Matthew K. Franklin
American computer scientist
Matthew K. Franklin's AcademicInfluence.com Rankings
Download Badge
Computer Science
Matthew K. Franklin's Degrees
- PhD Computer Science University of California, Berkeley
- Masters Computer Science University of California, Berkeley
- Bachelors Computer Science University of California, Berkeley
Similar Degrees You Can Earn
Why Is Matthew K. Franklin Influential?
(Suggest an Edit or Addition)According to Wikipedia, Matthew Keith "Matt" Franklin is an American cryptographer, and a professor of computer science at the University of California, Davis. Education and employment Franklin did his undergraduate studies at Pomona College, graduating in 1983 with a degree in mathematics, and was awarded a master's degree in mathematics in 1985 by the University of California, Berkeley. He earned his Ph.D. in computer science from Columbia University in 1994, under the joint supervision of Zvi Galil and Moti Yung. Prior to joining the UC Davis faculty in 2000, he worked at Xerox PARC, Bell Labs, and AT&T Labs.
Matthew K. Franklin's Published Works
Published Works
- Identity-Based Encryption from the Weil Pairing (2001) (9737)
- Advances in Cryptology – CRYPTO 2004 (2004) (712)
- An algebraic approach to IP traceback (2002) (521)
- Efficient generation of shared RSA keys (2001) (415)
- Multi-Autority Secret-Ballot Elections with Linear Work (1996) (407)
- The design and implementation of a secure auction service (1995) (312)
- An Efficient Public Key Traitor Tracing Scheme (1999) (307)
- Fair Exchange with a Semi-Trusted Third Party (extended abstract) (1997) (261)
- Self-healing key distribution with revocation (2002) (243)
- Communication complexity of secure computation (extended abstract) (1992) (214)
- Enhancing privacy and trust in electronic communities (1999) (197)
- Low-Exponent RSA with Related Messages (1996) (177)
- Efficient Generation of Shared RSA Keys (Extended Abstract) (1997) (167)
- Secure Communication in Minimal Connectivity Models (2000) (153)
- Efficiency Tradeoffs for Malicious Two-Party Computation (2006) (149)
- Auditable Metering with Lightweight Security (1997) (104)
- Intrusion-Resilient Public-Key Encryption (2003) (89)
- Joint encryption and message-efficient secure computation (1993) (88)
- Towards Optimal and Efficient Perfectly Secure Message Transmission (2007) (84)
- Lower Bounds for Multicast Message Authentication (2001) (81)
- Eavesdropping games: a graph-theoretic approach to privacy in distributed systems (1993) (80)
- Secure Group Barter: Multi-party Fair Exchange with Semi-Trusted Neutral Parties (1998) (79)
- Secure and Efficient Off-Line Digital Money (Extended Abstract) (1993) (77)
- Secure hypergraphs: privacy from partial broadcast (1995) (75)
- Optimal Coding for Streaming Authentication and Interactive Communication (2013) (66)
- A Generic Construction for Intrusion-Resilient Public-Key Encryption (2004) (58)
- Verifiable Signature Sharing (1995) (55)
- The Ω key management service (1996) (50)
- Multilevel specification of real time systems (1991) (46)
- Byzantine Agreement Given Partial Broadcast (2005) (45)
- A survey of key evolving cryptosystems (2006) (45)
- The Omega Key Management Service (1996) (44)
- Privacy-preserving alibi systems (2012) (41)
- Anonymous authentication with subset queries (extended abstract) (1999) (40)
- Complexity and security of distributed protocols (1994) (35)
- Reliable Communication over Partially Authenticated Networks (1997) (34)
- Unique Ring Signatures: A Practical Construction (2013) (32)
- State-based specification of complex real-time systems (1988) (31)
- A Framework for Unique Ring Signatures (2012) (27)
- A transformational method for verifying safety properties in real-time systems (1989) (26)
- An Overview of Secure Distributed Computing (1992) (24)
- Unique Group Signatures (2012) (20)
- Distribution chain security (2000) (20)
- Improved Efficiency for Private Stable Matching (2007) (19)
- Weakly-Private Secret Sharing Schemes (2007) (19)
- Cryptography as a Network Service (2000) (18)
- The Varieties of Secure Distributed Computation (1993) (17)
- Secure and E cient O-line Digital Money (1993) (16)
- Efficient Polynomial Operations in the Shared-Coefficients Setting (2006) (16)
- Mutual search (1999) (16)
- Practical Dual-Receiver Encryption - Soundness, Complete Non-Malleability, and Applications (2014) (15)
- Multi-level specification and verification of real-time software (1990) (14)
- Multi-party Indirect Indexing and Applications (2007) (12)
- Secure Communications in Minimal Connectivity Models (1998) (11)
- Efficient and Secure Evaluation of Multivariate Polynomials and Applications (2010) (10)
- Secure hypergraphs: privacy from partial broadcast (Extended Abstract). (1995) (9)
- Communication-Efficient Private Protocols for Longest Common Subsequence (2009) (9)
- Advances in Cryptology - CRYPTO 2004, 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings (2005) (9)
- Enhancing the Security of Personal Identification Numbers with Three-Dimensional Displays (2016) (8)
- Cryptology As a Network Service (2001) (8)
- Towards Provably Secure Eecient Electronic Cash (extended Abstract) (1992) (7)
- The Blinding of Weak Signatures (Extended Abstract) (1994) (7)
- An EÆcient Public Key Traitor Tracing Scheme (1999) (5)
- Self-Testing/Correcting Protocols (Extended Abstract) (1999) (4)
- Protecting privacy while sharing information in electronic communities (2000) (4)
- Proceedings of the Third International Conference on Financial Cryptography (1999) (4)
- Commital Deniable Proofs and Electronic Campaign Finance (2000) (4)
- Fair threshold decryption with semi-trusted third parties (2009) (3)
- Privacy from partial broadcast (1994) (2)
- 5.2 Veriiable Signature Sharing (1979) (2)
- Mix Networks (2005) (2)
- 3DPIN: Enhancing security with 3D display (2014) (2)
- Financial Cryptography: Third International Conference, FC'99 Anguilla, British West Indies, February 22-25, 1999 Proceedings (1999) (1)
- Cryptology and Network Security, 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings (2008) (1)
- " M Multi-Level Specification and ( NI Verification of Real-Time Software * (0)
- Mutual Search (Extended Abstract) (1998) (0)
- Systems and methods for encryption identity based and related cryptographic techniques (2002) (0)
- Deniable payments and electronic campaign finance (2000) (0)
- Communication-efficient multiparty oblivious transfer and applications (2009) (0)
- Varieties of Secure Distributed ComputingMatthew FranklinColumbia (1996) (0)
- Edge Eavesdropping Games (2006) (0)
- 2 . High Level View of the Protocol (2007) (0)
- Algorithmic Aspects of Secure Computation and Communication (2010) (0)
- Secure and efficient linear algebra computation (2009) (0)
- System, method and product for the state transition based cryptography (2001) (0)
- MQ or Multivariate Quadratic Public-Key Cryptosystem (MQPKC) (2011) (0)
- Systems and methods for rule-based printing and Fälschungsberurteilung (2001) (0)
- A an Alternative Private Protocol (1996) (0)
This paper list is powered by the following services:
Other Resources About Matthew K. Franklin
What Schools Are Affiliated With Matthew K. Franklin?
Matthew K. Franklin is affiliated with the following schools: