Philip MacKenzie

Google Publications

  •   

    A Method for Making Password-Based Key Exchange Resilient to Server Compromise

    Craig Gentry, Philip MacKenzie, Zulfikar Ramzan

    Advances in Cryptology - CRYPTO 2006, Springer, pp. 142-159

Previous Publications

  •   

    Resource Fairness and Composability of Cryptographic Protocols

    Juan A. Garay, Philip D. MacKenzie, Manoj Prabhakaran, Ke Yang

    TCC (2006), pp. 404-428

  •  

    Resource Fairness and Composability of Cryptographic Protocols

    Juan Garay, Philip MacKenzie, Manoj Prabhakaran, Ke Yang

    Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Springer, pp. 404-428

  •   

    Strengthening Zero-Knowledge Protocols Using Signatures

    Juan A. Garay, Philip D. MacKenzie, Ke Yang

    J. Cryptology, vol. 19 (2006), pp. 169-209

  •   

    Password authenticated key exchange using hidden smooth subgroups

    Craig Gentry, Philip D. Mackenzie, Zulfikar Ramzan

    ACM Conference on Computer and Communications Security (2005), pp. 299-309

  •   

    Alternatives to Non-malleability: Definitions, Constructions, and Applications (Extended Abstract)

    Philip D. MacKenzie, Michael K. Reiter, Ke Yang

    Theory of Cryptography: First Theory of Cryptography Conference, TCC 2006, Springer (2004), pp. 171-190

  •   

    On Simulation-Sound Trapdoor Commitments

    Philip D. MacKenzie, Ke Yang

    EUROCRYPT (2004), pp. 382-400

  •   

    Strengthening Zero-Knowledge Protocols Using Signatures

    Juan A. Garay, Philip D. MacKenzie, Ke Yang

    EUROCRYPT, Springer (2003), pp. 177-194

  •   

    Adaptively secure distributed public-key systems

    Yair Frankel, Philip MacKenzie, Moti Yung

    Theor. Comput. Sci., vol. 287 (2002), pp. 535-561

  •  

    Adaptive Security for the Additive-Sharing Based Proactive RSA

    Yair Frankel, Philip D. MacKenzie, Moti Yung

    PKC '01: Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography, Springer-Verlag, London, UK (2001), pp. 240-263

  •  

    "Psyeudorandom Intermixing": A Tool for Shared Cryptography

    Yair Frankel, Philip D. MacKenzie, Moti Yung

    PKC '00: Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography, Springer-Verlag, London, UK (2000), pp. 306-325

  •  

    Adaptively-Secure Distributed Public-Key Systems

    Yair Frankel, Philip D. MacKenzie, Moti Yung

    ESA '99: Proceedings of the 7th Annual European Symposium on Algorithms, Springer-Verlag, London, UK (1999), pp. 4-27

  •  

    Adaptively-Secure Optimal-Resilience Proactive RSA

    Yair Frankel, Philip D. MacKenzie, Moti Yung

    ASIACRYPT '99: Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security, Springer-Verlag, London, UK (1999), pp. 180-194

  •   

    Robust efficient distributed RSA-key generation

    Yair Frankel, Philip D. MacKenzie, Moti Yung

    PODC '98: Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing, ACM, New York, NY, USA (1998), pp. 320

  •   

    Robust efficient distributed RSA-key generation

    Yair Frankel, Philip D. MacKenzie, Moti Yung

    STOC '98: Proceedings of the thirtieth annual ACM symposium on Theory of computing, ACM, New York, NY, USA (1998), pp. 663-672

  •  

    Proactive RSA

    Yair Frankel, Peter Gemmell, Philip D. MacKenzie, Moti Yung

    CRYPTO '97: Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology, Springer-Verlag, London, UK (1997), pp. 440-454