Alejandro Hevia
Alejandro Hevia
Dept. of Computer Science, University of Chile
Verified email at - Homepage
Cited by
Cited by
UMAC: Message authentication code using universal hashing
T Krovetz
Strong accumulators from collision-resistant hashing
P Camacho, A Hevia, M Kiwi, R Opazo
Information Security: 11th International Conference, ISC 2008, Taipei …, 2008
Method and apparatus for authentication of data streams with adaptively controlled losses
C Gentry, A Hevia, R Kumar, T Kawahara, Z Ramzan
US Patent App. 10/543,640, 2006
An indistinguishability-based characterization of anonymous channels
A Hevia, D Micciancio
International Symposium on Privacy Enhancing Technologies Symposium, 24-43, 2008
A practice-oriented treatment of pseudorandom number generators
A Desai, A Hevia, YL Yin
International Conference on the Theory and Applications of Cryptographic …, 2002
Latent semantic analysis and keyword extraction for phishing classification
G L'Huillier, A Hevia, R Weber, S Rios
2010 IEEE international conference on intelligence and security informatics …, 2010
Surviving Internet Catastrophes.
FP Junqueira, R Bhagwan, A Hevia, K Marzullo, GM Voelker
USENIX Annual Technical Conference, General Track, 45-60, 2005
Strength of two data encryption standard implementations under timing attacks
A Hevia, M Kiwi
ACM Transactions on Information and System Security (TISSEC) 2 (4), 416-437, 1999
The provable security of graph-based one-time signatures and extensions to algebraic signature schemes
A Hevia, D Micciancio
Advances in Cryptology—ASIACRYPT 2002: 8th International Conference on the …, 2002
QA-NIZK arguments in asymmetric groups: new tools and new constructions
A González, A Hevia, C Ràfols
International Conference on the Theory and Application of Cryptology and …, 2015
On the impossibility of batch update for cryptographic accumulators
P Camacho, A Hevia
Progress in Cryptology–LATINCRYPT 2010: First International Conference on …, 2010
Short transitive signatures for directed trees
P Camacho, A Hevia
Cryptographers’ Track at the RSA Conference, 35-50, 2012
End-to-end security in the presence of intelligent data adapting proxies: The case of authenticating transcoded streaming media
C Gentry, A Hevia, R Jain, T Kawahara, Z Ramzan
IEEE Journal on Selected Areas in Communications 23 (2), 464-473, 2005
Electronic jury voting protocols
A Hevia, M Kiwi
Theoretical Computer Science 321 (1), 73-94, 2004
Electronic jury voting protocols
A Hevia, M Kiwi
Latin American Symposium on Theoretical Informatics, 415-429, 2002
Strength of two data encryption standard implementations under timing attacks
A Hevia, M Kiwi
Latin American Symposium on Theoretical Informatics, 192-205, 1998
Beating the birthday paradox in dining cryptographer networks
P García, J van de Graaf, A Hevia, A Viola
Progress in Cryptology-LATINCRYPT 2014: Third International Conference on …, 2015
Simultaneous broadcast revisited
A Hevia, D Micciancio
Proceedings of the twenty-fourth annual ACM symposium on Principles of …, 2005
A three-layer approach for protecting smart-citizens privacy in crowdsensing projects
S Blasco, J Bustos-Jimenez, G Font, A Hevia, MG Prato
2015 34th International Conference of the Chilean Computer Science Society …, 2015
Enhanced ANSI X9. 17 pseudorandom number generators with forward security
A Desai, Y Yin, A Hevia
US Patent 7,227,951, 2007
The system can't perform the operation now. Try again later.
Articles 1–20