H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 85 Citations 27,699 202 World Ranking 341 National Ranking 212

Overview

What is he best known for?

The fields of study he is best known for:

  • Cryptography
  • Operating system
  • Programming language

His primary areas of study are Theoretical computer science, Computer security, Cryptography, Encryption and Random oracle. His research integrates issues of Homomorphic encryption, Mathematical proof, Set, Protocol and Computation in his study of Theoretical computer science. As part of the same scientific family, Jonathan Katz usually focuses on Computation, concentrating on Commitment scheme and intersecting with Secure two-party computation, Secure multi-party computation and Divide and choose.

His study looks at the relationship between Computer security and topics such as Distributed computing, which overlap with Wireless sensor network, Overhead and Resilience. His Cryptography research is multidisciplinary, incorporating elements of Verifiable secret sharing and Key exchange, Blind signature, Public-key cryptography. His Random oracle study incorporates themes from ElGamal signature scheme, Standard model, Schnorr signature and Identification.

His most cited work include:

  • Introduction to Modern Cryptography (1269 citations)
  • A pairwise key predistribution scheme for wireless sensor networks (952 citations)
  • Predicate encryption supporting disjunctions, polynomial equations, and inner products (882 citations)

What are the main themes of his work throughout his whole career to date?

Jonathan Katz focuses on Theoretical computer science, Computer security, Cryptography, Encryption and Secure multi-party computation. His work investigates the relationship between Theoretical computer science and topics such as Random oracle that intersect with problems in Standard model. Public-key cryptography, Adversary, Authenticated Key Exchange, Cryptographic protocol and Password are the primary areas of interest in his Computer security study.

His Cryptography research is multidisciplinary, relying on both Scheme, Homomorphic encryption, Digital signature and Authentication. His studies in Probabilistic encryption, 40-bit encryption, Attribute-based encryption, Ciphertext and Cryptosystem are all subfields of Encryption research. His work in the fields of Secure two-party computation overlaps with other areas such as Protocol.

He most often published in these fields:

  • Theoretical computer science (41.52%)
  • Computer security (28.61%)
  • Cryptography (28.10%)

What were the highlights of his more recent work (between 2016-2021)?

  • Theoretical computer science (41.52%)
  • Protocol (14.43%)
  • Computer network (9.87%)

In recent papers he was focusing on the following fields of study:

Jonathan Katz mainly investigates Theoretical computer science, Protocol, Computer network, Computer security and Secure multi-party computation. The study incorporates disciplines such as Fuzzy extractor, Set, Construct, Hash function and Biometric data in addition to Theoretical computer science. Jonathan Katz has included themes like Telecommunications network, Average consensus, Consensus and Cryptocurrency in his Protocol study.

His work carried out in the field of Computer network brings together such families of science as Fraction and Constant. Computer security is closely attributed to Compromise in his study. His Secure multi-party computation research is multidisciplinary, incorporating perspectives in Stateless protocol and Distributed computing.

Between 2016 and 2021, his most popular works were:

  • Introduction to Modern Cryptography (Chapman & Hall/CRC Cryptography and Network Security Series) (449 citations)
  • Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation (62 citations)
  • Global-Scale Secure Multiparty Computation (62 citations)

In his most recent research, the most cited papers focused on:

  • Cryptography
  • Operating system
  • Computer network

His main research concerns Theoretical computer science, Computation, Secure multi-party computation, Protocol and Computer security. Theoretical computer science and Technical documentation are two areas of study in which Jonathan Katz engages in interdisciplinary research. His Computation research includes themes of Preprocessor and Parallel computing.

His Secure multi-party computation research is multidisciplinary, relying on both Cryptographic protocol and Block cipher. Jonathan Katz has included themes like Average consensus, Consensus, Divergence and Probabilistic logic in his Protocol study. He combines topics linked to Random variable with his work on Computer security.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

A pairwise key predistribution scheme for wireless sensor networks

Wenliang Du;Jing Deng;Yunghsiang S. Han;Pramod K. Varshney.
ACM Transactions on Information and System Security (2005)

2352 Citations

Introduction to Modern Cryptography

Jonathan Katz;Yehuda Lindell.
(2007)

1783 Citations

Predicate encryption supporting disjunctions, polynomial equations, and inner products

Jonathan Katz;Amit Sahai;Brent Waters.
international cryptology conference (2008)

978 Citations

Chosen-Ciphertext Security from Identity-Based Encryption

Ran Canetti;Shai Halevi;Jonathan Katz.
theory and application of cryptographic techniques (2004)

965 Citations

Faster secure two-party computation using garbled circuits

Yan Huang;David Evans;Jonathan Katz;Lior Malka.
usenix security symposium (2011)

646 Citations

Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series)

Jonathan Katz;Yehuda Lindell.
(2007)

632 Citations

A forward-secure public-key encryption scheme

Ran Canetti;Shai Halevi;Jonathan Katz.
Lecture Notes in Computer Science (2003)

597 Citations

Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords

Jonathan Katz;Rafail Ostrovsky;Moti Yung.
theory and application of cryptographic techniques (2001)

507 Citations

Key-Insulated Public Key Cryptosystems

Yevgeniy Dodis;Jonathan Katz;Shouhuai Xu;Moti Yung.
international cryptology conference (2002)

498 Citations

Scalable Protocols for Authenticated Group Key Exchange

Jonathan Katz;Moti Yung.
international cryptology conference (2003)

470 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Jonathan Katz

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 118

Benoît Libert

Benoît Libert

École Normale Supérieure de Lyon

Publications: 86

Brent Waters

Brent Waters

The University of Texas at Austin

Publications: 84

Rafail Ostrovsky

Rafail Ostrovsky

University of California, Los Angeles

Publications: 81

Amit Sahai

Amit Sahai

University of California, Los Angeles

Publications: 81

Yi Mu

Yi Mu

Fujian Normal University

Publications: 77

David Pointcheval

David Pointcheval

École Normale Supérieure

Publications: 71

Dan Boneh

Dan Boneh

Stanford University

Publications: 70

Yuval Ishai

Yuval Ishai

Technion – Israel Institute of Technology

Publications: 60

Eike Kiltz

Eike Kiltz

Ruhr University Bochum

Publications: 60

Zhenfu Cao

Zhenfu Cao

East China Normal University

Publications: 58

Huaxiong Wang

Huaxiong Wang

Nanyang Technological University

Publications: 58

Hoeteck Wee

Hoeteck Wee

École Normale Supérieure

Publications: 57

Michel Abdalla

Michel Abdalla

École Normale Supérieure

Publications: 57

Rafael Pass

Rafael Pass

Cornell University

Publications: 56

Something went wrong. Please try again later.