Follow
Hoeteck Wee
Hoeteck Wee
Verified email at di.ens.fr
Title
Cited by
Cited by
Year
Attribute-based encryption for circuits
S Gorbunov, V Vaikuntanathan, H Wee
Journal of the ACM (JACM) 62 (6), 1-33, 2015
5682015
Toward privacy in public databases
S Chawla, C Dwork, F McSherry, A Smith, H Wee
Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005 …, 2005
3892005
Functional encryption with bounded collusions via multi-party computation
S Gorbunov, V Vaikuntanathan, H Wee
Advances in Cryptology–CRYPTO 2012: 32nd Annual Cryptology Conference, Santa …, 2012
3402012
On obfuscating point functions
H Wee
Proceedings of the thirty-seventh annual ACM symposium on Theory of …, 2005
3402005
On the security of the TLS protocol: A systematic analysis
H Krawczyk, KG Paterson, H Wee
Annual Cryptology Conference, 429-448, 2013
2832013
Predicate encryption for circuits from LWE
S Gorbunov, V Vaikuntanathan, H Wee
Annual Cryptology Conference, 503-523, 2015
2762015
Improved dual system ABE in prime-order groups via predicate encodings
J Chen, R Gay, H Wee
Annual International Conference on the Theory and Applications of …, 2015
2472015
Fully,(almost) tightly secure IBE and dual system groups
J Chen, H Wee
Annual Cryptology Conference, 435-460, 2013
238*2013
Selfish caching in distributed systems: a game-theoretic analysis
BG Chun, K Chaudhuri, H Wee, M Barreno, CH Papadimitriou, ...
Proceedings of the twenty-third annual ACM symposium on Principles of …, 2004
2192004
Functional encryption for threshold functions (or fuzzy IBE) from lattices
S Agrawal, X Boyen, V Vaikuntanathan, P Voulgaris, H Wee
Public Key Cryptography–PKC 2012: 15th International Conference on Practice …, 2012
217*2012
Functional encryption: New perspectives and lower bounds
S Agrawal, S Gorbunov, V Vaikuntanathan, H Wee
Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013
2032013
Dual system encryption via predicate encodings
H Wee
Theory of Cryptography Conference, 616-637, 2014
2012014
Multi-input inner-product functional encryption from pairings
M Abdalla, R Gay, M Raykova, H Wee
Annual International Conference on the Theory and Applications of …, 2017
1682017
Quasi-adaptive NIZK for linear subspaces revisited
E Kiltz, H Wee
Annual International Conference on the Theory and Applications of …, 2015
1392015
The OPTLS protocol and TLS 1.3
H Krawczyk, H Wee
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 81-96, 2016
1372016
Pebbling and proofs of work
C Dwork, M Naor, H Wee
Advances in Cryptology–CRYPTO 2005: 25th Annual International Cryptology …, 2005
1372005
Black-box, round-efficient secure computation via non-malleability amplification
H Wee
2010 IEEE 51st Annual Symposium on Foundations of Computer Science, 531-540, 2010
1262010
Black-box constructions of two-party protocols from one-way functions
R Pass, H Wee
Theory of Cryptography: 6th Theory of Cryptography Conference, TCC 2009, San …, 2009
1242009
Tightly CCA-secure encryption without pairings
R Gay, D Hofheinz, E Kiltz, H Wee
Annual International Conference on the Theory and Applications of …, 2016
1212016
Public key encryption against related key attacks
H Wee
International Workshop on Public Key Cryptography, 262-279, 2012
1102012
The system can't perform the operation now. Try again later.
Articles 1–20