Karen Klein

According to our database1, Karen Klein authored at least 19 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Compact Selective Opening Security from LWE.
Proceedings of the Public-Key Cryptography - PKC 2024, 2024

2023
The Power of Undirected Rewindings for Adaptive Security.
IACR Cryptol. ePrint Arch., 2023

Compact Lossy Trapdoor Functions and Selective Opening Security From LWE.
IACR Cryptol. ePrint Arch., 2023

2022
Practical Statistically-Sound Proofs of Exponentiation in any Group.
IACR Cryptol. ePrint Arch., 2022

CoCoA: Concurrent Continuous Group Key Agreement.
IACR Cryptol. ePrint Arch., 2022

Coffee: Fast Healing Concurrent Continuous Group Key Agreement for Decentralized Group Messaging.
IACR Cryptol. ePrint Arch., 2022

SNACKs: Leveraging Proofs of Sequential Work for Blockchain Light Clients.
IACR Cryptol. ePrint Arch., 2022

2021
Limits on the Adaptive Security of Yao's Garbling.
IACR Cryptol. ePrint Arch., 2021

On the Cost of Adaptivity in Graph-Based Games.
IACR Cryptol. ePrint Arch., 2021

On Treewidth, Separators and Yao's Garbling.
IACR Cryptol. ePrint Arch., 2021

Grafting Key Trees: Efficient Key Management for Overlapping Groups.
IACR Cryptol. ePrint Arch., 2021

The Cost of Adaptivity in Security Games on Graphs.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Keep the Dirt: Tainted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

2020
Inverse-Sybil Attacks in Automated Contact Tracing.
IACR Cryptol. ePrint Arch., 2020

2019
Keep the Dirt: Tainted TreeKEM, an Efficient and Provably Secure Continuous Group Key Agreement Protocol.
IACR Cryptol. ePrint Arch., 2019

Reversible Proofs of Sequential Work.
IACR Cryptol. ePrint Arch., 2019

2018
Adaptively Secure Proxy Re-encryption.
IACR Cryptol. ePrint Arch., 2018

2017
Be Adaptive, Avoid Overcommitting.
IACR Cryptol. ePrint Arch., 2017

2016
On the Memory-Hardness of Data-Independent Password-Hashing Functions.
IACR Cryptol. ePrint Arch., 2016


  Loading...