Gene Itkis
Gene Itkis
MIT Lincoln Laboratory
Verified email at
Cited by
Cited by
Multicast security: A taxonomy and some efficient constructions
R Canetti, J Garay, G Itkis, D Micciancio, M Naor, B Pinkas
IEEE INFOCOM'99. Conference on Computer Communications. Proceedings …, 1999
Forward-secure signatures with optimal signing and verifying
G Itkis, L Reyzin
Advances in Cryptology—CRYPTO 2001: 21st Annual International Cryptology …, 2001
SiBIR: Signer-base intrusion-resilient signatures
G Itkis, L Reyzin
Advances in Cryptology—CRYPTO 2002: 22nd Annual International Cryptology …, 2002
Fast and lean self-stabilizing asynchronous protocols
G Itkis, L Levin
Proceedings 35th Annual Symposium on Foundations of Computer Science, 226-239, 1994
Upper and lower bounds on black-box steganography
N Dedić, G Itkis, L Reyzin, S Russell
Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005 …, 2005
Deterministic, constant space, self-stabilizing leader election on uniform rings
G Itkis, C Lin, J Simon
Distributed Algorithms: 9th International Workshop, WDAG'95 Le Mont-Saint …, 1995
Intrusion-resilient signatures: generic constructions, or defeating strong adversary with minimal assumptions
G Itkis
Security in Communication Networks: Third International Conference, SCN 2002 …, 2003
Cryptographic tamper evidence
G Itkis
Proceedings of the 10th ACM conference on Computer and communications …, 2003
Forward security, adaptive cryptography: Time evolution
G Itkis
Handbook of Information Security 3, 927-944, 2006
Multicast security: A taxonomy and efficient authentication
R Canetti, J Garay, G Itkis, D Micciancio, M Naor, B Pinkas
Proc. of INFOCOM’99, 1999
Iris biometric security challenges and possible solutions: For your eyes only? using the iris as a key
G Itkis, V Chandar, BW Fuller, JP Campbell, RK Cunningham
IEEE Signal Processing Magazine 32 (5), 42-53, 2015
Securing bulk content almost for free
J Byers, J Considine, G Itkis, MC Cheng, A Yeung
Computer communications 29 (3), 280-290, 2006
Intrusion-resilient signatures, or towards obsoletion of certificate revocation
G Itkis, L Reyzin
Advances in Cryptology—CRYPTO 2, 1-16, 2002
On mixed connectivity certificates
S Even, G Itkis, S Rajsbaum
Theoretical computer science 203 (2), 253-269, 1998
Bounded-collusion attribute-based encryption from minimal assumptions
G Itkis, E Shen, M Varia, D Wilson, A Yerukhimovich
Public-Key Cryptography–PKC 2017: 20th IACR International Conference on …, 2017
Generalized key-evolving signature schemes or how to foil an armed adversary
G Itkis, P Xie
Applied Cryptography and Network Security: First International Conference …, 2003
Multicast Security: A Taxonomy and E cient Construction
R Canetti, J Garay, G Itkis, D Micciancio, M Naor, B Pinkas
Proc. IEEE Infocom, 1999
Power of fast VLSI models is insensitive to wires' thinness
G Itkis, LA Levin
30th Annual Symposium on Foundations of Computer Science, 402-407, 1989
Group Key Manager on a Smart Card
H Hamandi, G Itkis
Boston University Computer Science Department, 2004
Broadcasting on a budget in the multi-service communication model
G Itkis, I Newman, A Schuster
Proceedings. Fifth International Conference on High Performance Computing …, 1998
The system can't perform the operation now. Try again later.
Articles 1–20