Alejandro Hevia
Alejandro Hevia
Computer Science Department, University of Chile
Verified email at dcc.uchile.cl - Homepage
Title
Cited by
Cited by
Year
UMAC: Message authentication code using universal hashing
T Krovetz, J Black, S Halevi, A Hevia, H Krawczyk, P Rogaway
RFC 4418, 2006
1052006
An indistinguishability-based characterization of anonymous channels
A Hevia, D Micciancio
International Symposium on Privacy Enhancing Technologies Symposium, 24-43, 2008
632008
Surviving Internet Catastrophes.
FP Junqueira, R Bhagwan, A Hevia, K Marzullo, GM Voelker
USENIX Annual Technical Conference, General Track, 45-60, 2005
612005
Method and apparatus for authentication of data streams with adaptively controlled losses
C Gentry, A Hevia, R Kumar, T Kawahara, Z Ramzan
US Patent App. 10/543,640, 2006
592006
A practice-oriented treatment of pseudorandom number generators
A Desai, A Hevia, YL Yin
International Conference on the Theory and Applications of Cryptographic …, 2002
582002
Strength of two Data Encryption Standard implementations under timing attacks
A Hevia, M Kiwi
ACM Transactions on Information and System Security (TISSEC) 2 (4), 416-437, 1999
551999
Strong accumulators from collision-resistant hashing
P Camacho, A Hevia, M Kiwi, R Opazo
International Conference on Information Security, 471-486, 2008
52*2008
Latent semantic analysis and keyword extraction for phishing classification
G L'Huillier, A Hevia, R Weber, S Rios
2010 IEEE international conference on intelligence and security informatics …, 2010
452010
The provable security of graph-based one-time signatures and extensions to algebraic signature schemes
A Hevia, D Micciancio
International Conference on the Theory and Application of Cryptology and …, 2002
382002
QA-NIZK arguments in asymmetric groups: new tools and new constructions
A González, A Hevia, C Ràfols
International Conference on the Theory and Application of Cryptology and …, 2015
272015
Short transitive signatures for directed trees
P Camacho, A Hevia
Cryptographers’ Track at the RSA Conference, 35-50, 2012
252012
End-to-end security in the presence of intelligent data adapting proxies: The case of authenticating transcoded streaming media
C Gentry, A Hevia, R Jain, T Kawahara, Z Ramzan
IEEE Journal on Selected Areas in Communications 23 (2), 464-473, 2005
252005
Electronic jury voting protocols
A Hevia, M Kiwi
Theoretical Computer Science 321 (1), 73-94, 2004
232004
On the impossibility of batch update for cryptographic accumulators
P Camacho, A Hevia
International Conference on Cryptology and Information Security in Latin …, 2010
192010
Strength of two data encryption standard implementations under timing attacks
A Hevia, M Kiwi
Latin American Symposium on Theoretical Informatics, 192-205, 1998
191998
Electronic jury voting protocols
A Hevia, M Kiwi
Latin American Symposium on Theoretical Informatics, 415-429, 2002
17*2002
Simultaneous broadcast revisited
A Hevia, D Micciancio
Proceedings of the twenty-fourth annual ACM symposium on Principles of …, 2005
142005
Enhanced ANSI X9. 17 pseudorandom number generators with forward security
A Desai, Y Yin, A Hevia
US Patent 7,227,951, 2007
132007
Method and apparatus for authenication of data streams with adaptively controlled losses
CB Gentry, A Hevia, RK Jain, T Kawahara, ZA Ramzan
US Patent App. 12/560,963, 2010
112010
Beating the birthday paradox in dining cryptographer networks
P García, J van de Graaf, A Hevia, A Viola
International Conference on Cryptology and Information Security in Latin …, 2014
102014
The system can't perform the operation now. Try again later.
Articles 1–20