Edit Profile Hopper, Nicholas J. Compute Distance To: Compute Author ID: hopper.nicholas-j Published as: Hopper, Nicholas; Hopper, Nicholas J. External Links: MGP Documents Indexed: 9 Publications since 2001 all top 5 Co-Authors 1 single-authored 5 von Ahn, Luis 4 Langford, John 2 Blum, Manuel 1 Cheon, Jung Hee 1 Kim, Yongdae 1 Molnar, David 1 Osipkov, Ivan 1 Wagner, David A. Serials 1 IEEE Transactions on Computers Fields 9 Information and communication theory, circuits (94-XX) 2 Computer science (68-XX) Publications by Year all cited Publications top 5 cited Publications Citations contained in zbMATH 9 Publications have been cited 70 times in 57 Documents Cited by ▼ Year ▼ Secure human identification protocols. Zbl 1062.94549Hopper, Nicholas J.; Blum, Manuel 22 2001 Provably secure steganography. Zbl 1026.94529Hopper, Nicholas J.; Langford, John; von Ahn, Luis 11 2002 CAPTCHA: Using hard AI problems for security. Zbl 1038.94551von Ahn, Luis; Blum, Manuel; Hopper, Nicholas J.; Langford, John 10 2003 Timed-release and key-insulated public key encryption. Zbl 1152.94410Cheon, Jung Hee; Hopper, Nicholas; Kim, Yongdae; Osipkov, Ivan 7 2006 Provably secure steganography. Zbl 1367.94316Hopper, Nicholas; von Ahn, Luis; Langford, John 6 2009 Public-key steganography. Zbl 1122.94443von Ahn, Luis; Hopper, Nicholas J. 6 2004 Covert two-party computation. Zbl 1192.94111von Ahn, Luis; Hopper, Nicholas; Langford, John 3 2005 On steganographic chosen covertext security. Zbl 1082.94521Hopper, Nicholas 3 2005 From weak to strong watermarking. Zbl 1129.94045Hopper, Nicholas; Molnar, David; Wagner, David 2 2007 Provably secure steganography. Zbl 1367.94316Hopper, Nicholas; von Ahn, Luis; Langford, John 6 2009 From weak to strong watermarking. Zbl 1129.94045Hopper, Nicholas; Molnar, David; Wagner, David 2 2007 Timed-release and key-insulated public key encryption. Zbl 1152.94410Cheon, Jung Hee; Hopper, Nicholas; Kim, Yongdae; Osipkov, Ivan 7 2006 Covert two-party computation. Zbl 1192.94111von Ahn, Luis; Hopper, Nicholas; Langford, John 3 2005 On steganographic chosen covertext security. Zbl 1082.94521Hopper, Nicholas 3 2005 Public-key steganography. Zbl 1122.94443von Ahn, Luis; Hopper, Nicholas J. 6 2004 CAPTCHA: Using hard AI problems for security. Zbl 1038.94551von Ahn, Luis; Blum, Manuel; Hopper, Nicholas J.; Langford, John 10 2003 Provably secure steganography. Zbl 1026.94529Hopper, Nicholas J.; Langford, John; von Ahn, Luis 11 2002 Secure human identification protocols. Zbl 1062.94549Hopper, Nicholas J.; Blum, Manuel 22 2001 all cited Publications top 5 cited Publications all top 5 Cited by 130 Authors 4 Liśkiewicz, Maciej 4 Vaudenay, Serge 3 Pietrzak, Krzysztof 3 Reischuk, Rüdiger-K 3 Wölfel, Ulrich 2 Blocki, Jeremiah 2 Bogos, Sonia 2 Cash, David M. 2 Katz, Jonathan N. 2 Kiltz, Eike 2 Mihaljević, Miodrag J. 2 Reyzin, Leonid 2 Russell, Alexander C. 2 Shikata, Junji 2 Shin, Ji Sun 2 Tessaro, Stefano 2 Venturi, Daniele 2 Watanabe, Yodai 2 Zhou, Hong-Sheng 1 Aggarwal, Gagan 1 Ahn, Gail-Joon 1 Alwen, Joël 1 Applebaum, Benny 1 Arora, Sanjeev 1 Asghar, Hassan Jameel 1 Ateniese, Giuseppe 1 Aumann, Yonatan 1 Baignères, Thomas 1 Benini, Anna Miriam 1 Berndt, Sebastian 1 Bhattacharyya, Arnab 1 Bhattarakosol, Pattarasinee 1 Blum, Manuel 1 Böhme, Rainer 1 Boneh, Dan 1 Buhrman, Harry 1 Cachin, Christian 1 Chen, Binyi 1 Chen, Tse-Shih 1 Chow, Sherman S. M. 1 Cohen, Aloni 1 Damgård, Ivan Bjerre 1 D’Arco, Paolo 1 Datta, Anupam 1 De Prisco, Roberto 1 Dedić, Nenad 1 Emura, Keita 1 Fan, Jianxi 1 Francati, Danilo 1 Frigeri, Achille 1 Gadekar, Ameet 1 García-Soriano, David 1 Ge, Rong 1 Guo, Qian 1 Haagh, Helene 1 Hamann, Matthias 1 Hanaoka, Goichiro 1 Hao, Rong 1 Holmgren, Justin 1 Hu, Hongxin 1 Imai, Hideki 1 Impagliazzo, Russell 1 Ishai, Yuval 1 Itkis, Gene 1 Jain, Abhishek 1 Jaiswal, Ragesh 1 Jiang, Shaoquan 1 Johansson, Thomas 1 Jutla, Charanjit S. 1 Kaafar, Mohamed Ali 1 Kabanets, Valentine 1 Kiayias, Aggelos 1 Krause, Matthias 1 Kushilevitz, Eyal 1 Lai, Xuejia 1 Levesque, Hector J. 1 Lewi, Kevin 1 Lindell, Yehuda 1 Liu, Shengli 1 Löndahl, Carl 1 Long, Yu 1 Magri, Bernardo 1 Matsliah, Arie 1 Mishra, Nina 1 Miyaji, Atsuko 1 Morini, Fiorenza 1 Nishide, Takashi 1 Nishimaki, Ryo 1 Nuida, Koji 1 Ognjanović, Zoran 1 Okamoto, Eiji 1 Omote, Kazumasa 1 Orlandi, Claudio 1 Ouafi, Khaled 1 Overbeck, Raphael 1 Peng, An-Guo 1 Perović, Aleksandar 1 Pinkas, Benny 1 Raekow, Yona 1 Rajgopal, Ninad ...and 30 more Authors all top 5 Cited in 18 Serials 9 Journal of Cryptology 6 Theoretical Computer Science 2 Information Processing Letters 2 Information and Computation 2 Designs, Codes and Cryptography 1 Artificial Intelligence 1 Computing 1 Information Sciences 1 SIAM Journal on Computing 1 Signal Processing 1 Mathematical Problems in Engineering 1 Journal of the ACM 1 Journal of Applied Mathematics 1 Journal of Machine Learning Research (JMLR) 1 Journal of Zhejiang University. Science A 1 Journal of Mathematical Cryptology 1 Cryptography and Communications 1 Science China. Information Sciences all top 5 Cited in 8 Fields 47 Information and communication theory, circuits (94-XX) 22 Computer science (68-XX) 2 Number theory (11-XX) 2 Statistics (62-XX) 1 Combinatorics (05-XX) 1 Algebraic geometry (14-XX) 1 Associative rings and algebras (16-XX) 1 Probability theory and stochastic processes (60-XX) Citations by Year