the Advances in Cryptology, 2009
Proceedings of the Advances in Cryptology, 2009
2008
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008
Universally Composable Multi-party Computation with an Unreliable Common Reference String.
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008
Proceedings of the 40th Annual ACM Symposium on Theory of Computing, 2008
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products.
Proceedings of the Advances in Cryptology, 2008
Proceedings of the Topics in Cryptology, 2008
2007
Review of "Probability and Computing: Randomized Algorithms and Probabilitic Analysis by Michael Mitzenmacher and Eli Upfal", Cambridge University Press, 2005.
SIGACT News, 2007
J. Cryptol., 2007
Proceedings of the Theory of Cryptography, 4th Theory of Cryptography Conference, 2007
Proceedings of the 39th Annual ACM Symposium on Theory of Computing, 2007
Efficient Cryptographic Protocols Based on the Hardness of Learning Parity with Noise.
Proceedings of the Cryptography and Coding, 2007
Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science, 2007
Proceedings of the Advances in Cryptology, 2007
Proceedings of the Advances in Cryptology, 2007
Proceedings of the Advances in Cryptology, 2007
Proceedings of the Fourth International Conference on Broadband Communications, 2007
Chapman and Hall/CRC Press, ISBN: 978-1-58488-551-1, 2007
2006
Review of "Primality Testing in Polynomial Time by Martin Dietzfelbinger", Springer-Verlag, 2004.
SIGACT News, 2006
Review of "A Computational Introduction to Number Theory and Algebra by Victor Shoup", Cambridge University Press, 2005.
SIGACT News, 2006
J. Cryptol., 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Theory of Cryptography, Third Theory of Cryptography Conference, 2006
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006
Proceedings of the Twenty-Fifth Annual ACM Symposium on Principles of Distributed Computing, 2006
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006
Proceedings of the Advances in Cryptology, 2006
Proceedings of the Advances in Cryptology, 2006
2005
ACM Trans. Inf. Syst. Secur., 2005
Comparative book review: Cryptography: An Introduction by V. V. Yaschenko (American Mathematical Society, 2002); Cryptanalysis of Number Theoretic Ciphers by S.S. Wagstaff, Jr. (Chapman & Hall/CRC Press, 2003); RSA and Public-Key Cryptography by R. A. Mollin (Chapman & Hall/CRC Press, 2003); Foundations of Cryptography, vol. 1: Basic Tools by O. Goldreich, (Cambridge University Press, 2001).
SIGACT News, 2005
SIAM J. Comput., 2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005
Proceedings of the Advances in Cryptology, 2005
Proceedings of the Advances in Cryptology, 2005
Proceedings of the Advances in Cryptology, 2005
Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption.
Proceedings of the Topics in Cryptology, 2005
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005
Proceedings of the Applied Cryptography and Network Security, 2005
2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Security in Communication Networks, 4th International Conference, 2004
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004
Proceedings of the Advances in Cryptology, 2004
Proceedings of the Topics in Cryptology, 2004
Proceedings of the Advances in Cryptology, 2004
Proceedings of the Applied Cryptography and Network Security, 2004
2003
Proceedings of the 35th Annual ACM Symposium on Theory of Computing, 2003
Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT 2003), 27-31 January 2003, 2003
Proceedings of the Public Key Cryptography, 2003
Proceedings of the Information Security and Cryptology, 2003
Proceedings of the Advances in Cryptology, 2003
Proceedings of the Advances in Cryptology, 2003
Proceedings of the Advances in Cryptology, 2003
Proceedings of the Topics in Cryptology, 2003
Proceedings of the Advances in Cryptology, 2003
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003
2002
Proceedings of the Security in Communication Networks, Third International Conference, 2002
Proceedings of the Information Security, 5th International Conference, 2002
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002
Proceedings of the Advances in Cryptology, 2002
2001
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001
Proceedings of the Advances in Cryptology, 2001
Proceedings of the Advances in Cryptology, 2001
Proceedings of the Advances in Cryptology, 2001
2000
Proceedings of the 9th USENIX Security Symposium, 2000
Complete characterization of security notions for probabilistic private-key encryption.
Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, 2000
Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, 2000
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000