default search action
Zulfikar Ramzan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2001
- [b1]Zulfikar Ramzan:
A study of Luby-Rackoff ciphers. Massachusetts Institute of Technology, Cambridge, MA, USA, 2001
Journal Articles
- 2023
- [j5]Clark W. Barrett, Brad Boyd, Elie Bursztein, Nicholas Carlini, Brad Chen, Jihye Choi, Amrita Roy Chowdhury, Mihai Christodorescu, Anupam Datta, Soheil Feizi, Kathleen Fisher, Tatsunori Hashimoto, Dan Hendrycks, Somesh Jha, Daniel Kang, Florian Kerschbaum, Eric Mitchell, John C. Mitchell, Zulfikar Ramzan, Khawaja Shams, Dawn Song, Ankur Taly, Diyi Yang:
Identifying and Mitigating the Security Risks of Generative AI. Found. Trends Priv. Secur. 6(1): 1-52 (2023) - 2005
- [j4]Craig Gentry, Alejandro Hevia, Ravi Jain, Toshiro Kawahara, Zulfikar Ramzan:
End-to-end security in the presence of intelligent data adapting proxies: the case of authenticating transcoded streaming media. IEEE J. Sel. Areas Commun. 23(2): 464-473 (2005) - 2004
- [j3]Rahul Shah, Zulfikar Ramzan, Ravi Jain, Raghu Dendukuri, Farooq Anjum:
Efficient Dissemination of Personalized Information Using Content-Based Multicast. IEEE Trans. Mob. Comput. 3(4): 394-408 (2004) - [j2]Craig Gentry, Zulfikar Ramzan:
Provable Cryptographic Security and its Applications to Mobile Wireless Computing. Wirel. Pers. Commun. 29(3-4): 191-203 (2004) - 2001
- [j1]Sarvar Patel, Zulfikar Ramzan, Ganapathy S. Sundaram:
Security for wireless internet access. Bell Labs Tech. J. 6(2): 74-83 (2001)
Conference and Workshop Papers
- 2007
- [c26]Zulfikar Ramzan, Candid Wueest:
Phishing Attacks: Analyzing Trends in 2006. CEAS 2007 - [c25]Sid Stamm, Zulfikar Ramzan, Markus Jakobsson:
Drive-By Pharming. ICICS 2007: 495-506 - 2006
- [c24]Craig Gentry, Philip D. MacKenzie, Zulfikar Ramzan:
A Method for Making Password-Based Key Exchange Resilient to Server Compromise. CRYPTO 2006: 142-159 - [c23]Zulfikar Ramzan, David P. Woodruff:
Fast Algorithms for the Free Riders Problem in Broadcast Encryption. CRYPTO 2006: 308-325 - [c22]Craig Gentry, Zulfikar Ramzan, David P. Woodruff:
Explicit Exclusive Set Systems with Applications to Broadcast Encryption. FOCS 2006: 27-38 - [c21]James Kempf, Jonathan Wood, Zulfikar Ramzan, Craig Gentry:
IP Address Authorization for Secure Address Proxying Using Multi-key CGAs and Ring Signatures. IWSEC 2006: 196-211 - [c20]Craig Gentry, Zulfikar Ramzan:
Identity-Based Aggregate Signatures. Public Key Cryptography 2006: 257-273 - [c19]Craig Gentry, Zulfikar Ramzan, Stuart G. Stubblebine:
Secure Distributed Human Computation. Security Protocols Workshop 2006: 177-180 - 2005
- [c18]Craig Gentry, David Molnar, Zulfikar Ramzan:
Efficient Designated Confirmer Signatures Without Random Oracles or General Zero-Knowledge Proofs. ASIACRYPT 2005: 662-681 - [c17]Craig Gentry, Philip D. MacKenzie, Zulfikar Ramzan:
Password authenticated key exchange using hidden smooth subgroups. CCS 2005: 299-309 - [c16]Ravi Jain, David Molnar, Zulfikar Ramzan:
Towards understanding algorithmic factors affecting energy consumption: switching complexity, randomness, and preliminary experiments. DIALM-POMC 2005: 70-79 - [c15]Craig Gentry, Zulfikar Ramzan, Stuart G. Stubblebine:
Secure Distributed Human Computation. Financial Cryptography 2005: 328-332 - [c14]Craig Gentry, Zulfikar Ramzan:
Single-Database Private Information Retrieval with Constant Communication Rate. ICALP 2005: 803-815 - [c13]Craig Gentry, Zulfikar Ramzan, Stuart G. Stubblebine:
Secure distributed human computation. EC 2005: 155-164 - [c12]Ravi Jain, David Molnar, Zulfikar Ramzan:
Towards a model of energy complexity for algorithms [mobile wireless applications]. WCNC 2005: 1884-1890 - 2004
- [c11]Craig Gentry, Zulfikar Ramzan:
Eliminating Random Permutation Oracles in the Even-Mansour Cipher. ASIACRYPT 2004: 32-47 - [c10]Takashi Suzuki, Zulfikar Ramzan, Hiroshi Fujimoto, Craig Gentry, Takehiro Nakayama, Ravi Jain:
A System for End-to-End Authentication of Adaptive Multimedia Content. Communications and Multimedia Security 2004: 237-249 - [c9]Craig Gentry, Zulfikar Ramzan:
Microcredits for Verifiable Foreign Service Provider Metering. Financial Cryptography 2004: 9-23 - [c8]Craig Gentry, Zulfikar Ramzan:
RSA Accumulator Based Broadcast Encryption. ISC 2004: 73-86 - [c7]Farid F. Elwailly, Craig Gentry, Zulfikar Ramzan:
QuasiModo: Efficient Certificate Validation and Revocation. Public Key Cryptography 2004: 375-388 - [c6]Sarvar Patel, Zulfikar Ramzan, Ganapathy S. Sundaram:
Efficient Constructions of Variable-Input-Length Block Ciphers. Selected Areas in Cryptography 2004: 326-340 - 2002
- [c5]Sarvar Patel, Zulfikar Ramzan, Ganapathy S. Sundaram:
Luby-Rackoff Ciphers: Why XOR Is Not So Exclusive. Selected Areas in Cryptography 2002: 271-290 - 2000
- [c4]Zulfikar Ramzan, Leonid Reyzin:
On the Round Security of Symmetric-Key Cryptographic Primitives. CRYPTO 2000: 376-393 - 1999
- [c3]Mark Etzel, Sarvar Patel, Zulfikar Ramzan:
SQUARE HASH: Fast Message Authenication via Optimized Universal Hash Functions. CRYPTO 1999: 234-251 - [c2]Sarvar Patel, Zulfikar Ramzan, Ganapathy S. Sundaram:
Towards Making Luby-Rackoff Ciphers Optimal and Practical. FSE 1999: 171-185 - 1998
- [c1]Anna Lysyanskaya, Zulfikar Ramzan:
Group Blind Digital Signatures: A Scalable Solution to Electronic Cash. Financial Cryptography 1998: 184-197
Parts in Books or Collections
- 2010
- [p1]Zulfikar Ramzan:
Phishing Attacks and Countermeasures. Handbook of Information and Communication Security 2010: 433-448
Informal and Other Publications
- 2023
- [i2]Clark W. Barrett, Brad Boyd, Ellie Burzstein, Nicholas Carlini, Brad Chen, Jihye Choi, Amrita Roy Chowdhury, Mihai Christodorescu, Anupam Datta, Soheil Feizi, Kathleen Fisher, Tatsunori Hashimoto, Dan Hendrycks, Somesh Jha, Daniel Kang, Florian Kerschbaum, Eric Mitchell, John C. Mitchell, Zulfikar Ramzan, Khawaja Shams, Dawn Song, Ankur Taly, Diyi Yang:
Identifying and Mitigating the Security Risks of Generative AI. CoRR abs/2308.14840 (2023) - 2006
- [i1]Zulfikar Ramzan, David P. Woodruff:
Fast Algorithms for the Free Riders Problem in Broadcast Encryption. IACR Cryptol. ePrint Arch. 2006: 293 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:40 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint