Alejandro Hevia
Alejandro Hevia
Computer Science Department, University of Chile
Verified email at dcc.uchile.cl - Homepage
TitleCited byYear
Method and apparatus for authentication of data streams with adaptively controlled losses
C Gentry, A Hevia, R Kumar, T Kawahara, Z Ramzan
US Patent App. 10/543,640, 2006
582006
Surviving Internet Catastrophes.
FP Junqueira, R Bhagwan, A Hevia, K Marzullo, GM Voelker
USENIX Annual Technical Conference, General Track, 45-60, 2005
582005
An indistinguishability-based characterization of anonymous channels
A Hevia, D Micciancio
International Symposium on Privacy Enhancing Technologies Symposium, 24-43, 2008
552008
A practice-oriented treatment of pseudorandom number generators
A Desai, A Hevia, YL Yin
International Conference on the Theory and Applications of Cryptographic …, 2002
552002
Strength of two Data Encryption Standard implementations under timing attacks
A Hevia, M Kiwi
ACM Transactions on Information and System Security (TISSEC) 2 (4), 416-437, 1999
501999
Strong accumulators from collision-resistant hashing
P Camacho, A Hevia, M Kiwi, R Opazo
International Conference on Information Security, 471-486, 2008
35*2008
The provable security of graph-based one-time signatures and extensions to algebraic signature schemes
A Hevia, D Micciancio
International Conference on the Theory and Application of Cryptology and …, 2002
342002
Latent semantic analysis and keyword extraction for phishing classification
G L'Huillier, A Hevia, R Weber, S Rios
2010 IEEE international conference on intelligence and security informatics …, 2010
302010
End-to-end security in the presence of intelligent data adapting proxies: The case of authenticating transcoded streaming media
C Gentry, A Hevia, R Jain, T Kawahara, Z Ramzan
IEEE Journal on Selected Areas in Communications 23 (2), 464-473, 2005
262005
Short transitive signatures for directed trees
P Camacho, A Hevia
Cryptographers’ Track at the RSA Conference, 35-50, 2012
202012
Electronic jury voting protocols
A Hevia, M Kiwi
Theoretical Computer Science 321 (1), 73-94, 2004
192004
Strength of two data encryption standard implementations under timing attacks
A Hevia, M Kiwi
Latin American Symposium on Theoretical Informatics, 192-205, 1998
171998
QA-NIZK arguments in asymmetric groups: new tools and new constructions
A González, A Hevia, C Ràfols
International Conference on the Theory and Application of Cryptology and …, 2015
152015
Electronic jury voting protocols
A Hevia, M Kiwi
Latin American Symposium on Theoretical Informatics, 415-429, 2002
14*2002
Enhanced ANSI X9. 17 pseudorandom number generators with forward security
A Desai, Y Yin, A Hevia
US Patent 7,227,951, 2007
132007
On the impossibility of batch update for cryptographic accumulators
P Camacho, A Hevia
International Conference on Cryptology and Information Security in Latin …, 2010
122010
Method and apparatus for authenication of data streams with adaptively controlled losses
CB Gentry, A Hevia, RK Jain, T Kawahara, ZA Ramzan
US Patent App. 12/560,963, 2010
112010
Simultaneous broadcast revisited
A Hevia, D Micciancio
Proceedings of the twenty-fourth annual ACM symposium on Principles of …, 2005
112005
Method and apparatus for authentication of data streams with adaptively controlled losses
CB Gentry, A Hevia, RK Jain, T Kawahara, ZA Ramzan
US Patent 8,256,015, 2012
82012
Beating the Birthday Paradox in Dining Cryptographer Networks
P García, J van de Graaf, A Hevia, A Viola
International Conference on Cryptology and Information Security in Latin …, 2014
72014
The system can't perform the operation now. Try again later.
Articles 1–20