Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Abhi Shelat
@article{DBLP:journals/iacr/RosefieldST24, author = {Schuyler Rosefield and Abhi Shelat and LaKyah Tyner}, title = {Threshold Garbled Circuits with Low Overhead}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {316}, year = {2024}, url = {https://eprint.iacr.org/2024/316}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/RosefieldST24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/CohenSW23, author = {Ran Cohen and Abhi Shelat and Daniel Wichs}, title = {Adaptively Secure {MPC} with Sublinear Communication Complexity}, journal = {J. Cryptol.}, volume = {36}, number = {2}, pages = {11}, year = {2023}, url = {https://doi.org/10.1007/s00145-023-09446-6}, doi = {10.1007/S00145-023-09446-6}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/CohenSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/DoernerKLST23, author = {Jack Doerner and Yashvanth Kondi and Eysa Lee and Abhi Shelat and LaKyah Tyner}, title = {Threshold {BBS+} Signatures for Distributed Anonymous Credential Issuance}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {773--789}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179470}, doi = {10.1109/SP46215.2023.10179470}, timestamp = {Thu, 27 Jul 2023 08:17:10 +0200}, biburl = {https://dblp.org/rec/conf/sp/DoernerKLST23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DoernerKLST23, author = {Jack Doerner and Yashvanth Kondi and Eysa Lee and Abhi Shelat and LaKyah Tyner}, title = {Threshold {BBS+} Signatures for Distributed Anonymous Credential Issuance}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {602}, year = {2023}, url = {https://eprint.iacr.org/2023/602}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DoernerKLST23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DoernerKLS23, author = {Jack Doerner and Yashvanth Kondi and Eysa Lee and Abhi Shelat}, title = {Threshold {ECDSA} in Three Rounds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {765}, year = {2023}, url = {https://eprint.iacr.org/2023/765}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DoernerKLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CohenDKS23, author = {Ran Cohen and Jack Doerner and Yashvanth Kondi and Abhi Shelat}, title = {Secure Multiparty Computation with Identifiable Abort from Vindicating Release}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1136}, year = {2023}, url = {https://eprint.iacr.org/2023/1136}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CohenDKS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/ChenDKLRSC22, author = {Megan Chen and Jack Doerner and Yashvanth Kondi and Eysa Lee and Schuyler Rosefield and Abhi Shelat and Ran Cohen}, title = {Multiparty Generation of an {RSA} Modulus}, journal = {J. Cryptol.}, volume = {35}, number = {2}, pages = {12}, year = {2022}, url = {https://doi.org/10.1007/s00145-021-09395-y}, doi = {10.1007/S00145-021-09395-Y}, timestamp = {Tue, 05 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/ChenDKLRSC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KondiS22, author = {Yashvanth Kondi and Abhi Shelat}, editor = {Shweta Agrawal and Dongdai Lin}, title = {Improved Straight-Line Extraction in the Random Oracle Model with Applications to Signature Aggregation}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13792}, pages = {279--309}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22966-4\_10}, doi = {10.1007/978-3-031-22966-4\_10}, timestamp = {Fri, 03 Feb 2023 17:07:14 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/KondiS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CohenDKS22, author = {Ran Cohen and Jack Doerner and Yashvanth Kondi and Abhi Shelat}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Guaranteed Output in {\textdollar}O({\textbackslash}sqrt\{n\}){\textdollar} Rounds for Round-Robin Sampling Protocols}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13275}, pages = {241--271}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06944-4\_9}, doi = {10.1007/978-3-031-06944-4\_9}, timestamp = {Tue, 31 May 2022 17:23:10 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CohenDKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CohenDKS22, author = {Ran Cohen and Jack Doerner and Yashvanth Kondi and Abhi Shelat}, title = {Guaranteed Output in {\textdollar}O({\textbackslash}sqrt\{n\}){\textdollar} Rounds for Round-Robin Sampling Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {257}, year = {2022}, url = {https://eprint.iacr.org/2022/257}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CohenDKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KondiS22, author = {Yashvanth Kondi and Abhi Shelat}, title = {Improved Straight-Line Extraction in the Random Oracle Model With Applications to Signature Aggregation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {393}, year = {2022}, url = {https://eprint.iacr.org/2022/393}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KondiS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KifferRS22, author = {Lucianna Kiffer and Rajmohan Rajaraman and Abhi Shelat}, title = {A Better Method to Analyze Blockchain Consistency}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {601}, year = {2022}, url = {https://eprint.iacr.org/2022/601}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KifferRS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ChenHIKMRSVW21, author = {Megan Chen and Carmit Hazay and Yuval Ishai and Yuriy Kashnikov and Daniele Micciancio and Tarik Riviere and Abhi Shelat and Muthuramakrishnan Venkitasubramaniam and Ruihan Wang}, title = {Diogenes: Lightweight Scalable {RSA} Modulus Generation with a Dishonest Majority}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {590--607}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00025}, doi = {10.1109/SP40001.2021.00025}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ChenHIKMRSVW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChenCDKLRS20, author = {Megan Chen and Ran Cohen and Jack Doerner and Yashvanth Kondi and Eysa Lee and Schuyler Rosefield and Abhi Shelat}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Multiparty Generation of an {RSA} Modulus}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12172}, pages = {64--93}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56877-1\_3}, doi = {10.1007/978-3-030-56877-1\_3}, timestamp = {Mon, 28 Aug 2023 21:17:50 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChenCDKLRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HazaySV20, author = {Carmit Hazay and Abhi Shelat and Muthuramakrishnan Venkitasubramaniam}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Going Beyond Dual Execution: {MPC} for Functions with Efficient Verification}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12111}, pages = {328--356}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45388-6\_12}, doi = {10.1007/978-3-030-45388-6\_12}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HazaySV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HazaySV20, author = {Carmit Hazay and Abhi Shelat and Muthuramakrishnan Venkitasubramaniam}, title = {Going Beyond Dual Execution: {MPC} for Functions with Efficient Verification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {139}, year = {2020}, url = {https://eprint.iacr.org/2020/139}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HazaySV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenCDKLRS20, author = {Megan Chen and Ran Cohen and Jack Doerner and Yashvanth Kondi and Eysa Lee and Schuyler Rosefield and Abhi Shelat}, title = {Multiparty Generation of an {RSA} Modulus}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {370}, year = {2020}, url = {https://eprint.iacr.org/2020/370}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenCDKLRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenHIKMRSVW20, author = {Megan Chen and Carmit Hazay and Yuval Ishai and Yuriy Kashnikov and Daniele Micciancio and Tarik Riviere and Abhi Shelat and Muthuramakrishnan Venkitasubramaniam and Ruihan Wang}, title = {Diogenes: Lightweight Scalable {RSA} Modulus Generation with a Dishonest Majority}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {374}, year = {2020}, url = {https://eprint.iacr.org/2020/374}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenHIKMRSVW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChampionSU19, author = {Jeffrey Champion and Abhi Shelat and Jonathan R. Ullman}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Securely Sampling Biased Coins with Applications to Differential Privacy}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {603--614}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3354256}, doi = {10.1145/3319535.3354256}, timestamp = {Tue, 10 Nov 2020 20:00:36 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChampionSU19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CohenSW19, author = {Ran Cohen and Abhi Shelat and Daniel Wichs}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Adaptively Secure {MPC} with Sublinear Communication Complexity}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11693}, pages = {30--60}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26951-7\_2}, doi = {10.1007/978-3-030-26951-7\_2}, timestamp = {Fri, 09 Aug 2019 14:22:41 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CohenSW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/MarcedonePS19, author = {Antonio Marcedone and Rafael Pass and Abhi Shelat}, editor = {Ian Goldberg and Tyler Moore}, title = {Minimizing Trust in Hardware Wallets with Two Factor Signatures}, booktitle = {Financial Cryptography and Data Security - 23rd International Conference, {FC} 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11598}, pages = {407--425}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32101-7\_25}, doi = {10.1007/978-3-030-32101-7\_25}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/MarcedonePS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/WangAPRS19, author = {Liang Wang and Gilad Asharov and Rafael Pass and Thomas Ristenpart and Abhi Shelat}, title = {Blind Certificate Authorities}, booktitle = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco, CA, USA, May 19-23, 2019}, pages = {1015--1032}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SP.2019.00007}, doi = {10.1109/SP.2019.00007}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/WangAPRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/DoernerKLS19, author = {Jack Doerner and Yashvanth Kondi and Eysa Lee and Abhi Shelat}, title = {Threshold {ECDSA} from {ECDSA} Assumptions: The Multiparty Case}, booktitle = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco, CA, USA, May 19-23, 2019}, pages = {1051--1066}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SP.2019.00024}, doi = {10.1109/SP.2019.00024}, timestamp = {Tue, 24 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/DoernerKLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MarcedonePS19, author = {Antonio Marcedone and Rafael Pass and Abhi Shelat}, title = {Minimizing Trust in Hardware Wallets with Two Factor Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {6}, year = {2019}, url = {https://eprint.iacr.org/2019/006}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MarcedonePS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DoernerKLS19, author = {Jack Doerner and Yashvanth Kondi and Eysa Lee and Abhi Shelat}, title = {Threshold {ECDSA} from {ECDSA} Assumptions: The Multiparty Case}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {523}, year = {2019}, url = {https://eprint.iacr.org/2019/523}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DoernerKLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChampionSU19, author = {Jeffrey Champion and Abhi Shelat and Jonathan R. Ullman}, title = {Securely Sampling Biased Coins with Applications to Differential Privacy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {823}, year = {2019}, url = {https://eprint.iacr.org/2019/823}, timestamp = {Tue, 27 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChampionSU19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KifferRS18, author = {Lucianna Kiffer and Rajmohan Rajaraman and Abhi Shelat}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {A Better Method to Analyze Blockchain Consistency}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {729--744}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243814}, doi = {10.1145/3243734.3243814}, timestamp = {Tue, 10 Nov 2020 20:00:51 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KifferRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HamlinSWW18, author = {Ariel Hamlin and Abhi Shelat and Mor Weiss and Daniel Wichs}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Multi-Key Searchable Encryption, Revisited}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10769}, pages = {95--124}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76578-5\_4}, doi = {10.1007/978-3-319-76578-5\_4}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HamlinSWW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/WahbyTSTW18, author = {Riad S. Wahby and Ioanna Tzialla and Abhi Shelat and Justin Thaler and Michael Walfish}, title = {Doubly-Efficient zkSNARKs Without Trusted Setup}, booktitle = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings, 21-23 May 2018, San Francisco, California, {USA}}, pages = {926--943}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SP.2018.00060}, doi = {10.1109/SP.2018.00060}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/WahbyTSTW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/DoernerKLS18, author = {Jack Doerner and Yashvanth Kondi and Eysa Lee and Abhi Shelat}, title = {Secure Two-party Threshold {ECDSA} from {ECDSA} Assumptions}, booktitle = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings, 21-23 May 2018, San Francisco, California, {USA}}, pages = {980--997}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SP.2018.00036}, doi = {10.1109/SP.2018.00036}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/DoernerKLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HamlinSWW18, author = {Ariel Hamlin and Abhi Shelat and Mor Weiss and Daniel Wichs}, title = {Multi-Key Searchable Encryption, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {18}, year = {2018}, url = {http://eprint.iacr.org/2018/018}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HamlinSWW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DoernerKLS18, author = {Jack Doerner and Yashvanth Kondi and Eysa Lee and Abhi Shelat}, title = {Secure Two-party Threshold {ECDSA} from {ECDSA} Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {499}, year = {2018}, url = {https://eprint.iacr.org/2018/499}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DoernerKLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangAPRS18, author = {Liang Wang and Gilad Asharov and Rafael Pass and Thomas Ristenpart and Abhi Shelat}, title = {Blind Certificate Authorities}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1022}, year = {2018}, url = {https://eprint.iacr.org/2018/1022}, timestamp = {Tue, 20 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangAPRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CohenSW18, author = {Ran Cohen and Abhi Shelat and Daniel Wichs}, title = {Adaptively Secure {MPC} with Sublinear Communication Complexity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1161}, year = {2018}, url = {https://eprint.iacr.org/2018/1161}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CohenSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DoernerS17, author = {Jack Doerner and Abhi Shelat}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Scaling {ORAM} for Secure Computation}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {523--535}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133967}, doi = {10.1145/3133956.3133967}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DoernerS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WahbyJBSTWW17, author = {Riad S. Wahby and Ye Ji and Andrew J. Blumberg and Abhi Shelat and Justin Thaler and Michael Walfish and Thomas Wies}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Full Accounting for Verifiable Outsourcing}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2071--2086}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133984}, doi = {10.1145/3133956.3133984}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WahbyJBSTWW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/PassSS17, author = {Rafael Pass and Lior Seeman and Abhi Shelat}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Analysis of the Blockchain Protocol in Asynchronous Networks}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10211}, pages = {643--673}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56614-6\_22}, doi = {10.1007/978-3-319-56614-6\_22}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/PassSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wine/FischPS17, author = {Ben Fisch and Rafael Pass and Abhi Shelat}, editor = {Nikhil R. Devanur and Pinyan Lu}, title = {Socially Optimal Mining Pools}, booktitle = {Web and Internet Economics - 13th International Conference, {WINE} 2017, Bangalore, India, December 17-20, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10660}, pages = {205--218}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71924-5\_15}, doi = {10.1007/978-3-319-71924-5\_15}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wine/FischPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/FischPS17, author = {Ben A. Fisch and Rafael Pass and Abhi Shelat}, title = {Socially Optimal Mining Pools}, journal = {CoRR}, volume = {abs/1703.03846}, year = {2017}, url = {http://arxiv.org/abs/1703.03846}, eprinttype = {arXiv}, eprint = {1703.03846}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/FischPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WahbyJBSTWW17, author = {Riad S. Wahby and Ye Ji and Andrew J. Blumberg and Abhi Shelat and Justin Thaler and Michael Walfish and Thomas Wies}, title = {Full accounting for verifiable outsourcing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {242}, year = {2017}, url = {http://eprint.iacr.org/2017/242}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WahbyJBSTWW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DoernerS17, author = {Jack Doerner and Abhi Shelat}, title = {Scaling {ORAM} for Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {827}, year = {2017}, url = {http://eprint.iacr.org/2017/827}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DoernerS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WahbyTSTW17, author = {Riad S. Wahby and Ioanna Tzialla and Abhi Shelat and Justin Thaler and Michael Walfish}, title = {Doubly-efficient zkSNARKs without trusted setup}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1132}, year = {2017}, url = {http://eprint.iacr.org/2017/1132}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WahbyTSTW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DoernerES16, author = {Jack Doerner and David Evans and Abhi Shelat}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {Secure Stable Matching at Scale}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {1602--1613}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978373}, doi = {10.1145/2976749.2978373}, timestamp = {Tue, 10 Nov 2020 20:00:49 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DoernerES16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/MarcedonePS16, author = {Antonio Marcedone and Rafael Pass and Abhi Shelat}, editor = {Vassilis Zikas and Roberto De Prisco}, title = {Bounded {KDM} Security from iO and {OWF}}, booktitle = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, pages = {571--586}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9\_30}, doi = {10.1007/978-3-319-44618-9\_30}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/MarcedonePS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/WahbyHGSW16, author = {Riad S. Wahby and Max Howald and Siddharth Garg and Abhi Shelat and Michael Walfish}, title = {Verifiable ASICs}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {759--778}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SP.2016.51}, doi = {10.1109/SP.2016.51}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/WahbyHGSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/PassS16, author = {Rafael Pass and Abhi Shelat}, editor = {Eyal Kushilevitz and Tal Malkin}, title = {Impossibility of {VBB} Obfuscation with Ideal Constant-Degree Graded Encodings}, booktitle = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9562}, pages = {3--17}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49096-9\_1}, doi = {10.1007/978-3-662-49096-9\_1}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/PassS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/MahmoodyMNPS16, author = {Mohammad Mahmoody and Ameer Mohammed and Soheil Nematihaji and Rafael Pass and Abhi Shelat}, editor = {Eyal Kushilevitz and Tal Malkin}, title = {Lower Bounds on Assumptions Behind Indistinguishability Obfuscation}, booktitle = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9562}, pages = {49--66}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49096-9\_3}, doi = {10.1007/978-3-662-49096-9\_3}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/MahmoodyMNPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ZhuHKS16, author = {Ruiyu Zhu and Yan Huang and Jonathan Katz and Abhi Shelat}, editor = {Thorsten Holz and Stefan Savage}, title = {The Cut-and-Choose Game and Its Application to Cryptographic Protocols}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {1085--1100}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/zhu}, timestamp = {Mon, 01 Feb 2021 08:43:18 +0100}, biburl = {https://dblp.org/rec/conf/uss/ZhuHKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MahmoodyMNPS16, author = {Mohammad Mahmoody and Ameer Mohammed and Soheil Nematihaji and Rafael Pass and Abhi Shelat}, title = {A Note on Black-Box Complexity of Indistinguishability Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {316}, year = {2016}, url = {http://eprint.iacr.org/2016/316}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MahmoodyMNPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PassS16, author = {Rafael Pass and Abhi Shelat}, title = {Micropayments for Decentralized Currencies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {332}, year = {2016}, url = {http://eprint.iacr.org/2016/332}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PassS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PassSS16, author = {Rafael Pass and Lior Seeman and Abhi Shelat}, title = {Analysis of the Blockchain Protocol in Asynchronous Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {454}, year = {2016}, url = {http://eprint.iacr.org/2016/454}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PassSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MarcedonePS16, author = {Antonio Marcedone and Rafael Pass and Abhi Shelat}, title = {Bounded {KDM} Security from iO and {OWF}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {688}, year = {2016}, url = {http://eprint.iacr.org/2016/688}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MarcedonePS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DoernerES16, author = {Jack Doerner and David Evans and Abhi Shelat}, title = {Secure Stable Matching at Scale}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {861}, year = {2016}, url = {http://eprint.iacr.org/2016/861}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DoernerES16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangPSR16, author = {Liang Wang and Rafael Pass and Abhi Shelat and Thomas Ristenpart}, title = {Secure Channel Injection and Anonymous Proofs of Account Ownership}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {925}, year = {2016}, url = {http://eprint.iacr.org/2016/925}, timestamp = {Tue, 20 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangPSR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/HohenbergerMPS15, author = {Susan Hohenberger and Steven A. Myers and Rafael Pass and Abhi Shelat}, title = {An Overview of {ANONIZE:} {A} Large-Scale Anonymous Survey System}, journal = {{IEEE} Secur. Priv.}, volume = {13}, number = {2}, pages = {22--29}, year = {2015}, url = {https://doi.org/10.1109/MSP.2015.21}, doi = {10.1109/MSP.2015.21}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/HohenbergerMPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/AhnBCHSW15, author = {Jae Hyun Ahn and Dan Boneh and Jan Camenisch and Susan Hohenberger and Abhi Shelat and Brent Waters}, title = {Computing on Authenticated Data}, journal = {J. Cryptol.}, volume = {28}, number = {2}, pages = {351--395}, year = {2015}, url = {https://doi.org/10.1007/s00145-014-9182-0}, doi = {10.1007/S00145-014-9182-0}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/AhnBCHSW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ShelatV15, author = {Abhi Shelat and Muthuramakrishnan Venkitasubramaniam}, editor = {Tetsu Iwata and Jung Hee Cheon}, title = {Secure Computation from Millionaire}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9452}, pages = {736--757}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48797-6\_30}, doi = {10.1007/978-3-662-48797-6\_30}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/ShelatV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PassS15, author = {Rafael Pass and Abhi Shelat}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Micropayments for Decentralized Currencies}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {207--218}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813713}, doi = {10.1145/2810103.2813713}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/PassS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dcc/BrunelleRS15, author = {Nathan Brunelle and Gabriel Robins and Abhi Shelat}, editor = {Ali Bilgin and Michael W. Marcellin and Joan Serra{-}Sagrist{\`{a}} and James A. Storer}, title = {Compression-Aware Algorithms for Massive Datasets}, booktitle = {2015 Data Compression Conference, {DCC} 2015, Snowbird, UT, USA, April 7-9, 2015}, pages = {441}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/DCC.2015.74}, doi = {10.1109/DCC.2015.74}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/dcc/BrunelleRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PassS15, author = {Rafael Pass and Abhi Shelat}, title = {Impossibility of {VBB} Obfuscation with Ideal Constant-Degree Graded Encodings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {383}, year = {2015}, url = {http://eprint.iacr.org/2015/383}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PassS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HohenbergerMPS15, author = {Susan Hohenberger and Steven A. Myers and Rafael Pass and Abhi Shelat}, title = {{ANONIZE:} {A} Large-Scale Anonymous Survey System}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {681}, year = {2015}, url = {http://eprint.iacr.org/2015/681}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HohenbergerMPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MahmoodyMNPS15, author = {Mohammad Mahmoody and Ameer Mohammed and Soheil Nematihaji and Rafael Pass and Abhi Shelat}, title = {Lower Bounds on Assumptions behind Indistinguishability Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1062}, year = {2015}, url = {http://eprint.iacr.org/2015/1062}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MahmoodyMNPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KosbaZMQCPPSS15, author = {Ahmed E. Kosba and Zhichao Zhao and Andrew Miller and Yi Qian and T.{-}H. Hubert Chan and Charalampos Papamanthou and Rafael Pass and Abhi Shelat and Elaine Shi}, title = {How to Use SNARKs in Universally Composable Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1093}, year = {2015}, url = {http://eprint.iacr.org/2015/1093}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KosbaZMQCPPSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WahbyHGSW15, author = {Riad S. Wahby and Max Howald and Siddharth Garg and Abhi Shelat and Michael Walfish}, title = {Verifiable ASICs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1243}, year = {2015}, url = {http://eprint.iacr.org/2015/1243}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WahbyHGSW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangHCSS14, author = {Xiao Shaun Wang and Yan Huang and T.{-}H. Hubert Chan and Abhi Shelat and Elaine Shi}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{SCORAM:} Oblivious {RAM} for Secure Computation}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {191--202}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660365}, doi = {10.1145/2660267.2660365}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/WangHCSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/HohenbergerMPS14, author = {Susan Hohenberger and Steven A. Myers and Rafael Pass and Abhi Shelat}, title = {{ANONIZE:} {A} Large-Scale Anonymous Survey System}, booktitle = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley, CA, USA, May 18-21, 2014}, pages = {375--389}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SP.2014.31}, doi = {10.1109/SP.2014.31}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/HohenbergerMPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangHCSS14a, author = {Xiao Shaun Wang and Yan Huang and T.{-}H. Hubert Chan and Abhi Shelat and Elaine Shi}, title = {{SCORAM:} Oblivious {RAM} for Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {671}, year = {2014}, url = {http://eprint.iacr.org/2014/671}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangHCSS14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/MyersSS13, author = {Steven A. Myers and Mona Sergi and Abhi Shelat}, title = {Black-box construction of a more than non-malleable {CCA1} encryption scheme from plaintext awareness}, journal = {J. Comput. Secur.}, volume = {21}, number = {5}, pages = {721--748}, year = {2013}, url = {https://doi.org/10.3233/JCS-130485}, doi = {10.3233/JCS-130485}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/MyersSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HustedMSG13, author = {Nathaniel Husted and Steven A. Myers and Abhi Shelat and Paul Grubbs}, editor = {Charles N. Payne Jr.}, title = {{GPU} and {CPU} parallelization of honest-but-curious secure two-party computation}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {169--178}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523681}, doi = {10.1145/2523649.2523681}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/HustedMSG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KreuterS13, author = {Benjamin Kreuter and Abhi Shelat}, editor = {Martin Franz and Andreas Holzer and Rupak Majumdar and Bryan Parno and Helmut Veith}, title = {Lessons learned with {PCF:} scaling secure computation}, booktitle = {PETShop'13, Proceedings of the 2013 {ACM} Workshop on Language Support for Privacy-Enhancing Technologies, Co-located with {CCS} 2013, November 4, 2013, Berlin, Germany}, pages = {7--10}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517872.2517877}, doi = {10.1145/2517872.2517877}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KreuterS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShelatS13, author = {Abhi Shelat and Chih{-}Hao Shen}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Fast two-party secure computation with minimal assumptions}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {523--534}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516698}, doi = {10.1145/2508859.2516698}, timestamp = {Tue, 10 Nov 2020 19:58:06 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ShelatS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dcc/BrunelleRS13, author = {Nathan Brunelle and Gabriel Robins and Abhi Shelat}, editor = {Ali Bilgin and Michael W. Marcellin and Joan Serra{-}Sagrist{\`{a}} and James A. Storer}, title = {Algorithms for Compressed Inputs}, booktitle = {2013 Data Compression Conference, {DCC} 2013, Snowbird, UT, USA, March 20-22, 2013}, pages = {478}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/DCC.2013.60}, doi = {10.1109/DCC.2013.60}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/dcc/BrunelleRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/MyersSS13, author = {Steven A. Myers and Mona Sergi and Abhi Shelat}, editor = {Amit Sahai}, title = {Black-Box Proof of Knowledge of Plaintext and Multiparty Computation with Low Communication Overhead}, booktitle = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC} 2013, Tokyo, Japan, March 3-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7785}, pages = {397--417}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36594-2\_23}, doi = {10.1007/978-3-642-36594-2\_23}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/MyersSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KreuterSMB13, author = {Ben Kreuter and Abhi Shelat and Benjamin Mood and Kevin R. B. Butler}, editor = {Samuel T. King}, title = {{PCF:} {A} Portable Circuit Format for Scalable Two-Party Secure Computation}, booktitle = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC, USA, August 14-16, 2013}, pages = {321--336}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/paper/kreuter}, timestamp = {Wed, 17 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/KreuterSMB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShelatS13, author = {Abhi Shelat and Chih{-}Hao Shen}, title = {Fast Two-Party Secure Computation with Minimal Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {196}, year = {2013}, url = {http://eprint.iacr.org/2013/196}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShelatS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/MyersSS12, author = {Steven A. Myers and Mona Sergi and Abhi Shelat}, editor = {Ivan Visconti and Roberto De Prisco}, title = {Blackbox Construction of a More Than Non-Malleable {CCA1} Encryption Scheme from Plaintext Awareness}, booktitle = {Security and Cryptography for Networks - 8th International Conference, {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7485}, pages = {149--165}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32928-9\_9}, doi = {10.1007/978-3-642-32928-9\_9}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/MyersSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AhnBCHSW12, author = {Jae Hyun Ahn and Dan Boneh and Jan Camenisch and Susan Hohenberger and Abhi Shelat and Brent Waters}, editor = {Ronald Cramer}, title = {Computing on Authenticated Data}, booktitle = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC} 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7194}, pages = {1--20}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28914-9\_1}, doi = {10.1007/978-3-642-28914-9\_1}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/AhnBCHSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KreuterSS12, author = {Benjamin Kreuter and Abhi Shelat and Chih{-}Hao Shen}, editor = {Tadayoshi Kohno}, title = {Billion-Gate Secure Computation with Malicious Adversaries}, booktitle = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA, USA, August 8-10, 2012}, pages = {285--300}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/kreuter}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/KreuterSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KreuterSS12, author = {Benjamin Kreuter and Abhi Shelat and Chih{-}Hao Shen}, title = {Towards Billion-Gate Secure Computation with Malicious Adversaries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {179}, year = {2012}, url = {http://eprint.iacr.org/2012/179}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KreuterSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/HohenbergerRSV11, author = {Susan Hohenberger and Guy N. Rothblum and Abhi Shelat and Vinod Vaikuntanathan}, title = {Securely Obfuscating Re-Encryption}, journal = {J. Cryptol.}, volume = {24}, number = {4}, pages = {694--719}, year = {2011}, url = {https://doi.org/10.1007/s00145-010-9077-7}, doi = {10.1007/S00145-010-9077-7}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/HohenbergerRSV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ShelatS11, author = {Abhi Shelat and Chih{-}Hao Shen}, editor = {Kenneth G. Paterson}, title = {Two-Output Secure Computation with Malicious Adversaries}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {386--405}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_22}, doi = {10.1007/978-3-642-20465-4\_22}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ShelatS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/HuangSEKS11, author = {Yan Huang and Chih{-}Hao Shen and David Evans and Jonathan Katz and Abhi Shelat}, editor = {Sushil Jajodia and Chandan Mazumdar}, title = {Efficient Secure Computation with Garbled Circuits}, booktitle = {Information Systems Security - 7th International Conference, {ICISS} 2011, Kolkata, India, December 15-19, 2011, Procedings}, series = {Lecture Notes in Computer Science}, volume = {7093}, pages = {28--48}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25560-1\_2}, doi = {10.1007/978-3-642-25560-1\_2}, timestamp = {Wed, 25 Sep 2019 18:06:16 +0200}, biburl = {https://dblp.org/rec/conf/iciss/HuangSEKS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/PassS11, author = {Rafael Pass and Abhi Shelat}, editor = {Bernard Chazelle}, title = {Renegotiation-Safe Protocols}, booktitle = {Innovations in Computer Science - {ICS} 2011, Tsinghua University, Beijing, China, January 7-9, 2011. Proceedings}, pages = {61--78}, publisher = {Tsinghua University Press}, year = {2011}, url = {http://conference.iiis.tsinghua.edu.cn/ICS2011/content/papers/26.html}, timestamp = {Mon, 23 Mar 2020 08:26:00 +0100}, biburl = {https://dblp.org/rec/conf/innovations/PassS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AhnBCHSW11, author = {Jae Hyun Ahn and Dan Boneh and Jan Camenisch and Susan Hohenberger and Abhi Shelat and Brent Waters}, title = {Computing on Authenticated Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {96}, year = {2011}, url = {http://eprint.iacr.org/2011/096}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AhnBCHSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MyersSS11, author = {Steven A. Myers and Mona Sergi and Abhi Shelat}, title = {Threshold Fully Homomorphic Encryption and Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {454}, year = {2011}, url = {http://eprint.iacr.org/2011/454}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MyersSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShelatS11, author = {Abhi Shelat and Chih{-}Hao Shen}, title = {Two-Output Secure Computation with Malicious Adversaries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {533}, year = {2011}, url = {http://eprint.iacr.org/2011/533}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShelatS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChaabouniLS10, author = {Rafik Chaabouni and Helger Lipmaa and Abhi Shelat}, editor = {Ron Steinfeld and Philip Hawkes}, title = {Additive Combinatorics and Discrete Logarithm Based Range Protocols}, booktitle = {Information Security and Privacy - 15th Australasian Conference, {ACISP} 2010, Sydney, Australia, July 5-7, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6168}, pages = {336--351}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14081-5\_21}, doi = {10.1007/978-3-642-14081-5\_21}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ChaabouniLS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/RosenS10, author = {Alon Rosen and Abhi Shelat}, editor = {Masayuki Abe}, title = {Optimistic Concurrent Zero Knowledge}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6477}, pages = {359--376}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17373-8\_21}, doi = {10.1007/978-3-642-17373-8\_21}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/RosenS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bqgt/Shelat10, author = {Abhi Shelat}, editor = {Moshe Dror and Greys Sosic}, title = {Collusion-free protocols}, booktitle = {Proceedings of the Behavioral and Quantitative Game Theory - Conference on Future Directions, {BQGT} '10, Newport Beach, California, USA, May 14-16, 2010}, pages = {91:1}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1807406.1807497}, doi = {10.1145/1807406.1807497}, timestamp = {Tue, 06 Nov 2018 16:57:10 +0100}, biburl = {https://dblp.org/rec/conf/bqgt/Shelat10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AlwenKLPSV09, author = {Jo{\"{e}}l Alwen and Jonathan Katz and Yehuda Lindell and Giuseppe Persiano and Abhi Shelat and Ivan Visconti}, editor = {Shai Halevi}, title = {Collusion-Free Multiparty Computation in the Mediated Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5677}, pages = {524--540}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03356-8\_31}, doi = {10.1007/978-3-642-03356-8\_31}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AlwenKLPSV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/MyersS09, author = {Steven A. Myers and Abhi Shelat}, title = {Bit Encryption Is Complete}, booktitle = {50th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS} 2009, October 25-27, 2009, Atlanta, Georgia, {USA}}, pages = {607--616}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/FOCS.2009.65}, doi = {10.1109/FOCS.2009.65}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/MyersS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/MicaliS09, author = {Silvio Micali and Abhi Shelat}, editor = {Omer Reingold}, title = {Purely Rational Secret Sharing (Extended Abstract)}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {54--71}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_4}, doi = {10.1007/978-3-642-00457-5\_4}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/MicaliS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChaabouniLS09, author = {Rafik Chaabouni and Helger Lipmaa and Abhi Shelat}, title = {Additive Combinatorics and Discrete Logarithm Based Range Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {469}, year = {2009}, url = {http://eprint.iacr.org/2009/469}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChaabouniLS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/CamenischCS08, author = {Jan Camenisch and Rafik Chaabouni and Abhi Shelat}, editor = {Josef Pieprzyk}, title = {Efficient Protocols for Set Membership and Range Proofs}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5350}, pages = {234--252}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89255-7\_15}, doi = {10.1007/978-3-540-89255-7\_15}, timestamp = {Sun, 02 Jun 2019 21:16:53 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/CamenischCS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AlwenSV08, author = {Jo{\"{e}}l Alwen and Abhi Shelat and Ivan Visconti}, editor = {David A. Wagner}, title = {Collusion-Free Protocols in the Mediated Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5157}, pages = {497--514}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85174-5\_28}, doi = {10.1007/978-3-540-85174-5\_28}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AlwenSV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CamenischNS08, author = {Jan Camenisch and Gregory Neven and Abhi Shelat}, title = {Simulatable Adaptive Oblivious Transfer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {14}, year = {2008}, url = {http://eprint.iacr.org/2008/014}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CamenischNS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/CramerHHIKPSV07, author = {Ronald Cramer and Goichiro Hanaoka and Dennis Hofheinz and Hideki Imai and Eike Kiltz and Rafael Pass and Abhi Shelat and Vinod Vaikuntanathan}, editor = {Kaoru Kurosawa}, title = {Bounded CCA2-Secure Encryption}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4833}, pages = {502--518}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76900-2\_31}, doi = {10.1007/978-3-540-76900-2\_31}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/CramerHHIKPSV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/PassSV07, author = {Rafael Pass and Abhi Shelat and Vinod Vaikuntanathan}, editor = {Kaoru Kurosawa}, title = {Relations Among Notions of Non-malleability for Encryption}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4833}, pages = {519--535}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76900-2\_32}, doi = {10.1007/978-3-540-76900-2\_32}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/PassSV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CamenischNS07, author = {Jan Camenisch and Gregory Neven and Abhi Shelat}, editor = {Moni Naor}, title = {Simulatable Adaptive Oblivious Transfer}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4515}, pages = {573--590}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72540-4\_33}, doi = {10.1007/978-3-540-72540-4\_33}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CamenischNS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/CanettiPS07, author = {Ran Canetti and Rafael Pass and Abhi Shelat}, title = {Cryptography from Sunspots: How to Use an Imperfect Reference String}, booktitle = {48th Annual {IEEE} Symposium on Foundations of Computer Science {(FOCS} 2007), October 20-23, 2007, Providence, RI, USA, Proceedings}, pages = {249--259}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/FOCS.2007.70}, doi = {10.1109/FOCS.2007.70}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/CanettiPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/CachinSS07, author = {Christian Cachin and Abhi Shelat and Alexander Shraer}, editor = {Indranil Gupta and Roger Wattenhofer}, title = {Efficient fork-linearizable access to untrusted shared memory}, booktitle = {Proceedings of the Twenty-Sixth Annual {ACM} Symposium on Principles of Distributed Computing, {PODC} 2007, Portland, Oregon, USA, August 12-15, 2007}, pages = {129--138}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1281100.1281121}, doi = {10.1145/1281100.1281121}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/CachinSS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HohenbergerRSV07, author = {Susan Hohenberger and Guy N. Rothblum and Abhi Shelat and Vinod Vaikuntanathan}, editor = {Salil P. Vadhan}, title = {Securely Obfuscating Re-encryption}, booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC} 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4392}, pages = {233--252}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-70936-7\_13}, doi = {10.1007/978-3-540-70936-7\_13}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/HohenbergerRSV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/PassSV06, author = {Rafael Pass and Abhi Shelat and Vinod Vaikuntanathan}, editor = {Cynthia Dwork}, title = {Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One}, booktitle = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4117}, pages = {271--289}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11818175\_16}, doi = {10.1007/11818175\_16}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/PassSV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dim/CamenischSSZ06, author = {Jan Camenisch and Abhi Shelat and Dieter Sommer and Roger Zimmermann}, editor = {Ari Juels and Marianne Winslett and Atsuhiro Goto}, title = {Securing user inputs for the web}, booktitle = {Proceedings of the 2006 Workshop on Digital Identity Management, Alexandria, VA, USA, November 3, 2006}, pages = {33--44}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179529.1179536}, doi = {10.1145/1179529.1179536}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dim/CamenischSSZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ndltd/Shelat05, author = {Abhi Shelat}, title = {{\'{E}}tudes in non-interactive zero-knowledge}, school = {Massachusetts Institute of Technology, Cambridge, MA, {USA}}, year = {2005}, url = {https://hdl.handle.net/1721.1/35531}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ndltd/Shelat05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/CharikarLLPPSS05, author = {Moses Charikar and Eric Lehman and Ding Liu and Rina Panigrahy and Manoj Prabhakaran and Amit Sahai and Abhi Shelat}, title = {The smallest grammar problem}, journal = {{IEEE} Trans. Inf. Theory}, volume = {51}, number = {7}, pages = {2554--2576}, year = {2005}, url = {https://doi.org/10.1109/TIT.2005.850116}, doi = {10.1109/TIT.2005.850116}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/CharikarLLPPSS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Passs05, author = {Rafael Pass and Abhi Shelat}, editor = {Victor Shoup}, title = {Unconditional Characterizations of Non-interactive Zero-Knowledge}, booktitle = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3621}, pages = {118--134}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11535218\_8}, doi = {10.1007/11535218\_8}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Passs05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dim/CamenischSSFHKLLT05, author = {Jan Camenisch and Abhi Shelat and Dieter Sommer and Simone Fischer{-}H{\"{u}}bner and Marit Hansen and Henry Krasemann and G{\'{e}}rard Lacoste and Ronald Leenes and Jimmy C. Tseng}, editor = {Vijay Atluri and Pierangela Samarati and Atsuhiro Goto}, title = {Privacy and identity management for everyone}, booktitle = {Proceedings of the 2005 Workshop on Digital Identity Management, Fairfax, VA, USA, November 11, 2005}, pages = {20--27}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102486.1102491}, doi = {10.1145/1102486.1102491}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dim/CamenischSSFHKLLT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/LepinksiMS05, author = {Matt Lepinski and Silvio Micali and Abhi Shelat}, editor = {Harold N. Gabow and Ronald Fagin}, title = {Collusion-free protocols}, booktitle = {Proceedings of the 37th Annual {ACM} Symposium on Theory of Computing, Baltimore, MD, USA, May 22-24, 2005}, pages = {543--552}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1060590.1060671}, doi = {10.1145/1060590.1060671}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/LepinksiMS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/LepinskiMS05, author = {Matt Lepinski and Silvio Micali and Abhi Shelat}, editor = {Joe Kilian}, title = {Fair-Zero Knowledge}, booktitle = {Theory of Cryptography, Second Theory of Cryptography Conference, {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3378}, pages = {245--263}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30576-7\_14}, doi = {10.1007/978-3-540-30576-7\_14}, timestamp = {Sun, 02 Jun 2019 21:21:22 +0200}, biburl = {https://dblp.org/rec/conf/tcc/LepinskiMS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/BlumbergS04, author = {Andrew J. Blumberg and Abhi Shelat}, editor = {Deborah L. McGuinness and George Ferguson}, title = {Searching for Stable Mechanisms: Automated Design for Imperfect Players}, booktitle = {Proceedings of the Nineteenth National Conference on Artificial Intelligence, Sixteenth Conference on Innovative Applications of Artificial Intelligence, July 25-29, 2004, San Jose, California, {USA}}, pages = {8--13}, publisher = {{AAAI} Press / The {MIT} Press}, year = {2004}, url = {http://www.aaai.org/Library/AAAI/2004/aaai04-002.php}, timestamp = {Tue, 05 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/BlumbergS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/LepinskiMP04, author = {Matt Lepinski and Silvio Micali and Chris Peikert and Abhi Shelat}, editor = {Soma Chaudhuri and Shay Kutten}, title = {Completely fair {SFE} and coalition-safe cheap talk}, booktitle = {Proceedings of the Twenty-Third Annual {ACM} Symposium on Principles of Distributed Computing, {PODC} 2004, St. John's, Newfoundland, Canada, July 25-28, 2004}, pages = {1--10}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1011767.1011769}, doi = {10.1145/1011767.1011769}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/LepinskiMP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dsonline/GarfinkelS03, author = {Simson L. Garfinkel and Abhi Shelat}, title = {{IEEE} Security {\&} Privacy: Data Forensics - Rememberance of Data Passed: {A} Study of Disk Sanitization Practices}, journal = {{IEEE} Distributed Syst. Online}, volume = {4}, number = {2}, year = {2003}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dsonline/GarfinkelS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GarfinkelS03, author = {Simson L. Garfinkel and Abhi Shelat}, title = {Remembrance of Data Passed: {A} Study of Disk Sanitization Practices}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {1}, pages = {17--27}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1176992}, doi = {10.1109/MSECP.2003.1176992}, timestamp = {Fri, 25 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/GarfinkelS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soda/PeikertSS03, author = {Chris Peikert and Abhi Shelat and Adam D. Smith}, title = {Lower bounds for collusion-secure fingerprinting}, booktitle = {Proceedings of the Fourteenth Annual {ACM-SIAM} Symposium on Discrete Algorithms, January 12-14, 2003, Baltimore, Maryland, {USA}}, pages = {472--479}, publisher = {{ACM/SIAM}}, year = {2003}, url = {http://dl.acm.org/citation.cfm?id=644108.644187}, timestamp = {Fri, 08 Apr 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/soda/PeikertSS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soda/LehmanS02, author = {Eric Lehman and Abhi Shelat}, editor = {David Eppstein}, title = {Approximation algorithms for grammar-based compression}, booktitle = {Proceedings of the Thirteenth Annual {ACM-SIAM} Symposium on Discrete Algorithms, January 6-8, 2002, San Francisco, CA, {USA}}, pages = {205--212}, publisher = {{ACM/SIAM}}, year = {2002}, url = {http://dl.acm.org/citation.cfm?id=545381.545407}, timestamp = {Fri, 07 Dec 2012 17:02:08 +0100}, biburl = {https://dblp.org/rec/conf/soda/LehmanS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/CharikarLLPPRSS02, author = {Moses Charikar and Eric Lehman and Ding Liu and Rina Panigrahy and Manoj Prabhakaran and April Rasala and Amit Sahai and Abhi Shelat}, editor = {John H. Reif}, title = {Approximating the smallest grammar: Kolmogorov complexity in natural models}, booktitle = {Proceedings on 34th Annual {ACM} Symposium on Theory of Computing, May 19-21, 2002, Montr{\'{e}}al, Qu{\'{e}}bec, Canada}, pages = {792--801}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/509907.510021}, doi = {10.1145/509907.510021}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stoc/CharikarLLPPRSS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.