Melissa Chase
Orcid: 0009-0003-8333-3942Affiliations:
- Microsoft Research
According to our database1,
Melissa Chase
authored at least 69 papers
between 2005 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the Security and Cryptography for Networks - 13th International Conference, 2022
2021
Proceedings of the Theory of Cryptography - 19th International Conference, 2021
2020
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
The Signal Private Group System and Anonymous Credentials Supporting Efficient Verifiable Encryption.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
2019
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
2017
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Theory of Cryptography - 13th International Conference, 2016
Efficient Zero-Knowledge Proof of Algebraic and Non-Algebraic Statements with Applications to Privacy Preserving Credentials.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
2015
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015
2014
Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Malleable Signatures: Complex Unary Transformations and Delegatable Anonymous Credentials.
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013
2012
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012
Inspection resistant memory: Architectural support for security from physical examination.
Proceedings of the 39th International Symposium on Computer Architecture (ISCA 2012), 2012
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012
Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012
2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
2010
Proceedings of the 1st USENIX Workshop on Health Security and Privacy, 2010
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010
2009
Proceedings of the Pairing-Based Cryptography, 2009
Proceedings of the Advances in Cryptology, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
Proceedings of the first ACM Cloud Computing Security Workshop, 2009
2008
PhD thesis, 2008
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008
Proceedings of the ACM SIGCOMM 2008 Workshop on Economics of Networked Systems, 2008
2007
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007
Proceedings of the Theory of Cryptography, 4th Theory of Cryptography Conference, 2007
Proceedings of the Advances in Cryptology, 2007
2006
2005
Proceedings of the Advances in Cryptology, 2005