Follow
Hoeteck Wee
Hoeteck Wee
Verified email at di.ens.fr
Title
Cited by
Cited by
Year
Attribute-based encryption for circuits
S Gorbunov, V Vaikuntanathan, H Wee
Journal of the ACM (JACM) 62 (6), 1-33, 2015
5772015
Toward privacy in public databases
S Chawla, C Dwork, F McSherry, A Smith, H Wee
Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005 …, 2005
3902005
Functional encryption with bounded collusions via multi-party computation
S Gorbunov, V Vaikuntanathan, H Wee
Advances in Cryptology–CRYPTO 2012: 32nd Annual Cryptology Conference, Santa …, 2012
3442012
On obfuscating point functions
H Wee
Proceedings of the thirty-seventh annual ACM symposium on Theory of …, 2005
3422005
Predicate encryption for circuits from LWE
S Gorbunov, V Vaikuntanathan, H Wee
Annual Cryptology Conference, 503-523, 2015
2842015
On the security of the TLS protocol: A systematic analysis
H Krawczyk, KG Paterson, H Wee
Annual Cryptology Conference, 429-448, 2013
2832013
Improved dual system ABE in prime-order groups via predicate encodings
J Chen, R Gay, H Wee
Annual International Conference on the Theory and Applications of …, 2015
2502015
Fully,(almost) tightly secure IBE and dual system groups
J Chen, H Wee
Annual Cryptology Conference, 435-460, 2013
241*2013
Selfish caching in distributed systems: a game-theoretic analysis
BG Chun, K Chaudhuri, H Wee, M Barreno, CH Papadimitriou, ...
Proceedings of the twenty-third annual ACM symposium on Principles of …, 2004
2192004
Functional encryption for threshold functions (or fuzzy IBE) from lattices
S Agrawal, X Boyen, V Vaikuntanathan, P Voulgaris, H Wee
Public Key Cryptography–PKC 2012: 15th International Conference on Practice …, 2012
218*2012
Dual system encryption via predicate encodings
H Wee
Theory of Cryptography Conference, 616-637, 2014
2042014
Functional encryption: New perspectives and lower bounds
S Agrawal, S Gorbunov, V Vaikuntanathan, H Wee
Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013
2042013
Multi-input inner-product functional encryption from pairings
M Abdalla, R Gay, M Raykova, H Wee
Annual International Conference on the Theory and Applications of …, 2017
1732017
Quasi-adaptive NIZK for linear subspaces revisited
E Kiltz, H Wee
Annual International Conference on the Theory and Applications of …, 2015
1422015
Pebbling and proofs of work
C Dwork, M Naor, H Wee
Advances in Cryptology–CRYPTO 2005: 25th Annual International Cryptology …, 2005
1392005
The OPTLS protocol and TLS 1.3
H Krawczyk, H Wee
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 81-96, 2016
1382016
Black-box, round-efficient secure computation via non-malleability amplification
H Wee
2010 IEEE 51st Annual Symposium on Foundations of Computer Science, 531-540, 2010
1272010
Black-box constructions of two-party protocols from one-way functions
R Pass, H Wee
Theory of Cryptography: 6th Theory of Cryptography Conference, TCC 2009, San …, 2009
1252009
Tightly CCA-secure encryption without pairings
R Gay, D Hofheinz, E Kiltz, H Wee
Annual International Conference on the Theory and Applications of …, 2016
1212016
Shorter IBE and signatures via asymmetric pairings
J Chen, HW Lim, S Ling, H Wang, H Wee
Pairing-Based Cryptography–Pairing 2012, 122-140, 2012
113*2012
The system can't perform the operation now. Try again later.
Articles 1–20