Ron Steinfeld
Ron Steinfeld
Senior Lecturer, Monash University
Verified email at monash.edu - Homepage
TitleCited byYear
Faster fully homomorphic encryption
D Stehlé, R Steinfeld
International Conference on the Theory and Application of Cryptology and …, 2010
3802010
Making NTRU as Secure as Worst-Case Problems over Ideal Lattices
D Stehlé, R Steinfeld
Annual International Conference on the Theory and Applications of …, 2011
3632011
Formal proofs for the security of signcryption
J Baek, R Steinfeld, Y Zheng
International Workshop on Public Key Cryptography, 80-98, 2002
3102002
Universal designated-verifier signatures
R Steinfeld, L Bull, H Wang, J Pieprzyk
International Conference on the Theory and Application of Cryptology and …, 2003
2482003
Content extraction signatures
R Steinfeld, L Bull, Y Zheng
International Conference on Information Security and Cryptology, 285-304, 2001
2402001
Efficient public key encryption based on ideal lattices
D Stehlé, R Steinfeld, K Tanaka, K Xagawa
International Conference on the Theory and Application of Cryptology and …, 2009
2002009
Formal proofs for the security of signcryption
J Baek, R Steinfeld, Y Zheng
Journal of cryptology 20 (2), 203-235, 2007
1502007
VSH, an efficient and provable collision-resistant hash function
S Contini, AK Lenstra, R Steinfeld
Annual International Conference on the Theory and Applications of …, 2006
1312006
GGHLite: More efficient multilinear maps from ideal lattices
A Langlois, D Stehlé, R Steinfeld
Annual International Conference on the Theory and Applications of …, 2014
1202014
Efficient extension of standard Schnorr/RSA signatures into universal designated-verifier signatures
R Steinfeld, H Wang, J Pieprzyk
International Workshop on Public Key Cryptography, 86-100, 2004
1192004
A signcryption scheme based on integer factorization
R Steinfeld, Y Zheng
International Workshop on Information Security, 308-322, 2000
1172000
Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance
S Bai, T Lepoint, A Roux-Langlois, A Sakzad, D Stehlé, R Steinfeld
Journal of Cryptology 31 (2), 610-640, 2018
922018
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface
M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ...
Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006
752006
How to strengthen any weakly unforgeable signature into a strongly unforgeable signature
R Steinfeld, J Pieprzyk, H Wang
Cryptographers’ Track at the RSA Conference, 357-371, 2007
552007
An efficient non-interactive multi-client searchable encryption with support for boolean queries
SF Sun, JK Liu, A Sakzad, R Steinfeld, TH Yuen
European symposium on research in computer security, 154-172, 2016
442016
Still jumping on the balance beam: Continued use of perceptual motor programs in Australian schools
J Stephenson, M Carter, K Wheldall
Australian journal of Education 51 (1), 6-18, 2007
37*2007
New constructions of anonymous membership broadcasting schemes
H Van Tilborg, J Pieprzyk, R Steinfeld, H Wang
Advances in Mathematics of communications 1 (1), 29, 2007
322007
A non-malleable group key exchange protocol robust against active insiders
Y Desmedt, J Pieprzyk, R Steinfeld, H Wang
International Conference on Information Security, 459-475, 2006
312006
Noisy Chinese remaindering in the Lee norm
IE Shparlinski, R Steinfeld
Journal of Complexity 20 (2-3), 423-437, 2004
312004
Hardness of k-LWE and applications in traitor tracing
S Ling, DH Phan, D Stehlé, R Steinfeld
Algorithmica 79 (4), 1318-1352, 2017
302017
The system can't perform the operation now. Try again later.
Articles 1–20