Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Yael Tauman Kalai
@inproceedings{DBLP:conf/crypto/BrakerskiBKLP23, author = {Zvika Brakerski and Maya Farber Brodsky and Yael Tauman Kalai and Alex Lombardi and Omer Paneth}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {SNARGs for Monotone Policy Batch {NP}}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14082}, pages = {252--283}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38545-2\_9}, doi = {10.1007/978-3-031-38545-2\_9}, timestamp = {Mon, 14 Aug 2023 16:16:25 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BrakerskiBKLP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KalaiLV23, author = {Yael Tauman Kalai and Alex Lombardi and Vinod Vaikuntanathan}, editor = {Carmit Hazay and Martijn Stam}, title = {SNARGs and {PPAD} Hardness from the Decisional Diffie-Hellman Assumption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14005}, pages = {470--498}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30617-4\_16}, doi = {10.1007/978-3-031-30617-4\_16}, timestamp = {Thu, 20 Apr 2023 11:35:01 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KalaiLV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soda/EfremenkoHKKRS23, author = {Klim Efremenko and Bernhard Haeupler and Yael Tauman Kalai and Gillat Kol and Nicolas Resch and Raghuvansh R. Saxena}, editor = {Nikhil Bansal and Viswanath Nagarajan}, title = {Interactive Coding with Small Memory}, booktitle = {Proceedings of the 2023 {ACM-SIAM} Symposium on Discrete Algorithms, {SODA} 2023, Florence, Italy, January 22-25, 2023}, pages = {3587--3613}, publisher = {{SIAM}}, year = {2023}, url = {https://doi.org/10.1137/1.9781611977554.ch137}, doi = {10.1137/1.9781611977554.CH137}, timestamp = {Fri, 17 Feb 2023 09:28:57 +0100}, biburl = {https://dblp.org/rec/conf/soda/EfremenkoHKKRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/KalaiLVW23, author = {Yael Kalai and Alex Lombardi and Vinod Vaikuntanathan and Daniel Wichs}, editor = {Barna Saha and Rocco A. Servedio}, title = {Boosting Batch Arguments and {RAM} Delegation}, booktitle = {Proceedings of the 55th Annual {ACM} Symposium on Theory of Computing, {STOC} 2023, Orlando, FL, USA, June 20-23, 2023}, pages = {1545--1552}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3564246.3585200}, doi = {10.1145/3564246.3585200}, timestamp = {Mon, 22 May 2023 13:01:48 +0200}, biburl = {https://dblp.org/rec/conf/stoc/KalaiLVW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/KalaiLV023, author = {Yael Kalai and Alex Lombardi and Vinod Vaikuntanathan and Lisa Yang}, editor = {Barna Saha and Rocco A. Servedio}, title = {Quantum Advantage from Any Non-local Game}, booktitle = {Proceedings of the 55th Annual {ACM} Symposium on Theory of Computing, {STOC} 2023, Orlando, FL, USA, June 20-23, 2023}, pages = {1617--1628}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3564246.3585164}, doi = {10.1145/3564246.3585164}, timestamp = {Mon, 22 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stoc/KalaiLV023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/innovations/2023, editor = {Yael Tauman Kalai}, title = {14th Innovations in Theoretical Computer Science Conference, {ITCS} 2023, January 10-13, 2023, MIT, Cambridge, Massachusetts, {USA}}, series = {LIPIcs}, volume = {251}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2023}, url = {https://www.dagstuhl.de/dagpub/978-3-95977-263-1}, isbn = {978-3-95977-263-1}, timestamp = {Thu, 02 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/innovations/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-09524, author = {Boaz Barak and Yael Kalai and Ran Raz and Salil P. Vadhan and Nisheeth K. Vishnoi}, title = {On the works of Avi Wigderson}, journal = {CoRR}, volume = {abs/2307.09524}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.09524}, doi = {10.48550/ARXIV.2307.09524}, eprinttype = {arXiv}, eprint = {2307.09524}, timestamp = {Tue, 25 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-09524.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiBKLP23, author = {Zvika Brakerski and Maya Farber Brodsky and Yael Tauman Kalai and Alex Lombardi and Omer Paneth}, title = {SNARGs for Monotone Policy Batch {NP}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1050}, year = {2023}, url = {https://eprint.iacr.org/2023/1050}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiBKLP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/KalaiRR22, author = {Yael Tauman Kalai and Ran Raz and Ron D. Rothblum}, title = {How to Delegate Computations: The Power of No-Signaling Proofs}, journal = {J. {ACM}}, volume = {69}, number = {1}, pages = {1:1--1:82}, year = {2022}, url = {https://doi.org/10.1145/3456867}, doi = {10.1145/3456867}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jacm/KalaiRR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/GellesKR22, author = {Ran Gelles and Yael Tauman Kalai and Govind Ramnarayan}, title = {Efficient Multiparty Interactive Coding - Part {II:} Non-Oblivious Noise}, journal = {{IEEE} Trans. Inf. Theory}, volume = {68}, number = {7}, pages = {4723--4749}, year = {2022}, url = {https://doi.org/10.1109/TIT.2022.3160515}, doi = {10.1109/TIT.2022.3160515}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/GellesKR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BartusekKLMMVVY22, author = {James Bartusek and Yael Tauman Kalai and Alex Lombardi and Fermi Ma and Giulio Malavolta and Vinod Vaikuntanathan and Thomas Vidick and Lisa Yang}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Succinct Classical Verification of Quantum Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13508}, pages = {195--211}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15979-4\_7}, doi = {10.1007/978-3-031-15979-4\_7}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BartusekKLMMVVY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BitanskyBK22, author = {Nir Bitansky and Zvika Brakerski and Yael Tauman Kalai}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Constructive Post-Quantum Reductions}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13509}, pages = {654--683}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15982-4\_22}, doi = {10.1007/978-3-031-15982-4\_22}, timestamp = {Wed, 19 Oct 2022 17:37:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BitanskyBK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/DevadasGKV22, author = {Lalita Devadas and Rishab Goyal and Yael Kalai and Vinod Vaikuntanathan}, title = {Rate-1 Non-Interactive Arguments for Batch-NP and Applications}, booktitle = {63rd {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS} 2022, Denver, CO, USA, October 31 - November 3, 2022}, pages = {1057--1068}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/FOCS54457.2022.00103}, doi = {10.1109/FOCS54457.2022.00103}, timestamp = {Sat, 31 Dec 2022 17:14:50 +0100}, biburl = {https://dblp.org/rec/conf/focs/DevadasGKV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/EfremenkoHKKKRS22, author = {Klim Efremenko and Bernhard Haeupler and Yael Tauman Kalai and Pritish Kamath and Gillat Kol and Nicolas Resch and Raghuvansh R. Saxena}, editor = {Stefano Leonardi and Anupam Gupta}, title = {Circuits resilient to short-circuit errors}, booktitle = {{STOC} '22: 54th Annual {ACM} {SIGACT} Symposium on Theory of Computing, Rome, Italy, June 20 - 24, 2022}, pages = {582--594}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3519935.3520007}, doi = {10.1145/3519935.3520007}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/EfremenkoHKKKRS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/GuptaKZ22, author = {Meghal Gupta and Yael Tauman Kalai and Rachel Yun Zhang}, editor = {Stefano Leonardi and Anupam Gupta}, title = {Interactive error correcting codes over binary erasure channels resilient to {\textgreater} {\textonehalf} adversarial corruption}, booktitle = {{STOC} '22: 54th Annual {ACM} {SIGACT} Symposium on Theory of Computing, Rome, Italy, June 20 - 24, 2022}, pages = {609--622}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3519935.3519980}, doi = {10.1145/3519935.3519980}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/GuptaKZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Ben-DavidKP22, author = {Shany Ben{-}David and Yael Tauman Kalai and Omer Paneth}, editor = {Eike Kiltz and Vinod Vaikuntanathan}, title = {Verifiable Private Information Retrieval}, booktitle = {Theory of Cryptography - 20th International Conference, {TCC} 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13749}, pages = {3--32}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22368-6\_1}, doi = {10.1007/978-3-031-22368-6\_1}, timestamp = {Fri, 23 Dec 2022 17:47:38 +0100}, biburl = {https://dblp.org/rec/conf/tcc/Ben-DavidKP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-02314, author = {Nir Bitansky and Zvika Brakerski and Yael Tauman Kalai}, title = {Constructive Post-Quantum Reductions}, journal = {CoRR}, volume = {abs/2203.02314}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.02314}, doi = {10.48550/ARXIV.2203.02314}, eprinttype = {arXiv}, eprint = {2203.02314}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-02314.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-15877, author = {Yael Kalai and Alex Lombardi and Vinod Vaikuntanathan and Lisa Yang}, title = {Quantum Advantage from Any Non-Local Game}, journal = {CoRR}, volume = {abs/2203.15877}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.15877}, doi = {10.48550/ARXIV.2203.15877}, eprinttype = {arXiv}, eprint = {2203.15877}, timestamp = {Tue, 05 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-15877.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2206-14929, author = {James Bartusek and Yael Tauman Kalai and Alex Lombardi and Fermi Ma and Giulio Malavolta and Vinod Vaikuntanathan and Thomas Vidick and Lisa Yang}, title = {Succinct Classical Verification of Quantum Computation}, journal = {CoRR}, volume = {abs/2206.14929}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2206.14929}, doi = {10.48550/ARXIV.2206.14929}, eprinttype = {arXiv}, eprint = {2206.14929}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2206-14929.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/EfremenkoHKKKRS22, author = {Klim Efremenko and Bernhard Haeupler and Yael Kalai and Pritish Kamath and Gillat Kol and Nicolas Resch and Raghuvansh Saxena}, title = {Circuits Resilient to Short-Circuit Errors}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR22-050}}, year = {2022}, url = {https://eccc.weizmann.ac.il/report/2022/050}, eprinttype = {ECCC}, eprint = {TR22-050}, timestamp = {Mon, 11 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/EfremenkoHKKKRS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/EfremenkoHKRSK22, author = {Klim Efremenko and Bernhard Haeupler and Gillat Kol and Nicolas Resch and Raghuvansh Saxena and Yael Tauman Kalai}, title = {Interactive Coding with Small Memory}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR22-146}}, year = {2022}, url = {https://eccc.weizmann.ac.il/report/2022/146}, eprinttype = {ECCC}, eprint = {TR22-146}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eccc/EfremenkoHKRSK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BitanskyBK22, author = {Nir Bitansky and Zvika Brakerski and Yael Tauman Kalai}, title = {Constructive Post-Quantum Reductions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {298}, year = {2022}, url = {https://eprint.iacr.org/2022/298}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BitanskyBK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KalaiLVY22, author = {Yael Tauman Kalai and Alex Lombardi and Vinod Vaikuntanathan and Lisa Yang}, title = {Quantum Advantage from Any Non-Local Game}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {400}, year = {2022}, url = {https://eprint.iacr.org/2022/400}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KalaiLVY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BartusekKLMMVV022, author = {James Bartusek and Yael Tauman Kalai and Alex Lombardi and Fermi Ma and Giulio Malavolta and Vinod Vaikuntanathan and Thomas Vidick and Lisa Yang}, title = {Succinct Classical Verification of Quantum Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {857}, year = {2022}, url = {https://eprint.iacr.org/2022/857}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BartusekKLMMVV022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DevadasGKV22, author = {Lalita Devadas and Rishab Goyal and Yael Kalai and Vinod Vaikuntanathan}, title = {Rate-1 Non-Interactive Arguments for Batch-NP and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1236}, year = {2022}, url = {https://eprint.iacr.org/2022/1236}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DevadasGKV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KalaiLVW22, author = {Yael Tauman Kalai and Alex Lombardi and Vinod Vaikuntanathan and Daniel Wichs}, title = {Boosting Batch Arguments and {RAM} Delegation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1320}, year = {2022}, url = {https://eprint.iacr.org/2022/1320}, timestamp = {Sat, 22 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KalaiLVW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KalaiLV22, author = {Yael Tauman Kalai and Alex Lombardi and Vinod Vaikuntanathan}, title = {SNARGs and {PPAD} Hardness from the Decisional Diffie-Hellman Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1409}, year = {2022}, url = {https://eprint.iacr.org/2022/1409}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KalaiLV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ben-DavidKP22, author = {Shany Ben{-}David and Yael Tauman Kalai and Omer Paneth}, title = {Verifiable Private Information Retrieval}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1560}, year = {2022}, url = {https://eprint.iacr.org/2022/1560}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Ben-DavidKP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/combinatorica/KalaiKR21, author = {Yael Tauman Kalai and Ilan Komargodski and Ran Raz}, title = {A Lower Bound for Adaptively-Secure Collective Coin Flipping Protocols}, journal = {Comb.}, volume = {41}, number = {1}, pages = {75--98}, year = {2021}, url = {https://doi.org/10.1007/s00493-020-4147-4}, doi = {10.1007/S00493-020-4147-4}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/combinatorica/KalaiKR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/GellesKR21, author = {Ran Gelles and Yael Tauman Kalai and Govind Ramnarayan}, title = {Efficient Multiparty Interactive Coding - Part {I:} Oblivious Insertions, Deletions and Substitutions}, journal = {{IEEE} Trans. Inf. Theory}, volume = {67}, number = {6}, pages = {3411--3437}, year = {2021}, url = {https://doi.org/10.1109/TIT.2021.3066009}, doi = {10.1109/TIT.2021.3066009}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/GellesKR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/JawaleKKZ21, author = {Ruta Jawale and Yael Tauman Kalai and Dakshita Khurana and Rachel Yun Zhang}, editor = {Samir Khuller and Virginia Vassilevska Williams}, title = {SNARGs for bounded depth computations and {PPAD} hardness from sub-exponential {LWE}}, booktitle = {{STOC} '21: 53rd Annual {ACM} {SIGACT} Symposium on Theory of Computing, Virtual Event, Italy, June 21-25, 2021}, pages = {708--721}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3406325.3451055}, doi = {10.1145/3406325.3451055}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/JawaleKKZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/KalaiVZ21, author = {Yael Tauman Kalai and Vinod Vaikuntanathan and Rachel Yun Zhang}, editor = {Kobbi Nissim and Brent Waters}, title = {Somewhere Statistical Soundness, Post-Quantum Security, and SNARGs}, booktitle = {Theory of Cryptography - 19th International Conference, {TCC} 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13042}, pages = {330--368}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90459-3\_12}, doi = {10.1007/978-3-030-90459-3\_12}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/KalaiVZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-04181, author = {Meghal Gupta and Yael Tauman Kalai and Rachel Yun Zhang}, title = {Interactive Error Correcting Codes Over Binary Erasure Channels Resilient to {\textdollar}{\textgreater}{\textbackslash}frac12{\textdollar} Adversarial Corruption}, journal = {CoRR}, volume = {abs/2111.04181}, year = {2021}, url = {https://arxiv.org/abs/2111.04181}, eprinttype = {arXiv}, eprint = {2111.04181}, timestamp = {Fri, 10 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-04181.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KalaiVZ21, author = {Yael Tauman Kalai and Vinod Vaikuntanathan and Rachel Yun Zhang}, title = {Somewhere Statistical Soundness, Post-Quantum Security, and SNARGs for {P}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {788}, year = {2021}, url = {https://eprint.iacr.org/2021/788}, timestamp = {Wed, 10 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KalaiVZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuptaKZ21, author = {Meghal Gupta and Yael Tauman Kalai and Rachel Yun Zhang}, title = {Interactive Error Correcting Codes Over Binary Erasure Channels Resilient to {\textdollar}{\textgreater}{\textbackslash}frac12{\textdollar} Adversarial Corruption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1481}, year = {2021}, url = {https://eprint.iacr.org/2021/1481}, timestamp = {Fri, 10 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GuptaKZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KalaiP020, author = {Yael Tauman Kalai and Omer Paneth and Lisa Yang}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Delegation with Updatable Unambiguous Proofs and PPAD-Hardness}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12172}, pages = {652--673}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56877-1\_23}, doi = {10.1007/978-3-030-56877-1\_23}, timestamp = {Mon, 28 Aug 2023 21:17:50 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KalaiP020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GargKK20, author = {Ankit Garg and Yael Tauman Kalai and Dakshita Khurana}, editor = {Anne Canteaut and Yuval Ishai}, title = {Low Error Efficient Computational Extractors in the {CRS} Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12105}, pages = {373--402}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45721-1\_14}, doi = {10.1007/978-3-030-45721-1\_14}, timestamp = {Mon, 04 May 2020 14:27:11 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GargKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/BrakerskiKS20, author = {Zvika Brakerski and Yael Tauman Kalai and Raghuvansh R. Saxena}, editor = {Sandy Irani}, title = {Deterministic and Efficient Interactive Coding from Hard-to-Decode Tree Codes}, booktitle = {61st {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS} 2020, Durham, NC, USA, November 16-19, 2020}, pages = {446--457}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/FOCS46700.2020.00049}, doi = {10.1109/FOCS46700.2020.00049}, timestamp = {Wed, 15 Dec 2021 10:49:16 +0100}, biburl = {https://dblp.org/rec/conf/focs/BrakerskiKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/EfremenkoHK20, author = {Klim Efremenko and Elad Haramaty and Yael Tauman Kalai}, editor = {Thomas Vidick}, title = {Interactive Coding with Constant Round and Communication Blowup}, booktitle = {11th Innovations in Theoretical Computer Science Conference, {ITCS} 2020, January 12-14, 2020, Seattle, Washington, {USA}}, series = {LIPIcs}, volume = {151}, pages = {7:1--7:34}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://doi.org/10.4230/LIPIcs.ITCS.2020.7}, doi = {10.4230/LIPICS.ITCS.2020.7}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/innovations/EfremenkoHK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ita/GoldwasserKKM20, author = {Shafi Goldwasser and Adam Tauman Kalai and Yael Tauman Kalai and Omar Montasser}, title = {Identifying unpredictable test examples with worst-case guarantees}, booktitle = {Information Theory and Applications Workshop, {ITA} 2020, San Diego, CA, USA, February 2-7, 2020}, pages = {1--14}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ITA50056.2020.9244996}, doi = {10.1109/ITA50056.2020.9244996}, timestamp = {Thu, 19 Nov 2020 14:03:02 +0100}, biburl = {https://dblp.org/rec/conf/ita/GoldwasserKKM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/GoldwasserKKM20, author = {Shafi Goldwasser and Adam Tauman Kalai and Yael Kalai and Omar Montasser}, editor = {Hugo Larochelle and Marc'Aurelio Ranzato and Raia Hadsell and Maria{-}Florina Balcan and Hsuan{-}Tien Lin}, title = {Beyond Perturbations: Learning Guarantees with Arbitrary Adversarial Test Examples}, booktitle = {Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, NeurIPS 2020, December 6-12, 2020, virtual}, year = {2020}, url = {https://proceedings.neurips.cc/paper/2020/hash/b6c8cf4c587f2ead0c08955ee6e2502b-Abstract.html}, timestamp = {Tue, 19 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nips/GoldwasserKKM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BrakerskiK20, author = {Zvika Brakerski and Yael Kalai}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Witness Indistinguishability for Any Single-Round Argument with Applications to Access Control}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12111}, pages = {97--123}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45388-6\_4}, doi = {10.1007/978-3-030-45388-6\_4}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BrakerskiK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/HoldenK20, author = {Dhiraj Holden and Yael Tauman Kalai}, editor = {Konstantin Makarychev and Yury Makarychev and Madhur Tulsiani and Gautam Kamath and Julia Chuzhoy}, title = {Non-signaling proofs with o({\(\surd\)} log n) provers are in {PSPACE}}, booktitle = {Proceedings of the 52nd Annual {ACM} {SIGACT} Symposium on Theory of Computing, {STOC} 2020, Chicago, IL, USA, June 22-26, 2020}, pages = {1024--1037}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3357713.3384246}, doi = {10.1145/3357713.3384246}, timestamp = {Mon, 18 Dec 2023 07:33:37 +0100}, biburl = {https://dblp.org/rec/conf/stoc/HoldenK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icits/2020, editor = {Yael Tauman Kalai and Adam D. Smith and Daniel Wichs}, title = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020, June 17-19, 2020, Boston, MA, {USA}}, series = {LIPIcs}, volume = {163}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://www.dagstuhl.de/dagpub/978-3-95977-151-1}, isbn = {978-3-95977-151-1}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-05145, author = {Shafi Goldwasser and Adam Tauman Kalai and Yael Tauman Kalai and Omar Montasser}, title = {Beyond Perturbations: Learning Guarantees with Arbitrary Adversarial Test Examples}, journal = {CoRR}, volume = {abs/2007.05145}, year = {2020}, url = {https://arxiv.org/abs/2007.05145}, eprinttype = {arXiv}, eprint = {2007.05145}, timestamp = {Mon, 20 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-05145.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/BrakerskiKS20, author = {Zvika Brakerski and Yael Tauman Kalai and Raghuvansh Saxena}, title = {Deterministic and Efficient Interactive Coding from Hard-to-Decode Tree Codes}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR20-137}}, year = {2020}, url = {https://eccc.weizmann.ac.il/report/2020/137}, eprinttype = {ECCC}, eprint = {TR20-137}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/BrakerskiKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KalaiZ20, author = {Yael Tauman Kalai and Rachel Yun Zhang}, title = {SNARGs for Bounded Depth Computations from Sub-Exponential {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {860}, year = {2020}, url = {https://eprint.iacr.org/2020/860}, timestamp = {Wed, 10 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KalaiZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiKLRSSTVW20, author = {Ran Canetti and Yael Tauman Kalai and Anna Lysyanskaya and Ronald L. Rivest and Adi Shamir and Emily Shen and Ari Trachtenberg and Mayank Varia and Daniel J. Weitzner}, title = {Privacy-Preserving Automated Exposure Notification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {863}, year = {2020}, url = {https://eprint.iacr.org/2020/863}, timestamp = {Mon, 27 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiKLRSSTVW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JawaleKKZ20, author = {Ruta Jawale and Yael Tauman Kalai and Dakshita Khurana and Rachel Yun Zhang}, title = {SNARGs for Bounded Depth Computations and {PPAD} Hardness from Sub-Exponential {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {980}, year = {2020}, url = {https://eprint.iacr.org/2020/980}, timestamp = {Wed, 10 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/JawaleKKZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/GellesK19, author = {Ran Gelles and Yael Tauman Kalai}, title = {Constant-Rate Interactive Coding Is Impossible, Even in Constant-Degree Networks}, journal = {{IEEE} Trans. Inf. Theory}, volume = {65}, number = {6}, pages = {3812--3829}, year = {2019}, url = {https://doi.org/10.1109/TIT.2019.2904576}, doi = {10.1109/TIT.2019.2904576}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/GellesK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KalaiK19, author = {Yael Tauman Kalai and Dakshita Khurana}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Non-interactive Non-malleability from Quantum Supremacy}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {552--582}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_18}, doi = {10.1007/978-3-030-26954-8\_18}, timestamp = {Fri, 09 Aug 2019 14:27:02 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KalaiK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/GellesKR19, author = {Ran Gelles and Yael Tauman Kalai and Govind Ramnarayan}, editor = {Peter Robinson and Faith Ellen}, title = {Efficient Multiparty Interactive Coding for Insertions, Deletions, and Substitutions}, booktitle = {Proceedings of the 2019 {ACM} Symposium on Principles of Distributed Computing, {PODC} 2019, Toronto, ON, Canada, July 29 - August 2, 2019}, pages = {137--146}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3293611.3331621}, doi = {10.1145/3293611.3331621}, timestamp = {Fri, 19 Jul 2019 08:02:49 +0200}, biburl = {https://dblp.org/rec/conf/podc/GellesKR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/KalaiPY19, author = {Yael Tauman Kalai and Omer Paneth and Lisa Yang}, editor = {Moses Charikar and Edith Cohen}, title = {How to delegate computations publicly}, booktitle = {Proceedings of the 51st Annual {ACM} {SIGACT} Symposium on Theory of Computing, {STOC} 2019, Phoenix, AZ, USA, June 23-26, 2019}, pages = {1115--1124}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3313276.3316411}, doi = {10.1145/3313276.3316411}, timestamp = {Sun, 08 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/KalaiPY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AnanthDKL19, author = {Prabhanjan Ananth and Apoorvaa Deshpande and Yael Tauman Kalai and Anna Lysyanskaya}, editor = {Dennis Hofheinz and Alon Rosen}, title = {Fully Homomorphic {NIZK} and {NIWI} Proofs}, booktitle = {Theory of Cryptography - 17th International Conference, {TCC} 2019, Nuremberg, Germany, December 1-5, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11892}, pages = {356--385}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36033-7\_14}, doi = {10.1007/978-3-030-36033-7\_14}, timestamp = {Mon, 25 Nov 2019 13:59:31 +0100}, biburl = {https://dblp.org/rec/conf/tcc/AnanthDKL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/acm/19/KalaiR19, author = {Yael Tauman Kalai and Leonid Reyzin}, editor = {Oded Goldreich}, title = {A survey of leakage-resilient cryptography}, booktitle = {Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali}, pages = {727--794}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3335741.3335768}, doi = {10.1145/3335741.3335768}, timestamp = {Tue, 05 Nov 2019 15:40:16 +0100}, biburl = {https://dblp.org/rec/books/acm/19/KalaiR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-09863, author = {Ran Gelles and Yael Tauman Kalai and Govind Ramnarayan}, title = {Efficient Multiparty Interactive Coding for Insertions, Deletions and Substitutions}, journal = {CoRR}, volume = {abs/1901.09863}, year = {2019}, url = {http://arxiv.org/abs/1901.09863}, eprinttype = {arXiv}, eprint = {1901.09863}, timestamp = {Sat, 02 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-09863.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-02590, author = {Dhiraj Holden and Yael Kalai}, title = {No-Signaling Proofs with O({\(\surd\)}(log n)) Provers are in {PSPACE}}, journal = {CoRR}, volume = {abs/1910.02590}, year = {2019}, url = {http://arxiv.org/abs/1910.02590}, eprinttype = {arXiv}, eprint = {1910.02590}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-02590.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KalaiR19, author = {Yael Tauman Kalai and Leonid Reyzin}, title = {A Survey of Leakage-Resilient Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {302}, year = {2019}, url = {https://eprint.iacr.org/2019/302}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KalaiR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KalaiPY19, author = {Yael Kalai and Omer Paneth and Lisa Yang}, title = {How to Delegate Computations Publicly}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {603}, year = {2019}, url = {https://eprint.iacr.org/2019/603}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KalaiPY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnanthDKL19, author = {Prabhanjan Ananth and Apoorvaa Deshpande and Yael Tauman Kalai and Anna Lysyanskaya}, title = {Fully Homomorphic {NIZK} and {NIWI} Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {732}, year = {2019}, url = {https://eprint.iacr.org/2019/732}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnanthDKL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargKK19, author = {Ankit Garg and Yael Tauman Kalai and Dakshita Khurana}, title = {Computational Extractors with Negligible Error in the {CRS} Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1116}, year = {2019}, url = {https://eprint.iacr.org/2019/1116}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargKK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/DaskalakisKI18, author = {Costis Daskalakis and Yael Kalai and Sandy Irani}, title = {Special Section on the Forty-Seventh Annual {ACM} Symposium on Theory of Computing {(STOC} 2015)}, journal = {{SIAM} J. Comput.}, volume = {47}, number = {3}, pages = {888--889}, year = {2018}, url = {https://doi.org/10.1137/18N974571}, doi = {10.1137/18N974571}, timestamp = {Mon, 23 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/DaskalakisKI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BadrinarayananG18, author = {Saikrishna Badrinarayanan and Vipul Goyal and Abhishek Jain and Yael Tauman Kalai and Dakshita Khurana and Amit Sahai}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Promise Zero Knowledge and Its Applications to Round Optimal {MPC}}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, pages = {459--487}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0\_16}, doi = {10.1007/978-3-319-96881-0\_16}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BadrinarayananG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KalaiKS18, author = {Yael Tauman Kalai and Dakshita Khurana and Amit Sahai}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Statistical Witness Indistinguishability (and more) in Two Messages}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10822}, pages = {34--65}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78372-7\_2}, doi = {10.1007/978-3-319-78372-7\_2}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KalaiKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/BitanskyKP18, author = {Nir Bitansky and Yael Tauman Kalai and Omer Paneth}, editor = {Ilias Diakonikolas and David Kempe and Monika Henzinger}, title = {Multi-collision resistance: a paradigm for keyless hash functions}, booktitle = {Proceedings of the 50th Annual {ACM} {SIGACT} Symposium on Theory of Computing, {STOC} 2018, Los Angeles, CA, USA, June 25-29, 2018}, pages = {671--684}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3188745.3188870}, doi = {10.1145/3188745.3188870}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/BitanskyKP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/BadrinarayananK18, author = {Saikrishna Badrinarayanan and Yael Tauman Kalai and Dakshita Khurana and Amit Sahai and Daniel Wichs}, editor = {Ilias Diakonikolas and David Kempe and Monika Henzinger}, title = {Succinct delegation for low-space non-deterministic computation}, booktitle = {Proceedings of the 50th Annual {ACM} {SIGACT} Symposium on Theory of Computing, {STOC} 2018, Los Angeles, CA, USA, June 25-29, 2018}, pages = {709--721}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3188745.3188924}, doi = {10.1145/3188745.3188924}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/BadrinarayananK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wdag/KalaiKR18, author = {Yael Tauman Kalai and Ilan Komargodski and Ran Raz}, editor = {Ulrich Schmid and Josef Widder}, title = {A Lower Bound for Adaptively-Secure Collective Coin-Flipping Protocols}, booktitle = {32nd International Symposium on Distributed Computing, {DISC} 2018, New Orleans, LA, USA, October 15-19, 2018}, series = {LIPIcs}, volume = {121}, pages = {34:1--34:16}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2018}, url = {https://doi.org/10.4230/LIPIcs.DISC.2018.34}, doi = {10.4230/LIPICS.DISC.2018.34}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wdag/KalaiKR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/BadrinarayananK18, author = {Saikrishna Badrinarayanan and Yael Kalai and Dakshita Khurana and Amit Sahai and Daniel Wichs}, title = {Non-Interactive Delegation for Low-Space Non-Deterministic Computation}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR18-009}}, year = {2018}, url = {https://eccc.weizmann.ac.il/report/2018/009}, eprinttype = {ECCC}, eprint = {TR18-009}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/BadrinarayananK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/EfremenkoHK18, author = {Klim Efremenko and Elad Haramaty and Yael Kalai}, title = {Interactive Coding with Constant Round and Communication Blowup}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR18-054}}, year = {2018}, url = {https://eccc.weizmann.ac.il/report/2018/054}, eprinttype = {ECCC}, eprint = {TR18-054}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/EfremenkoHK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/KalaiK18, author = {Yael Kalai and Dakshita Khurana}, title = {Non-Interactive Non-Malleability from Quantum Supremacy}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR18-203}}, year = {2018}, url = {https://eccc.weizmann.ac.il/report/2018/203}, eprinttype = {ECCC}, eprint = {TR18-203}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/KalaiK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/KomargodskiRK18, author = {Ilan Komargodski and Ran Raz and Yael Tauman Kalai}, title = {A Lower Bound for Adaptively-Secure Collective Coin-Flipping Protocols}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR18-140}}, year = {2018}, url = {https://eccc.weizmann.ac.il/report/2018/140}, eprinttype = {ECCC}, eprint = {TR18-140}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/KomargodskiRK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KalaiKS18, author = {Yael Tauman Kalai and Dakshita Khurana and Amit Sahai}, title = {Statistical Witness Indistinguishability (and more) in Two Messages}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {168}, year = {2018}, url = {http://eprint.iacr.org/2018/168}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KalaiKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiK18, author = {Zvika Brakerski and Yael Tauman Kalai}, title = {Monotone Batch NP-Delegation with Applications to Access Control}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {375}, year = {2018}, url = {https://eprint.iacr.org/2018/375}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KalaiPY18, author = {Yael Kalai and Omer Paneth and Lisa Yang}, title = {On Publicly Verifiable Delegation From Standard Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {776}, year = {2018}, url = {https://eprint.iacr.org/2018/776}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KalaiPY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DeshpandeK18, author = {Apoorvaa Deshpande and Yael Kalai}, title = {Proofs of Ignorance and Applications to 2-Message Witness Hiding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {896}, year = {2018}, url = {https://eprint.iacr.org/2018/896}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DeshpandeK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KalaiK18, author = {Yael Tauman Kalai and Dakshita Khurana}, title = {Non-Interactive Non-Malleability from Quantum Supremacy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1118}, year = {2018}, url = {https://eprint.iacr.org/2018/1118}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KalaiK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithmica/BitanskyCKP17, author = {Nir Bitansky and Ran Canetti and Yael Tauman Kalai and Omer Paneth}, title = {On Virtual Grey Box Obfuscation for General Circuits}, journal = {Algorithmica}, volume = {79}, number = {4}, pages = {1014--1051}, year = {2017}, url = {https://doi.org/10.1007/s00453-016-0218-8}, doi = {10.1007/S00453-016-0218-8}, timestamp = {Mon, 09 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/algorithmica/BitanskyCKP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BrakerskiKP17, author = {Zvika Brakerski and Yael Tauman Kalai and Renen Perlman}, editor = {Tsuyoshi Takagi and Thomas Peyrin}, title = {Succinct Spooky Free Compilers Are Not Black Box Sound}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10626}, pages = {159--180}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70700-6\_6}, doi = {10.1007/978-3-319-70700-6\_6}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BrakerskiKP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/0002KKR17, author = {Abhishek Jain and Yael Tauman Kalai and Dakshita Khurana and Ron Rothblum}, editor = {Jonathan Katz and Hovav Shacham}, title = {Distinguisher-Dependent Simulation in Two Rounds and its Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10402}, pages = {158--189}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63715-0\_6}, doi = {10.1007/978-3-319-63715-0\_6}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/0002KKR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KalaiRR17, author = {Yael Tauman Kalai and Guy N. Rothblum and Ron D. Rothblum}, editor = {Jonathan Katz and Hovav Shacham}, title = {From Obfuscation to the Security of Fiat-Shamir for Proofs}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10402}, pages = {224--251}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63715-0\_8}, doi = {10.1007/978-3-319-63715-0\_8}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KalaiRR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/GellesK17, author = {Ran Gelles and Yael Tauman Kalai}, editor = {Christos H. Papadimitriou}, title = {Constant-Rate Interactive Coding Is Impossible, Even In Constant-Degree Networks}, booktitle = {8th Innovations in Theoretical Computer Science Conference, {ITCS} 2017, January 9-11, 2017, Berkeley, CA, {USA}}, series = {LIPIcs}, volume = {67}, pages = {21:1--21:13}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2017}, url = {https://doi.org/10.4230/LIPIcs.ITCS.2017.21}, doi = {10.4230/LIPICS.ITCS.2017.21}, timestamp = {Tue, 11 Feb 2020 15:52:14 +0100}, biburl = {https://dblp.org/rec/conf/innovations/GellesK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/BrakerskiHK17, author = {Zvika Brakerski and Justin Holmgren and Yael Tauman Kalai}, editor = {Hamed Hatami and Pierre McKenzie and Valerie King}, title = {Non-interactive delegation and batch {NP} verification from standard computational assumptions}, booktitle = {Proceedings of the 49th Annual {ACM} {SIGACT} Symposium on Theory of Computing, {STOC} 2017, Montreal, QC, Canada, June 19-23, 2017}, pages = {474--482}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3055399.3055497}, doi = {10.1145/3055399.3055497}, timestamp = {Sun, 02 Jun 2019 21:10:31 +0200}, biburl = {https://dblp.org/rec/conf/stoc/BrakerskiHK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tcc/2017-1, editor = {Yael Kalai and Leonid Reyzin}, title = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10677}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70500-2}, doi = {10.1007/978-3-319-70500-2}, isbn = {978-3-319-70499-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/2017-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tcc/2017-2, editor = {Yael Kalai and Leonid Reyzin}, title = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10678}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70503-3}, doi = {10.1007/978-3-319-70503-3}, isbn = {978-3-319-70502-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/2017-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/BitanskyPK17, author = {Nir Bitansky and Omer Paneth and Yael Tauman Kalai}, title = {Multi-Collision Resistance: {A} Paradigm for Keyless Hash Functions}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR17-099}}, year = {2017}, url = {https://eccc.weizmann.ac.il/report/2017/099}, eprinttype = {ECCC}, eprint = {TR17-099}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/BitanskyPK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/GellesK17, author = {Ran Gelles and Yael Tauman Kalai}, title = {Constant-Rate Interactive Coding Is Impossible, Even In Constant-Degree Networks}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR17-095}}, year = {2017}, url = {https://eccc.weizmann.ac.il/report/2017/095}, eprinttype = {ECCC}, eprint = {TR17-095}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/GellesK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/GoldwasserRK17, author = {Shafi Goldwasser and Guy N. Rothblum and Yael Tauman Kalai}, title = {Delegating Computation: Interactive Proofs for Muggles}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR17-108}}, year = {2017}, url = {https://eccc.weizmann.ac.il/report/2017/108}, eprinttype = {ECCC}, eprint = {TR17-108}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/GoldwasserRK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JainKKR17, author = {Abhishek Jain and Yael Tauman Kalai and Dakshita Khurana and Ron Rothblum}, title = {Distinguisher-Dependent Simulation in Two Rounds and its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {330}, year = {2017}, url = {http://eprint.iacr.org/2017/330}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JainKKR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BitanskyKP17, author = {Nir Bitansky and Yael Tauman Kalai and Omer Paneth}, title = {Multi-Collision Resistance: {A} Paradigm for Keyless Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {488}, year = {2017}, url = {http://eprint.iacr.org/2017/488}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BitanskyKP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiKP17, author = {Zvika Brakerski and Yael Tauman Kalai and Renen Perlman}, title = {Succinct Spooky Free Compilers Are Not Black Box Sound}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {887}, year = {2017}, url = {http://eprint.iacr.org/2017/887}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiKP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadrinarayananG17c, author = {Saikrishna Badrinarayanan and Vipul Goyal and Abhishek Jain and Yael Tauman Kalai and Dakshita Khurana and Amit Sahai}, title = {Promise Zero Knowledge and its Applications to Round Optimal {MPC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1088}, year = {2017}, url = {http://eprint.iacr.org/2017/1088}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadrinarayananG17c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadrinarayananK17, author = {Saikrishna Badrinarayanan and Yael Tauman Kalai and Dakshita Khurana and Amit Sahai and Daniel Wichs}, title = {Non-Interactive Delegation for Low-Space Non-Deterministic Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1250}, year = {2017}, url = {http://eprint.iacr.org/2017/1250}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadrinarayananK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/KalaiRR16, author = {Yael Tauman Kalai and Ran Raz and Oded Regev}, editor = {Madhu Sudan}, title = {On the Space Complexity of Linear Programming with Preprocessing}, booktitle = {Proceedings of the 2016 {ACM} Conference on Innovations in Theoretical Computer Science, Cambridge, MA, USA, January 14-16, 2016}, pages = {293--300}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2840728.2840750}, doi = {10.1145/2840728.2840750}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/innovations/KalaiRR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BitanskyBKPV16, author = {Nir Bitansky and Zvika Brakerski and Yael Tauman Kalai and Omer Paneth and Vinod Vaikuntanathan}, editor = {Martin Hirt and Adam D. Smith}, title = {3-Message Zero Knowledge Against Human Ignorance}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9985}, pages = {57--83}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53641-4\_3}, doi = {10.1007/978-3-662-53641-4\_3}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BitanskyBKPV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/KalaiP16, author = {Yael Tauman Kalai and Omer Paneth}, editor = {Martin Hirt and Adam D. Smith}, title = {Delegating {RAM} Computations}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9986}, pages = {91--118}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53644-5\_4}, doi = {10.1007/978-3-662-53644-5\_4}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/KalaiP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GoldwasserK16, author = {Shafi Goldwasser and Yael Tauman Kalai}, editor = {Eyal Kushilevitz and Tal Malkin}, title = {Cryptographic Assumptions: {A} Position Paper}, booktitle = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9562}, pages = {505--522}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49096-9\_21}, doi = {10.1007/978-3-662-49096-9\_21}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GoldwasserK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/BrakerskiHK16, author = {Zvika Brakerski and Justin Holmgren and Yael Tauman Kalai}, title = {Non-Interactive {RAM} and Batch {NP} Delegation from any {PIR}}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR16-077}}, year = {2016}, url = {https://eccc.weizmann.ac.il/report/2016/077}, eprinttype = {ECCC}, eprint = {TR16-077}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/BrakerskiHK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BitanskyBKPV16, author = {Nir Bitansky and Zvika Brakerski and Yael Tauman Kalai and Omer Paneth and Vinod Vaikuntanathan}, title = {3-Message Zero Knowledge Against Human Ignorance}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {213}, year = {2016}, url = {http://eprint.iacr.org/2016/213}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BitanskyBKPV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KalaiRR16, author = {Yael Tauman Kalai and Guy N. Rothblum and Ron D. Rothblum}, title = {From Obfuscation to the Security of Fiat-Shamir for Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {303}, year = {2016}, url = {http://eprint.iacr.org/2016/303}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KalaiRR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiHK16, author = {Zvika Brakerski and Justin Holmgren and Yael Tauman Kalai}, title = {Non-Interactive {RAM} and Batch {NP} Delegation from any {PIR}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {459}, year = {2016}, url = {http://eprint.iacr.org/2016/459}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiHK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/GoldwasserKR15, author = {Shafi Goldwasser and Yael Tauman Kalai and Guy N. Rothblum}, title = {Delegating Computation: Interactive Proofs for Muggles}, journal = {J. {ACM}}, volume = {62}, number = {4}, pages = {27:1--27:64}, year = {2015}, url = {https://doi.org/10.1145/2699436}, doi = {10.1145/2699436}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jacm/GoldwasserKR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KalaiR15, author = {Yael Tauman Kalai and Ron D. Rothblum}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Arguments of Proximity - [Extended Abstract]}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {422--442}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_21}, doi = {10.1007/978-3-662-48000-7\_21}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KalaiR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/GoldwasserKP15, author = {Shafi Goldwasser and Yael Tauman Kalai and Sunoo Park}, editor = {Magn{\'{u}}s M. Halld{\'{o}}rsson and Kazuo Iwama and Naoki Kobayashi and Bettina Speckmann}, title = {Adaptively Secure Coin-Flipping, Revisited}, booktitle = {Automata, Languages, and Programming - 42nd International Colloquium, {ICALP} 2015, Kyoto, Japan, July 6-10, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9135}, pages = {663--674}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47666-6\_53}, doi = {10.1007/978-3-662-47666-6\_53}, timestamp = {Fri, 27 Mar 2020 09:02:59 +0100}, biburl = {https://dblp.org/rec/conf/icalp/GoldwasserKP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/0002KL15, author = {Abhishek Jain and Yael Tauman Kalai and Allison Bishop Lewko}, editor = {Tim Roughgarden}, title = {Interactive Coding for Multiparty Protocols}, booktitle = {Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, {ITCS} 2015, Rehovot, Israel, January 11-13, 2015}, pages = {1--10}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2688073.2688109}, doi = {10.1145/2688073.2688109}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/innovations/0002KL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CanettiKP15, author = {Ran Canetti and Yael Tauman Kalai and Omer Paneth}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {On Obfuscation with Random Oracles}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9015}, pages = {456--467}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46497-7\_18}, doi = {10.1007/978-3-662-46497-7\_18}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/CanettiKP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wdag/KalaiK15, author = {Yael Tauman Kalai and Ilan Komargodski}, editor = {Yoram Moses}, title = {Compressing Communication in Distributed Protocols}, booktitle = {Distributed Computing - 29th International Symposium, {DISC} 2015, Tokyo, Japan, October 7-9, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9363}, pages = {467--479}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48653-5\_31}, doi = {10.1007/978-3-662-48653-5\_31}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/wdag/KalaiK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GoldwasserKP15, author = {Shafi Goldwasser and Yael Tauman Kalai and Sunoo Park}, title = {Adaptively Secure Coin-Flipping, Revisited}, journal = {CoRR}, volume = {abs/1503.01588}, year = {2015}, url = {http://arxiv.org/abs/1503.01588}, eprinttype = {arXiv}, eprint = {1503.01588}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GoldwasserKP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KalaiK15, author = {Yael Tauman Kalai and Ilan Komargodski}, title = {Compressing Communication in Distributed Protocols}, journal = {CoRR}, volume = {abs/1506.00290}, year = {2015}, url = {http://arxiv.org/abs/1506.00290}, eprinttype = {arXiv}, eprint = {1506.00290}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KalaiK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/KalaiK15, author = {Yael Tauman Kalai and Ilan Komargodski}, title = {Compressing Communication in Distributed Protocols}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR15-092}}, year = {2015}, url = {https://eccc.weizmann.ac.il/report/2015/092}, eprinttype = {ECCC}, eprint = {TR15-092}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/KalaiK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiKP15, author = {Ran Canetti and Yael Tauman Kalai and Omer Paneth}, title = {On Obfuscation with Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {48}, year = {2015}, url = {http://eprint.iacr.org/2015/048}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiKP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoldwasserKP15, author = {Shafi Goldwasser and Yael Tauman Kalai and Sunoo Park}, title = {Adaptively Secure Coin-Flipping, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {202}, year = {2015}, url = {http://eprint.iacr.org/2015/202}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoldwasserKP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoldwasserK15, author = {Shafi Goldwasser and Yael Tauman Kalai}, title = {Cryptographic Assumptions: {A} Position Paper}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {907}, year = {2015}, url = {http://eprint.iacr.org/2015/907}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoldwasserK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KalaiP15, author = {Yael Tauman Kalai and Omer Paneth}, title = {Delegating {RAM} Computations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {957}, year = {2015}, url = {http://eprint.iacr.org/2015/957}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KalaiP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dc/BoyleGK14, author = {Elette Boyle and Shafi Goldwasser and Yael Tauman Kalai}, title = {Leakage-resilient coin tossing}, journal = {Distributed Comput.}, volume = {27}, number = {3}, pages = {147--164}, year = {2014}, url = {https://doi.org/10.1007/s00446-013-0206-z}, doi = {10.1007/S00446-013-0206-Z}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dc/BoyleGK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/BrakerskiKN14, author = {Zvika Brakerski and Yael Tauman Kalai and Moni Naor}, title = {Fast Interactive Coding against Adversarial Noise}, journal = {J. {ACM}}, volume = {61}, number = {6}, pages = {35:1--35:30}, year = {2014}, url = {https://doi.org/10.1145/2661628}, doi = {10.1145/2661628}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jacm/BrakerskiKN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BitanskyCCGKPR14, author = {Nir Bitansky and Ran Canetti and Henry Cohn and Shafi Goldwasser and Yael Tauman Kalai and Omer Paneth and Alon Rosen}, editor = {Juan A. Garay and Rosario Gennaro}, title = {The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {71--89}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_5}, doi = {10.1007/978-3-662-44381-1\_5}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BitanskyCCGKPR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BitanskyCKP14, author = {Nir Bitansky and Ran Canetti and Yael Tauman Kalai and Omer Paneth}, editor = {Juan A. Garay and Rosario Gennaro}, title = {On Virtual Grey Box Obfuscation for General Circuits}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {108--125}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_7}, doi = {10.1007/978-3-662-44381-1\_7}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BitanskyCKP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BarakGKPS14, author = {Boaz Barak and Sanjam Garg and Yael Tauman Kalai and Omer Paneth and Amit Sahai}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Protecting Obfuscation against Algebraic Attacks}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {221--238}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_13}, doi = {10.1007/978-3-642-55220-5\_13}, timestamp = {Thu, 14 Oct 2021 09:58:16 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BarakGKPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/KalaiRR14, author = {Yael Tauman Kalai and Ran Raz and Ron D. Rothblum}, editor = {David B. Shmoys}, title = {How to delegate computations: the power of no-signaling proofs}, booktitle = {Symposium on Theory of Computing, {STOC} 2014, New York, NY, USA, May 31 - June 03, 2014}, pages = {485--494}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2591796.2591809}, doi = {10.1145/2591796.2591809}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stoc/KalaiRR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BarakBCKPS14, author = {Boaz Barak and Nir Bitansky and Ran Canetti and Yael Tauman Kalai and Omer Paneth and Amit Sahai}, editor = {Yehuda Lindell}, title = {Obfuscation for Evasive Functions}, booktitle = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC} 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8349}, pages = {26--51}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54242-8\_2}, doi = {10.1007/978-3-642-54242-8\_2}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BarakBCKPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Dachman-SoledK14, author = {Dana Dachman{-}Soled and Yael Tauman Kalai}, editor = {Yehuda Lindell}, title = {Securing Circuits and Protocols against 1/poly(k) Tampering Rate}, booktitle = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC} 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8349}, pages = {540--565}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54242-8\_23}, doi = {10.1007/978-3-642-54242-8\_23}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Dachman-SoledK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CohnGK14, author = {Henry Cohn and Shafi Goldwasser and Yael Tauman Kalai}, title = {The impossibility of obfuscation with a universal simulator}, journal = {CoRR}, volume = {abs/1401.0348}, year = {2014}, url = {http://arxiv.org/abs/1401.0348}, eprinttype = {arXiv}, eprint = {1401.0348}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/CohnGK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/KalaiR14, author = {Yael Tauman Kalai and Ran Raz}, title = {On the Space Complexity of Linear Programming with Preprocessing}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR14-170}}, year = {2014}, url = {https://eccc.weizmann.ac.il/report/2014/170}, eprinttype = {ECCC}, eprint = {TR14-170}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/KalaiR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BitanskyCKP14, author = {Nir Bitansky and Ran Canetti and Yael Tauman Kalai and Omer Paneth}, title = {On Virtual Grey Box Obfuscation for General Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {554}, year = {2014}, url = {http://eprint.iacr.org/2014/554}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BitanskyCKP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BoyleG0KS13, author = {Elette Boyle and Sanjam Garg and Abhishek Jain and Yael Tauman Kalai and Amit Sahai}, editor = {Ran Canetti and Juan A. Garay}, title = {Secure Computation against Adaptive Auxiliary Information}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {316--334}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_18}, doi = {10.1007/978-3-642-40041-4\_18}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BoyleG0KS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoldwasserKPVZ13, author = {Shafi Goldwasser and Yael Tauman Kalai and Raluca A. Popa and Vinod Vaikuntanathan and Nickolai Zeldovich}, editor = {Ran Canetti and Juan A. Garay}, title = {How to Run Turing Machines on Encrypted Data}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {536--553}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_30}, doi = {10.1007/978-3-642-40084-1\_30}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GoldwasserKPVZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/GoldwasserKPVZ13, author = {Shafi Goldwasser and Yael Tauman Kalai and Raluca A. Popa and Vinod Vaikuntanathan and Nickolai Zeldovich}, editor = {Dan Boneh and Tim Roughgarden and Joan Feigenbaum}, title = {Reusable garbled circuits and succinct functional encryption}, booktitle = {Symposium on Theory of Computing Conference, STOC'13, Palo Alto, CA, USA, June 1-4, 2013}, pages = {555--564}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2488608.2488678}, doi = {10.1145/2488608.2488678}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/GoldwasserKPVZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/KalaiRR13, author = {Yael Tauman Kalai and Ran Raz and Ron D. Rothblum}, editor = {Dan Boneh and Tim Roughgarden and Joan Feigenbaum}, title = {Delegation for bounded space}, booktitle = {Symposium on Theory of Computing Conference, STOC'13, Palo Alto, CA, USA, June 1-4, 2013}, pages = {565--574}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2488608.2488679}, doi = {10.1145/2488608.2488679}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stoc/KalaiRR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BitanskyDG0KLW13, author = {Nir Bitansky and Dana Dachman{-}Soled and Sanjam Garg and Abhishek Jain and Yael Tauman Kalai and Adriana L{\'{o}}pez{-}Alt and Daniel Wichs}, editor = {Amit Sahai}, title = {Why "Fiat-Shamir for Proofs" Lacks a Proof}, booktitle = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC} 2013, Tokyo, Japan, March 3-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7785}, pages = {182--201}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36594-2\_11}, doi = {10.1007/978-3-642-36594-2\_11}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BitanskyDG0KLW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/KalaiRR13, author = {Yael Tauman Kalai and Ran Raz and Ron Rothblum}, title = {How to Delegate Computations: The Power of No-Signaling Proofs}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR13-183}}, year = {2013}, url = {https://eccc.weizmann.ac.il/report/2013/183}, eprinttype = {ECCC}, eprint = {TR13-183}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/KalaiRR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoldwasserKPVZ13, author = {Shafi Goldwasser and Yael Tauman Kalai and Raluca A. Popa and Vinod Vaikuntanathan and Nickolai Zeldovich}, title = {Overcoming the Worst-Case Curse for Cryptographic Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {229}, year = {2013}, url = {http://eprint.iacr.org/2013/229}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoldwasserKPVZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarakGKPS13, author = {Boaz Barak and Sanjam Garg and Yael Tauman Kalai and Omer Paneth and Amit Sahai}, title = {Protecting Obfuscation Against Algebraic Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {631}, year = {2013}, url = {http://eprint.iacr.org/2013/631}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarakGKPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoldwasserK13, author = {Shafi Goldwasser and Yael Tauman Kalai}, title = {A Note on the Impossibility of Obfuscation with Auxiliary Input}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {665}, year = {2013}, url = {http://eprint.iacr.org/2013/665}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoldwasserK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarakBCKPS13, author = {Boaz Barak and Nir Bitansky and Ran Canetti and Yael Tauman Kalai and Omer Paneth and Amit Sahai}, title = {Obfuscation for Evasive Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {668}, year = {2013}, url = {http://eprint.iacr.org/2013/668}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarakBCKPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KalaiRR13, author = {Yael Tauman Kalai and Ran Raz and Ron Rothblum}, title = {How to Delegate Computations: The Power of No-Signaling Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {862}, year = {2013}, url = {http://eprint.iacr.org/2013/862}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KalaiRR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/HaleviK12, author = {Shai Halevi and Yael Tauman Kalai}, title = {Smooth Projective Hashing and Two-Message Oblivious Transfer}, journal = {J. Cryptol.}, volume = {25}, number = {1}, pages = {158--193}, year = {2012}, url = {https://doi.org/10.1007/s00145-010-9092-8}, doi = {10.1007/S00145-010-9092-8}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/HaleviK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Dachman-SoledK12, author = {Dana Dachman{-}Soled and Yael Tauman Kalai}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Securing Circuits against Constant-Rate Tampering}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {533--551}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_31}, doi = {10.1007/978-3-642-32009-5\_31}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Dachman-SoledK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/BrakerskiK12, author = {Zvika Brakerski and Yael Tauman Kalai}, title = {Efficient Interactive Coding against Adversarial Noise}, booktitle = {53rd Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS} 2012, New Brunswick, NJ, USA, October 20-23, 2012}, pages = {160--166}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/FOCS.2012.22}, doi = {10.1109/FOCS.2012.22}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/BrakerskiK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/KalaiLR12, author = {Yael Tauman Kalai and Allison B. Lewko and Anup Rao}, title = {Formulas Resilient to Short-Circuit Errors}, booktitle = {53rd Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS} 2012, New Brunswick, NJ, USA, October 20-23, 2012}, pages = {490--499}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/FOCS.2012.69}, doi = {10.1109/FOCS.2012.69}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/KalaiLR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/BoyleGJK12, author = {Elette Boyle and Shafi Goldwasser and Abhishek Jain and Yael Tauman Kalai}, editor = {Howard J. Karloff and Toniann Pitassi}, title = {Multiparty computation secure against continual memory leakage}, booktitle = {Proceedings of the 44th Symposium on Theory of Computing Conference, {STOC} 2012, New York, NY, USA, May 19 - 22, 2012}, pages = {1235--1254}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2213977.2214087}, doi = {10.1145/2213977.2214087}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stoc/BoyleGJK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BrakerskiK12, author = {Zvika Brakerski and Yael Tauman Kalai}, editor = {Ronald Cramer}, title = {A Parallel Repetition Theorem for Leakage Resilience}, booktitle = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC} 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7194}, pages = {248--265}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28914-9\_14}, doi = {10.1007/978-3-642-28914-9\_14}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BrakerskiK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/BrakerskiK12, author = {Zvika Brakerski and Yael Tauman Kalai}, title = {Efficient Interactive Coding Against Adversarial Noise}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR12-043}}, year = {2012}, url = {https://eccc.weizmann.ac.il/report/2012/043}, eprinttype = {ECCC}, eprint = {TR12-043}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/BrakerskiK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-SoledK12, author = {Dana Dachman{-}Soled and Yael Tauman Kalai}, title = {Securing Circuits Against Constant-Rate Tampering}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {366}, year = {2012}, url = {http://eprint.iacr.org/2012/366}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-SoledK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-Soled0KL12, author = {Dana Dachman{-}Soled and Abhishek Jain and Yael Tauman Kalai and Adriana L{\'{o}}pez{-}Alt}, title = {On the (In)security of the Fiat-Shamir Paradigm, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {706}, year = {2012}, url = {http://eprint.iacr.org/2012/706}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-Soled0KL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoldwasserKPVZ12, author = {Shafi Goldwasser and Yael Tauman Kalai and Raluca A. Popa and Vinod Vaikuntanathan and Nickolai Zeldovich}, title = {Succinct Functional Encryption and Applications: Reusable Garbled Circuits and Beyond}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {733}, year = {2012}, url = {http://eprint.iacr.org/2012/733}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoldwasserKPVZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BitanskyCGHKR11, author = {Nir Bitansky and Ran Canetti and Shafi Goldwasser and Shai Halevi and Yael Tauman Kalai and Guy N. Rothblum}, editor = {Dong Hoon Lee and Xiaoyun Wang}, title = {Program Obfuscation with Leaky Hardware}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7073}, pages = {722--739}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25385-0\_39}, doi = {10.1007/978-3-642-25385-0\_39}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BitanskyCGHKR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChungKLR11, author = {Kai{-}Min Chung and Yael Tauman Kalai and Feng{-}Hao Liu and Ran Raz}, editor = {Phillip Rogaway}, title = {Memory Delegation}, booktitle = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6841}, pages = {151--168}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22792-9\_9}, doi = {10.1007/978-3-642-22792-9\_9}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChungKLR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KalaiKS11, author = {Yael Tauman Kalai and Bhavana Kanukurthi and Amit Sahai}, editor = {Phillip Rogaway}, title = {Cryptography with Tamperable and Leaky Memory}, booktitle = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6841}, pages = {373--390}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22792-9\_21}, doi = {10.1007/978-3-642-22792-9\_21}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KalaiKS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/BravermanHK11, author = {Mark Braverman and Avinatan Hassidim and Yael Tauman Kalai}, editor = {Bernard Chazelle}, title = {Leaky Pseudo-Entropy Functions}, booktitle = {Innovations in Computer Science - {ICS} 2011, Tsinghua University, Beijing, China, January 7-9, 2011. Proceedings}, pages = {353--366}, publisher = {Tsinghua University Press}, year = {2011}, url = {http://conference.iiis.tsinghua.edu.cn/ICS2011/content/papers/17.html}, timestamp = {Mon, 23 Mar 2020 08:26:00 +0100}, biburl = {https://dblp.org/rec/conf/innovations/BravermanHK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BrakerskiGK11, author = {Zvika Brakerski and Shafi Goldwasser and Yael Tauman Kalai}, editor = {Yuval Ishai}, title = {Black-Box Circular-Secure Encryption beyond Affine Functions}, booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC} 2011, Providence, RI, USA, March 28-30, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6597}, pages = {201--218}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19571-6\_13}, doi = {10.1007/978-3-642-19571-6\_13}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BrakerskiGK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wdag/BoyleGK11, author = {Elette Boyle and Shafi Goldwasser and Yael Tauman Kalai}, editor = {David Peleg}, title = {Leakage-Resilient Coin Tossing}, booktitle = {Distributed Computing - 25th International Symposium, {DISC} 2011, Rome, Italy, September 20-22, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6950}, pages = {181--196}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24100-0\_16}, doi = {10.1007/978-3-642-24100-0\_16}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/wdag/BoyleGK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiK11, author = {Zvika Brakerski and Yael Tauman Kalai}, title = {A Parallel Repetition Theorem for Leakage Resilience}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {250}, year = {2011}, url = {http://eprint.iacr.org/2011/250}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChungKLR11, author = {Kai{-}Min Chung and Yael Tauman Kalai and Feng{-}Hao Liu and Ran Raz}, title = {Memory Delegation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {273}, year = {2011}, url = {http://eprint.iacr.org/2011/273}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChungKLR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyleGK11, author = {Elette Boyle and Shafi Goldwasser and Yael Tauman Kalai}, title = {Leakage-Resilient Coin Tossing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {291}, year = {2011}, url = {http://eprint.iacr.org/2011/291}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyleGK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BitanskyCGHKR11, author = {Nir Bitansky and Ran Canetti and Shafi Goldwasser and Shai Halevi and Yael Tauman Kalai and Guy N. Rothblum}, title = {Program Obfuscation with Leaky Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {660}, year = {2011}, url = {http://eprint.iacr.org/2011/660}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BitanskyCGHKR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChungKV10, author = {Kai{-}Min Chung and Yael Tauman Kalai and Salil P. Vadhan}, editor = {Tal Rabin}, title = {Improved Delegation of Computation Using Fully Homomorphic Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {483--501}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_26}, doi = {10.1007/978-3-642-14623-7\_26}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChungKV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/BrakerskiKKV10, author = {Zvika Brakerski and Yael Tauman Kalai and Jonathan Katz and Vinod Vaikuntanathan}, title = {Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage}, booktitle = {51th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS} 2010, October 23-26, 2010, Las Vegas, Nevada, {USA}}, pages = {501--510}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/FOCS.2010.55}, doi = {10.1109/FOCS.2010.55}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/BrakerskiKKV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/GoldwasserKPV10, author = {Shafi Goldwasser and Yael Tauman Kalai and Chris Peikert and Vinod Vaikuntanathan}, editor = {Andrew Chi{-}Chih Yao}, title = {Robustness of the Learning with Errors Assumption}, booktitle = {Innovations in Computer Science - {ICS} 2010, Tsinghua University, Beijing, China, January 5-7, 2010. Proceedings}, pages = {230--240}, publisher = {Tsinghua University Press}, year = {2010}, url = {http://conference.iiis.tsinghua.edu.cn/ICS2010/content/papers/19.html}, timestamp = {Wed, 04 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/innovations/GoldwasserKPV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CanettiKVW10, author = {Ran Canetti and Yael Tauman Kalai and Mayank Varia and Daniel Wichs}, editor = {Daniele Micciancio}, title = {On Symmetric Encryption and Point Obfuscation}, booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC} 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5978}, pages = {52--71}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11799-2\_4}, doi = {10.1007/978-3-642-11799-2\_4}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/CanettiKVW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DodisGKPV10, author = {Yevgeniy Dodis and Shafi Goldwasser and Yael Tauman Kalai and Chris Peikert and Vinod Vaikuntanathan}, editor = {Daniele Micciancio}, title = {Public-Key Encryption Schemes with Auxiliary Inputs}, booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC} 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5978}, pages = {361--381}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11799-2\_22}, doi = {10.1007/978-3-642-11799-2\_22}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DodisGKPV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiKVW10, author = {Ran Canetti and Yael Tauman Kalai and Mayank Varia and Daniel Wichs}, title = {On Symmetric Encryption and Point Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {49}, year = {2010}, url = {http://eprint.iacr.org/2010/049}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiKVW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiK10, author = {Zvika Brakerski and Yael Tauman Kalai}, title = {A Framework for Efficient Signatures, Ring Signatures and Identity Based Encryption in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {86}, year = {2010}, url = {http://eprint.iacr.org/2010/086}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChungKV10, author = {Kai{-}Min Chung and Yael Tauman Kalai and Salil P. Vadhan}, title = {Improved Delegation of Computation using Fully Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {241}, year = {2010}, url = {http://eprint.iacr.org/2010/241}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChungKV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiKKV10, author = {Zvika Brakerski and Yael Tauman Kalai and Jonathan Katz and Vinod Vaikuntanathan}, title = {Overcoming the Hole In The Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {278}, year = {2010}, url = {http://eprint.iacr.org/2010/278}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiKKV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KalaiR09, author = {Yael Tauman Kalai and Ran Raz}, editor = {Shai Halevi}, title = {Probabilistically Checkable Arguments}, booktitle = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5677}, pages = {143--159}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03356-8\_9}, doi = {10.1007/978-3-642-03356-8\_9}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KalaiR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/KalaiLR09, author = {Yael Tauman Kalai and Xin Li and Anup Rao}, title = {2-Source Extractors under Computational Assumptions and Cryptography with Defective Randomness}, booktitle = {50th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS} 2009, October 25-27, 2009, Atlanta, Georgia, {USA}}, pages = {617--626}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/FOCS.2009.61}, doi = {10.1109/FOCS.2009.61}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/KalaiLR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/DodisKL09, author = {Yevgeniy Dodis and Yael Tauman Kalai and Shachar Lovett}, editor = {Michael Mitzenmacher}, title = {On cryptography with auxiliary input}, booktitle = {Proceedings of the 41st Annual {ACM} Symposium on Theory of Computing, {STOC} 2009, Bethesda, MD, USA, May 31 - June 2, 2009}, pages = {621--630}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1536414.1536498}, doi = {10.1145/1536414.1536498}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stoc/DodisKL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiGK09, author = {Zvika Brakerski and Shafi Goldwasser and Yael Tauman Kalai}, title = {Black-Box Circular-Secure Encryption Beyond Affine Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {485}, year = {2009}, url = {http://eprint.iacr.org/2009/485}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiGK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoldwasserKR08, author = {Shafi Goldwasser and Yael Tauman Kalai and Guy N. Rothblum}, editor = {David A. Wagner}, title = {One-Time Programs}, booktitle = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5157}, pages = {39--56}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85174-5\_3}, doi = {10.1007/978-3-540-85174-5\_3}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GoldwasserKR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/KalaiLRZ08, author = {Yael Tauman Kalai and Xin Li and Anup Rao and David Zuckerman}, title = {Network Extractor Protocols}, booktitle = {49th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS} 2008, October 25-28, 2008, Philadelphia, PA, {USA}}, pages = {654--663}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/FOCS.2008.73}, doi = {10.1109/FOCS.2008.73}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/KalaiLRZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/KalaiR08, author = {Yael Tauman Kalai and Ran Raz}, editor = {Luca Aceto and Ivan Damg{\aa}rd and Leslie Ann Goldberg and Magn{\'{u}}s M. Halld{\'{o}}rsson and Anna Ing{\'{o}}lfsd{\'{o}}ttir and Igor Walukiewicz}, title = {Interactive {PCP}}, booktitle = {Automata, Languages and Programming, 35th International Colloquium, {ICALP} 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part {II} - Track {B:} Logic, Semantics, and Theory of Programming {\&} Track {C:} Security and Cryptography Foundations}, series = {Lecture Notes in Computer Science}, volume = {5126}, pages = {536--547}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70583-3\_44}, doi = {10.1007/978-3-540-70583-3\_44}, timestamp = {Fri, 27 Mar 2020 09:02:59 +0100}, biburl = {https://dblp.org/rec/conf/icalp/KalaiR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/GoldwasserKR08, author = {Shafi Goldwasser and Yael Tauman Kalai and Guy N. Rothblum}, editor = {Cynthia Dwork}, title = {Delegating computation: interactive proofs for muggles}, booktitle = {Proceedings of the 40th Annual {ACM} Symposium on Theory of Computing, Victoria, British Columbia, Canada, May 17-20, 2008}, pages = {113--122}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1374376.1374396}, doi = {10.1145/1374376.1374396}, timestamp = {Mon, 26 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/GoldwasserKR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/KalaiLP07, author = {Yael Tauman Kalai and Yehuda Lindell and Manoj Prabhakaran}, title = {Concurrent Composition of Secure Protocols in the Timing Model}, journal = {J. Cryptol.}, volume = {20}, number = {4}, pages = {431--492}, year = {2007}, url = {https://doi.org/10.1007/s00145-007-0567-1}, doi = {10.1007/S00145-007-0567-1}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/KalaiLP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/KalaiR07, author = {Yael Tauman Kalai and Ran Raz}, title = {Interactive {PCP}}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR07-031}}, year = {2007}, url = {https://eccc.weizmann.ac.il/eccc-reports/2007/TR07-031/index.html}, eprinttype = {ECCC}, eprint = {TR07-031}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/KalaiR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaleviK07, author = {Shai Halevi and Yael Tauman Kalai}, title = {Smooth Projective Hashing and Two-Message Oblivious Transfer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {118}, year = {2007}, url = {http://eprint.iacr.org/2007/118}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaleviK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ndltd/Kalai06, author = {Yael Tauman Kalai}, title = {Attacks on the Fiat-Shamir paradigm and program obfuscation}, school = {Massachusetts Institute of Technology, Cambridge, MA, {USA}}, year = {2006}, url = {https://hdl.handle.net/1721.1/34026}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ndltd/Kalai06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/RivestST06, author = {Ronald L. Rivest and Adi Shamir and Yael Tauman}, editor = {Oded Goldreich and Arnold L. Rosenberg and Alan L. Selman}, title = {How to Leak a Secret: Theory and Applications of Ring Signatures}, booktitle = {Theoretical Computer Science, Essays in Memory of Shimon Even}, series = {Lecture Notes in Computer Science}, volume = {3895}, pages = {164--186}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11685654\_7}, doi = {10.1007/11685654\_7}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/birthday/RivestST06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/KalaiR06, author = {Yael Tauman Kalai and Ran Raz}, title = {Succinct Non-Interactive Zero-Knowledge Proofs with Preprocessing for {LOGSNP}}, booktitle = {47th Annual {IEEE} Symposium on Foundations of Computer Science {(FOCS} 2006), 21-24 October 2006, Berkeley, California, USA, Proceedings}, pages = {355--366}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/FOCS.2006.74}, doi = {10.1109/FOCS.2006.74}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/focs/KalaiR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Kalai05, author = {Yael Tauman Kalai}, editor = {Ronald Cramer}, title = {Smooth Projective Hashing and Two-Message Oblivious Transfer}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {78--95}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_5}, doi = {10.1007/11426639\_5}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Kalai05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/GoldwasserK05, author = {Shafi Goldwasser and Yael Tauman Kalai}, title = {On the Impossibility of Obfuscation with Auxiliary Input}, booktitle = {46th Annual {IEEE} Symposium on Foundations of Computer Science {(FOCS} 2005), 23-25 October 2005, Pittsburgh, PA, USA, Proceedings}, pages = {553--562}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/SFCS.2005.60}, doi = {10.1109/SFCS.2005.60}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/GoldwasserK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/KalaiLP05, author = {Yael Tauman Kalai and Yehuda Lindell and Manoj Prabhakaran}, editor = {Harold N. Gabow and Ronald Fagin}, title = {Concurrent general composition of secure protocols in the timing model}, booktitle = {Proceedings of the 37th Annual {ACM} Symposium on Theory of Computing, Baltimore, MD, USA, May 22-24, 2005}, pages = {644--653}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1060590.1060687}, doi = {10.1145/1060590.1060687}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stoc/KalaiLP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KalaiLP05, author = {Yael Tauman Kalai and Yehuda Lindell and Manoj Prabhakaran}, title = {Concurrent Composition of Secure Protocols in the Timing Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {36}, year = {2005}, url = {http://eprint.iacr.org/2005/036}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KalaiLP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/GoldwasserK03, author = {Shafi Goldwasser and Yael Tauman Kalai}, title = {On the (In)security of the Fiat-Shamir Paradigm}, booktitle = {44th Symposium on Foundations of Computer Science {(FOCS} 2003), 11-14 October 2003, Cambridge, MA, USA, Proceedings}, pages = {102--113}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/SFCS.2003.1238185}, doi = {10.1109/SFCS.2003.1238185}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/GoldwasserK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ECCC-TR03-015, author = {Shafi Goldwasser and Yael Tauman}, title = {On the (In)security of the Fiat-Shamir Paradigm}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR03-015}}, year = {2003}, url = {https://eccc.weizmann.ac.il/eccc-reports/2003/TR03-015/index.html}, eprinttype = {ECCC}, eprint = {TR03-015}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ECCC-TR03-015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoldwasserT03, author = {Shafi Goldwasser and Yael Tauman}, title = {On the (In)security of the Fiat-Shamir Paradigm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {34}, year = {2003}, url = {http://eprint.iacr.org/2003/034}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoldwasserT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/RivestST01, author = {Ronald L. Rivest and Adi Shamir and Yael Tauman}, editor = {Colin Boyd}, title = {How to Leak a Secret}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2248}, pages = {552--565}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45682-1\_32}, doi = {10.1007/3-540-45682-1\_32}, timestamp = {Tue, 01 Jun 2021 15:22:33 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/RivestST01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ShamirT01, author = {Adi Shamir and Yael Tauman}, editor = {Joe Kilian}, title = {Improved Online/Offline Signature Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2139}, pages = {355--367}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44647-8\_21}, doi = {10.1007/3-540-44647-8\_21}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ShamirT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.