BibTeX records: Abhi Shelat

download as .bib file

@article{DBLP:journals/iacr/RosefieldST24,
  author       = {Schuyler Rosefield and
                  Abhi Shelat and
                  LaKyah Tyner},
  title        = {Threshold Garbled Circuits with Low Overhead},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {316},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/316},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/RosefieldST24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/CohenSW23,
  author       = {Ran Cohen and
                  Abhi Shelat and
                  Daniel Wichs},
  title        = {Adaptively Secure {MPC} with Sublinear Communication Complexity},
  journal      = {J. Cryptol.},
  volume       = {36},
  number       = {2},
  pages        = {11},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00145-023-09446-6},
  doi          = {10.1007/S00145-023-09446-6},
  timestamp    = {Thu, 20 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/CohenSW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/DoernerKLST23,
  author       = {Jack Doerner and
                  Yashvanth Kondi and
                  Eysa Lee and
                  Abhi Shelat and
                  LaKyah Tyner},
  title        = {Threshold {BBS+} Signatures for Distributed Anonymous Credential Issuance},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {773--789},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179470},
  doi          = {10.1109/SP46215.2023.10179470},
  timestamp    = {Thu, 27 Jul 2023 08:17:10 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/DoernerKLST23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DoernerKLST23,
  author       = {Jack Doerner and
                  Yashvanth Kondi and
                  Eysa Lee and
                  Abhi Shelat and
                  LaKyah Tyner},
  title        = {Threshold {BBS+} Signatures for Distributed Anonymous Credential Issuance},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {602},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/602},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DoernerKLST23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DoernerKLS23,
  author       = {Jack Doerner and
                  Yashvanth Kondi and
                  Eysa Lee and
                  Abhi Shelat},
  title        = {Threshold {ECDSA} in Three Rounds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {765},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/765},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DoernerKLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CohenDKS23,
  author       = {Ran Cohen and
                  Jack Doerner and
                  Yashvanth Kondi and
                  Abhi Shelat},
  title        = {Secure Multiparty Computation with Identifiable Abort from Vindicating
                  Release},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1136},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1136},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CohenDKS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/ChenDKLRSC22,
  author       = {Megan Chen and
                  Jack Doerner and
                  Yashvanth Kondi and
                  Eysa Lee and
                  Schuyler Rosefield and
                  Abhi Shelat and
                  Ran Cohen},
  title        = {Multiparty Generation of an {RSA} Modulus},
  journal      = {J. Cryptol.},
  volume       = {35},
  number       = {2},
  pages        = {12},
  year         = {2022},
  url          = {https://doi.org/10.1007/s00145-021-09395-y},
  doi          = {10.1007/S00145-021-09395-Y},
  timestamp    = {Tue, 05 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/ChenDKLRSC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KondiS22,
  author       = {Yashvanth Kondi and
                  Abhi Shelat},
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {Improved Straight-Line Extraction in the Random Oracle Model with
                  Applications to Signature Aggregation},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13792},
  pages        = {279--309},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22966-4\_10},
  doi          = {10.1007/978-3-031-22966-4\_10},
  timestamp    = {Fri, 03 Feb 2023 17:07:14 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KondiS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CohenDKS22,
  author       = {Ran Cohen and
                  Jack Doerner and
                  Yashvanth Kondi and
                  Abhi Shelat},
  editor       = {Orr Dunkelman and
                  Stefan Dziembowski},
  title        = {Guaranteed Output in {\textdollar}O({\textbackslash}sqrt\{n\}){\textdollar}
                  Rounds for Round-Robin Sampling Protocols},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13275},
  pages        = {241--271},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-06944-4\_9},
  doi          = {10.1007/978-3-031-06944-4\_9},
  timestamp    = {Tue, 31 May 2022 17:23:10 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CohenDKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CohenDKS22,
  author       = {Ran Cohen and
                  Jack Doerner and
                  Yashvanth Kondi and
                  Abhi Shelat},
  title        = {Guaranteed Output in {\textdollar}O({\textbackslash}sqrt\{n\}){\textdollar}
                  Rounds for Round-Robin Sampling Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {257},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/257},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CohenDKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KondiS22,
  author       = {Yashvanth Kondi and
                  Abhi Shelat},
  title        = {Improved Straight-Line Extraction in the Random Oracle Model With
                  Applications to Signature Aggregation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {393},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/393},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KondiS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KifferRS22,
  author       = {Lucianna Kiffer and
                  Rajmohan Rajaraman and
                  Abhi Shelat},
  title        = {A Better Method to Analyze Blockchain Consistency},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {601},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/601},
  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KifferRS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ChenHIKMRSVW21,
  author       = {Megan Chen and
                  Carmit Hazay and
                  Yuval Ishai and
                  Yuriy Kashnikov and
                  Daniele Micciancio and
                  Tarik Riviere and
                  Abhi Shelat and
                  Muthuramakrishnan Venkitasubramaniam and
                  Ruihan Wang},
  title        = {Diogenes: Lightweight Scalable {RSA} Modulus Generation with a Dishonest
                  Majority},
  booktitle    = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco,
                  CA, USA, 24-27 May 2021},
  pages        = {590--607},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SP40001.2021.00025},
  doi          = {10.1109/SP40001.2021.00025},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ChenHIKMRSVW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChenCDKLRS20,
  author       = {Megan Chen and
                  Ran Cohen and
                  Jack Doerner and
                  Yashvanth Kondi and
                  Eysa Lee and
                  Schuyler Rosefield and
                  Abhi Shelat},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Multiparty Generation of an {RSA} Modulus},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12172},
  pages        = {64--93},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56877-1\_3},
  doi          = {10.1007/978-3-030-56877-1\_3},
  timestamp    = {Mon, 28 Aug 2023 21:17:50 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChenCDKLRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HazaySV20,
  author       = {Carmit Hazay and
                  Abhi Shelat and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Going Beyond Dual Execution: {MPC} for Functions with Efficient Verification},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12111},
  pages        = {328--356},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45388-6\_12},
  doi          = {10.1007/978-3-030-45388-6\_12},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HazaySV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HazaySV20,
  author       = {Carmit Hazay and
                  Abhi Shelat and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Going Beyond Dual Execution: {MPC} for Functions with Efficient Verification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {139},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/139},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HazaySV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenCDKLRS20,
  author       = {Megan Chen and
                  Ran Cohen and
                  Jack Doerner and
                  Yashvanth Kondi and
                  Eysa Lee and
                  Schuyler Rosefield and
                  Abhi Shelat},
  title        = {Multiparty Generation of an {RSA} Modulus},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {370},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/370},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenCDKLRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenHIKMRSVW20,
  author       = {Megan Chen and
                  Carmit Hazay and
                  Yuval Ishai and
                  Yuriy Kashnikov and
                  Daniele Micciancio and
                  Tarik Riviere and
                  Abhi Shelat and
                  Muthuramakrishnan Venkitasubramaniam and
                  Ruihan Wang},
  title        = {Diogenes: Lightweight Scalable {RSA} Modulus Generation with a Dishonest
                  Majority},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {374},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/374},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenHIKMRSVW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChampionSU19,
  author       = {Jeffrey Champion and
                  Abhi Shelat and
                  Jonathan R. Ullman},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Securely Sampling Biased Coins with Applications to Differential Privacy},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {603--614},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3354256},
  doi          = {10.1145/3319535.3354256},
  timestamp    = {Tue, 10 Nov 2020 20:00:36 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChampionSU19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CohenSW19,
  author       = {Ran Cohen and
                  Abhi Shelat and
                  Daniel Wichs},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Adaptively Secure {MPC} with Sublinear Communication Complexity},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11693},
  pages        = {30--60},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26951-7\_2},
  doi          = {10.1007/978-3-030-26951-7\_2},
  timestamp    = {Fri, 09 Aug 2019 14:22:41 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CohenSW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/MarcedonePS19,
  author       = {Antonio Marcedone and
                  Rafael Pass and
                  Abhi Shelat},
  editor       = {Ian Goldberg and
                  Tyler Moore},
  title        = {Minimizing Trust in Hardware Wallets with Two Factor Signatures},
  booktitle    = {Financial Cryptography and Data Security - 23rd International Conference,
                  {FC} 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11598},
  pages        = {407--425},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32101-7\_25},
  doi          = {10.1007/978-3-030-32101-7\_25},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/MarcedonePS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/WangAPRS19,
  author       = {Liang Wang and
                  Gilad Asharov and
                  Rafael Pass and
                  Thomas Ristenpart and
                  Abhi Shelat},
  title        = {Blind Certificate Authorities},
  booktitle    = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco,
                  CA, USA, May 19-23, 2019},
  pages        = {1015--1032},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SP.2019.00007},
  doi          = {10.1109/SP.2019.00007},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/WangAPRS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/DoernerKLS19,
  author       = {Jack Doerner and
                  Yashvanth Kondi and
                  Eysa Lee and
                  Abhi Shelat},
  title        = {Threshold {ECDSA} from {ECDSA} Assumptions: The Multiparty Case},
  booktitle    = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco,
                  CA, USA, May 19-23, 2019},
  pages        = {1051--1066},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SP.2019.00024},
  doi          = {10.1109/SP.2019.00024},
  timestamp    = {Tue, 24 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/DoernerKLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MarcedonePS19,
  author       = {Antonio Marcedone and
                  Rafael Pass and
                  Abhi Shelat},
  title        = {Minimizing Trust in Hardware Wallets with Two Factor Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {6},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/006},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MarcedonePS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DoernerKLS19,
  author       = {Jack Doerner and
                  Yashvanth Kondi and
                  Eysa Lee and
                  Abhi Shelat},
  title        = {Threshold {ECDSA} from {ECDSA} Assumptions: The Multiparty Case},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {523},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/523},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DoernerKLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChampionSU19,
  author       = {Jeffrey Champion and
                  Abhi Shelat and
                  Jonathan R. Ullman},
  title        = {Securely Sampling Biased Coins with Applications to Differential Privacy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {823},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/823},
  timestamp    = {Tue, 27 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChampionSU19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KifferRS18,
  author       = {Lucianna Kiffer and
                  Rajmohan Rajaraman and
                  Abhi Shelat},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {A Better Method to Analyze Blockchain Consistency},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {729--744},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243814},
  doi          = {10.1145/3243734.3243814},
  timestamp    = {Tue, 10 Nov 2020 20:00:51 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KifferRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HamlinSWW18,
  author       = {Ariel Hamlin and
                  Abhi Shelat and
                  Mor Weiss and
                  Daniel Wichs},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Multi-Key Searchable Encryption, Revisited},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10769},
  pages        = {95--124},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76578-5\_4},
  doi          = {10.1007/978-3-319-76578-5\_4},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HamlinSWW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/WahbyTSTW18,
  author       = {Riad S. Wahby and
                  Ioanna Tzialla and
                  Abhi Shelat and
                  Justin Thaler and
                  Michael Walfish},
  title        = {Doubly-Efficient zkSNARKs Without Trusted Setup},
  booktitle    = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings,
                  21-23 May 2018, San Francisco, California, {USA}},
  pages        = {926--943},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SP.2018.00060},
  doi          = {10.1109/SP.2018.00060},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/WahbyTSTW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/DoernerKLS18,
  author       = {Jack Doerner and
                  Yashvanth Kondi and
                  Eysa Lee and
                  Abhi Shelat},
  title        = {Secure Two-party Threshold {ECDSA} from {ECDSA} Assumptions},
  booktitle    = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings,
                  21-23 May 2018, San Francisco, California, {USA}},
  pages        = {980--997},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SP.2018.00036},
  doi          = {10.1109/SP.2018.00036},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/DoernerKLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HamlinSWW18,
  author       = {Ariel Hamlin and
                  Abhi Shelat and
                  Mor Weiss and
                  Daniel Wichs},
  title        = {Multi-Key Searchable Encryption, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {18},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/018},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HamlinSWW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DoernerKLS18,
  author       = {Jack Doerner and
                  Yashvanth Kondi and
                  Eysa Lee and
                  Abhi Shelat},
  title        = {Secure Two-party Threshold {ECDSA} from {ECDSA} Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {499},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/499},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DoernerKLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangAPRS18,
  author       = {Liang Wang and
                  Gilad Asharov and
                  Rafael Pass and
                  Thomas Ristenpart and
                  Abhi Shelat},
  title        = {Blind Certificate Authorities},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1022},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1022},
  timestamp    = {Tue, 20 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangAPRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CohenSW18,
  author       = {Ran Cohen and
                  Abhi Shelat and
                  Daniel Wichs},
  title        = {Adaptively Secure {MPC} with Sublinear Communication Complexity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1161},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1161},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CohenSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DoernerS17,
  author       = {Jack Doerner and
                  Abhi Shelat},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {Scaling {ORAM} for Secure Computation},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {523--535},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3133967},
  doi          = {10.1145/3133956.3133967},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/DoernerS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WahbyJBSTWW17,
  author       = {Riad S. Wahby and
                  Ye Ji and
                  Andrew J. Blumberg and
                  Abhi Shelat and
                  Justin Thaler and
                  Michael Walfish and
                  Thomas Wies},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {Full Accounting for Verifiable Outsourcing},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {2071--2086},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3133984},
  doi          = {10.1145/3133956.3133984},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WahbyJBSTWW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/PassSS17,
  author       = {Rafael Pass and
                  Lior Seeman and
                  Abhi Shelat},
  editor       = {Jean{-}S{\'{e}}bastien Coron and
                  Jesper Buus Nielsen},
  title        = {Analysis of the Blockchain Protocol in Asynchronous Networks},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10211},
  pages        = {643--673},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-56614-6\_22},
  doi          = {10.1007/978-3-319-56614-6\_22},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/PassSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wine/FischPS17,
  author       = {Ben Fisch and
                  Rafael Pass and
                  Abhi Shelat},
  editor       = {Nikhil R. Devanur and
                  Pinyan Lu},
  title        = {Socially Optimal Mining Pools},
  booktitle    = {Web and Internet Economics - 13th International Conference, {WINE}
                  2017, Bangalore, India, December 17-20, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10660},
  pages        = {205--218},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71924-5\_15},
  doi          = {10.1007/978-3-319-71924-5\_15},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wine/FischPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/FischPS17,
  author       = {Ben A. Fisch and
                  Rafael Pass and
                  Abhi Shelat},
  title        = {Socially Optimal Mining Pools},
  journal      = {CoRR},
  volume       = {abs/1703.03846},
  year         = {2017},
  url          = {http://arxiv.org/abs/1703.03846},
  eprinttype    = {arXiv},
  eprint       = {1703.03846},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/FischPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WahbyJBSTWW17,
  author       = {Riad S. Wahby and
                  Ye Ji and
                  Andrew J. Blumberg and
                  Abhi Shelat and
                  Justin Thaler and
                  Michael Walfish and
                  Thomas Wies},
  title        = {Full accounting for verifiable outsourcing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {242},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/242},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WahbyJBSTWW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DoernerS17,
  author       = {Jack Doerner and
                  Abhi Shelat},
  title        = {Scaling {ORAM} for Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {827},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/827},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DoernerS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WahbyTSTW17,
  author       = {Riad S. Wahby and
                  Ioanna Tzialla and
                  Abhi Shelat and
                  Justin Thaler and
                  Michael Walfish},
  title        = {Doubly-efficient zkSNARKs without trusted setup},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1132},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1132},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WahbyTSTW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DoernerES16,
  author       = {Jack Doerner and
                  David Evans and
                  Abhi Shelat},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {Secure Stable Matching at Scale},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {1602--1613},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978373},
  doi          = {10.1145/2976749.2978373},
  timestamp    = {Tue, 10 Nov 2020 20:00:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DoernerES16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/MarcedonePS16,
  author       = {Antonio Marcedone and
                  Rafael Pass and
                  Abhi Shelat},
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {Bounded {KDM} Security from iO and {OWF}},
  booktitle    = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  pages        = {571--586},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9\_30},
  doi          = {10.1007/978-3-319-44618-9\_30},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/MarcedonePS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/WahbyHGSW16,
  author       = {Riad S. Wahby and
                  Max Howald and
                  Siddharth Garg and
                  Abhi Shelat and
                  Michael Walfish},
  title        = {Verifiable ASICs},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA,
                  USA, May 22-26, 2016},
  pages        = {759--778},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SP.2016.51},
  doi          = {10.1109/SP.2016.51},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/WahbyHGSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/PassS16,
  author       = {Rafael Pass and
                  Abhi Shelat},
  editor       = {Eyal Kushilevitz and
                  Tal Malkin},
  title        = {Impossibility of {VBB} Obfuscation with Ideal Constant-Degree Graded
                  Encodings},
  booktitle    = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A,
                  Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9562},
  pages        = {3--17},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49096-9\_1},
  doi          = {10.1007/978-3-662-49096-9\_1},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/PassS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/MahmoodyMNPS16,
  author       = {Mohammad Mahmoody and
                  Ameer Mohammed and
                  Soheil Nematihaji and
                  Rafael Pass and
                  Abhi Shelat},
  editor       = {Eyal Kushilevitz and
                  Tal Malkin},
  title        = {Lower Bounds on Assumptions Behind Indistinguishability Obfuscation},
  booktitle    = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A,
                  Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9562},
  pages        = {49--66},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49096-9\_3},
  doi          = {10.1007/978-3-662-49096-9\_3},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/MahmoodyMNPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZhuHKS16,
  author       = {Ruiyu Zhu and
                  Yan Huang and
                  Jonathan Katz and
                  Abhi Shelat},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {The Cut-and-Choose Game and Its Application to Cryptographic Protocols},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {1085--1100},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/zhu},
  timestamp    = {Mon, 01 Feb 2021 08:43:18 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ZhuHKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MahmoodyMNPS16,
  author       = {Mohammad Mahmoody and
                  Ameer Mohammed and
                  Soheil Nematihaji and
                  Rafael Pass and
                  Abhi Shelat},
  title        = {A Note on Black-Box Complexity of Indistinguishability Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {316},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/316},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MahmoodyMNPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PassS16,
  author       = {Rafael Pass and
                  Abhi Shelat},
  title        = {Micropayments for Decentralized Currencies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {332},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/332},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PassS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PassSS16,
  author       = {Rafael Pass and
                  Lior Seeman and
                  Abhi Shelat},
  title        = {Analysis of the Blockchain Protocol in Asynchronous Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {454},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/454},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PassSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MarcedonePS16,
  author       = {Antonio Marcedone and
                  Rafael Pass and
                  Abhi Shelat},
  title        = {Bounded {KDM} Security from iO and {OWF}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {688},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/688},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MarcedonePS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DoernerES16,
  author       = {Jack Doerner and
                  David Evans and
                  Abhi Shelat},
  title        = {Secure Stable Matching at Scale},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {861},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/861},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DoernerES16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangPSR16,
  author       = {Liang Wang and
                  Rafael Pass and
                  Abhi Shelat and
                  Thomas Ristenpart},
  title        = {Secure Channel Injection and Anonymous Proofs of Account Ownership},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {925},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/925},
  timestamp    = {Tue, 20 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangPSR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/HohenbergerMPS15,
  author       = {Susan Hohenberger and
                  Steven A. Myers and
                  Rafael Pass and
                  Abhi Shelat},
  title        = {An Overview of {ANONIZE:} {A} Large-Scale Anonymous Survey System},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {13},
  number       = {2},
  pages        = {22--29},
  year         = {2015},
  url          = {https://doi.org/10.1109/MSP.2015.21},
  doi          = {10.1109/MSP.2015.21},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/HohenbergerMPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/AhnBCHSW15,
  author       = {Jae Hyun Ahn and
                  Dan Boneh and
                  Jan Camenisch and
                  Susan Hohenberger and
                  Abhi Shelat and
                  Brent Waters},
  title        = {Computing on Authenticated Data},
  journal      = {J. Cryptol.},
  volume       = {28},
  number       = {2},
  pages        = {351--395},
  year         = {2015},
  url          = {https://doi.org/10.1007/s00145-014-9182-0},
  doi          = {10.1007/S00145-014-9182-0},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/AhnBCHSW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ShelatV15,
  author       = {Abhi Shelat and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Tetsu Iwata and
                  Jung Hee Cheon},
  title        = {Secure Computation from Millionaire},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9452},
  pages        = {736--757},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48797-6\_30},
  doi          = {10.1007/978-3-662-48797-6\_30},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ShelatV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PassS15,
  author       = {Rafael Pass and
                  Abhi Shelat},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {Micropayments for Decentralized Currencies},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {207--218},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813713},
  doi          = {10.1145/2810103.2813713},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/PassS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dcc/BrunelleRS15,
  author       = {Nathan Brunelle and
                  Gabriel Robins and
                  Abhi Shelat},
  editor       = {Ali Bilgin and
                  Michael W. Marcellin and
                  Joan Serra{-}Sagrist{\`{a}} and
                  James A. Storer},
  title        = {Compression-Aware Algorithms for Massive Datasets},
  booktitle    = {2015 Data Compression Conference, {DCC} 2015, Snowbird, UT, USA, April
                  7-9, 2015},
  pages        = {441},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/DCC.2015.74},
  doi          = {10.1109/DCC.2015.74},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/dcc/BrunelleRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PassS15,
  author       = {Rafael Pass and
                  Abhi Shelat},
  title        = {Impossibility of {VBB} Obfuscation with Ideal Constant-Degree Graded
                  Encodings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {383},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/383},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PassS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HohenbergerMPS15,
  author       = {Susan Hohenberger and
                  Steven A. Myers and
                  Rafael Pass and
                  Abhi Shelat},
  title        = {{ANONIZE:} {A} Large-Scale Anonymous Survey System},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {681},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/681},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HohenbergerMPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MahmoodyMNPS15,
  author       = {Mohammad Mahmoody and
                  Ameer Mohammed and
                  Soheil Nematihaji and
                  Rafael Pass and
                  Abhi Shelat},
  title        = {Lower Bounds on Assumptions behind Indistinguishability Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1062},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1062},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MahmoodyMNPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KosbaZMQCPPSS15,
  author       = {Ahmed E. Kosba and
                  Zhichao Zhao and
                  Andrew Miller and
                  Yi Qian and
                  T.{-}H. Hubert Chan and
                  Charalampos Papamanthou and
                  Rafael Pass and
                  Abhi Shelat and
                  Elaine Shi},
  title        = {How to Use SNARKs in Universally Composable Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1093},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1093},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KosbaZMQCPPSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WahbyHGSW15,
  author       = {Riad S. Wahby and
                  Max Howald and
                  Siddharth Garg and
                  Abhi Shelat and
                  Michael Walfish},
  title        = {Verifiable ASICs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1243},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1243},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WahbyHGSW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangHCSS14,
  author       = {Xiao Shaun Wang and
                  Yan Huang and
                  T.{-}H. Hubert Chan and
                  Abhi Shelat and
                  Elaine Shi},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {{SCORAM:} Oblivious {RAM} for Secure Computation},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {191--202},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660365},
  doi          = {10.1145/2660267.2660365},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/WangHCSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/HohenbergerMPS14,
  author       = {Susan Hohenberger and
                  Steven A. Myers and
                  Rafael Pass and
                  Abhi Shelat},
  title        = {{ANONIZE:} {A} Large-Scale Anonymous Survey System},
  booktitle    = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley,
                  CA, USA, May 18-21, 2014},
  pages        = {375--389},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/SP.2014.31},
  doi          = {10.1109/SP.2014.31},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/HohenbergerMPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangHCSS14a,
  author       = {Xiao Shaun Wang and
                  Yan Huang and
                  T.{-}H. Hubert Chan and
                  Abhi Shelat and
                  Elaine Shi},
  title        = {{SCORAM:} Oblivious {RAM} for Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {671},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/671},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangHCSS14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/MyersSS13,
  author       = {Steven A. Myers and
                  Mona Sergi and
                  Abhi Shelat},
  title        = {Black-box construction of a more than non-malleable {CCA1} encryption
                  scheme from plaintext awareness},
  journal      = {J. Comput. Secur.},
  volume       = {21},
  number       = {5},
  pages        = {721--748},
  year         = {2013},
  url          = {https://doi.org/10.3233/JCS-130485},
  doi          = {10.3233/JCS-130485},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/MyersSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HustedMSG13,
  author       = {Nathaniel Husted and
                  Steven A. Myers and
                  Abhi Shelat and
                  Paul Grubbs},
  editor       = {Charles N. Payne Jr.},
  title        = {{GPU} and {CPU} parallelization of honest-but-curious secure two-party
                  computation},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {169--178},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523681},
  doi          = {10.1145/2523649.2523681},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/HustedMSG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KreuterS13,
  author       = {Benjamin Kreuter and
                  Abhi Shelat},
  editor       = {Martin Franz and
                  Andreas Holzer and
                  Rupak Majumdar and
                  Bryan Parno and
                  Helmut Veith},
  title        = {Lessons learned with {PCF:} scaling secure computation},
  booktitle    = {PETShop'13, Proceedings of the 2013 {ACM} Workshop on Language Support
                  for Privacy-Enhancing Technologies, Co-located with {CCS} 2013, November
                  4, 2013, Berlin, Germany},
  pages        = {7--10},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517872.2517877},
  doi          = {10.1145/2517872.2517877},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KreuterS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ShelatS13,
  author       = {Abhi Shelat and
                  Chih{-}Hao Shen},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Fast two-party secure computation with minimal assumptions},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {523--534},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516698},
  doi          = {10.1145/2508859.2516698},
  timestamp    = {Tue, 10 Nov 2020 19:58:06 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ShelatS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dcc/BrunelleRS13,
  author       = {Nathan Brunelle and
                  Gabriel Robins and
                  Abhi Shelat},
  editor       = {Ali Bilgin and
                  Michael W. Marcellin and
                  Joan Serra{-}Sagrist{\`{a}} and
                  James A. Storer},
  title        = {Algorithms for Compressed Inputs},
  booktitle    = {2013 Data Compression Conference, {DCC} 2013, Snowbird, UT, USA, March
                  20-22, 2013},
  pages        = {478},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/DCC.2013.60},
  doi          = {10.1109/DCC.2013.60},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/dcc/BrunelleRS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/MyersSS13,
  author       = {Steven A. Myers and
                  Mona Sergi and
                  Abhi Shelat},
  editor       = {Amit Sahai},
  title        = {Black-Box Proof of Knowledge of Plaintext and Multiparty Computation
                  with Low Communication Overhead},
  booktitle    = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC}
                  2013, Tokyo, Japan, March 3-6, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7785},
  pages        = {397--417},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36594-2\_23},
  doi          = {10.1007/978-3-642-36594-2\_23},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/MyersSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KreuterSMB13,
  author       = {Ben Kreuter and
                  Abhi Shelat and
                  Benjamin Mood and
                  Kevin R. B. Butler},
  editor       = {Samuel T. King},
  title        = {{PCF:} {A} Portable Circuit Format for Scalable Two-Party Secure Computation},
  booktitle    = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC,
                  USA, August 14-16, 2013},
  pages        = {321--336},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/paper/kreuter},
  timestamp    = {Wed, 17 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/KreuterSMB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShelatS13,
  author       = {Abhi Shelat and
                  Chih{-}Hao Shen},
  title        = {Fast Two-Party Secure Computation with Minimal Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {196},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/196},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShelatS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/MyersSS12,
  author       = {Steven A. Myers and
                  Mona Sergi and
                  Abhi Shelat},
  editor       = {Ivan Visconti and
                  Roberto De Prisco},
  title        = {Blackbox Construction of a More Than Non-Malleable {CCA1} Encryption
                  Scheme from Plaintext Awareness},
  booktitle    = {Security and Cryptography for Networks - 8th International Conference,
                  {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7485},
  pages        = {149--165},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32928-9\_9},
  doi          = {10.1007/978-3-642-32928-9\_9},
  timestamp    = {Thu, 23 Jun 2022 19:58:57 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/MyersSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AhnBCHSW12,
  author       = {Jae Hyun Ahn and
                  Dan Boneh and
                  Jan Camenisch and
                  Susan Hohenberger and
                  Abhi Shelat and
                  Brent Waters},
  editor       = {Ronald Cramer},
  title        = {Computing on Authenticated Data},
  booktitle    = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC}
                  2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7194},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28914-9\_1},
  doi          = {10.1007/978-3-642-28914-9\_1},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/AhnBCHSW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KreuterSS12,
  author       = {Benjamin Kreuter and
                  Abhi Shelat and
                  Chih{-}Hao Shen},
  editor       = {Tadayoshi Kohno},
  title        = {Billion-Gate Secure Computation with Malicious Adversaries},
  booktitle    = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA,
                  USA, August 8-10, 2012},
  pages        = {285--300},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/kreuter},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/KreuterSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KreuterSS12,
  author       = {Benjamin Kreuter and
                  Abhi Shelat and
                  Chih{-}Hao Shen},
  title        = {Towards Billion-Gate Secure Computation with Malicious Adversaries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {179},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/179},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KreuterSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/HohenbergerRSV11,
  author       = {Susan Hohenberger and
                  Guy N. Rothblum and
                  Abhi Shelat and
                  Vinod Vaikuntanathan},
  title        = {Securely Obfuscating Re-Encryption},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {4},
  pages        = {694--719},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-010-9077-7},
  doi          = {10.1007/S00145-010-9077-7},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/HohenbergerRSV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ShelatS11,
  author       = {Abhi Shelat and
                  Chih{-}Hao Shen},
  editor       = {Kenneth G. Paterson},
  title        = {Two-Output Secure Computation with Malicious Adversaries},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {386--405},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_22},
  doi          = {10.1007/978-3-642-20465-4\_22},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/ShelatS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/HuangSEKS11,
  author       = {Yan Huang and
                  Chih{-}Hao Shen and
                  David Evans and
                  Jonathan Katz and
                  Abhi Shelat},
  editor       = {Sushil Jajodia and
                  Chandan Mazumdar},
  title        = {Efficient Secure Computation with Garbled Circuits},
  booktitle    = {Information Systems Security - 7th International Conference, {ICISS}
                  2011, Kolkata, India, December 15-19, 2011, Procedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7093},
  pages        = {28--48},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25560-1\_2},
  doi          = {10.1007/978-3-642-25560-1\_2},
  timestamp    = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/HuangSEKS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/PassS11,
  author       = {Rafael Pass and
                  Abhi Shelat},
  editor       = {Bernard Chazelle},
  title        = {Renegotiation-Safe Protocols},
  booktitle    = {Innovations in Computer Science - {ICS} 2011, Tsinghua University,
                  Beijing, China, January 7-9, 2011. Proceedings},
  pages        = {61--78},
  publisher    = {Tsinghua University Press},
  year         = {2011},
  url          = {http://conference.iiis.tsinghua.edu.cn/ICS2011/content/papers/26.html},
  timestamp    = {Mon, 23 Mar 2020 08:26:00 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/PassS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AhnBCHSW11,
  author       = {Jae Hyun Ahn and
                  Dan Boneh and
                  Jan Camenisch and
                  Susan Hohenberger and
                  Abhi Shelat and
                  Brent Waters},
  title        = {Computing on Authenticated Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {96},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/096},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AhnBCHSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MyersSS11,
  author       = {Steven A. Myers and
                  Mona Sergi and
                  Abhi Shelat},
  title        = {Threshold Fully Homomorphic Encryption and Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {454},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/454},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MyersSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShelatS11,
  author       = {Abhi Shelat and
                  Chih{-}Hao Shen},
  title        = {Two-Output Secure Computation with Malicious Adversaries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {533},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/533},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShelatS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChaabouniLS10,
  author       = {Rafik Chaabouni and
                  Helger Lipmaa and
                  Abhi Shelat},
  editor       = {Ron Steinfeld and
                  Philip Hawkes},
  title        = {Additive Combinatorics and Discrete Logarithm Based Range Protocols},
  booktitle    = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
                  2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6168},
  pages        = {336--351},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14081-5\_21},
  doi          = {10.1007/978-3-642-14081-5\_21},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ChaabouniLS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/RosenS10,
  author       = {Alon Rosen and
                  Abhi Shelat},
  editor       = {Masayuki Abe},
  title        = {Optimistic Concurrent Zero Knowledge},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 5-9, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6477},
  pages        = {359--376},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17373-8\_21},
  doi          = {10.1007/978-3-642-17373-8\_21},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/RosenS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bqgt/Shelat10,
  author       = {Abhi Shelat},
  editor       = {Moshe Dror and
                  Greys Sosic},
  title        = {Collusion-free protocols},
  booktitle    = {Proceedings of the Behavioral and Quantitative Game Theory - Conference
                  on Future Directions, {BQGT} '10, Newport Beach, California, USA,
                  May 14-16, 2010},
  pages        = {91:1},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1807406.1807497},
  doi          = {10.1145/1807406.1807497},
  timestamp    = {Tue, 06 Nov 2018 16:57:10 +0100},
  biburl       = {https://dblp.org/rec/conf/bqgt/Shelat10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AlwenKLPSV09,
  author       = {Jo{\"{e}}l Alwen and
                  Jonathan Katz and
                  Yehuda Lindell and
                  Giuseppe Persiano and
                  Abhi Shelat and
                  Ivan Visconti},
  editor       = {Shai Halevi},
  title        = {Collusion-Free Multiparty Computation in the Mediated Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {524--540},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_31},
  doi          = {10.1007/978-3-642-03356-8\_31},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AlwenKLPSV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/MyersS09,
  author       = {Steven A. Myers and
                  Abhi Shelat},
  title        = {Bit Encryption Is Complete},
  booktitle    = {50th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
                  2009, October 25-27, 2009, Atlanta, Georgia, {USA}},
  pages        = {607--616},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/FOCS.2009.65},
  doi          = {10.1109/FOCS.2009.65},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/MyersS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/MicaliS09,
  author       = {Silvio Micali and
                  Abhi Shelat},
  editor       = {Omer Reingold},
  title        = {Purely Rational Secret Sharing (Extended Abstract)},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {54--71},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_4},
  doi          = {10.1007/978-3-642-00457-5\_4},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/MicaliS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaabouniLS09,
  author       = {Rafik Chaabouni and
                  Helger Lipmaa and
                  Abhi Shelat},
  title        = {Additive Combinatorics and Discrete Logarithm Based Range Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {469},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/469},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaabouniLS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CamenischCS08,
  author       = {Jan Camenisch and
                  Rafik Chaabouni and
                  Abhi Shelat},
  editor       = {Josef Pieprzyk},
  title        = {Efficient Protocols for Set Membership and Range Proofs},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Melbourne, Australia, December 7-11, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5350},
  pages        = {234--252},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89255-7\_15},
  doi          = {10.1007/978-3-540-89255-7\_15},
  timestamp    = {Sun, 02 Jun 2019 21:16:53 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/CamenischCS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AlwenSV08,
  author       = {Jo{\"{e}}l Alwen and
                  Abhi Shelat and
                  Ivan Visconti},
  editor       = {David A. Wagner},
  title        = {Collusion-Free Protocols in the Mediated Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5157},
  pages        = {497--514},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85174-5\_28},
  doi          = {10.1007/978-3-540-85174-5\_28},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AlwenSV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischNS08,
  author       = {Jan Camenisch and
                  Gregory Neven and
                  Abhi Shelat},
  title        = {Simulatable Adaptive Oblivious Transfer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {14},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/014},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CamenischNS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CramerHHIKPSV07,
  author       = {Ronald Cramer and
                  Goichiro Hanaoka and
                  Dennis Hofheinz and
                  Hideki Imai and
                  Eike Kiltz and
                  Rafael Pass and
                  Abhi Shelat and
                  Vinod Vaikuntanathan},
  editor       = {Kaoru Kurosawa},
  title        = {Bounded CCA2-Secure Encryption},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kuching, Malaysia, December 2-6, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4833},
  pages        = {502--518},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76900-2\_31},
  doi          = {10.1007/978-3-540-76900-2\_31},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/CramerHHIKPSV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/PassSV07,
  author       = {Rafael Pass and
                  Abhi Shelat and
                  Vinod Vaikuntanathan},
  editor       = {Kaoru Kurosawa},
  title        = {Relations Among Notions of Non-malleability for Encryption},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kuching, Malaysia, December 2-6, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4833},
  pages        = {519--535},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76900-2\_32},
  doi          = {10.1007/978-3-540-76900-2\_32},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/PassSV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CamenischNS07,
  author       = {Jan Camenisch and
                  Gregory Neven and
                  Abhi Shelat},
  editor       = {Moni Naor},
  title        = {Simulatable Adaptive Oblivious Transfer},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Barcelona, Spain, May 20-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4515},
  pages        = {573--590},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72540-4\_33},
  doi          = {10.1007/978-3-540-72540-4\_33},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CamenischNS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/CanettiPS07,
  author       = {Ran Canetti and
                  Rafael Pass and
                  Abhi Shelat},
  title        = {Cryptography from Sunspots: How to Use an Imperfect Reference String},
  booktitle    = {48th Annual {IEEE} Symposium on Foundations of Computer Science {(FOCS}
                  2007), October 20-23, 2007, Providence, RI, USA, Proceedings},
  pages        = {249--259},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/FOCS.2007.70},
  doi          = {10.1109/FOCS.2007.70},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/CanettiPS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/CachinSS07,
  author       = {Christian Cachin and
                  Abhi Shelat and
                  Alexander Shraer},
  editor       = {Indranil Gupta and
                  Roger Wattenhofer},
  title        = {Efficient fork-linearizable access to untrusted shared memory},
  booktitle    = {Proceedings of the Twenty-Sixth Annual {ACM} Symposium on Principles
                  of Distributed Computing, {PODC} 2007, Portland, Oregon, USA, August
                  12-15, 2007},
  pages        = {129--138},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1281100.1281121},
  doi          = {10.1145/1281100.1281121},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/CachinSS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HohenbergerRSV07,
  author       = {Susan Hohenberger and
                  Guy N. Rothblum and
                  Abhi Shelat and
                  Vinod Vaikuntanathan},
  editor       = {Salil P. Vadhan},
  title        = {Securely Obfuscating Re-encryption},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {233--252},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_13},
  doi          = {10.1007/978-3-540-70936-7\_13},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/HohenbergerRSV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/PassSV06,
  author       = {Rafael Pass and
                  Abhi Shelat and
                  Vinod Vaikuntanathan},
  editor       = {Cynthia Dwork},
  title        = {Construction of a Non-malleable Encryption Scheme from Any Semantically
                  Secure One},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4117},
  pages        = {271--289},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11818175\_16},
  doi          = {10.1007/11818175\_16},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/PassSV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dim/CamenischSSZ06,
  author       = {Jan Camenisch and
                  Abhi Shelat and
                  Dieter Sommer and
                  Roger Zimmermann},
  editor       = {Ari Juels and
                  Marianne Winslett and
                  Atsuhiro Goto},
  title        = {Securing user inputs for the web},
  booktitle    = {Proceedings of the 2006 Workshop on Digital Identity Management, Alexandria,
                  VA, USA, November 3, 2006},
  pages        = {33--44},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179529.1179536},
  doi          = {10.1145/1179529.1179536},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dim/CamenischSSZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ndltd/Shelat05,
  author       = {Abhi Shelat},
  title        = {{\'{E}}tudes in non-interactive zero-knowledge},
  school       = {Massachusetts Institute of Technology, Cambridge, MA, {USA}},
  year         = {2005},
  url          = {https://hdl.handle.net/1721.1/35531},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ndltd/Shelat05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/CharikarLLPPSS05,
  author       = {Moses Charikar and
                  Eric Lehman and
                  Ding Liu and
                  Rina Panigrahy and
                  Manoj Prabhakaran and
                  Amit Sahai and
                  Abhi Shelat},
  title        = {The smallest grammar problem},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {51},
  number       = {7},
  pages        = {2554--2576},
  year         = {2005},
  url          = {https://doi.org/10.1109/TIT.2005.850116},
  doi          = {10.1109/TIT.2005.850116},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/CharikarLLPPSS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Passs05,
  author       = {Rafael Pass and
                  Abhi Shelat},
  editor       = {Victor Shoup},
  title        = {Unconditional Characterizations of Non-interactive Zero-Knowledge},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 14-18,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3621},
  pages        = {118--134},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11535218\_8},
  doi          = {10.1007/11535218\_8},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Passs05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dim/CamenischSSFHKLLT05,
  author       = {Jan Camenisch and
                  Abhi Shelat and
                  Dieter Sommer and
                  Simone Fischer{-}H{\"{u}}bner and
                  Marit Hansen and
                  Henry Krasemann and
                  G{\'{e}}rard Lacoste and
                  Ronald Leenes and
                  Jimmy C. Tseng},
  editor       = {Vijay Atluri and
                  Pierangela Samarati and
                  Atsuhiro Goto},
  title        = {Privacy and identity management for everyone},
  booktitle    = {Proceedings of the 2005 Workshop on Digital Identity Management, Fairfax,
                  VA, USA, November 11, 2005},
  pages        = {20--27},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102486.1102491},
  doi          = {10.1145/1102486.1102491},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dim/CamenischSSFHKLLT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/LepinksiMS05,
  author       = {Matt Lepinski and
                  Silvio Micali and
                  Abhi Shelat},
  editor       = {Harold N. Gabow and
                  Ronald Fagin},
  title        = {Collusion-free protocols},
  booktitle    = {Proceedings of the 37th Annual {ACM} Symposium on Theory of Computing,
                  Baltimore, MD, USA, May 22-24, 2005},
  pages        = {543--552},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1060590.1060671},
  doi          = {10.1145/1060590.1060671},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/LepinksiMS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/LepinskiMS05,
  author       = {Matt Lepinski and
                  Silvio Micali and
                  Abhi Shelat},
  editor       = {Joe Kilian},
  title        = {Fair-Zero Knowledge},
  booktitle    = {Theory of Cryptography, Second Theory of Cryptography Conference,
                  {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3378},
  pages        = {245--263},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30576-7\_14},
  doi          = {10.1007/978-3-540-30576-7\_14},
  timestamp    = {Sun, 02 Jun 2019 21:21:22 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/LepinskiMS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/BlumbergS04,
  author       = {Andrew J. Blumberg and
                  Abhi Shelat},
  editor       = {Deborah L. McGuinness and
                  George Ferguson},
  title        = {Searching for Stable Mechanisms: Automated Design for Imperfect Players},
  booktitle    = {Proceedings of the Nineteenth National Conference on Artificial Intelligence,
                  Sixteenth Conference on Innovative Applications of Artificial Intelligence,
                  July 25-29, 2004, San Jose, California, {USA}},
  pages        = {8--13},
  publisher    = {{AAAI} Press / The {MIT} Press},
  year         = {2004},
  url          = {http://www.aaai.org/Library/AAAI/2004/aaai04-002.php},
  timestamp    = {Tue, 05 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/BlumbergS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/LepinskiMP04,
  author       = {Matt Lepinski and
                  Silvio Micali and
                  Chris Peikert and
                  Abhi Shelat},
  editor       = {Soma Chaudhuri and
                  Shay Kutten},
  title        = {Completely fair {SFE} and coalition-safe cheap talk},
  booktitle    = {Proceedings of the Twenty-Third Annual {ACM} Symposium on Principles
                  of Distributed Computing, {PODC} 2004, St. John's, Newfoundland, Canada,
                  July 25-28, 2004},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1011767.1011769},
  doi          = {10.1145/1011767.1011769},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/LepinskiMP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dsonline/GarfinkelS03,
  author       = {Simson L. Garfinkel and
                  Abhi Shelat},
  title        = {{IEEE} Security {\&} Privacy: Data Forensics - Rememberance of
                  Data Passed: {A} Study of Disk Sanitization Practices},
  journal      = {{IEEE} Distributed Syst. Online},
  volume       = {4},
  number       = {2},
  year         = {2003},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dsonline/GarfinkelS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/GarfinkelS03,
  author       = {Simson L. Garfinkel and
                  Abhi Shelat},
  title        = {Remembrance of Data Passed: {A} Study of Disk Sanitization Practices},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {1},
  pages        = {17--27},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1176992},
  doi          = {10.1109/MSECP.2003.1176992},
  timestamp    = {Fri, 25 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/GarfinkelS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soda/PeikertSS03,
  author       = {Chris Peikert and
                  Abhi Shelat and
                  Adam D. Smith},
  title        = {Lower bounds for collusion-secure fingerprinting},
  booktitle    = {Proceedings of the Fourteenth Annual {ACM-SIAM} Symposium on Discrete
                  Algorithms, January 12-14, 2003, Baltimore, Maryland, {USA}},
  pages        = {472--479},
  publisher    = {{ACM/SIAM}},
  year         = {2003},
  url          = {http://dl.acm.org/citation.cfm?id=644108.644187},
  timestamp    = {Fri, 08 Apr 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/soda/PeikertSS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soda/LehmanS02,
  author       = {Eric Lehman and
                  Abhi Shelat},
  editor       = {David Eppstein},
  title        = {Approximation algorithms for grammar-based compression},
  booktitle    = {Proceedings of the Thirteenth Annual {ACM-SIAM} Symposium on Discrete
                  Algorithms, January 6-8, 2002, San Francisco, CA, {USA}},
  pages        = {205--212},
  publisher    = {{ACM/SIAM}},
  year         = {2002},
  url          = {http://dl.acm.org/citation.cfm?id=545381.545407},
  timestamp    = {Fri, 07 Dec 2012 17:02:08 +0100},
  biburl       = {https://dblp.org/rec/conf/soda/LehmanS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/CharikarLLPPRSS02,
  author       = {Moses Charikar and
                  Eric Lehman and
                  Ding Liu and
                  Rina Panigrahy and
                  Manoj Prabhakaran and
                  April Rasala and
                  Amit Sahai and
                  Abhi Shelat},
  editor       = {John H. Reif},
  title        = {Approximating the smallest grammar: Kolmogorov complexity in natural
                  models},
  booktitle    = {Proceedings on 34th Annual {ACM} Symposium on Theory of Computing,
                  May 19-21, 2002, Montr{\'{e}}al, Qu{\'{e}}bec, Canada},
  pages        = {792--801},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/509907.510021},
  doi          = {10.1145/509907.510021},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stoc/CharikarLLPPRSS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics