Attribute-based encryption for circuits S Gorbunov, V Vaikuntanathan, H Wee Journal of the ACM (JACM) 62 (6), 1-33, 2015 | 565 | 2015 |
Toward privacy in public databases S Chawla, C Dwork, F McSherry, A Smith, H Wee Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005 …, 2005 | 388 | 2005 |
On obfuscating point functions H Wee Proceedings of the thirty-seventh annual ACM symposium on Theory of …, 2005 | 337 | 2005 |
Functional encryption with bounded collusions via multi-party computation S Gorbunov, V Vaikuntanathan, H Wee Advances in Cryptology–CRYPTO 2012: 32nd Annual Cryptology Conference, Santa …, 2012 | 336 | 2012 |
On the security of the TLS protocol: A systematic analysis H Krawczyk, KG Paterson, H Wee Annual Cryptology Conference, 429-448, 2013 | 277 | 2013 |
Predicate encryption for circuits from LWE S Gorbunov, V Vaikuntanathan, H Wee Annual Cryptology Conference, 503-523, 2015 | 273 | 2015 |
Improved dual system ABE in prime-order groups via predicate encodings J Chen, R Gay, H Wee Annual International Conference on the Theory and Applications of …, 2015 | 247 | 2015 |
Fully,(almost) tightly secure IBE and dual system groups J Chen, H Wee Annual Cryptology Conference, 435-460, 2013 | 238* | 2013 |
Selfish caching in distributed systems: a game-theoretic analysis BG Chun, K Chaudhuri, H Wee, M Barreno, CH Papadimitriou, ... Proceedings of the twenty-third annual ACM symposium on Principles of …, 2004 | 219 | 2004 |
Functional encryption for threshold functions (or fuzzy IBE) from lattices S Agrawal, X Boyen, V Vaikuntanathan, P Voulgaris, H Wee Public Key Cryptography–PKC 2012: 15th International Conference on Practice …, 2012 | 216* | 2012 |
Functional encryption: New perspectives and lower bounds S Agrawal, S Gorbunov, V Vaikuntanathan, H Wee Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013 | 203 | 2013 |
Dual system encryption via predicate encodings H Wee Theory of Cryptography Conference, 616-637, 2014 | 201 | 2014 |
Multi-input inner-product functional encryption from pairings M Abdalla, R Gay, M Raykova, H Wee Annual International Conference on the Theory and Applications of …, 2017 | 167 | 2017 |
Quasi-adaptive NIZK for linear subspaces revisited E Kiltz, H Wee Annual International Conference on the Theory and Applications of …, 2015 | 139 | 2015 |
The OPTLS protocol and TLS 1.3 H Krawczyk, H Wee 2016 IEEE European Symposium on Security and Privacy (EuroS&P), 81-96, 2016 | 136 | 2016 |
Pebbling and proofs of work C Dwork, M Naor, H Wee Advances in Cryptology–CRYPTO 2005: 25th Annual International Cryptology …, 2005 | 136 | 2005 |
Black-box, round-efficient secure computation via non-malleability amplification H Wee 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, 531-540, 2010 | 126 | 2010 |
Black-box constructions of two-party protocols from one-way functions R Pass, H Wee Theory of Cryptography: 6th Theory of Cryptography Conference, TCC 2009, San …, 2009 | 122 | 2009 |
Tightly CCA-secure encryption without pairings R Gay, D Hofheinz, E Kiltz, H Wee Annual International Conference on the Theory and Applications of …, 2016 | 121 | 2016 |
Public key encryption against related key attacks H Wee International Workshop on Public Key Cryptography, 262-279, 2012 | 110 | 2012 |