Hoeteck Wee
Hoeteck Wee
Verified email at di.ens.fr
TitleCited byYear
Attribute-based encryption for circuits
S Gorbunov, V Vaikuntanathan, H Wee
Journal of the ACM (JACM) 62 (6), 45, 2015
3472015
Toward privacy in public databases
S Chawla, C Dwork, F McSherry, A Smith, H Wee
Theory of Cryptography Conference, 363-385, 2005
2962005
On obfuscating point functions
H Wee
Proceedings of the thirty-seventh annual ACM symposium on Theory of …, 2005
2612005
Functional encryption with bounded collusions via multi-party computation
S Gorbunov, V Vaikuntanathan, H Wee
Annual Cryptology Conference, 162-179, 2012
1982012
Selfish caching in distributed systems: a game-theoretic analysis
BG Chun, K Chaudhuri, H Wee, M Barreno, CH Papadimitriou, ...
Proceedings of the twenty-third annual ACM symposium on Principles of …, 2004
1912004
On the security of the TLS protocol: A systematic analysis
H Krawczyk, KG Paterson, H Wee
Annual Cryptology Conference, 429-448, 2013
1802013
Fully,(almost) tightly secure IBE and dual system groups
J Chen, H Wee
Annual Cryptology Conference, 435-460, 2013
157*2013
Functional encryption: New perspectives and lower bounds
S Agrawal, S Gorbunov, V Vaikuntanathan, H Wee
Annual Cryptology Conference, 500-518, 2013
1392013
Predicate encryption for circuits from LWE
S Gorbunov, V Vaikuntanathan, H Wee
Annual Cryptology Conference, 503-523, 2015
1282015
Functional encryption for threshold functions (or fuzzy IBE) from lattices
S Agrawal, X Boyen, V Vaikuntanathan, P Voulgaris, H Wee
International Workshop on Public Key Cryptography, 280-297, 2012
126*2012
Improved dual system ABE in prime-order groups via predicate encodings
J Chen, R Gay, H Wee
Annual International Conference on the Theory and Applications of …, 2015
1112015
Dual system encryption via predicate encodings
H Wee
Theory of Cryptography Conference, 616-637, 2014
1072014
Pebbling and proofs of work
C Dwork, M Naor, H Wee
Annual International Cryptology Conference, 37-54, 2005
902005
Public key encryption against related key attacks
H Wee
International Workshop on Public Key Cryptography, 262-279, 2012
872012
Efficient chosen-ciphertext security via extractable hash proofs
H Wee
Annual Cryptology Conference, 314-332, 2010
832010
Black-box constructions of two-party protocols from one-way functions
R Pass, H Wee
Theory of Cryptography Conference, 403-418, 2009
812009
Black-box, round-efficient secure computation via non-malleability amplification
H Wee
2010 IEEE 51st Annual Symposium on Foundations of Computer Science, 531-540, 2010
732010
Quasi-adaptive NIZK for linear subspaces revisited
E Kiltz, H Wee
Annual International Conference on the Theory and Applications of …, 2015
722015
The OPTLS protocol and TLS 1.3
H Krawczyk, H Wee
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 81-96, 2016
712016
Encryption schemes secure against chosen-ciphertext selective opening attacks
S Fehr, D Hofheinz, E Kiltz, H Wee
Annual International Conference on the Theory and Applications of …, 2010
682010
The system can't perform the operation now. Try again later.
Articles 1–20