词条 | Ran Canetti |
释义 |
| name = Ran Canetti | image = | image_size = | birth_date = {{birth year and age|1962}} | birth_place = Israel | death_date = | death_place = | residence = U.S | citizenship = | nationality = Israeli-American | ethnicity = | field = Cryptography | work_institutions = {{Plainlist|
}} | alma_mater = {{Plainlist|
}} | doctoral_advisor = {{Plainlist|
}} | doctoral_students = | known_for = {{Plainlist|
}} | author_abbrev_bot = | author_abbrev_zoo = | religion = | signature = | footnotes = | native_name = רן קנטי }} Ran Canetti (Hebrew: רן קנטי) is a professor of Computer Science at Boston University.[1] and Tel Aviv University[2]. He is also the director of the Check Point Institute for Information Security[3] and of the Center for Reliable Information System and Cyber Security. He is also associate editor of the Journal of Cryptology and Information and Computation[4]. His main areas of research span cryptography and information security[5], with an emphasis on the design, analysis and use of cryptographic protocols. BiographyBorn in 1962 in Tel Aviv, Israel, Canetti obtained his BA in Computer Science in 1989, his BA in Physics in 1990, and his M.Sc in Computer Science in 1991, all from the Technion, Haifa. He received his PhD in 1995 from the Weizmann Institute, Rehovot under the supervision of Prof. Oded Goldreich[6]. He then completed his post-doctoral training at the Lab of Computer Science, at the Massachusetts Institute of Technology (MIT) in 1996 under the supervision of Prof. Shafi Goldwasser. He then joined IBM’s T.J. Watson Research Center and was a Research Staff Member until 2008. Canetti is known for his contribution to both the practice and theory of cryptography. Prominent contributions include the Keyed-Hash Message Authentication Code (HMAC)[7], the definition of which was first published in 1996 in a paper by Mihir Bellare, Ran Canetti, and Hugo Krawczyk, and the formulation of the Universally Composable Security framework, which allows analyzing security of cryptographic protocols in a modular and robust way. Canetti is the recipient of the RSA Award for Excellence in Mathematics (2018). He is a Fellow of the Association of Cryptologic Research[8]. He received the IBM Research Outstanding Innovation Award in 2006, the IBM Corporate Award in 2005, the IBM Research Division Award in 1999, two IBM Best Paper Awards and the Kennedy Thesis Award from The Weizmann Institute in Current RolesSince July 2011, Canetti has been a Professor in the Department of Computer Science at Boston University and the Director for Research at the Center for Reliable Information Systems and Cyber Security (RISCS) at Boston University since September 2011[9]. His current positions include being the Head of the Check Point Institute of Information Security at Tel Aviv University as well as the Editor for the Journal of Cryptography and Editor of Information and Computation[10]. Canetti currently lives in Brookline, MA and is married with two children. PatentsCanetti’s registered patents and recognized and authorized standards include:
Standards
BooksCanetti has also authored several books including:
Publications
Some of Canetti’s past activities include being a co-organizer of the Crypto in the Clouds Workshop at MIT (2009, co-organizer of the CPIIS TAU/IDC Workshop on Electronic voting (2009), co-organizer of the Theoretical Foundations of Practical Information Security workshop (2008). He was also the Program Committee chair for the Theory of Cryptography Conference (2008) and for eight years was the co-chair of the Multicast Security Working Group at the Internet Engineering Task Force (2000-2008). Ran Canetti's Full List of Publications (1990-2018)[30] Areas of ResearchHis research interests span multiple aspects of cryptography and information security, with emphasis on the design, analysis and use of cryptographic protocols. Awards
Public AppearancesCanetti has spoken at major conferences worldwide including the below selection of keynote talks:
References1. ^{{Cite web|url=http://www.bu.edu/cs/ran-canetti/|title=Ran Canetti {{!}} Computer Science|last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}} {{DEFAULTSORT:Canetti, Ran}}2. ^{{Cite web|url=http://www.cs.tau.ac.il/~canetti/|title=Ran Canetti {{!}} School of Computer Science, Tel Aviv University|last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}} 3. ^{{Cite web|url=http://cpiis.cs.tau.ac.il/people/|title=The Check Point Institute for Information Security |last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}} 4. ^{{Cite web|url=https://www.springer.com/computer/theoretical+computer+science/journal/145?detailsPage=editorialBoard|title=Journal of Cryptology|last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}} 5. ^{{Cite web|url=https://www.researchgate.net/search?q=ran%20canetti|title=Ran Canetti {{!}} ResearchGate||last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}} 6. ^{{Cite web|url=http://www.genealogy.ams.org/id.php?id=19236|title=Ran Canetti - The Mathematics Genealogy Project|website=www.genealogy.ams.org|access-date=2019-02-27}} 7. ^{{Citation|last=Bellare|first=Mihir|title=Keying Hash Functions for Message Authentication|date=1996|url=http://dx.doi.org/10.1007/3-540-68697-5_1|work=Advances in Cryptology — CRYPTO ’96|pages=1–15|publisher=Springer Berlin Heidelberg|isbn=9783540615125|access-date=2019-02-27|last2=Canetti|first2=Ran|last3=Krawczyk|first3=Hugo}} 8. ^{{Cite web|url=https://www.iacr.org/fellows/2014/canetti.html|title=Ran Canetti, IACR Fellow|website=www.iacr.org|access-date=2019-02-27}} 9. ^{{Cite web|url=http://www.bu.edu/hic/profile/ran-canetti/|title=Ran Canetti {{!}} Rafik Hariri Institute for Computing and Computational Science & Engineering|website=www.bu.edu|access-date=2019-02-27}} 10. ^{{Cite web|url=http://projects.csail.mit.edu/iandc/Editors/Canetti.html|title=Ran Canetti|website=projects.csail.mit.edu|access-date=2019-02-27}} 11. ^{{Citation|last=|first=|title=Mitigating dictionary attacks on password-protected local storage|url=https://patents.google.com/patent/US20080049939A1/en|volume=|pages=|access-date=2019-02-27}} 12. ^{{Citation|last=|first=|title=Non-transferable anonymous credentials|url=https://patents.google.com/patent/US7222362B1/en|volume=|pages=|issue-date=|access-date=2019-02-27}} 13. ^{{Citation|last=|first=|title=Mechanism for keeping a key secret from mobile eavesdroppers|url=https://patents.google.com/patent/US5412723A/en|volume=|pages=|issue-date=|access-date=2019-02-27}} 14. ^{{Citation|last=|first=|title=Secure communication and computation in an insecure environment|url=https://patents.google.com/patent/US5469507A/en|volume=|pages=|issue-date=|access-date=2019-02-27}} 15. ^{{Cite web|url=https://tools.ietf.org/html/rfc4046.html|title=Multicast Security (MSEC) Group Key Management Architecture|last=Dondeti|first=Lakshminath R.|last2=Lindholm|first2=Fredrik|website=tools.ietf.org|language=en|access-date=2019-02-27|last3=Baugher|first3=Mark}} 16. ^{{Cite web|url=https://www.ietf.org/rfc/rfc4082.txt|title=A. Perrig, R. Canetti, B. Briscoe, D. Tygar, D. Song, “TESLA: Multicast Source Authentication Transform”, Internet Engineering Task Force|last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}} 17. ^{{Cite web|url=https://tools.ietf.org/html/rfc2104.html|title=HMAC: Keyed-Hashing for Message Authentication|last=Krawczyk|first=Hugo|last2=Canetti|first2=Ran|website=tools.ietf.org|language=en|access-date=2019-02-27|last3=Bellare|first3=Mihir}} 18. ^{{Cite web|url=https://webstore.ansi.org/Standards/ASCX9/ANSIX9712000|title=ANSI X9.71-2000 - Keyed Hash Message Authentication Code (MAC)|website=webstore.ansi.org|access-date=2019-02-27}} 19. ^{{Cite web|url=https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.198-1.pdf|title=Federal Information Processing Standard No. 198|last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}} 20. ^{{Cite journal|last=Canetti|first=Ran|date=|title=Security and Composition of Cryptographic Protocols: A Tutorial (Part I)|url=http://doi.acm.org/10.1145/1165555.1165570|journal=SIGACT News|volume=37|issue=3|pages=67–92|doi=10.1145/1165555.1165570|issn=0163-5700|via=}} 21. ^{{Cite web|url=https://www.amazon.ca/Secure-Multi-Party-Computation-Manoj-Prabhakaran/dp/1614991685|title=Secure Multiparty Computation|last=|first=|date=|website=www.amazon.ca|archive-url=|archive-date=|dead-url=|access-date=2019-02-27}} 22. ^{{Cite web|url=https://www.iospress.nl/bookserie/cryptology-and-information-security-series/|title=Cryptology and Information Security Series|last=|first=|date=|website=|language=en-US|archive-url=|archive-date=|dead-url=|access-date=2019-02-27}} 23. ^{{Cite web|url=https://eprint.iacr.org/2006/082.pdf|title=Journal of Cryptology Special Issue on the Byzantine Agreement|last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}} 24. ^{{Cite web|url=https://link.springer.com/referencework/10.1007/978-1-4419-5906-5|title=Encyclopedia of Cryptography and Security {{!}} SpringerLink|website=link.springer.com|doi=10.1007/978-1-4419-5906-5|access-date=2019-02-27}} 25. ^{{Cite journal|last=Bellare|first=Mihir|last2=Canetti|first2=Ran|last3=Krawczyk|first3=Hugo|date=1996|editor-last=Koblitz|editor-first=Neal|title=Keying Hash Functions for Message Authentication|url=https://link.springer.com/chapter/10.1007/3-540-68697-5_1|journal=Advances in Cryptology — CRYPTO ’96|series=Lecture Notes in Computer Science|language=en|publisher=Springer Berlin Heidelberg|pages=1–15|doi=10.1007/3-540-68697-5_1|isbn=9783540686972}} 26. ^{{Cite web|url=https://eprint.iacr.org/2000/067.pdf|title=Universally Composable Security: A New Paradigm for Cryptographic Protocols|last=Canetti|first=Ran|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}} 27. ^{{Cite web|url=https://eprint.iacr.org/2014/402.pdf|title=On the Existence of Extractable One-Way Functions|last=Canetti|first=Ran|date=May 31, 2014|website=|archive-url=|archive-date=|dead-url=|access-date=}} 28. ^{{Cite web|url=https://eprint.iacr.org/2018/131.pdf|title=Fiat-Shamir and Correlation Intractability from Strong KDM-Secure Encryption|last=Canetti|first=Ran|date=February 4, 2018|website=|archive-url=|archive-date=|dead-url=|access-date=}} 29. ^{{Cite web|url=https://perso.uclouvain.be/olivier.pereira/wodes06.pdf|title=Task Structured Probabilistic I/O Automata|last=Canetti|first=Ran|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}} 30. ^{{Cite web|url=https://dblp.uni-trier.de/pers/hd/c/Canetti:Ran|title=Full List of Publications (1990-2018)|last=Canetti|first=Ran|date=|website=dblp.uni-trier.de|language=en|archive-url=|archive-date=|dead-url=|access-date=2019-02-27}} 31. ^{{Cite web|url=http://www.bu.edu/research/articles/ran-canetti-honored-for-cryptography-innovation/|title=Ran Canetti Honored for Cryptography Innovation|website=www.bu.edu|language=en|access-date=2019-02-27}} 32. ^{{Cite web|url=https://researcher.watson.ibm.com/researcher/view_group.php?id=5855&mhq=ran%20canetti&mhsrc=ibmsearch_a|title=Pat Goldberg Memorial Best Paper Awards - IBM|date=2016-07-25|website=researcher.watson.ibm.com|language=en-US|access-date=2019-02-27}} 33. ^{{Cite web|url=https://researcher.watson.ibm.com/researcher/view_group.php?id=5855&mhq=ran%20canetti&mhsrc=ibmsearch_a|title=Pat Goldberg Memorial Best Paper Awards - IBM|date=2016-07-25|website=researcher.watson.ibm.com|language=en-US|access-date=2019-02-27}} 34. ^{{Cite web|url=http://www.yadhanadiv.org.il/node/615/view/recipients?field_rp_first_name_value=&field_rp_last_name_value=canetti&date_filter%5Bvalue%5D%5Byear%5D=&date_filter%5Bvalue%5D%5Bmonth%5D=0&date_filter%5Bvalue%5D%5Bday%5D=0&date_filter%5Bvalue%5D%5Bhour%5D=0&date_filter%5Bvalue%5D%5Bminute%5D=0&date_filter%5Bvalue%5D%5Bsecond%5D=0&field_rp_search_disciplines_value_many_to_one=All|title=Rothschild Fellowship|website=www.yadhanadiv.org.il|language=en|access-date=2019-02-27}} 35. ^{{Cite web|url=https://www.researchgate.net/publication/220479001_Universally_Composable_Symbolic_Security_Analysis|title=Universally Composable Symbolic Security Analysis|website=ResearchGate|language=en|access-date=2019-02-27}} 36. ^{{Cite web|url=https://eprint.iacr.org/2007/475.pdf|title=Obtaining Universally Composable Security: Towards the Bare Bones of Trust|last=Canetti|first=Ran|date=December 15, 2007|website=|archive-url=|archive-date=|dead-url=|access-date=}} 37. ^{{Cite web|url=https://www.cs.tau.ac.il/~canetti/materials/ac07.pdf|title=Obtaining Universally Composable Security: Towards the Bare Bones of Trust|last=Canetti|first=Ran|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}} 38. ^{{Cite web|url=http://www.cs.cornell.edu/~rafael/papers/cdpw.pdf|title=Universally Composable Security with Global Setup|last=Canetti|first=Ran|date=November 20, 2006|website=|archive-url=|archive-date=|dead-url=|access-date=}} 39. ^{{Cite web|url=http://www.cs.tau.ac.il/~canetti/materials/sp09-sem-lec9.pdf|title=Security and Composition of Cryptographic Protocols: A Tutorial|last=Canetti|first=Ran|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}} 40. ^{{Cite web|url=https://www.researchgate.net/publication/220556089_Security_and_composition_of_cryptographic_protocols_A_tutorial|title=Security and composition of cryptographic protocols: A tutorial|website=ResearchGate|language=en|access-date=2019-02-27}} 41. ^{{Cite web|url=https://calendar.csail.mit.edu/events/936|title=CSAIL Calendar: The HMAC Construction: A Decade Later|website=calendar.csail.mit.edu|access-date=2019-02-27}} 42. ^{{Cite web|url=https://www.cs.tau.ac.il/~canetti/materials/hmac-10.pdf|title=The HMAC Construction: A Decade Later|last=Canetti|first=Ran|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}} 2 : Year of birth missing (living people)|Living people |
随便看 |
|
开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。