BibTeX records: Yael Tauman Kalai

download as .bib file

@inproceedings{DBLP:conf/crypto/BrakerskiBKLP23,
  author       = {Zvika Brakerski and
                  Maya Farber Brodsky and
                  Yael Tauman Kalai and
                  Alex Lombardi and
                  Omer Paneth},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {SNARGs for Monotone Policy Batch {NP}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14082},
  pages        = {252--283},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38545-2\_9},
  doi          = {10.1007/978-3-031-38545-2\_9},
  timestamp    = {Mon, 14 Aug 2023 16:16:25 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BrakerskiBKLP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KalaiLV23,
  author       = {Yael Tauman Kalai and
                  Alex Lombardi and
                  Vinod Vaikuntanathan},
  editor       = {Carmit Hazay and
                  Martijn Stam},
  title        = {SNARGs and {PPAD} Hardness from the Decisional Diffie-Hellman Assumption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Lyon, France, April 23-27, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14005},
  pages        = {470--498},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30617-4\_16},
  doi          = {10.1007/978-3-031-30617-4\_16},
  timestamp    = {Thu, 20 Apr 2023 11:35:01 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KalaiLV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soda/EfremenkoHKKRS23,
  author       = {Klim Efremenko and
                  Bernhard Haeupler and
                  Yael Tauman Kalai and
                  Gillat Kol and
                  Nicolas Resch and
                  Raghuvansh R. Saxena},
  editor       = {Nikhil Bansal and
                  Viswanath Nagarajan},
  title        = {Interactive Coding with Small Memory},
  booktitle    = {Proceedings of the 2023 {ACM-SIAM} Symposium on Discrete Algorithms,
                  {SODA} 2023, Florence, Italy, January 22-25, 2023},
  pages        = {3587--3613},
  publisher    = {{SIAM}},
  year         = {2023},
  url          = {https://doi.org/10.1137/1.9781611977554.ch137},
  doi          = {10.1137/1.9781611977554.CH137},
  timestamp    = {Fri, 17 Feb 2023 09:28:57 +0100},
  biburl       = {https://dblp.org/rec/conf/soda/EfremenkoHKKRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/KalaiLVW23,
  author       = {Yael Kalai and
                  Alex Lombardi and
                  Vinod Vaikuntanathan and
                  Daniel Wichs},
  editor       = {Barna Saha and
                  Rocco A. Servedio},
  title        = {Boosting Batch Arguments and {RAM} Delegation},
  booktitle    = {Proceedings of the 55th Annual {ACM} Symposium on Theory of Computing,
                  {STOC} 2023, Orlando, FL, USA, June 20-23, 2023},
  pages        = {1545--1552},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3564246.3585200},
  doi          = {10.1145/3564246.3585200},
  timestamp    = {Mon, 22 May 2023 13:01:48 +0200},
  biburl       = {https://dblp.org/rec/conf/stoc/KalaiLVW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/KalaiLV023,
  author       = {Yael Kalai and
                  Alex Lombardi and
                  Vinod Vaikuntanathan and
                  Lisa Yang},
  editor       = {Barna Saha and
                  Rocco A. Servedio},
  title        = {Quantum Advantage from Any Non-local Game},
  booktitle    = {Proceedings of the 55th Annual {ACM} Symposium on Theory of Computing,
                  {STOC} 2023, Orlando, FL, USA, June 20-23, 2023},
  pages        = {1617--1628},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3564246.3585164},
  doi          = {10.1145/3564246.3585164},
  timestamp    = {Mon, 22 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stoc/KalaiLV023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/innovations/2023,
  editor       = {Yael Tauman Kalai},
  title        = {14th Innovations in Theoretical Computer Science Conference, {ITCS}
                  2023, January 10-13, 2023, MIT, Cambridge, Massachusetts, {USA}},
  series       = {LIPIcs},
  volume       = {251},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2023},
  url          = {https://www.dagstuhl.de/dagpub/978-3-95977-263-1},
  isbn         = {978-3-95977-263-1},
  timestamp    = {Thu, 02 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2307-09524,
  author       = {Boaz Barak and
                  Yael Kalai and
                  Ran Raz and
                  Salil P. Vadhan and
                  Nisheeth K. Vishnoi},
  title        = {On the works of Avi Wigderson},
  journal      = {CoRR},
  volume       = {abs/2307.09524},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2307.09524},
  doi          = {10.48550/ARXIV.2307.09524},
  eprinttype    = {arXiv},
  eprint       = {2307.09524},
  timestamp    = {Tue, 25 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2307-09524.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiBKLP23,
  author       = {Zvika Brakerski and
                  Maya Farber Brodsky and
                  Yael Tauman Kalai and
                  Alex Lombardi and
                  Omer Paneth},
  title        = {SNARGs for Monotone Policy Batch {NP}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1050},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1050},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiBKLP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/KalaiRR22,
  author       = {Yael Tauman Kalai and
                  Ran Raz and
                  Ron D. Rothblum},
  title        = {How to Delegate Computations: The Power of No-Signaling Proofs},
  journal      = {J. {ACM}},
  volume       = {69},
  number       = {1},
  pages        = {1:1--1:82},
  year         = {2022},
  url          = {https://doi.org/10.1145/3456867},
  doi          = {10.1145/3456867},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jacm/KalaiRR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/GellesKR22,
  author       = {Ran Gelles and
                  Yael Tauman Kalai and
                  Govind Ramnarayan},
  title        = {Efficient Multiparty Interactive Coding - Part {II:} Non-Oblivious
                  Noise},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {68},
  number       = {7},
  pages        = {4723--4749},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIT.2022.3160515},
  doi          = {10.1109/TIT.2022.3160515},
  timestamp    = {Tue, 28 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/GellesKR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BartusekKLMMVVY22,
  author       = {James Bartusek and
                  Yael Tauman Kalai and
                  Alex Lombardi and
                  Fermi Ma and
                  Giulio Malavolta and
                  Vinod Vaikuntanathan and
                  Thomas Vidick and
                  Lisa Yang},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Succinct Classical Verification of Quantum Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13508},
  pages        = {195--211},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15979-4\_7},
  doi          = {10.1007/978-3-031-15979-4\_7},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BartusekKLMMVVY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BitanskyBK22,
  author       = {Nir Bitansky and
                  Zvika Brakerski and
                  Yael Tauman Kalai},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Constructive Post-Quantum Reductions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13509},
  pages        = {654--683},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15982-4\_22},
  doi          = {10.1007/978-3-031-15982-4\_22},
  timestamp    = {Wed, 19 Oct 2022 17:37:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BitanskyBK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/DevadasGKV22,
  author       = {Lalita Devadas and
                  Rishab Goyal and
                  Yael Kalai and
                  Vinod Vaikuntanathan},
  title        = {Rate-1 Non-Interactive Arguments for Batch-NP and Applications},
  booktitle    = {63rd {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS}
                  2022, Denver, CO, USA, October 31 - November 3, 2022},
  pages        = {1057--1068},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/FOCS54457.2022.00103},
  doi          = {10.1109/FOCS54457.2022.00103},
  timestamp    = {Sat, 31 Dec 2022 17:14:50 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/DevadasGKV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/EfremenkoHKKKRS22,
  author       = {Klim Efremenko and
                  Bernhard Haeupler and
                  Yael Tauman Kalai and
                  Pritish Kamath and
                  Gillat Kol and
                  Nicolas Resch and
                  Raghuvansh R. Saxena},
  editor       = {Stefano Leonardi and
                  Anupam Gupta},
  title        = {Circuits resilient to short-circuit errors},
  booktitle    = {{STOC} '22: 54th Annual {ACM} {SIGACT} Symposium on Theory of Computing,
                  Rome, Italy, June 20 - 24, 2022},
  pages        = {582--594},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3519935.3520007},
  doi          = {10.1145/3519935.3520007},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/EfremenkoHKKKRS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/GuptaKZ22,
  author       = {Meghal Gupta and
                  Yael Tauman Kalai and
                  Rachel Yun Zhang},
  editor       = {Stefano Leonardi and
                  Anupam Gupta},
  title        = {Interactive error correcting codes over binary erasure channels resilient
                  to {\textgreater} {\textonehalf} adversarial corruption},
  booktitle    = {{STOC} '22: 54th Annual {ACM} {SIGACT} Symposium on Theory of Computing,
                  Rome, Italy, June 20 - 24, 2022},
  pages        = {609--622},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3519935.3519980},
  doi          = {10.1145/3519935.3519980},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/GuptaKZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Ben-DavidKP22,
  author       = {Shany Ben{-}David and
                  Yael Tauman Kalai and
                  Omer Paneth},
  editor       = {Eike Kiltz and
                  Vinod Vaikuntanathan},
  title        = {Verifiable Private Information Retrieval},
  booktitle    = {Theory of Cryptography - 20th International Conference, {TCC} 2022,
                  Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13749},
  pages        = {3--32},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22368-6\_1},
  doi          = {10.1007/978-3-031-22368-6\_1},
  timestamp    = {Fri, 23 Dec 2022 17:47:38 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/Ben-DavidKP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-02314,
  author       = {Nir Bitansky and
                  Zvika Brakerski and
                  Yael Tauman Kalai},
  title        = {Constructive Post-Quantum Reductions},
  journal      = {CoRR},
  volume       = {abs/2203.02314},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.02314},
  doi          = {10.48550/ARXIV.2203.02314},
  eprinttype    = {arXiv},
  eprint       = {2203.02314},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-02314.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-15877,
  author       = {Yael Kalai and
                  Alex Lombardi and
                  Vinod Vaikuntanathan and
                  Lisa Yang},
  title        = {Quantum Advantage from Any Non-Local Game},
  journal      = {CoRR},
  volume       = {abs/2203.15877},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.15877},
  doi          = {10.48550/ARXIV.2203.15877},
  eprinttype    = {arXiv},
  eprint       = {2203.15877},
  timestamp    = {Tue, 05 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-15877.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2206-14929,
  author       = {James Bartusek and
                  Yael Tauman Kalai and
                  Alex Lombardi and
                  Fermi Ma and
                  Giulio Malavolta and
                  Vinod Vaikuntanathan and
                  Thomas Vidick and
                  Lisa Yang},
  title        = {Succinct Classical Verification of Quantum Computation},
  journal      = {CoRR},
  volume       = {abs/2206.14929},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2206.14929},
  doi          = {10.48550/ARXIV.2206.14929},
  eprinttype    = {arXiv},
  eprint       = {2206.14929},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2206-14929.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/EfremenkoHKKKRS22,
  author       = {Klim Efremenko and
                  Bernhard Haeupler and
                  Yael Kalai and
                  Pritish Kamath and
                  Gillat Kol and
                  Nicolas Resch and
                  Raghuvansh Saxena},
  title        = {Circuits Resilient to Short-Circuit Errors},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR22-050}},
  year         = {2022},
  url          = {https://eccc.weizmann.ac.il/report/2022/050},
  eprinttype    = {ECCC},
  eprint       = {TR22-050},
  timestamp    = {Mon, 11 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/EfremenkoHKKKRS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/EfremenkoHKRSK22,
  author       = {Klim Efremenko and
                  Bernhard Haeupler and
                  Gillat Kol and
                  Nicolas Resch and
                  Raghuvansh Saxena and
                  Yael Tauman Kalai},
  title        = {Interactive Coding with Small Memory},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR22-146}},
  year         = {2022},
  url          = {https://eccc.weizmann.ac.il/report/2022/146},
  eprinttype    = {ECCC},
  eprint       = {TR22-146},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eccc/EfremenkoHKRSK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BitanskyBK22,
  author       = {Nir Bitansky and
                  Zvika Brakerski and
                  Yael Tauman Kalai},
  title        = {Constructive Post-Quantum Reductions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {298},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/298},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BitanskyBK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KalaiLVY22,
  author       = {Yael Tauman Kalai and
                  Alex Lombardi and
                  Vinod Vaikuntanathan and
                  Lisa Yang},
  title        = {Quantum Advantage from Any Non-Local Game},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {400},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/400},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KalaiLVY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BartusekKLMMVV022,
  author       = {James Bartusek and
                  Yael Tauman Kalai and
                  Alex Lombardi and
                  Fermi Ma and
                  Giulio Malavolta and
                  Vinod Vaikuntanathan and
                  Thomas Vidick and
                  Lisa Yang},
  title        = {Succinct Classical Verification of Quantum Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {857},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/857},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BartusekKLMMVV022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DevadasGKV22,
  author       = {Lalita Devadas and
                  Rishab Goyal and
                  Yael Kalai and
                  Vinod Vaikuntanathan},
  title        = {Rate-1 Non-Interactive Arguments for Batch-NP and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1236},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1236},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DevadasGKV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KalaiLVW22,
  author       = {Yael Tauman Kalai and
                  Alex Lombardi and
                  Vinod Vaikuntanathan and
                  Daniel Wichs},
  title        = {Boosting Batch Arguments and {RAM} Delegation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1320},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1320},
  timestamp    = {Sat, 22 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KalaiLVW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KalaiLV22,
  author       = {Yael Tauman Kalai and
                  Alex Lombardi and
                  Vinod Vaikuntanathan},
  title        = {SNARGs and {PPAD} Hardness from the Decisional Diffie-Hellman Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1409},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1409},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KalaiLV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ben-DavidKP22,
  author       = {Shany Ben{-}David and
                  Yael Tauman Kalai and
                  Omer Paneth},
  title        = {Verifiable Private Information Retrieval},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1560},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1560},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Ben-DavidKP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/combinatorica/KalaiKR21,
  author       = {Yael Tauman Kalai and
                  Ilan Komargodski and
                  Ran Raz},
  title        = {A Lower Bound for Adaptively-Secure Collective Coin Flipping Protocols},
  journal      = {Comb.},
  volume       = {41},
  number       = {1},
  pages        = {75--98},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00493-020-4147-4},
  doi          = {10.1007/S00493-020-4147-4},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/combinatorica/KalaiKR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/GellesKR21,
  author       = {Ran Gelles and
                  Yael Tauman Kalai and
                  Govind Ramnarayan},
  title        = {Efficient Multiparty Interactive Coding - Part {I:} Oblivious Insertions,
                  Deletions and Substitutions},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {67},
  number       = {6},
  pages        = {3411--3437},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIT.2021.3066009},
  doi          = {10.1109/TIT.2021.3066009},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/GellesKR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/JawaleKKZ21,
  author       = {Ruta Jawale and
                  Yael Tauman Kalai and
                  Dakshita Khurana and
                  Rachel Yun Zhang},
  editor       = {Samir Khuller and
                  Virginia Vassilevska Williams},
  title        = {SNARGs for bounded depth computations and {PPAD} hardness from sub-exponential
                  {LWE}},
  booktitle    = {{STOC} '21: 53rd Annual {ACM} {SIGACT} Symposium on Theory of Computing,
                  Virtual Event, Italy, June 21-25, 2021},
  pages        = {708--721},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3406325.3451055},
  doi          = {10.1145/3406325.3451055},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/JawaleKKZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/KalaiVZ21,
  author       = {Yael Tauman Kalai and
                  Vinod Vaikuntanathan and
                  Rachel Yun Zhang},
  editor       = {Kobbi Nissim and
                  Brent Waters},
  title        = {Somewhere Statistical Soundness, Post-Quantum Security, and SNARGs},
  booktitle    = {Theory of Cryptography - 19th International Conference, {TCC} 2021,
                  Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13042},
  pages        = {330--368},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90459-3\_12},
  doi          = {10.1007/978-3-030-90459-3\_12},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/KalaiVZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-04181,
  author       = {Meghal Gupta and
                  Yael Tauman Kalai and
                  Rachel Yun Zhang},
  title        = {Interactive Error Correcting Codes Over Binary Erasure Channels Resilient
                  to {\textdollar}{\textgreater}{\textbackslash}frac12{\textdollar}
                  Adversarial Corruption},
  journal      = {CoRR},
  volume       = {abs/2111.04181},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.04181},
  eprinttype    = {arXiv},
  eprint       = {2111.04181},
  timestamp    = {Fri, 10 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-04181.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KalaiVZ21,
  author       = {Yael Tauman Kalai and
                  Vinod Vaikuntanathan and
                  Rachel Yun Zhang},
  title        = {Somewhere Statistical Soundness, Post-Quantum Security, and SNARGs
                  for {P}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {788},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/788},
  timestamp    = {Wed, 10 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KalaiVZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuptaKZ21,
  author       = {Meghal Gupta and
                  Yael Tauman Kalai and
                  Rachel Yun Zhang},
  title        = {Interactive Error Correcting Codes Over Binary Erasure Channels Resilient
                  to {\textdollar}{\textgreater}{\textbackslash}frac12{\textdollar}
                  Adversarial Corruption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1481},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1481},
  timestamp    = {Fri, 10 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GuptaKZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KalaiP020,
  author       = {Yael Tauman Kalai and
                  Omer Paneth and
                  Lisa Yang},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Delegation with Updatable Unambiguous Proofs and PPAD-Hardness},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12172},
  pages        = {652--673},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56877-1\_23},
  doi          = {10.1007/978-3-030-56877-1\_23},
  timestamp    = {Mon, 28 Aug 2023 21:17:50 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KalaiP020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GargKK20,
  author       = {Ankit Garg and
                  Yael Tauman Kalai and
                  Dakshita Khurana},
  editor       = {Anne Canteaut and
                  Yuval Ishai},
  title        = {Low Error Efficient Computational Extractors in the {CRS} Model},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12105},
  pages        = {373--402},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45721-1\_14},
  doi          = {10.1007/978-3-030-45721-1\_14},
  timestamp    = {Mon, 04 May 2020 14:27:11 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GargKK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/BrakerskiKS20,
  author       = {Zvika Brakerski and
                  Yael Tauman Kalai and
                  Raghuvansh R. Saxena},
  editor       = {Sandy Irani},
  title        = {Deterministic and Efficient Interactive Coding from Hard-to-Decode
                  Tree Codes},
  booktitle    = {61st {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS}
                  2020, Durham, NC, USA, November 16-19, 2020},
  pages        = {446--457},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/FOCS46700.2020.00049},
  doi          = {10.1109/FOCS46700.2020.00049},
  timestamp    = {Wed, 15 Dec 2021 10:49:16 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/BrakerskiKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/EfremenkoHK20,
  author       = {Klim Efremenko and
                  Elad Haramaty and
                  Yael Tauman Kalai},
  editor       = {Thomas Vidick},
  title        = {Interactive Coding with Constant Round and Communication Blowup},
  booktitle    = {11th Innovations in Theoretical Computer Science Conference, {ITCS}
                  2020, January 12-14, 2020, Seattle, Washington, {USA}},
  series       = {LIPIcs},
  volume       = {151},
  pages        = {7:1--7:34},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2020},
  url          = {https://doi.org/10.4230/LIPIcs.ITCS.2020.7},
  doi          = {10.4230/LIPICS.ITCS.2020.7},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/innovations/EfremenkoHK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ita/GoldwasserKKM20,
  author       = {Shafi Goldwasser and
                  Adam Tauman Kalai and
                  Yael Tauman Kalai and
                  Omar Montasser},
  title        = {Identifying unpredictable test examples with worst-case guarantees},
  booktitle    = {Information Theory and Applications Workshop, {ITA} 2020, San Diego,
                  CA, USA, February 2-7, 2020},
  pages        = {1--14},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ITA50056.2020.9244996},
  doi          = {10.1109/ITA50056.2020.9244996},
  timestamp    = {Thu, 19 Nov 2020 14:03:02 +0100},
  biburl       = {https://dblp.org/rec/conf/ita/GoldwasserKKM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/GoldwasserKKM20,
  author       = {Shafi Goldwasser and
                  Adam Tauman Kalai and
                  Yael Kalai and
                  Omar Montasser},
  editor       = {Hugo Larochelle and
                  Marc'Aurelio Ranzato and
                  Raia Hadsell and
                  Maria{-}Florina Balcan and
                  Hsuan{-}Tien Lin},
  title        = {Beyond Perturbations: Learning Guarantees with Arbitrary Adversarial
                  Test Examples},
  booktitle    = {Advances in Neural Information Processing Systems 33: Annual Conference
                  on Neural Information Processing Systems 2020, NeurIPS 2020, December
                  6-12, 2020, virtual},
  year         = {2020},
  url          = {https://proceedings.neurips.cc/paper/2020/hash/b6c8cf4c587f2ead0c08955ee6e2502b-Abstract.html},
  timestamp    = {Tue, 19 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nips/GoldwasserKKM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BrakerskiK20,
  author       = {Zvika Brakerski and
                  Yael Kalai},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Witness Indistinguishability for Any Single-Round Argument with Applications
                  to Access Control},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12111},
  pages        = {97--123},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45388-6\_4},
  doi          = {10.1007/978-3-030-45388-6\_4},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BrakerskiK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/HoldenK20,
  author       = {Dhiraj Holden and
                  Yael Tauman Kalai},
  editor       = {Konstantin Makarychev and
                  Yury Makarychev and
                  Madhur Tulsiani and
                  Gautam Kamath and
                  Julia Chuzhoy},
  title        = {Non-signaling proofs with o({\(\surd\)} log n) provers are in {PSPACE}},
  booktitle    = {Proceedings of the 52nd Annual {ACM} {SIGACT} Symposium on Theory
                  of Computing, {STOC} 2020, Chicago, IL, USA, June 22-26, 2020},
  pages        = {1024--1037},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3357713.3384246},
  doi          = {10.1145/3357713.3384246},
  timestamp    = {Mon, 18 Dec 2023 07:33:37 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/HoldenK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icits/2020,
  editor       = {Yael Tauman Kalai and
                  Adam D. Smith and
                  Daniel Wichs},
  title        = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020,
                  June 17-19, 2020, Boston, MA, {USA}},
  series       = {LIPIcs},
  volume       = {163},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2020},
  url          = {https://www.dagstuhl.de/dagpub/978-3-95977-151-1},
  isbn         = {978-3-95977-151-1},
  timestamp    = {Thu, 04 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-05145,
  author       = {Shafi Goldwasser and
                  Adam Tauman Kalai and
                  Yael Tauman Kalai and
                  Omar Montasser},
  title        = {Beyond Perturbations: Learning Guarantees with Arbitrary Adversarial
                  Test Examples},
  journal      = {CoRR},
  volume       = {abs/2007.05145},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.05145},
  eprinttype    = {arXiv},
  eprint       = {2007.05145},
  timestamp    = {Mon, 20 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-05145.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/BrakerskiKS20,
  author       = {Zvika Brakerski and
                  Yael Tauman Kalai and
                  Raghuvansh Saxena},
  title        = {Deterministic and Efficient Interactive Coding from Hard-to-Decode
                  Tree Codes},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR20-137}},
  year         = {2020},
  url          = {https://eccc.weizmann.ac.il/report/2020/137},
  eprinttype    = {ECCC},
  eprint       = {TR20-137},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/BrakerskiKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KalaiZ20,
  author       = {Yael Tauman Kalai and
                  Rachel Yun Zhang},
  title        = {SNARGs for Bounded Depth Computations from Sub-Exponential {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {860},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/860},
  timestamp    = {Wed, 10 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KalaiZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiKLRSSTVW20,
  author       = {Ran Canetti and
                  Yael Tauman Kalai and
                  Anna Lysyanskaya and
                  Ronald L. Rivest and
                  Adi Shamir and
                  Emily Shen and
                  Ari Trachtenberg and
                  Mayank Varia and
                  Daniel J. Weitzner},
  title        = {Privacy-Preserving Automated Exposure Notification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {863},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/863},
  timestamp    = {Mon, 27 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiKLRSSTVW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JawaleKKZ20,
  author       = {Ruta Jawale and
                  Yael Tauman Kalai and
                  Dakshita Khurana and
                  Rachel Yun Zhang},
  title        = {SNARGs for Bounded Depth Computations and {PPAD} Hardness from Sub-Exponential
                  {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {980},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/980},
  timestamp    = {Wed, 10 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/JawaleKKZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/GellesK19,
  author       = {Ran Gelles and
                  Yael Tauman Kalai},
  title        = {Constant-Rate Interactive Coding Is Impossible, Even in Constant-Degree
                  Networks},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {65},
  number       = {6},
  pages        = {3812--3829},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIT.2019.2904576},
  doi          = {10.1109/TIT.2019.2904576},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/GellesK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KalaiK19,
  author       = {Yael Tauman Kalai and
                  Dakshita Khurana},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Non-interactive Non-malleability from Quantum Supremacy},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {552--582},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_18},
  doi          = {10.1007/978-3-030-26954-8\_18},
  timestamp    = {Fri, 09 Aug 2019 14:27:02 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KalaiK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/GellesKR19,
  author       = {Ran Gelles and
                  Yael Tauman Kalai and
                  Govind Ramnarayan},
  editor       = {Peter Robinson and
                  Faith Ellen},
  title        = {Efficient Multiparty Interactive Coding for Insertions, Deletions,
                  and Substitutions},
  booktitle    = {Proceedings of the 2019 {ACM} Symposium on Principles of Distributed
                  Computing, {PODC} 2019, Toronto, ON, Canada, July 29 - August 2, 2019},
  pages        = {137--146},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3293611.3331621},
  doi          = {10.1145/3293611.3331621},
  timestamp    = {Fri, 19 Jul 2019 08:02:49 +0200},
  biburl       = {https://dblp.org/rec/conf/podc/GellesKR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/KalaiPY19,
  author       = {Yael Tauman Kalai and
                  Omer Paneth and
                  Lisa Yang},
  editor       = {Moses Charikar and
                  Edith Cohen},
  title        = {How to delegate computations publicly},
  booktitle    = {Proceedings of the 51st Annual {ACM} {SIGACT} Symposium on Theory
                  of Computing, {STOC} 2019, Phoenix, AZ, USA, June 23-26, 2019},
  pages        = {1115--1124},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3313276.3316411},
  doi          = {10.1145/3313276.3316411},
  timestamp    = {Sun, 08 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/KalaiPY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AnanthDKL19,
  author       = {Prabhanjan Ananth and
                  Apoorvaa Deshpande and
                  Yael Tauman Kalai and
                  Anna Lysyanskaya},
  editor       = {Dennis Hofheinz and
                  Alon Rosen},
  title        = {Fully Homomorphic {NIZK} and {NIWI} Proofs},
  booktitle    = {Theory of Cryptography - 17th International Conference, {TCC} 2019,
                  Nuremberg, Germany, December 1-5, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11892},
  pages        = {356--385},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36033-7\_14},
  doi          = {10.1007/978-3-030-36033-7\_14},
  timestamp    = {Mon, 25 Nov 2019 13:59:31 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/AnanthDKL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/acm/19/KalaiR19,
  author       = {Yael Tauman Kalai and
                  Leonid Reyzin},
  editor       = {Oded Goldreich},
  title        = {A survey of leakage-resilient cryptography},
  booktitle    = {Providing Sound Foundations for Cryptography: On the Work of Shafi
                  Goldwasser and Silvio Micali},
  pages        = {727--794},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3335741.3335768},
  doi          = {10.1145/3335741.3335768},
  timestamp    = {Tue, 05 Nov 2019 15:40:16 +0100},
  biburl       = {https://dblp.org/rec/books/acm/19/KalaiR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-09863,
  author       = {Ran Gelles and
                  Yael Tauman Kalai and
                  Govind Ramnarayan},
  title        = {Efficient Multiparty Interactive Coding for Insertions, Deletions
                  and Substitutions},
  journal      = {CoRR},
  volume       = {abs/1901.09863},
  year         = {2019},
  url          = {http://arxiv.org/abs/1901.09863},
  eprinttype    = {arXiv},
  eprint       = {1901.09863},
  timestamp    = {Sat, 02 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1901-09863.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-02590,
  author       = {Dhiraj Holden and
                  Yael Kalai},
  title        = {No-Signaling Proofs with O({\(\surd\)}(log n)) Provers are in {PSPACE}},
  journal      = {CoRR},
  volume       = {abs/1910.02590},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.02590},
  eprinttype    = {arXiv},
  eprint       = {1910.02590},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-02590.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KalaiR19,
  author       = {Yael Tauman Kalai and
                  Leonid Reyzin},
  title        = {A Survey of Leakage-Resilient Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {302},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/302},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KalaiR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KalaiPY19,
  author       = {Yael Kalai and
                  Omer Paneth and
                  Lisa Yang},
  title        = {How to Delegate Computations Publicly},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {603},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/603},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KalaiPY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnanthDKL19,
  author       = {Prabhanjan Ananth and
                  Apoorvaa Deshpande and
                  Yael Tauman Kalai and
                  Anna Lysyanskaya},
  title        = {Fully Homomorphic {NIZK} and {NIWI} Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {732},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/732},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnanthDKL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargKK19,
  author       = {Ankit Garg and
                  Yael Tauman Kalai and
                  Dakshita Khurana},
  title        = {Computational Extractors with Negligible Error in the {CRS} Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1116},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1116},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargKK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/DaskalakisKI18,
  author       = {Costis Daskalakis and
                  Yael Kalai and
                  Sandy Irani},
  title        = {Special Section on the Forty-Seventh Annual {ACM} Symposium on Theory
                  of Computing {(STOC} 2015)},
  journal      = {{SIAM} J. Comput.},
  volume       = {47},
  number       = {3},
  pages        = {888--889},
  year         = {2018},
  url          = {https://doi.org/10.1137/18N974571},
  doi          = {10.1137/18N974571},
  timestamp    = {Mon, 23 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/DaskalakisKI18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BadrinarayananG18,
  author       = {Saikrishna Badrinarayanan and
                  Vipul Goyal and
                  Abhishek Jain and
                  Yael Tauman Kalai and
                  Dakshita Khurana and
                  Amit Sahai},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Promise Zero Knowledge and Its Applications to Round Optimal {MPC}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10992},
  pages        = {459--487},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96881-0\_16},
  doi          = {10.1007/978-3-319-96881-0\_16},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BadrinarayananG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KalaiKS18,
  author       = {Yael Tauman Kalai and
                  Dakshita Khurana and
                  Amit Sahai},
  editor       = {Jesper Buus Nielsen and
                  Vincent Rijmen},
  title        = {Statistical Witness Indistinguishability (and more) in Two Messages},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10822},
  pages        = {34--65},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-78372-7\_2},
  doi          = {10.1007/978-3-319-78372-7\_2},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KalaiKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/BitanskyKP18,
  author       = {Nir Bitansky and
                  Yael Tauman Kalai and
                  Omer Paneth},
  editor       = {Ilias Diakonikolas and
                  David Kempe and
                  Monika Henzinger},
  title        = {Multi-collision resistance: a paradigm for keyless hash functions},
  booktitle    = {Proceedings of the 50th Annual {ACM} {SIGACT} Symposium on Theory
                  of Computing, {STOC} 2018, Los Angeles, CA, USA, June 25-29, 2018},
  pages        = {671--684},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3188745.3188870},
  doi          = {10.1145/3188745.3188870},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/BitanskyKP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/BadrinarayananK18,
  author       = {Saikrishna Badrinarayanan and
                  Yael Tauman Kalai and
                  Dakshita Khurana and
                  Amit Sahai and
                  Daniel Wichs},
  editor       = {Ilias Diakonikolas and
                  David Kempe and
                  Monika Henzinger},
  title        = {Succinct delegation for low-space non-deterministic computation},
  booktitle    = {Proceedings of the 50th Annual {ACM} {SIGACT} Symposium on Theory
                  of Computing, {STOC} 2018, Los Angeles, CA, USA, June 25-29, 2018},
  pages        = {709--721},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3188745.3188924},
  doi          = {10.1145/3188745.3188924},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/BadrinarayananK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wdag/KalaiKR18,
  author       = {Yael Tauman Kalai and
                  Ilan Komargodski and
                  Ran Raz},
  editor       = {Ulrich Schmid and
                  Josef Widder},
  title        = {A Lower Bound for Adaptively-Secure Collective Coin-Flipping Protocols},
  booktitle    = {32nd International Symposium on Distributed Computing, {DISC} 2018,
                  New Orleans, LA, USA, October 15-19, 2018},
  series       = {LIPIcs},
  volume       = {121},
  pages        = {34:1--34:16},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2018},
  url          = {https://doi.org/10.4230/LIPIcs.DISC.2018.34},
  doi          = {10.4230/LIPICS.DISC.2018.34},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wdag/KalaiKR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/BadrinarayananK18,
  author       = {Saikrishna Badrinarayanan and
                  Yael Kalai and
                  Dakshita Khurana and
                  Amit Sahai and
                  Daniel Wichs},
  title        = {Non-Interactive Delegation for Low-Space Non-Deterministic Computation},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR18-009}},
  year         = {2018},
  url          = {https://eccc.weizmann.ac.il/report/2018/009},
  eprinttype    = {ECCC},
  eprint       = {TR18-009},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/BadrinarayananK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/EfremenkoHK18,
  author       = {Klim Efremenko and
                  Elad Haramaty and
                  Yael Kalai},
  title        = {Interactive Coding with Constant Round and Communication Blowup},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR18-054}},
  year         = {2018},
  url          = {https://eccc.weizmann.ac.il/report/2018/054},
  eprinttype    = {ECCC},
  eprint       = {TR18-054},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/EfremenkoHK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/KalaiK18,
  author       = {Yael Kalai and
                  Dakshita Khurana},
  title        = {Non-Interactive Non-Malleability from Quantum Supremacy},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR18-203}},
  year         = {2018},
  url          = {https://eccc.weizmann.ac.il/report/2018/203},
  eprinttype    = {ECCC},
  eprint       = {TR18-203},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/KalaiK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/KomargodskiRK18,
  author       = {Ilan Komargodski and
                  Ran Raz and
                  Yael Tauman Kalai},
  title        = {A Lower Bound for Adaptively-Secure Collective Coin-Flipping Protocols},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR18-140}},
  year         = {2018},
  url          = {https://eccc.weizmann.ac.il/report/2018/140},
  eprinttype    = {ECCC},
  eprint       = {TR18-140},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/KomargodskiRK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KalaiKS18,
  author       = {Yael Tauman Kalai and
                  Dakshita Khurana and
                  Amit Sahai},
  title        = {Statistical Witness Indistinguishability (and more) in Two Messages},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {168},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/168},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KalaiKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiK18,
  author       = {Zvika Brakerski and
                  Yael Tauman Kalai},
  title        = {Monotone Batch NP-Delegation with Applications to Access Control},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {375},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/375},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KalaiPY18,
  author       = {Yael Kalai and
                  Omer Paneth and
                  Lisa Yang},
  title        = {On Publicly Verifiable Delegation From Standard Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {776},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/776},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KalaiPY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DeshpandeK18,
  author       = {Apoorvaa Deshpande and
                  Yael Kalai},
  title        = {Proofs of Ignorance and Applications to 2-Message Witness Hiding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {896},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/896},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DeshpandeK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KalaiK18,
  author       = {Yael Tauman Kalai and
                  Dakshita Khurana},
  title        = {Non-Interactive Non-Malleability from Quantum Supremacy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1118},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1118},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KalaiK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithmica/BitanskyCKP17,
  author       = {Nir Bitansky and
                  Ran Canetti and
                  Yael Tauman Kalai and
                  Omer Paneth},
  title        = {On Virtual Grey Box Obfuscation for General Circuits},
  journal      = {Algorithmica},
  volume       = {79},
  number       = {4},
  pages        = {1014--1051},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00453-016-0218-8},
  doi          = {10.1007/S00453-016-0218-8},
  timestamp    = {Mon, 09 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/algorithmica/BitanskyCKP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BrakerskiKP17,
  author       = {Zvika Brakerski and
                  Yael Tauman Kalai and
                  Renen Perlman},
  editor       = {Tsuyoshi Takagi and
                  Thomas Peyrin},
  title        = {Succinct Spooky Free Compilers Are Not Black Box Sound},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Hong Kong, China, December 3-7, 2017, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10626},
  pages        = {159--180},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70700-6\_6},
  doi          = {10.1007/978-3-319-70700-6\_6},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BrakerskiKP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/0002KKR17,
  author       = {Abhishek Jain and
                  Yael Tauman Kalai and
                  Dakshita Khurana and
                  Ron Rothblum},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Distinguisher-Dependent Simulation in Two Rounds and its Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10402},
  pages        = {158--189},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63715-0\_6},
  doi          = {10.1007/978-3-319-63715-0\_6},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/0002KKR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KalaiRR17,
  author       = {Yael Tauman Kalai and
                  Guy N. Rothblum and
                  Ron D. Rothblum},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {From Obfuscation to the Security of Fiat-Shamir for Proofs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10402},
  pages        = {224--251},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63715-0\_8},
  doi          = {10.1007/978-3-319-63715-0\_8},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KalaiRR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/GellesK17,
  author       = {Ran Gelles and
                  Yael Tauman Kalai},
  editor       = {Christos H. Papadimitriou},
  title        = {Constant-Rate Interactive Coding Is Impossible, Even In Constant-Degree
                  Networks},
  booktitle    = {8th Innovations in Theoretical Computer Science Conference, {ITCS}
                  2017, January 9-11, 2017, Berkeley, CA, {USA}},
  series       = {LIPIcs},
  volume       = {67},
  pages        = {21:1--21:13},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2017},
  url          = {https://doi.org/10.4230/LIPIcs.ITCS.2017.21},
  doi          = {10.4230/LIPICS.ITCS.2017.21},
  timestamp    = {Tue, 11 Feb 2020 15:52:14 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/GellesK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/BrakerskiHK17,
  author       = {Zvika Brakerski and
                  Justin Holmgren and
                  Yael Tauman Kalai},
  editor       = {Hamed Hatami and
                  Pierre McKenzie and
                  Valerie King},
  title        = {Non-interactive delegation and batch {NP} verification from standard
                  computational assumptions},
  booktitle    = {Proceedings of the 49th Annual {ACM} {SIGACT} Symposium on Theory
                  of Computing, {STOC} 2017, Montreal, QC, Canada, June 19-23, 2017},
  pages        = {474--482},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3055399.3055497},
  doi          = {10.1145/3055399.3055497},
  timestamp    = {Sun, 02 Jun 2019 21:10:31 +0200},
  biburl       = {https://dblp.org/rec/conf/stoc/BrakerskiHK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2017-1,
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10677},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70500-2},
  doi          = {10.1007/978-3-319-70500-2},
  isbn         = {978-3-319-70499-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/2017-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2017-2,
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10678},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70503-3},
  doi          = {10.1007/978-3-319-70503-3},
  isbn         = {978-3-319-70502-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/2017-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/BitanskyPK17,
  author       = {Nir Bitansky and
                  Omer Paneth and
                  Yael Tauman Kalai},
  title        = {Multi-Collision Resistance: {A} Paradigm for Keyless Hash Functions},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR17-099}},
  year         = {2017},
  url          = {https://eccc.weizmann.ac.il/report/2017/099},
  eprinttype    = {ECCC},
  eprint       = {TR17-099},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/BitanskyPK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/GellesK17,
  author       = {Ran Gelles and
                  Yael Tauman Kalai},
  title        = {Constant-Rate Interactive Coding Is Impossible, Even In Constant-Degree
                  Networks},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR17-095}},
  year         = {2017},
  url          = {https://eccc.weizmann.ac.il/report/2017/095},
  eprinttype    = {ECCC},
  eprint       = {TR17-095},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/GellesK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/GoldwasserRK17,
  author       = {Shafi Goldwasser and
                  Guy N. Rothblum and
                  Yael Tauman Kalai},
  title        = {Delegating Computation: Interactive Proofs for Muggles},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR17-108}},
  year         = {2017},
  url          = {https://eccc.weizmann.ac.il/report/2017/108},
  eprinttype    = {ECCC},
  eprint       = {TR17-108},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/GoldwasserRK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JainKKR17,
  author       = {Abhishek Jain and
                  Yael Tauman Kalai and
                  Dakshita Khurana and
                  Ron Rothblum},
  title        = {Distinguisher-Dependent Simulation in Two Rounds and its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {330},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/330},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JainKKR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BitanskyKP17,
  author       = {Nir Bitansky and
                  Yael Tauman Kalai and
                  Omer Paneth},
  title        = {Multi-Collision Resistance: {A} Paradigm for Keyless Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {488},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/488},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BitanskyKP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiKP17,
  author       = {Zvika Brakerski and
                  Yael Tauman Kalai and
                  Renen Perlman},
  title        = {Succinct Spooky Free Compilers Are Not Black Box Sound},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {887},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/887},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiKP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadrinarayananG17c,
  author       = {Saikrishna Badrinarayanan and
                  Vipul Goyal and
                  Abhishek Jain and
                  Yael Tauman Kalai and
                  Dakshita Khurana and
                  Amit Sahai},
  title        = {Promise Zero Knowledge and its Applications to Round Optimal {MPC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1088},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1088},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BadrinarayananG17c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadrinarayananK17,
  author       = {Saikrishna Badrinarayanan and
                  Yael Tauman Kalai and
                  Dakshita Khurana and
                  Amit Sahai and
                  Daniel Wichs},
  title        = {Non-Interactive Delegation for Low-Space Non-Deterministic Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1250},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1250},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BadrinarayananK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/KalaiRR16,
  author       = {Yael Tauman Kalai and
                  Ran Raz and
                  Oded Regev},
  editor       = {Madhu Sudan},
  title        = {On the Space Complexity of Linear Programming with Preprocessing},
  booktitle    = {Proceedings of the 2016 {ACM} Conference on Innovations in Theoretical
                  Computer Science, Cambridge, MA, USA, January 14-16, 2016},
  pages        = {293--300},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2840728.2840750},
  doi          = {10.1145/2840728.2840750},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/innovations/KalaiRR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BitanskyBKPV16,
  author       = {Nir Bitansky and
                  Zvika Brakerski and
                  Yael Tauman Kalai and
                  Omer Paneth and
                  Vinod Vaikuntanathan},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {3-Message Zero Knowledge Against Human Ignorance},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9985},
  pages        = {57--83},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53641-4\_3},
  doi          = {10.1007/978-3-662-53641-4\_3},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BitanskyBKPV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/KalaiP16,
  author       = {Yael Tauman Kalai and
                  Omer Paneth},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Delegating {RAM} Computations},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9986},
  pages        = {91--118},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53644-5\_4},
  doi          = {10.1007/978-3-662-53644-5\_4},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/KalaiP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GoldwasserK16,
  author       = {Shafi Goldwasser and
                  Yael Tauman Kalai},
  editor       = {Eyal Kushilevitz and
                  Tal Malkin},
  title        = {Cryptographic Assumptions: {A} Position Paper},
  booktitle    = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A,
                  Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9562},
  pages        = {505--522},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49096-9\_21},
  doi          = {10.1007/978-3-662-49096-9\_21},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GoldwasserK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/BrakerskiHK16,
  author       = {Zvika Brakerski and
                  Justin Holmgren and
                  Yael Tauman Kalai},
  title        = {Non-Interactive {RAM} and Batch {NP} Delegation from any {PIR}},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR16-077}},
  year         = {2016},
  url          = {https://eccc.weizmann.ac.il/report/2016/077},
  eprinttype    = {ECCC},
  eprint       = {TR16-077},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/BrakerskiHK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BitanskyBKPV16,
  author       = {Nir Bitansky and
                  Zvika Brakerski and
                  Yael Tauman Kalai and
                  Omer Paneth and
                  Vinod Vaikuntanathan},
  title        = {3-Message Zero Knowledge Against Human Ignorance},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {213},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/213},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BitanskyBKPV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KalaiRR16,
  author       = {Yael Tauman Kalai and
                  Guy N. Rothblum and
                  Ron D. Rothblum},
  title        = {From Obfuscation to the Security of Fiat-Shamir for Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {303},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/303},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KalaiRR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiHK16,
  author       = {Zvika Brakerski and
                  Justin Holmgren and
                  Yael Tauman Kalai},
  title        = {Non-Interactive {RAM} and Batch {NP} Delegation from any {PIR}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {459},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/459},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiHK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/GoldwasserKR15,
  author       = {Shafi Goldwasser and
                  Yael Tauman Kalai and
                  Guy N. Rothblum},
  title        = {Delegating Computation: Interactive Proofs for Muggles},
  journal      = {J. {ACM}},
  volume       = {62},
  number       = {4},
  pages        = {27:1--27:64},
  year         = {2015},
  url          = {https://doi.org/10.1145/2699436},
  doi          = {10.1145/2699436},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jacm/GoldwasserKR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KalaiR15,
  author       = {Yael Tauman Kalai and
                  Ron D. Rothblum},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Arguments of Proximity - [Extended Abstract]},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {422--442},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_21},
  doi          = {10.1007/978-3-662-48000-7\_21},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KalaiR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/GoldwasserKP15,
  author       = {Shafi Goldwasser and
                  Yael Tauman Kalai and
                  Sunoo Park},
  editor       = {Magn{\'{u}}s M. Halld{\'{o}}rsson and
                  Kazuo Iwama and
                  Naoki Kobayashi and
                  Bettina Speckmann},
  title        = {Adaptively Secure Coin-Flipping, Revisited},
  booktitle    = {Automata, Languages, and Programming - 42nd International Colloquium,
                  {ICALP} 2015, Kyoto, Japan, July 6-10, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9135},
  pages        = {663--674},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47666-6\_53},
  doi          = {10.1007/978-3-662-47666-6\_53},
  timestamp    = {Fri, 27 Mar 2020 09:02:59 +0100},
  biburl       = {https://dblp.org/rec/conf/icalp/GoldwasserKP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/0002KL15,
  author       = {Abhishek Jain and
                  Yael Tauman Kalai and
                  Allison Bishop Lewko},
  editor       = {Tim Roughgarden},
  title        = {Interactive Coding for Multiparty Protocols},
  booktitle    = {Proceedings of the 2015 Conference on Innovations in Theoretical Computer
                  Science, {ITCS} 2015, Rehovot, Israel, January 11-13, 2015},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2688073.2688109},
  doi          = {10.1145/2688073.2688109},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/innovations/0002KL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CanettiKP15,
  author       = {Ran Canetti and
                  Yael Tauman Kalai and
                  Omer Paneth},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {On Obfuscation with Random Oracles},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9015},
  pages        = {456--467},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46497-7\_18},
  doi          = {10.1007/978-3-662-46497-7\_18},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/CanettiKP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wdag/KalaiK15,
  author       = {Yael Tauman Kalai and
                  Ilan Komargodski},
  editor       = {Yoram Moses},
  title        = {Compressing Communication in Distributed Protocols},
  booktitle    = {Distributed Computing - 29th International Symposium, {DISC} 2015,
                  Tokyo, Japan, October 7-9, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9363},
  pages        = {467--479},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48653-5\_31},
  doi          = {10.1007/978-3-662-48653-5\_31},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/wdag/KalaiK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GoldwasserKP15,
  author       = {Shafi Goldwasser and
                  Yael Tauman Kalai and
                  Sunoo Park},
  title        = {Adaptively Secure Coin-Flipping, Revisited},
  journal      = {CoRR},
  volume       = {abs/1503.01588},
  year         = {2015},
  url          = {http://arxiv.org/abs/1503.01588},
  eprinttype    = {arXiv},
  eprint       = {1503.01588},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GoldwasserKP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KalaiK15,
  author       = {Yael Tauman Kalai and
                  Ilan Komargodski},
  title        = {Compressing Communication in Distributed Protocols},
  journal      = {CoRR},
  volume       = {abs/1506.00290},
  year         = {2015},
  url          = {http://arxiv.org/abs/1506.00290},
  eprinttype    = {arXiv},
  eprint       = {1506.00290},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KalaiK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/KalaiK15,
  author       = {Yael Tauman Kalai and
                  Ilan Komargodski},
  title        = {Compressing Communication in Distributed Protocols},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR15-092}},
  year         = {2015},
  url          = {https://eccc.weizmann.ac.il/report/2015/092},
  eprinttype    = {ECCC},
  eprint       = {TR15-092},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/KalaiK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiKP15,
  author       = {Ran Canetti and
                  Yael Tauman Kalai and
                  Omer Paneth},
  title        = {On Obfuscation with Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {48},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/048},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiKP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoldwasserKP15,
  author       = {Shafi Goldwasser and
                  Yael Tauman Kalai and
                  Sunoo Park},
  title        = {Adaptively Secure Coin-Flipping, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {202},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/202},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoldwasserKP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoldwasserK15,
  author       = {Shafi Goldwasser and
                  Yael Tauman Kalai},
  title        = {Cryptographic Assumptions: {A} Position Paper},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {907},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/907},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoldwasserK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KalaiP15,
  author       = {Yael Tauman Kalai and
                  Omer Paneth},
  title        = {Delegating {RAM} Computations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {957},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/957},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KalaiP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dc/BoyleGK14,
  author       = {Elette Boyle and
                  Shafi Goldwasser and
                  Yael Tauman Kalai},
  title        = {Leakage-resilient coin tossing},
  journal      = {Distributed Comput.},
  volume       = {27},
  number       = {3},
  pages        = {147--164},
  year         = {2014},
  url          = {https://doi.org/10.1007/s00446-013-0206-z},
  doi          = {10.1007/S00446-013-0206-Z},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dc/BoyleGK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/BrakerskiKN14,
  author       = {Zvika Brakerski and
                  Yael Tauman Kalai and
                  Moni Naor},
  title        = {Fast Interactive Coding against Adversarial Noise},
  journal      = {J. {ACM}},
  volume       = {61},
  number       = {6},
  pages        = {35:1--35:30},
  year         = {2014},
  url          = {https://doi.org/10.1145/2661628},
  doi          = {10.1145/2661628},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jacm/BrakerskiKN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BitanskyCCGKPR14,
  author       = {Nir Bitansky and
                  Ran Canetti and
                  Henry Cohn and
                  Shafi Goldwasser and
                  Yael Tauman Kalai and
                  Omer Paneth and
                  Alon Rosen},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {The Impossibility of Obfuscation with Auxiliary Input or a Universal
                  Simulator},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {71--89},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_5},
  doi          = {10.1007/978-3-662-44381-1\_5},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BitanskyCCGKPR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BitanskyCKP14,
  author       = {Nir Bitansky and
                  Ran Canetti and
                  Yael Tauman Kalai and
                  Omer Paneth},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {On Virtual Grey Box Obfuscation for General Circuits},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {108--125},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_7},
  doi          = {10.1007/978-3-662-44381-1\_7},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BitanskyCKP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BarakGKPS14,
  author       = {Boaz Barak and
                  Sanjam Garg and
                  Yael Tauman Kalai and
                  Omer Paneth and
                  Amit Sahai},
  editor       = {Phong Q. Nguyen and
                  Elisabeth Oswald},
  title        = {Protecting Obfuscation against Algebraic Attacks},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8441},
  pages        = {221--238},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55220-5\_13},
  doi          = {10.1007/978-3-642-55220-5\_13},
  timestamp    = {Thu, 14 Oct 2021 09:58:16 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BarakGKPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/KalaiRR14,
  author       = {Yael Tauman Kalai and
                  Ran Raz and
                  Ron D. Rothblum},
  editor       = {David B. Shmoys},
  title        = {How to delegate computations: the power of no-signaling proofs},
  booktitle    = {Symposium on Theory of Computing, {STOC} 2014, New York, NY, USA,
                  May 31 - June 03, 2014},
  pages        = {485--494},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2591796.2591809},
  doi          = {10.1145/2591796.2591809},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stoc/KalaiRR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BarakBCKPS14,
  author       = {Boaz Barak and
                  Nir Bitansky and
                  Ran Canetti and
                  Yael Tauman Kalai and
                  Omer Paneth and
                  Amit Sahai},
  editor       = {Yehuda Lindell},
  title        = {Obfuscation for Evasive Functions},
  booktitle    = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC}
                  2014, San Diego, CA, USA, February 24-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8349},
  pages        = {26--51},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54242-8\_2},
  doi          = {10.1007/978-3-642-54242-8\_2},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BarakBCKPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Dachman-SoledK14,
  author       = {Dana Dachman{-}Soled and
                  Yael Tauman Kalai},
  editor       = {Yehuda Lindell},
  title        = {Securing Circuits and Protocols against 1/poly(k) Tampering Rate},
  booktitle    = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC}
                  2014, San Diego, CA, USA, February 24-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8349},
  pages        = {540--565},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54242-8\_23},
  doi          = {10.1007/978-3-642-54242-8\_23},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Dachman-SoledK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CohnGK14,
  author       = {Henry Cohn and
                  Shafi Goldwasser and
                  Yael Tauman Kalai},
  title        = {The impossibility of obfuscation with a universal simulator},
  journal      = {CoRR},
  volume       = {abs/1401.0348},
  year         = {2014},
  url          = {http://arxiv.org/abs/1401.0348},
  eprinttype    = {arXiv},
  eprint       = {1401.0348},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/CohnGK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/KalaiR14,
  author       = {Yael Tauman Kalai and
                  Ran Raz},
  title        = {On the Space Complexity of Linear Programming with Preprocessing},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR14-170}},
  year         = {2014},
  url          = {https://eccc.weizmann.ac.il/report/2014/170},
  eprinttype    = {ECCC},
  eprint       = {TR14-170},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/KalaiR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BitanskyCKP14,
  author       = {Nir Bitansky and
                  Ran Canetti and
                  Yael Tauman Kalai and
                  Omer Paneth},
  title        = {On Virtual Grey Box Obfuscation for General Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {554},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/554},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BitanskyCKP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BoyleG0KS13,
  author       = {Elette Boyle and
                  Sanjam Garg and
                  Abhishek Jain and
                  Yael Tauman Kalai and
                  Amit Sahai},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Secure Computation against Adaptive Auxiliary Information},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {316--334},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_18},
  doi          = {10.1007/978-3-642-40041-4\_18},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BoyleG0KS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoldwasserKPVZ13,
  author       = {Shafi Goldwasser and
                  Yael Tauman Kalai and
                  Raluca A. Popa and
                  Vinod Vaikuntanathan and
                  Nickolai Zeldovich},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {How to Run Turing Machines on Encrypted Data},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {536--553},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_30},
  doi          = {10.1007/978-3-642-40084-1\_30},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GoldwasserKPVZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/GoldwasserKPVZ13,
  author       = {Shafi Goldwasser and
                  Yael Tauman Kalai and
                  Raluca A. Popa and
                  Vinod Vaikuntanathan and
                  Nickolai Zeldovich},
  editor       = {Dan Boneh and
                  Tim Roughgarden and
                  Joan Feigenbaum},
  title        = {Reusable garbled circuits and succinct functional encryption},
  booktitle    = {Symposium on Theory of Computing Conference, STOC'13, Palo Alto, CA,
                  USA, June 1-4, 2013},
  pages        = {555--564},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2488608.2488678},
  doi          = {10.1145/2488608.2488678},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/GoldwasserKPVZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/KalaiRR13,
  author       = {Yael Tauman Kalai and
                  Ran Raz and
                  Ron D. Rothblum},
  editor       = {Dan Boneh and
                  Tim Roughgarden and
                  Joan Feigenbaum},
  title        = {Delegation for bounded space},
  booktitle    = {Symposium on Theory of Computing Conference, STOC'13, Palo Alto, CA,
                  USA, June 1-4, 2013},
  pages        = {565--574},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2488608.2488679},
  doi          = {10.1145/2488608.2488679},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stoc/KalaiRR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BitanskyDG0KLW13,
  author       = {Nir Bitansky and
                  Dana Dachman{-}Soled and
                  Sanjam Garg and
                  Abhishek Jain and
                  Yael Tauman Kalai and
                  Adriana L{\'{o}}pez{-}Alt and
                  Daniel Wichs},
  editor       = {Amit Sahai},
  title        = {Why "Fiat-Shamir for Proofs" Lacks a Proof},
  booktitle    = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC}
                  2013, Tokyo, Japan, March 3-6, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7785},
  pages        = {182--201},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36594-2\_11},
  doi          = {10.1007/978-3-642-36594-2\_11},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BitanskyDG0KLW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/KalaiRR13,
  author       = {Yael Tauman Kalai and
                  Ran Raz and
                  Ron Rothblum},
  title        = {How to Delegate Computations: The Power of No-Signaling Proofs},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR13-183}},
  year         = {2013},
  url          = {https://eccc.weizmann.ac.il/report/2013/183},
  eprinttype    = {ECCC},
  eprint       = {TR13-183},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/KalaiRR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoldwasserKPVZ13,
  author       = {Shafi Goldwasser and
                  Yael Tauman Kalai and
                  Raluca A. Popa and
                  Vinod Vaikuntanathan and
                  Nickolai Zeldovich},
  title        = {Overcoming the Worst-Case Curse for Cryptographic Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {229},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/229},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoldwasserKPVZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarakGKPS13,
  author       = {Boaz Barak and
                  Sanjam Garg and
                  Yael Tauman Kalai and
                  Omer Paneth and
                  Amit Sahai},
  title        = {Protecting Obfuscation Against Algebraic Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {631},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/631},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarakGKPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoldwasserK13,
  author       = {Shafi Goldwasser and
                  Yael Tauman Kalai},
  title        = {A Note on the Impossibility of Obfuscation with Auxiliary Input},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {665},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/665},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoldwasserK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarakBCKPS13,
  author       = {Boaz Barak and
                  Nir Bitansky and
                  Ran Canetti and
                  Yael Tauman Kalai and
                  Omer Paneth and
                  Amit Sahai},
  title        = {Obfuscation for Evasive Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {668},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/668},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarakBCKPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KalaiRR13,
  author       = {Yael Tauman Kalai and
                  Ran Raz and
                  Ron Rothblum},
  title        = {How to Delegate Computations: The Power of No-Signaling Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {862},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/862},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KalaiRR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/HaleviK12,
  author       = {Shai Halevi and
                  Yael Tauman Kalai},
  title        = {Smooth Projective Hashing and Two-Message Oblivious Transfer},
  journal      = {J. Cryptol.},
  volume       = {25},
  number       = {1},
  pages        = {158--193},
  year         = {2012},
  url          = {https://doi.org/10.1007/s00145-010-9092-8},
  doi          = {10.1007/S00145-010-9092-8},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/HaleviK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Dachman-SoledK12,
  author       = {Dana Dachman{-}Soled and
                  Yael Tauman Kalai},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Securing Circuits against Constant-Rate Tampering},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {533--551},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_31},
  doi          = {10.1007/978-3-642-32009-5\_31},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Dachman-SoledK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/BrakerskiK12,
  author       = {Zvika Brakerski and
                  Yael Tauman Kalai},
  title        = {Efficient Interactive Coding against Adversarial Noise},
  booktitle    = {53rd Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
                  2012, New Brunswick, NJ, USA, October 20-23, 2012},
  pages        = {160--166},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/FOCS.2012.22},
  doi          = {10.1109/FOCS.2012.22},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/BrakerskiK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/KalaiLR12,
  author       = {Yael Tauman Kalai and
                  Allison B. Lewko and
                  Anup Rao},
  title        = {Formulas Resilient to Short-Circuit Errors},
  booktitle    = {53rd Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
                  2012, New Brunswick, NJ, USA, October 20-23, 2012},
  pages        = {490--499},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/FOCS.2012.69},
  doi          = {10.1109/FOCS.2012.69},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/KalaiLR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/BoyleGJK12,
  author       = {Elette Boyle and
                  Shafi Goldwasser and
                  Abhishek Jain and
                  Yael Tauman Kalai},
  editor       = {Howard J. Karloff and
                  Toniann Pitassi},
  title        = {Multiparty computation secure against continual memory leakage},
  booktitle    = {Proceedings of the 44th Symposium on Theory of Computing Conference,
                  {STOC} 2012, New York, NY, USA, May 19 - 22, 2012},
  pages        = {1235--1254},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2213977.2214087},
  doi          = {10.1145/2213977.2214087},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stoc/BoyleGJK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BrakerskiK12,
  author       = {Zvika Brakerski and
                  Yael Tauman Kalai},
  editor       = {Ronald Cramer},
  title        = {A Parallel Repetition Theorem for Leakage Resilience},
  booktitle    = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC}
                  2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7194},
  pages        = {248--265},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28914-9\_14},
  doi          = {10.1007/978-3-642-28914-9\_14},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BrakerskiK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/BrakerskiK12,
  author       = {Zvika Brakerski and
                  Yael Tauman Kalai},
  title        = {Efficient Interactive Coding Against Adversarial Noise},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR12-043}},
  year         = {2012},
  url          = {https://eccc.weizmann.ac.il/report/2012/043},
  eprinttype    = {ECCC},
  eprint       = {TR12-043},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/BrakerskiK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-SoledK12,
  author       = {Dana Dachman{-}Soled and
                  Yael Tauman Kalai},
  title        = {Securing Circuits Against Constant-Rate Tampering},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {366},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/366},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-SoledK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-Soled0KL12,
  author       = {Dana Dachman{-}Soled and
                  Abhishek Jain and
                  Yael Tauman Kalai and
                  Adriana L{\'{o}}pez{-}Alt},
  title        = {On the (In)security of the Fiat-Shamir Paradigm, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {706},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/706},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-Soled0KL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoldwasserKPVZ12,
  author       = {Shafi Goldwasser and
                  Yael Tauman Kalai and
                  Raluca A. Popa and
                  Vinod Vaikuntanathan and
                  Nickolai Zeldovich},
  title        = {Succinct Functional Encryption and Applications: Reusable Garbled
                  Circuits and Beyond},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {733},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/733},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoldwasserKPVZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BitanskyCGHKR11,
  author       = {Nir Bitansky and
                  Ran Canetti and
                  Shafi Goldwasser and
                  Shai Halevi and
                  Yael Tauman Kalai and
                  Guy N. Rothblum},
  editor       = {Dong Hoon Lee and
                  Xiaoyun Wang},
  title        = {Program Obfuscation with Leaky Hardware},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Seoul, South Korea, December 4-8, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7073},
  pages        = {722--739},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25385-0\_39},
  doi          = {10.1007/978-3-642-25385-0\_39},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BitanskyCGHKR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChungKLR11,
  author       = {Kai{-}Min Chung and
                  Yael Tauman Kalai and
                  Feng{-}Hao Liu and
                  Ran Raz},
  editor       = {Phillip Rogaway},
  title        = {Memory Delegation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 14-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6841},
  pages        = {151--168},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22792-9\_9},
  doi          = {10.1007/978-3-642-22792-9\_9},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChungKLR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KalaiKS11,
  author       = {Yael Tauman Kalai and
                  Bhavana Kanukurthi and
                  Amit Sahai},
  editor       = {Phillip Rogaway},
  title        = {Cryptography with Tamperable and Leaky Memory},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 14-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6841},
  pages        = {373--390},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22792-9\_21},
  doi          = {10.1007/978-3-642-22792-9\_21},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KalaiKS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/BravermanHK11,
  author       = {Mark Braverman and
                  Avinatan Hassidim and
                  Yael Tauman Kalai},
  editor       = {Bernard Chazelle},
  title        = {Leaky Pseudo-Entropy Functions},
  booktitle    = {Innovations in Computer Science - {ICS} 2011, Tsinghua University,
                  Beijing, China, January 7-9, 2011. Proceedings},
  pages        = {353--366},
  publisher    = {Tsinghua University Press},
  year         = {2011},
  url          = {http://conference.iiis.tsinghua.edu.cn/ICS2011/content/papers/17.html},
  timestamp    = {Mon, 23 Mar 2020 08:26:00 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/BravermanHK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BrakerskiGK11,
  author       = {Zvika Brakerski and
                  Shafi Goldwasser and
                  Yael Tauman Kalai},
  editor       = {Yuval Ishai},
  title        = {Black-Box Circular-Secure Encryption beyond Affine Functions},
  booktitle    = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC}
                  2011, Providence, RI, USA, March 28-30, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6597},
  pages        = {201--218},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19571-6\_13},
  doi          = {10.1007/978-3-642-19571-6\_13},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BrakerskiGK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wdag/BoyleGK11,
  author       = {Elette Boyle and
                  Shafi Goldwasser and
                  Yael Tauman Kalai},
  editor       = {David Peleg},
  title        = {Leakage-Resilient Coin Tossing},
  booktitle    = {Distributed Computing - 25th International Symposium, {DISC} 2011,
                  Rome, Italy, September 20-22, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6950},
  pages        = {181--196},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24100-0\_16},
  doi          = {10.1007/978-3-642-24100-0\_16},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/wdag/BoyleGK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiK11,
  author       = {Zvika Brakerski and
                  Yael Tauman Kalai},
  title        = {A Parallel Repetition Theorem for Leakage Resilience},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {250},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/250},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChungKLR11,
  author       = {Kai{-}Min Chung and
                  Yael Tauman Kalai and
                  Feng{-}Hao Liu and
                  Ran Raz},
  title        = {Memory Delegation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {273},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/273},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChungKLR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleGK11,
  author       = {Elette Boyle and
                  Shafi Goldwasser and
                  Yael Tauman Kalai},
  title        = {Leakage-Resilient Coin Tossing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {291},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/291},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyleGK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BitanskyCGHKR11,
  author       = {Nir Bitansky and
                  Ran Canetti and
                  Shafi Goldwasser and
                  Shai Halevi and
                  Yael Tauman Kalai and
                  Guy N. Rothblum},
  title        = {Program Obfuscation with Leaky Hardware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {660},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/660},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BitanskyCGHKR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChungKV10,
  author       = {Kai{-}Min Chung and
                  Yael Tauman Kalai and
                  Salil P. Vadhan},
  editor       = {Tal Rabin},
  title        = {Improved Delegation of Computation Using Fully Homomorphic Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {483--501},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_26},
  doi          = {10.1007/978-3-642-14623-7\_26},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChungKV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/BrakerskiKKV10,
  author       = {Zvika Brakerski and
                  Yael Tauman Kalai and
                  Jonathan Katz and
                  Vinod Vaikuntanathan},
  title        = {Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient
                  to Continual Memory Leakage},
  booktitle    = {51th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
                  2010, October 23-26, 2010, Las Vegas, Nevada, {USA}},
  pages        = {501--510},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/FOCS.2010.55},
  doi          = {10.1109/FOCS.2010.55},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/BrakerskiKKV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/GoldwasserKPV10,
  author       = {Shafi Goldwasser and
                  Yael Tauman Kalai and
                  Chris Peikert and
                  Vinod Vaikuntanathan},
  editor       = {Andrew Chi{-}Chih Yao},
  title        = {Robustness of the Learning with Errors Assumption},
  booktitle    = {Innovations in Computer Science - {ICS} 2010, Tsinghua University,
                  Beijing, China, January 5-7, 2010. Proceedings},
  pages        = {230--240},
  publisher    = {Tsinghua University Press},
  year         = {2010},
  url          = {http://conference.iiis.tsinghua.edu.cn/ICS2010/content/papers/19.html},
  timestamp    = {Wed, 04 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/innovations/GoldwasserKPV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CanettiKVW10,
  author       = {Ran Canetti and
                  Yael Tauman Kalai and
                  Mayank Varia and
                  Daniel Wichs},
  editor       = {Daniele Micciancio},
  title        = {On Symmetric Encryption and Point Obfuscation},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {52--71},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_4},
  doi          = {10.1007/978-3-642-11799-2\_4},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/CanettiKVW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DodisGKPV10,
  author       = {Yevgeniy Dodis and
                  Shafi Goldwasser and
                  Yael Tauman Kalai and
                  Chris Peikert and
                  Vinod Vaikuntanathan},
  editor       = {Daniele Micciancio},
  title        = {Public-Key Encryption Schemes with Auxiliary Inputs},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {361--381},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_22},
  doi          = {10.1007/978-3-642-11799-2\_22},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DodisGKPV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiKVW10,
  author       = {Ran Canetti and
                  Yael Tauman Kalai and
                  Mayank Varia and
                  Daniel Wichs},
  title        = {On Symmetric Encryption and Point Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {49},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/049},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiKVW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiK10,
  author       = {Zvika Brakerski and
                  Yael Tauman Kalai},
  title        = {A Framework for Efficient Signatures, Ring Signatures and Identity
                  Based Encryption in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {86},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/086},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChungKV10,
  author       = {Kai{-}Min Chung and
                  Yael Tauman Kalai and
                  Salil P. Vadhan},
  title        = {Improved Delegation of Computation using Fully Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {241},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/241},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChungKV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiKKV10,
  author       = {Zvika Brakerski and
                  Yael Tauman Kalai and
                  Jonathan Katz and
                  Vinod Vaikuntanathan},
  title        = {Overcoming the Hole In The Bucket: Public-Key Cryptography Resilient
                  to Continual Memory Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {278},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/278},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiKKV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KalaiR09,
  author       = {Yael Tauman Kalai and
                  Ran Raz},
  editor       = {Shai Halevi},
  title        = {Probabilistically Checkable Arguments},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {143--159},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_9},
  doi          = {10.1007/978-3-642-03356-8\_9},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KalaiR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/KalaiLR09,
  author       = {Yael Tauman Kalai and
                  Xin Li and
                  Anup Rao},
  title        = {2-Source Extractors under Computational Assumptions and Cryptography
                  with Defective Randomness},
  booktitle    = {50th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
                  2009, October 25-27, 2009, Atlanta, Georgia, {USA}},
  pages        = {617--626},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/FOCS.2009.61},
  doi          = {10.1109/FOCS.2009.61},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/KalaiLR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/DodisKL09,
  author       = {Yevgeniy Dodis and
                  Yael Tauman Kalai and
                  Shachar Lovett},
  editor       = {Michael Mitzenmacher},
  title        = {On cryptography with auxiliary input},
  booktitle    = {Proceedings of the 41st Annual {ACM} Symposium on Theory of Computing,
                  {STOC} 2009, Bethesda, MD, USA, May 31 - June 2, 2009},
  pages        = {621--630},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1536414.1536498},
  doi          = {10.1145/1536414.1536498},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stoc/DodisKL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiGK09,
  author       = {Zvika Brakerski and
                  Shafi Goldwasser and
                  Yael Tauman Kalai},
  title        = {Black-Box Circular-Secure Encryption Beyond Affine Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {485},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/485},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiGK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoldwasserKR08,
  author       = {Shafi Goldwasser and
                  Yael Tauman Kalai and
                  Guy N. Rothblum},
  editor       = {David A. Wagner},
  title        = {One-Time Programs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5157},
  pages        = {39--56},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85174-5\_3},
  doi          = {10.1007/978-3-540-85174-5\_3},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GoldwasserKR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/KalaiLRZ08,
  author       = {Yael Tauman Kalai and
                  Xin Li and
                  Anup Rao and
                  David Zuckerman},
  title        = {Network Extractor Protocols},
  booktitle    = {49th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
                  2008, October 25-28, 2008, Philadelphia, PA, {USA}},
  pages        = {654--663},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/FOCS.2008.73},
  doi          = {10.1109/FOCS.2008.73},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/KalaiLRZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/KalaiR08,
  author       = {Yael Tauman Kalai and
                  Ran Raz},
  editor       = {Luca Aceto and
                  Ivan Damg{\aa}rd and
                  Leslie Ann Goldberg and
                  Magn{\'{u}}s M. Halld{\'{o}}rsson and
                  Anna Ing{\'{o}}lfsd{\'{o}}ttir and
                  Igor Walukiewicz},
  title        = {Interactive {PCP}},
  booktitle    = {Automata, Languages and Programming, 35th International Colloquium,
                  {ICALP} 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part
                  {II} - Track {B:} Logic, Semantics, and Theory of Programming {\&}
                  Track {C:} Security and Cryptography Foundations},
  series       = {Lecture Notes in Computer Science},
  volume       = {5126},
  pages        = {536--547},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70583-3\_44},
  doi          = {10.1007/978-3-540-70583-3\_44},
  timestamp    = {Fri, 27 Mar 2020 09:02:59 +0100},
  biburl       = {https://dblp.org/rec/conf/icalp/KalaiR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/GoldwasserKR08,
  author       = {Shafi Goldwasser and
                  Yael Tauman Kalai and
                  Guy N. Rothblum},
  editor       = {Cynthia Dwork},
  title        = {Delegating computation: interactive proofs for muggles},
  booktitle    = {Proceedings of the 40th Annual {ACM} Symposium on Theory of Computing,
                  Victoria, British Columbia, Canada, May 17-20, 2008},
  pages        = {113--122},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1374376.1374396},
  doi          = {10.1145/1374376.1374396},
  timestamp    = {Mon, 26 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/GoldwasserKR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/KalaiLP07,
  author       = {Yael Tauman Kalai and
                  Yehuda Lindell and
                  Manoj Prabhakaran},
  title        = {Concurrent Composition of Secure Protocols in the Timing Model},
  journal      = {J. Cryptol.},
  volume       = {20},
  number       = {4},
  pages        = {431--492},
  year         = {2007},
  url          = {https://doi.org/10.1007/s00145-007-0567-1},
  doi          = {10.1007/S00145-007-0567-1},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/KalaiLP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/KalaiR07,
  author       = {Yael Tauman Kalai and
                  Ran Raz},
  title        = {Interactive {PCP}},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR07-031}},
  year         = {2007},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/2007/TR07-031/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR07-031},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/KalaiR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleviK07,
  author       = {Shai Halevi and
                  Yael Tauman Kalai},
  title        = {Smooth Projective Hashing and Two-Message Oblivious Transfer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {118},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/118},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleviK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ndltd/Kalai06,
  author       = {Yael Tauman Kalai},
  title        = {Attacks on the Fiat-Shamir paradigm and program obfuscation},
  school       = {Massachusetts Institute of Technology, Cambridge, MA, {USA}},
  year         = {2006},
  url          = {https://hdl.handle.net/1721.1/34026},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ndltd/Kalai06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/RivestST06,
  author       = {Ronald L. Rivest and
                  Adi Shamir and
                  Yael Tauman},
  editor       = {Oded Goldreich and
                  Arnold L. Rosenberg and
                  Alan L. Selman},
  title        = {How to Leak a Secret: Theory and Applications of Ring Signatures},
  booktitle    = {Theoretical Computer Science, Essays in Memory of Shimon Even},
  series       = {Lecture Notes in Computer Science},
  volume       = {3895},
  pages        = {164--186},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11685654\_7},
  doi          = {10.1007/11685654\_7},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/RivestST06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/KalaiR06,
  author       = {Yael Tauman Kalai and
                  Ran Raz},
  title        = {Succinct Non-Interactive Zero-Knowledge Proofs with Preprocessing
                  for {LOGSNP}},
  booktitle    = {47th Annual {IEEE} Symposium on Foundations of Computer Science {(FOCS}
                  2006), 21-24 October 2006, Berkeley, California, USA, Proceedings},
  pages        = {355--366},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/FOCS.2006.74},
  doi          = {10.1109/FOCS.2006.74},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/focs/KalaiR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Kalai05,
  author       = {Yael Tauman Kalai},
  editor       = {Ronald Cramer},
  title        = {Smooth Projective Hashing and Two-Message Oblivious Transfer},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {78--95},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_5},
  doi          = {10.1007/11426639\_5},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Kalai05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/GoldwasserK05,
  author       = {Shafi Goldwasser and
                  Yael Tauman Kalai},
  title        = {On the Impossibility of Obfuscation with Auxiliary Input},
  booktitle    = {46th Annual {IEEE} Symposium on Foundations of Computer Science {(FOCS}
                  2005), 23-25 October 2005, Pittsburgh, PA, USA, Proceedings},
  pages        = {553--562},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/SFCS.2005.60},
  doi          = {10.1109/SFCS.2005.60},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/GoldwasserK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/KalaiLP05,
  author       = {Yael Tauman Kalai and
                  Yehuda Lindell and
                  Manoj Prabhakaran},
  editor       = {Harold N. Gabow and
                  Ronald Fagin},
  title        = {Concurrent general composition of secure protocols in the timing model},
  booktitle    = {Proceedings of the 37th Annual {ACM} Symposium on Theory of Computing,
                  Baltimore, MD, USA, May 22-24, 2005},
  pages        = {644--653},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1060590.1060687},
  doi          = {10.1145/1060590.1060687},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stoc/KalaiLP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KalaiLP05,
  author       = {Yael Tauman Kalai and
                  Yehuda Lindell and
                  Manoj Prabhakaran},
  title        = {Concurrent Composition of Secure Protocols in the Timing Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {36},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/036},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KalaiLP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/GoldwasserK03,
  author       = {Shafi Goldwasser and
                  Yael Tauman Kalai},
  title        = {On the (In)security of the Fiat-Shamir Paradigm},
  booktitle    = {44th Symposium on Foundations of Computer Science {(FOCS} 2003), 11-14
                  October 2003, Cambridge, MA, USA, Proceedings},
  pages        = {102--113},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/SFCS.2003.1238185},
  doi          = {10.1109/SFCS.2003.1238185},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/GoldwasserK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR03-015,
  author       = {Shafi Goldwasser and
                  Yael Tauman},
  title        = {On the (In)security of the Fiat-Shamir Paradigm},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR03-015}},
  year         = {2003},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/2003/TR03-015/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR03-015},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/ECCC-TR03-015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoldwasserT03,
  author       = {Shafi Goldwasser and
                  Yael Tauman},
  title        = {On the (In)security of the Fiat-Shamir Paradigm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {34},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/034},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoldwasserT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/RivestST01,
  author       = {Ronald L. Rivest and
                  Adi Shamir and
                  Yael Tauman},
  editor       = {Colin Boyd},
  title        = {How to Leak a Secret},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2001, 7th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Gold Coast, Australia, December 9-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2248},
  pages        = {552--565},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45682-1\_32},
  doi          = {10.1007/3-540-45682-1\_32},
  timestamp    = {Tue, 01 Jun 2021 15:22:33 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/RivestST01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ShamirT01,
  author       = {Adi Shamir and
                  Yael Tauman},
  editor       = {Joe Kilian},
  title        = {Improved Online/Offline Signature Schemes},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 19-23,
                  2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2139},
  pages        = {355--367},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44647-8\_21},
  doi          = {10.1007/3-540-44647-8\_21},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ShamirT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics