Ran Canetti
Orcid: 0000-0002-5479-7540Affiliations:
- Boston University, USA
- Tel Aviv University, Israel
According to our database1,
Ran Canetti
authored at least 201 papers
between 1990 and 2025.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2020, "For contributions to cryptography and computer security".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on cs.tau.ac.il
-
on dl.acm.org
On csauthors.net:
Bibliography
2025
IACR Cryptol. ePrint Arch., 2025
Proceedings of the IEEE Symposium on Security and Privacy, 2025
Proceedings of the 26th ACM Conference on Economics and Computation, 2025
2024
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024
2023
Proceedings of the Theory of Cryptography - 21st International Conference, 2023
Proceedings of the 14th Innovations in Theoretical Computer Science Conference, 2023
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
2022
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
Using Zero-Knowledge to Reconcile Law Enforcement Secrecy and Fair Trial Rights in Criminal Cases.
Proceedings of the 2022 Symposium on Computer Science and Law, 2022
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022
2021
Proceedings of the Theory of Cryptography - 19th International Conference, 2021
2020
CoRR, 2020
Proceedings of the Theory of Cryptography - 18th International Conference, 2020
Universal Composition with Global Subroutines: Capturing Global Setup Within Plain UC.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020
Proceedings of the Public-Key Cryptography - PKC 2020, 2020
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020
Proceedings of the Topics in Cryptology - CT-RSA 2020, 2020
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Efficient and Round-Optimal Oblivious Transfer and Commitment with Adaptive Security.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
2019
Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing, 2019
Proceedings of the 2019 IEEE Cybersecurity Development, 2019
Proceedings of the Conference on Fairness, Accountability, and Transparency, 2019
Proceedings of the 32nd IEEE Computer Security Foundations Symposium, 2019
2018
SIAM J. Comput., 2018
Non-Interactive Zero Knowledge and Correlation Intractability from Circular-Secure FHE.
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Theory of Cryptography - 16th International Conference, 2018
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Theory of Cryptography - 15th International Conference, 2017
Equivocating Yao: constant-round adaptively secure multiparty computation in the plain model.
Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, 2017
Proceedings of the Public-Key Cryptography - PKC 2017, 2017
Proceedings of the Public-Key Cryptography - PKC 2017, 2017
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Theory of Cryptography - 13th International Conference, 2016
Proceedings of the Theory of Cryptography - 14th International Conference, 2016
Proceedings of the Public-Key Cryptography - PKC 2016, 2016
Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, 2016
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016
2015
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015
Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, 2015
Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, Melbourne, Victoria, Australia, May 31, 2015
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
A Simpler Variant of Universally Composable Security for Standard Multiparty Computation.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014
Proceedings of the Symposium on Theory of Computing, 2014
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014
Proceedings of the Public-Key Cryptography - PKC 2014, 2014
Client-Server Concurrent Zero Knowledge with Constant Rounds and Guaranteed Complexity.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Proceedings of the Secure Multi-Party Computation, 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Indistinguishability Obfuscation vs. Auxiliary-Input Extractable Functions: One Must Fall.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013
Proceedings of the Symposium on Theory of Computing Conference, 2013
Proceedings of the 54th Annual IEEE Symposium on Foundations of Computer Science, 2013
2012
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012
Proceedings of the Public Key Cryptography - PKC 2012, 2012
From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again.
Proceedings of the Innovations in Theoretical Computer Science 2012, 2012
Proceedings of the Information Theoretic Security - 6th International Conference, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011
Proceedings of the Applied Cryptography and Network Security, 2011
2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010
Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions.
Proceedings of the 51th Annual IEEE Symposium on Foundations of Computer Science, 2010
Proceedings of the Advances in Cryptology, 2010
2009
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009
2008
IACR Cryptol. ePrint Arch., 2008
Discret. Event Dyn. Syst., 2008
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008
Proceedings of the Advances in Cryptology, 2008
Proceedings of the Theoretical Foundations of Practical Information Security, 30.11., 2008
08491 Abstracts Collection - Theoretical Foundations of Practical Information Security.
Proceedings of the Theoretical Foundations of Practical Information Security, 30.11., 2008
Proceedings of the Theoretical Foundations of Practical Information Security, 30.11., 2008
Proceedings of the 1st ACM Workshop on Security and Artificial Intelligence, 2008
2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Theory of Cryptography, 4th Theory of Cryptography Conference, 2007
Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science, 2007
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007
Proceedings of the Advances in Cryptology, 2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
Proceedings of the Advances in Cryptology, 2007
2006
SIGACT News, 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Distributed Computing, 20th International Symposium, 2006
Universally Composable Symbolic Analysis of Mutual Authentication and Key-Exchange Protocols.
Proceedings of the Theory of Cryptography, Third Theory of Cryptography Conference, 2006
Proceedings of the Advances in Cryptology, 2006
2005
Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction.
RFC, June, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005
Proceedings of the Advances in Cryptology, 2005
Proceedings of the Advances in Cryptology, 2005
2004
ACM Trans. Inf. Syst. Secur., 2004
Universally Composable Symbolic Analysis of Cryptographic Protocols (The case of encryption-based mutual authentication and key exchange).
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004
Proceedings of the 45th Symposium on Foundations of Computer Science, 2004
Proceedings of the Advances in Cryptology, 2004
Proceedings of the 17th IEEE Computer Security Foundations Workshop, 2004
2003
IACR Cryptol. ePrint Arch., 2003
On the Limitations of Universally Composable Two-Party Computation without Set-up Assumptions.
Proceedings of the Advances in Cryptology, 2003
Proceedings of the Advances in Cryptology, 2003
Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card.
Proceedings of the Computer Security, 2003
Proceedings of the Advances in Cryptology, 2003
2002
SIAM J. Comput., 2002
Proceedings of the Proceedings on 34th Annual ACM Symposium on Theory of Computing, 2002
Proceedings of the First International IEEE Security in Storage Workshop, 2002
Proceedings of the Software Security -- Theories and Systems, 2002
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002
Proceedings of the Advances in Cryptology, 2002
2001
Electron. Colloquium Comput. Complex., 2001
Proceedings of the Proceedings on 33rd Annual ACM Symposium on Theory of Computing, 2001
Proceedings of the Security Protocols, 2001
Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing, 2001
Proceedings of the Network and Distributed System Security Symposium, 2001
Proceedings of the 42nd Annual Symposium on Foundations of Computer Science, 2001
Proceedings of the Advances in Cryptology, 2001
Proceedings of the Advances in Cryptology, 2001
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001
2000
Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, 2000
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000
Proceedings of the Network and Distributed System Security Symposium, 2000
Proceedings of the Advances in Cryptology, 2000
1999
Secure Computation with Honest-Looking Parties: What If Nobody Is Truly Honest? (Extended Abstract).
Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing, 1999
Proceedings of the Proceedings IEEE INFOCOM '99, 1999
Proceedings of the Advances in Cryptology, 1999
An Efficient <i>Threshold</i> Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack.
Proceedings of the Advances in Cryptology, 1999
Proceedings of the Advances in Cryptology, 1999
1998
IACR Cryptol. ePrint Arch., 1998
A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols.
IACR Cryptol. ePrint Arch., 1998
Proceedings of the Thirtieth Annual ACM Symposium on the Theory of Computing, 1998
Proceedings of the Thirtieth Annual ACM Symposium on the Theory of Computing, 1998
A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols (Extended Abstract).
Proceedings of the Thirtieth Annual ACM Symposium on the Theory of Computing, 1998
1997
Proceedings of the Sixteenth Annual ACM Symposium on Principles of Distributed Computing, 1997
Proceedings of the Sixteenth Annual ACM Symposium on Principles of Distributed Computing, 1997
Proceedings of the Advances in Cryptology, 1997
1996
Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, 1996
Proceedings of the 37th Annual Symposium on Foundations of Computer Science, 1996
Pseudorandom Functions Revisited: The Cascade Construction and Its Concrete Security.
Proceedings of the 37th Annual Symposium on Foundations of Computer Science, 1996
Proceedings of the Advances in Cryptology, 1996
1995
Inf. Process. Lett., 1995
Proceedings of the Twenty-Seventh Annual ACM Symposium on Theory of Computing, 1995
Proceedings of the Twenty-Seventh Annual ACM Symposium on Theory of Computing, 1995
1994
Proceedings of the Advances in Cryptology, 1994
1993
Proceedings of the Twenty-Fifth Annual ACM Symposium on Theory of Computing, 1993
Proceedings of the Twenty-Fifth Annual ACM Symposium on Theory of Computing, 1993
1991
1990
Proceedings of the 31st Annual Symposium on Foundations of Computer Science, 1990