D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 43 Citations 13,549 91 World Ranking 4905 National Ranking 2425

Research.com Recognitions

Awards & Achievements

2008 - Fellow of Alfred P. Sloan Foundation

Overview

What is she best known for?

The fields of study she is best known for:

  • Cryptography
  • Computer network
  • Programming language

The scientist’s investigation covers issues in Computer security, Cryptography, Theoretical computer science, Random oracle and Credential. Group signature and Strong RSA assumption are the core of her Computer security study. Her research integrates issues of Encryption, Ring signature and Blind signature in her study of Cryptography.

Her study focuses on the intersection of Theoretical computer science and fields such as Proof of knowledge with connections in the field of Hash function, Accumulator and Revocation. Her Random oracle research integrates issues from Algorithm and Signature. Her Credential research is multidisciplinary, incorporating elements of Scheme, Security parameter, Authentication and Anonymity.

Her most cited work include:

  • An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation (1005 citations)
  • Signature Schemes and Anonymous Credentials from Bilinear Maps (792 citations)
  • Dynamic accumulators and application to efficient revocation of anonymous credentials (618 citations)

What are the main themes of her work throughout her whole career to date?

Anna Lysyanskaya spends much of her time researching Computer security, Cryptography, Theoretical computer science, Random oracle and Credential. Anna Lysyanskaya usually deals with Computer security and limits it to topics linked to Scheme and Identity. Her Cryptography research is multidisciplinary, relying on both Discrete logarithm, Adversary, Verifiable secret sharing and Blind signature.

Her Theoretical computer science research incorporates elements of Signature, Mathematical proof, Digital signature, Proof of knowledge and Strong RSA assumption. Her Random oracle research incorporates themes from Algorithm and Security parameter. Anna Lysyanskaya has included themes like Accumulator, Revocation, Internet privacy and Delegate in her Credential study.

She most often published in these fields:

  • Computer security (60.31%)
  • Cryptography (36.64%)
  • Theoretical computer science (19.85%)

What were the highlights of her more recent work (between 2013-2021)?

  • Computer security (60.31%)
  • Encryption (16.03%)
  • Adversary (9.92%)

In recent papers she was focusing on the following fields of study:

Her primary areas of investigation include Computer security, Encryption, Adversary, Computer network and Credential. Her Identification research extends to the thematically linked field of Computer security. Her research investigates the connection with Adversary and areas like Stateless protocol which intersect with concerns in Line, Random oracle, Distributed computing and Oblivious transfer.

Anna Lysyanskaya combines subjects such as Scheme and Scalability with her study of Computer network. Her Credential course of study focuses on Delegate and Generic group model. Her study in Cryptography is interdisciplinary in nature, drawing from both Modular design, Communication complexity, Anonymity, Accumulator and Revocation.

Between 2013 and 2021, her most popular works were:

  • Malleable Signatures: New Definitions and Delegatable Anonymous Credentials (32 citations)
  • Memento: How to Reconstruct Your Secrets from a Single Password in a Hostile Environment (25 citations)
  • Accumulators with Applications to Anonymity-Preserving Revocation (23 citations)

In her most recent research, the most cited papers focused on:

  • Cryptography
  • Programming language
  • Computer network

Her primary scientific interests are in Computer security, Identification, Cryptography, Hash-based message authentication code and DUAL. Her research in Computer security intersects with topics in Signature, Mathematical proof and Theoretical computer science. Anna Lysyanskaya has researched Identification in several fields, including Scheme, Focus and Component.

Her Cryptography research includes elements of Communication complexity, Anonymity, Accumulator, Revocation and Credential. Her Hash-based message authentication code research is classified as research in Algorithm.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Dynamic accumulators and application to efficient revocation of anonymous credentials

Jan Camenisch;Anna Lysyanskaya.
Lecture Notes in Computer Science (2002)

1977 Citations

Dynamic accumulators and application to efficient revocation of anonymous credentials

Jan Camenisch;Anna Lysyanskaya.
Lecture Notes in Computer Science (2002)

1977 Citations

An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation.

Jan Camenisch;Anna Lysyanskaya.
IACR Cryptology ePrint Archive (2001)

1590 Citations

An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation.

Jan Camenisch;Anna Lysyanskaya.
IACR Cryptology ePrint Archive (2001)

1590 Citations

A signature scheme with efficient protocols

Jan Camenisch;Anna Lysyanskaya.
Lecture Notes in Computer Science (2003)

1181 Citations

A signature scheme with efficient protocols

Jan Camenisch;Anna Lysyanskaya.
Lecture Notes in Computer Science (2003)

1181 Citations

Signature schemes and anonymous credentials from bilinear maps

Jan Camenisch;Anna Lysyanskaya.
Lecture Notes in Computer Science (2004)

1098 Citations

Signature schemes and anonymous credentials from bilinear maps

Jan Camenisch;Anna Lysyanskaya.
Lecture Notes in Computer Science (2004)

1098 Citations

Pseudonym Systems

Anna Lysyanskaya;Ronald L. Rivest;Amit Sahai;Stefan Wolf.
selected areas in cryptography (1999)

671 Citations

Pseudonym Systems

Anna Lysyanskaya;Ronald L. Rivest;Amit Sahai;Stefan Wolf.
selected areas in cryptography (1999)

671 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Anna Lysyanskaya

Jan Camenisch

Jan Camenisch

DFINITY

Publications: 117

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 80

Moti Yung

Moti Yung

Columbia University

Publications: 65

Gregory Neven

Gregory Neven

DFINITY

Publications: 56

Liqun Chen

Liqun Chen

University of Surrey

Publications: 56

Yi Mu

Yi Mu

Fujian Normal University

Publications: 54

Benoît Libert

Benoît Libert

École Normale Supérieure de Lyon

Publications: 49

Brent Waters

Brent Waters

The University of Texas at Austin

Publications: 48

Man Ho Au

Man Ho Au

University of Hong Kong

Publications: 46

Roberto Tamassia

Roberto Tamassia

Brown University

Publications: 45

Xiaofeng Chen

Xiaofeng Chen

Xidian University

Publications: 42

Susan Hohenberger

Susan Hohenberger

Johns Hopkins University

Publications: 42

Aggelos Kiayias

Aggelos Kiayias

University of Edinburgh

Publications: 41

Markulf Kohlweiss

Markulf Kohlweiss

University of Edinburgh

Publications: 40

Dan Boneh

Dan Boneh

Stanford University

Publications: 39

Jonathan Katz

Jonathan Katz

University of Maryland, College Park

Publications: 37

Trending Scientists

Aurel A. Lazar

Aurel A. Lazar

Columbia University

Ben Weinkove

Ben Weinkove

Northwestern University

Mattia Frasca

Mattia Frasca

University of Catania

Yasuhiko Takemura

Yasuhiko Takemura

JSR (Japan)

Fen Wu

Fen Wu

North Carolina State University

Eric J. Toone

Eric J. Toone

Duke University

Lohengrin A. Cavieres

Lohengrin A. Cavieres

University of Concepción

Laura Gough

Laura Gough

Towson University

Pascal Genschik

Pascal Genschik

University of Strasbourg

Mark Yeager

Mark Yeager

University of Virginia

Kelly S. Doran

Kelly S. Doran

University of Colorado Denver

Takahiro Takano

Takahiro Takano

University of Rochester

Roger P. Woods

Roger P. Woods

University of California, Los Angeles

David M. Segal

David M. Segal

University of California, Davis

Harald Baumeister

Harald Baumeister

University of Ulm

David J. McKirnan

David J. McKirnan

University of Illinois at Chicago

Something went wrong. Please try again later.