BibTeX records: Salil P. Vadhan

download as .bib file

@inproceedings{DBLP:conf/colt/Vadhan17,
  author    = {Salil P. Vadhan},
  title     = {On Learning vs. Refutation},
  booktitle = {Proceedings of the 30th Conference on Learning Theory, {COLT} 2017,
               Amsterdam, The Netherlands, 7-10 July 2017},
  pages     = {1835--1848},
  year      = {2017},
  crossref  = {DBLP:conf/colt/2017},
  url       = {http://proceedings.mlr.press/v65/vadhan17a.html},
  timestamp = {Wed, 16 Aug 2017 11:08:55 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/colt/Vadhan17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/focs/MurtaghRSV17,
  author    = {Jack Murtagh and
               Omer Reingold and
               Aaron Sidford and
               Salil P. Vadhan},
  title     = {Derandomization Beyond Connectivity: Undirected Laplacian Systems
               in Nearly Logarithmic Space},
  booktitle = {58th {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS}
               2017, Berkeley, CA, USA, October 15-17, 2017},
  pages     = {801--812},
  year      = {2017},
  crossref  = {DBLP:conf/focs/2017},
  url       = {https://doi.org/10.1109/FOCS.2017.79},
  doi       = {10.1109/FOCS.2017.79},
  timestamp = {Thu, 16 Nov 2017 15:01:42 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/focs/MurtaghRSV17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:books/sp/17/HaitnerV17,
  author    = {Iftach Haitner and
               Salil P. Vadhan},
  title     = {The Many Entropies in One-Way Functions},
  booktitle = {Tutorials on the Foundations of Cryptography.},
  pages     = {159--217},
  year      = {2017},
  crossref  = {DBLP:books/sp/L2017},
  url       = {https://doi.org/10.1007/978-3-319-57048-8_4},
  doi       = {10.1007/978-3-319-57048-8_4},
  timestamp = {Thu, 29 Jun 2017 17:40:41 +0200},
  biburl    = {http://dblp.org/rec/bib/books/sp/17/HaitnerV17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:books/sp/17/Vadhan17,
  author    = {Salil P. Vadhan},
  title     = {The Complexity of Differential Privacy},
  booktitle = {Tutorials on the Foundations of Cryptography.},
  pages     = {347--450},
  year      = {2017},
  crossref  = {DBLP:books/sp/L2017},
  url       = {https://doi.org/10.1007/978-3-319-57048-8_7},
  doi       = {10.1007/978-3-319-57048-8_7},
  timestamp = {Thu, 29 Jun 2017 17:40:41 +0200},
  biburl    = {http://dblp.org/rec/bib/books/sp/17/Vadhan17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/ChenCLVW17,
  author    = {Yi{-}Hsiu Chen and
               Kai{-}Min Chung and
               Ching{-}Yi Lai and
               Salil P. Vadhan and
               Xiaodi Wu},
  title     = {Computational Notions of Quantum Min-Entropy},
  journal   = {CoRR},
  volume    = {abs/1704.07309},
  year      = {2017},
  url       = {http://arxiv.org/abs/1704.07309},
  archivePrefix = {arXiv},
  eprint    = {1704.07309},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/ChenCLVW17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-04634,
  author    = {Jack Murtagh and
               Omer Reingold and
               Aaron Sidford and
               Salil P. Vadhan},
  title     = {Derandomization Beyond Connectivity: Undirected Laplacian Systems
               in Nearly Logarithmic Space},
  journal   = {CoRR},
  volume    = {abs/1708.04634},
  year      = {2017},
  url       = {http://arxiv.org/abs/1708.04634},
  archivePrefix = {arXiv},
  eprint    = {1708.04634},
  timestamp = {Tue, 05 Sep 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/abs-1708-04634},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/abs-1709-05396,
  author    = {Victor Balcer and
               Salil P. Vadhan},
  title     = {Differential Privacy on Finite Computers},
  journal   = {CoRR},
  volume    = {abs/1709.05396},
  year      = {2017},
  url       = {http://arxiv.org/abs/1709.05396},
  archivePrefix = {arXiv},
  eprint    = {1709.05396},
  timestamp = {Thu, 05 Oct 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/abs-1709-05396},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/abs-1711-03908,
  author    = {Vishesh Karwa and
               Salil P. Vadhan},
  title     = {Finite Sample Differentially Private Confidence Intervals},
  journal   = {CoRR},
  volume    = {abs/1711.03908},
  year      = {2017},
  url       = {http://arxiv.org/abs/1711.03908},
  archivePrefix = {arXiv},
  eprint    = {1711.03908},
  timestamp = {Fri, 01 Dec 2017 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/journals/corr/abs-1711-03908},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eccc/HaitnerV17,
  author    = {Iftach Haitner and
               Salil P. Vadhan},
  title     = {The Many Entropies in One-Way Functions},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {24},
  pages     = {84},
  year      = {2017},
  url       = {https://eccc.weizmann.ac.il/report/2017/084},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/eccc/HaitnerV17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/teco/ChenCKMV16,
  author    = {Yiling Chen and
               Stephen Chong and
               Ian A. Kash and
               Tal Moran and
               Salil P. Vadhan},
  title     = {Truthful Mechanisms for Agents That Value Privacy},
  journal   = {{ACM} Trans. Economics and Comput.},
  volume    = {4},
  number    = {3},
  pages     = {13:1--13:30},
  year      = {2016},
  url       = {http://doi.acm.org/10.1145/2892555},
  doi       = {10.1145/2892555},
  timestamp = {Tue, 03 Jan 2017 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/journals/teco/ChenCKMV16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icml/RogersVLG16,
  author    = {Marco Gaboardi and
               Hyun{-}Woo Lim and
               Ryan M. Rogers and
               Salil P. Vadhan},
  title     = {Differentially Private Chi-Squared Hypothesis Testing: Goodness of
               Fit and Independence Testing},
  booktitle = {Proceedings of the 33nd International Conference on Machine Learning,
               {ICML} 2016, New York City, NY, USA, June 19-24, 2016},
  pages     = {2111--2120},
  year      = {2016},
  crossref  = {DBLP:conf/icml/2016},
  url       = {http://jmlr.org/proceedings/papers/v48/rogers16.html},
  timestamp = {Thu, 30 Mar 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icml/RogersVLG16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/nips/RogersVRU16,
  author    = {Ryan M. Rogers and
               Salil P. Vadhan and
               Aaron Roth and
               Jonathan Ullman},
  title     = {Privacy Odometers and Filters: Pay-as-you-Go Composition},
  booktitle = {Advances in Neural Information Processing Systems 29: Annual Conference
               on Neural Information Processing Systems 2016, December 5-10, 2016,
               Barcelona, Spain},
  pages     = {1921--1929},
  year      = {2016},
  crossref  = {DBLP:conf/nips/2016},
  url       = {http://papers.nips.cc/paper/6170-privacy-odometers-and-filters-pay-as-you-go-composition},
  timestamp = {Fri, 03 Mar 2017 14:59:41 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/nips/RogersVRU16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/pods/NissimSV16,
  author    = {Kobbi Nissim and
               Uri Stemmer and
               Salil P. Vadhan},
  title     = {Locating a Small Cluster Privately},
  booktitle = {Proceedings of the 35th {ACM} {SIGMOD-SIGACT-SIGAI} Symposium on Principles
               of Database Systems, {PODS} 2016, San Francisco, CA, USA, June 26
               - July 01, 2016},
  pages     = {413--427},
  year      = {2016},
  crossref  = {DBLP:conf/pods/2016},
  url       = {http://doi.acm.org/10.1145/2902251.2902296},
  doi       = {10.1145/2902251.2902296},
  timestamp = {Sat, 18 Jun 2016 14:40:49 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/pods/NissimSV16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/tcc/MurtaghV16,
  author    = {Jack Murtagh and
               Salil P. Vadhan},
  title     = {The Complexity of Computing the Optimal Composition of Differential
               Privacy},
  booktitle = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A,
               Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {I}},
  pages     = {157--175},
  year      = {2016},
  crossref  = {DBLP:conf/tcc/2016a1},
  url       = {https://doi.org/10.1007/978-3-662-49096-9_7},
  doi       = {10.1007/978-3-662-49096-9_7},
  timestamp = {Tue, 23 May 2017 01:06:08 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/MurtaghV16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BunCV16,
  author    = {Mark Bun and
               Yi{-}Hsiu Chen and
               Salil P. Vadhan},
  title     = {Separating Computational and Statistical Differential Privacy in the
               Client-Server Model},
  booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
               Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}},
  pages     = {607--634},
  year      = {2016},
  crossref  = {DBLP:conf/tcc/2016b1},
  url       = {https://doi.org/10.1007/978-3-662-53641-4_23},
  doi       = {10.1007/978-3-662-53641-4_23},
  timestamp = {Tue, 23 May 2017 01:06:07 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/BunCV16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/GaboardiLRV16,
  author    = {Marco Gaboardi and
               Hyun{-}Woo Lim and
               Ryan M. Rogers and
               Salil P. Vadhan},
  title     = {Differentially Private Chi-Squared Hypothesis Testing: Goodness of
               Fit and Independence Testing},
  journal   = {CoRR},
  volume    = {abs/1602.03090},
  year      = {2016},
  url       = {http://arxiv.org/abs/1602.03090},
  archivePrefix = {arXiv},
  eprint    = {1602.03090},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/GaboardiLRV16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/CranorRSVW16,
  author    = {Lorrie Faith Cranor and
               Tal Rabin and
               Vitaly Shmatikov and
               Salil P. Vadhan and
               Daniel J. Weitzner},
  title     = {Towards a Privacy Research Roadmap for the Computing Community},
  journal   = {CoRR},
  volume    = {abs/1604.03160},
  year      = {2016},
  url       = {http://arxiv.org/abs/1604.03160},
  archivePrefix = {arXiv},
  eprint    = {1604.03160},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/CranorRSVW16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/NissimSV16,
  author    = {Kobbi Nissim and
               Uri Stemmer and
               Salil P. Vadhan},
  title     = {Locating a Small Cluster Privately},
  journal   = {CoRR},
  volume    = {abs/1604.05590},
  year      = {2016},
  url       = {http://arxiv.org/abs/1604.05590},
  archivePrefix = {arXiv},
  eprint    = {1604.05590},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/NissimSV16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/RogersRUV16,
  author    = {Ryan M. Rogers and
               Aaron Roth and
               Jonathan Ullman and
               Salil P. Vadhan},
  title     = {Privacy Odometers and Filters: Pay-as-you-Go Composition},
  journal   = {CoRR},
  volume    = {abs/1605.08294},
  year      = {2016},
  url       = {http://arxiv.org/abs/1605.08294},
  archivePrefix = {arXiv},
  eprint    = {1605.08294},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/RogersRUV16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/GaboardiHKNUV16,
  author    = {Marco Gaboardi and
               James Honaker and
               Gary King and
               Kobbi Nissim and
               Jonathan Ullman and
               Salil P. Vadhan},
  title     = {{PSI} ({\(\Psi\)}): a Private data Sharing Interface},
  journal   = {CoRR},
  volume    = {abs/1609.04340},
  year      = {2016},
  url       = {http://arxiv.org/abs/1609.04340},
  archivePrefix = {arXiv},
  eprint    = {1609.04340},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/GaboardiHKNUV16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BunCV16,
  author    = {Mark Bun and
               Yi{-}Hsiu Chen and
               Salil P. Vadhan},
  title     = {Separating Computational and Statistical Differential Privacy in the
               Client-Server Model},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {820},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/820},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/BunCV16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/focs/BunNSV15,
  author    = {Mark Bun and
               Kobbi Nissim and
               Uri Stemmer and
               Salil P. Vadhan},
  title     = {Differentially Private Release and Learning of Threshold Functions},
  booktitle = {{IEEE} 56th Annual Symposium on Foundations of Computer Science, {FOCS}
               2015, Berkeley, CA, USA, 17-20 October, 2015},
  pages     = {634--649},
  year      = {2015},
  crossref  = {DBLP:conf/focs/2015},
  url       = {https://doi.org/10.1109/FOCS.2015.45},
  doi       = {10.1109/FOCS.2015.45},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/focs/BunNSV15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/focs/DworkSSUV15,
  author    = {Cynthia Dwork and
               Adam D. Smith and
               Thomas Steinke and
               Jonathan Ullman and
               Salil P. Vadhan},
  title     = {Robust Traceability from Trace Amounts},
  booktitle = {{IEEE} 56th Annual Symposium on Foundations of Computer Science, {FOCS}
               2015, Berkeley, CA, USA, 17-20 October, 2015},
  pages     = {650--669},
  year      = {2015},
  crossref  = {DBLP:conf/focs/2015},
  url       = {https://doi.org/10.1109/FOCS.2015.46},
  doi       = {10.1109/FOCS.2015.46},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/focs/DworkSSUV15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/ChenSV15,
  author    = {Sitan Chen and
               Thomas Steinke and
               Salil P. Vadhan},
  title     = {Pseudorandomness for Read-Once, Constant-Depth Circuits},
  journal   = {CoRR},
  volume    = {abs/1504.04675},
  year      = {2015},
  url       = {http://arxiv.org/abs/1504.04675},
  archivePrefix = {arXiv},
  eprint    = {1504.04675},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/ChenSV15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/BunNSV15,
  author    = {Mark Bun and
               Kobbi Nissim and
               Uri Stemmer and
               Salil P. Vadhan},
  title     = {Differentially Private Release and Learning of Threshold Functions},
  journal   = {CoRR},
  volume    = {abs/1504.07553},
  year      = {2015},
  url       = {http://arxiv.org/abs/1504.07553},
  archivePrefix = {arXiv},
  eprint    = {1504.07553},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/BunNSV15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/MurtaghV15,
  author    = {Jack Murtagh and
               Salil P. Vadhan},
  title     = {The Complexity of Computing the Optimal Composition of Differential
               Privacy},
  journal   = {CoRR},
  volume    = {abs/1507.03113},
  year      = {2015},
  url       = {http://arxiv.org/abs/1507.03113},
  archivePrefix = {arXiv},
  eprint    = {1507.03113},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/MurtaghV15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/MurtaghV15,
  author    = {Jack Murtagh and
               Salil P. Vadhan},
  title     = {The Complexity of Computing the Optimal Composition of Differential
               Privacy},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {1057},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/1057},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/MurtaghV15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/approx/SteinkeVW14,
  author    = {Thomas Steinke and
               Salil P. Vadhan and
               Andrew Wan},
  title     = {Pseudorandomness and Fourier Growth Bounds for Width-3 Branching Programs},
  booktitle = {Approximation, Randomization, and Combinatorial Optimization. Algorithms
               and Techniques, {APPROX/RANDOM} 2014, September 4-6, 2014, Barcelona,
               Spain},
  pages     = {885--899},
  year      = {2014},
  crossref  = {DBLP:conf/approx/2014},
  url       = {https://doi.org/10.4230/LIPIcs.APPROX-RANDOM.2014.885},
  doi       = {10.4230/LIPIcs.APPROX-RANDOM.2014.885},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/approx/SteinkeVW14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/innovations/GopalanVZ14,
  author    = {Parikshit Gopalan and
               Salil P. Vadhan and
               Yuan Zhou},
  title     = {Locally testable codes and cayley graphs},
  booktitle = {Innovations in Theoretical Computer Science, ITCS'14, Princeton, NJ,
               USA, January 12-14, 2014},
  pages     = {81--92},
  year      = {2014},
  crossref  = {DBLP:conf/innovations/2014},
  url       = {http://doi.acm.org/10.1145/2554797.2554807},
  doi       = {10.1145/2554797.2554807},
  timestamp = {Fri, 14 Feb 2014 17:36:37 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/innovations/GopalanVZ14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/innovations/NissimVX14,
  author    = {Kobbi Nissim and
               Salil P. Vadhan and
               David Xiao},
  title     = {Redrawing the boundaries on purchasing data from privacy-sensitive
               individuals},
  booktitle = {Innovations in Theoretical Computer Science, ITCS'14, Princeton, NJ,
               USA, January 12-14, 2014},
  pages     = {411--422},
  year      = {2014},
  crossref  = {DBLP:conf/innovations/2014},
  url       = {http://doi.acm.org/10.1145/2554797.2554835},
  doi       = {10.1145/2554797.2554835},
  timestamp = {Fri, 14 Feb 2014 17:36:37 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/innovations/NissimVX14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/stoc/BunUV14,
  author    = {Mark Bun and
               Jonathan Ullman and
               Salil P. Vadhan},
  title     = {Fingerprinting codes and the price of approximate differential privacy},
  booktitle = {Symposium on Theory of Computing, {STOC} 2014, New York, NY, USA,
               May 31 - June 03, 2014},
  pages     = {1--10},
  year      = {2014},
  crossref  = {DBLP:conf/stoc/2014},
  url       = {http://doi.acm.org/10.1145/2591796.2591877},
  doi       = {10.1145/2591796.2591877},
  timestamp = {Wed, 29 Mar 2017 16:45:26 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/BunUV14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/wine/ChenSV14,
  author    = {Yiling Chen and
               Or Sheffet and
               Salil P. Vadhan},
  title     = {Privacy Games},
  booktitle = {Web and Internet Economics - 10th International Conference, {WINE}
               2014, Beijing, China, December 14-17, 2014. Proceedings},
  pages     = {371--385},
  year      = {2014},
  crossref  = {DBLP:conf/wine/2014},
  url       = {https://doi.org/10.1007/978-3-319-13129-0_30},
  doi       = {10.1007/978-3-319-13129-0_30},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/wine/ChenSV14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/NissimVX14,
  author    = {Kobbi Nissim and
               Salil P. Vadhan and
               David Xiao},
  title     = {Redrawing the Boundaries on Purchasing Data from Privacy-Sensitive
               Individuals},
  journal   = {CoRR},
  volume    = {abs/1401.4092},
  year      = {2014},
  url       = {http://arxiv.org/abs/1401.4092},
  archivePrefix = {arXiv},
  eprint    = {1401.4092},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/NissimVX14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/SteinkeVW14,
  author    = {Thomas Steinke and
               Salil P. Vadhan and
               Andrew Wan},
  title     = {Pseudorandomness and Fourier Growth Bounds for Width 3 Branching Programs},
  journal   = {CoRR},
  volume    = {abs/1405.7028},
  year      = {2014},
  url       = {http://arxiv.org/abs/1405.7028},
  archivePrefix = {arXiv},
  eprint    = {1405.7028},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/SteinkeVW14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/ChenSV14,
  author    = {Yiling Chen and
               Or Sheffet and
               Salil P. Vadhan},
  title     = {Privacy Games},
  journal   = {CoRR},
  volume    = {abs/1410.1920},
  year      = {2014},
  url       = {http://arxiv.org/abs/1410.1920},
  archivePrefix = {arXiv},
  eprint    = {1410.1920},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/ChenSV14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/rsa/ReshefV13,
  author    = {Yakir Reshef and
               Salil P. Vadhan},
  title     = {On extractors and exposure-resilient functions for sublogarithmic
               entropy},
  journal   = {Random Struct. Algorithms},
  volume    = {42},
  number    = {3},
  pages     = {386--401},
  year      = {2013},
  url       = {https://doi.org/10.1002/rsa.20424},
  doi       = {10.1002/rsa.20424},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/rsa/ReshefV13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/siamcomp/HaitnerRV13,
  author    = {Iftach Haitner and
               Omer Reingold and
               Salil P. Vadhan},
  title     = {Efficiency Improvements in Constructing Pseudorandom Generators from
               One-Way Functions},
  journal   = {{SIAM} J. Comput.},
  volume    = {42},
  number    = {3},
  pages     = {1405--1430},
  year      = {2013},
  url       = {https://doi.org/10.1137/100814421},
  doi       = {10.1137/100814421},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/siamcomp/HaitnerRV13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/toc/ChungMV13,
  author    = {Kai{-}Min Chung and
               Michael Mitzenmacher and
               Salil P. Vadhan},
  title     = {Why Simple Hash Functions Work: Exploiting the Entropy in a Data Stream},
  journal   = {Theory of Computing},
  volume    = {9},
  pages     = {897--945},
  year      = {2013},
  url       = {https://doi.org/10.4086/toc.2013.v009a030},
  doi       = {10.4086/toc.2013.v009a030},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/toc/ChungMV13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/approx/ReingoldSV13,
  author    = {Omer Reingold and
               Thomas Steinke and
               Salil P. Vadhan},
  title     = {Pseudorandomness for Regular Branching Programs via Fourier Analysis},
  booktitle = {Approximation, Randomization, and Combinatorial Optimization. Algorithms
               and Techniques - 16th International Workshop, {APPROX} 2013, and 17th
               International Workshop, {RANDOM} 2013, Berkeley, CA, USA, August 21-23,
               2013. Proceedings},
  pages     = {655--670},
  year      = {2013},
  crossref  = {DBLP:conf/approx/2013},
  url       = {https://doi.org/10.1007/978-3-642-40328-6_45},
  doi       = {10.1007/978-3-642-40328-6_45},
  timestamp = {Tue, 23 May 2017 01:10:59 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/approx/ReingoldSV13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/VadhanZ13,
  author    = {Salil P. Vadhan and
               Colin Jia Zheng},
  title     = {A Uniform Min-Max Theorem with Applications in Cryptography},
  booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  pages     = {93--110},
  year      = {2013},
  crossref  = {DBLP:conf/crypto/2013-1},
  url       = {https://doi.org/10.1007/978-3-642-40041-4_6},
  doi       = {10.1007/978-3-642-40041-4_6},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/VadhanZ13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/RaghunathanSV13,
  author    = {Ananth Raghunathan and
               Gil Segev and
               Salil P. Vadhan},
  title     = {Deterministic Public-Key Encryption for Adaptively Chosen Plaintext
               Distributions},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Athens, Greece, May 26-30, 2013. Proceedings},
  pages     = {93--110},
  year      = {2013},
  crossref  = {DBLP:conf/eurocrypt/2013},
  url       = {https://doi.org/10.1007/978-3-642-38348-9_6},
  doi       = {10.1007/978-3-642-38348-9_6},
  timestamp = {Wed, 24 May 2017 08:31:21 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/RaghunathanSV13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/innovations/MahmoodyMV13,
  author    = {Mohammad Mahmoody and
               Tal Moran and
               Salil P. Vadhan},
  title     = {Publicly verifiable proofs of sequential work},
  booktitle = {Innovations in Theoretical Computer Science, {ITCS} '13, Berkeley,
               CA, USA, January 9-12, 2013},
  pages     = {373--388},
  year      = {2013},
  crossref  = {DBLP:conf/innovations/2013},
  url       = {http://doi.acm.org/10.1145/2422436.2422479},
  doi       = {10.1145/2422436.2422479},
  timestamp = {Sun, 17 Feb 2013 11:19:02 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/innovations/MahmoodyMV13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sigecom/ChenCKMV13,
  author    = {Yiling Chen and
               Stephen Chong and
               Ian A. Kash and
               Tal Moran and
               Salil P. Vadhan},
  title     = {Truthful mechanisms for agents that value privacy},
  booktitle = {{ACM} Conference on Electronic Commerce, {EC} '13, Philadelphia, PA,
               USA, June 16-20, 2013},
  pages     = {215--232},
  year      = {2013},
  crossref  = {DBLP:conf/sigecom/2013},
  url       = {http://doi.acm.org/10.1145/2482540.2482549},
  doi       = {10.1145/2482540.2482549},
  timestamp = {Mon, 27 Nov 2017 14:42:24 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/sigecom/ChenCKMV13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/stoc/RothblumVW13,
  author    = {Guy N. Rothblum and
               Salil P. Vadhan and
               Avi Wigderson},
  title     = {Interactive proofs of proximity: delegating computation in sublinear
               time},
  booktitle = {Symposium on Theory of Computing Conference, STOC'13, Palo Alto, CA,
               USA, June 1-4, 2013},
  pages     = {793--802},
  year      = {2013},
  crossref  = {DBLP:conf/stoc/2013},
  url       = {http://doi.acm.org/10.1145/2488608.2488709},
  doi       = {10.1145/2488608.2488709},
  timestamp = {Sun, 26 May 2013 10:30:47 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/RothblumVW13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/ReingoldSV13,
  author    = {Omer Reingold and
               Thomas Steinke and
               Salil P. Vadhan},
  title     = {Pseudorandomness for Regular Branching Programs via Fourier Analysis},
  journal   = {CoRR},
  volume    = {abs/1306.3004},
  year      = {2013},
  url       = {http://arxiv.org/abs/1306.3004},
  archivePrefix = {arXiv},
  eprint    = {1306.3004},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/ReingoldSV13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/GopalanVZ13,
  author    = {Parikshit Gopalan and
               Salil P. Vadhan and
               Yuan Zhou},
  title     = {Locally Testable Codes and Cayley Graphs},
  journal   = {CoRR},
  volume    = {abs/1308.5158},
  year      = {2013},
  url       = {http://arxiv.org/abs/1308.5158},
  archivePrefix = {arXiv},
  eprint    = {1308.5158},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/GopalanVZ13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/BunUV13,
  author    = {Mark Bun and
               Jonathan Ullman and
               Salil P. Vadhan},
  title     = {Fingerprinting Codes and the Price of Approximate Differential Privacy},
  journal   = {CoRR},
  volume    = {abs/1311.3158},
  year      = {2013},
  url       = {http://arxiv.org/abs/1311.3158},
  archivePrefix = {arXiv},
  eprint    = {1311.3158},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/BunUV13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eccc/ReingoldSV13,
  author    = {Omer Reingold and
               Thomas Steinke and
               Salil P. Vadhan},
  title     = {Pseudorandomness for Regular Branching Programs via Fourier Analysis},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {20},
  pages     = {86},
  year      = {2013},
  url       = {http://eccc.hpi-web.de/report/2013/086},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/eccc/ReingoldSV13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eccc/ZhengV13,
  author    = {Colin Jia Zheng and
               Salil P. Vadhan},
  title     = {A Uniform Min-Max Theorem with Applications in Cryptography},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {20},
  pages     = {101},
  year      = {2013},
  url       = {http://eccc.hpi-web.de/report/2013/101},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/eccc/ZhengV13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eccc/GopalanVZ13,
  author    = {Parikshit Gopalan and
               Salil P. Vadhan and
               Yuan Zhou},
  title     = {Locally Testable Codes and Cayley Graphs},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {20},
  pages     = {114},
  year      = {2013},
  url       = {http://eccc.hpi-web.de/report/2013/114},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/eccc/GopalanVZ13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/RaghunathanSV13,
  author    = {Ananth Raghunathan and
               Gil Segev and
               Salil P. Vadhan},
  title     = {Deterministic Public-Key Encryption for Adaptively Chosen Plaintext
               Distributions},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {125},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/125},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/RaghunathanSV13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/VadhanZ13,
  author    = {Salil P. Vadhan and
               Colin Jia Zheng},
  title     = {A Uniform Min-Max Theorem with Applications in Cryptography},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {437},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/437},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/VadhanZ13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/cc/GoldreichV12,
  author    = {Oded Goldreich and
               Salil P. Vadhan},
  title     = {Special issue from RANDOM'09: Editors' Foreword},
  journal   = {Computational Complexity},
  volume    = {21},
  number    = {1},
  pages     = {1},
  year      = {2012},
  url       = {https://doi.org/10.1007/s00037-011-0035-z},
  doi       = {10.1007/s00037-011-0035-z},
  timestamp = {Wed, 15 Nov 2017 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/journals/cc/GoldreichV12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/fttcs/Vadhan12,
  author    = {Salil P. Vadhan},
  title     = {Pseudorandomness},
  journal   = {Foundations and Trends in Theoretical Computer Science},
  volume    = {7},
  number    = {1-3},
  pages     = {1--336},
  year      = {2012},
  url       = {https://doi.org/10.1561/0400000010},
  doi       = {10.1561/0400000010},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/fttcs/Vadhan12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jacm/BarakGIRSVY12,
  author    = {Boaz Barak and
               Oded Goldreich and
               Russell Impagliazzo and
               Steven Rudich and
               Amit Sahai and
               Salil P. Vadhan and
               Ke Yang},
  title     = {On the (im)possibility of obfuscating programs},
  journal   = {J. {ACM}},
  volume    = {59},
  number    = {2},
  pages     = {6:1--6:48},
  year      = {2012},
  url       = {http://doi.acm.org/10.1145/2160158.2160159},
  doi       = {10.1145/2160158.2160159},
  timestamp = {Wed, 15 Nov 2017 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/journals/jacm/BarakGIRSVY12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/siamcomp/EtessamiMPWV12,
  author    = {Kousha Etessami and
               Dieter van Melkebeek and
               Seth Pettie and
               John Watrous and
               Salil P. Vadhan},
  title     = {Special Section on the Forty-Third Annual {ACM} Symposium on Theory
               of Computing {(STOC} 2011)},
  journal   = {{SIAM} J. Comput.},
  volume    = {41},
  number    = {5},
  pages     = {1233--1234},
  year      = {2012},
  url       = {https://doi.org/10.1137/12097324X},
  doi       = {10.1137/12097324X},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/siamcomp/EtessamiMPWV12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/toct/SchoenebeckV12,
  author    = {Grant Schoenebeck and
               Salil P. Vadhan},
  title     = {The Computational Complexity of Nash Equilibria in Concisely Represented
               Games},
  journal   = {{TOCT}},
  volume    = {4},
  number    = {2},
  pages     = {4:1--4:50},
  year      = {2012},
  url       = {http://doi.acm.org/10.1145/2189778.2189779},
  doi       = {10.1145/2189778.2189779},
  timestamp = {Mon, 09 Jan 2017 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/journals/toct/SchoenebeckV12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DodisLMV12,
  author    = {Yevgeniy Dodis and
               Adriana L{\'{o}}pez{-}Alt and
               Ilya Mironov and
               Salil P. Vadhan},
  title     = {Differential Privacy with Imperfect Randomness},
  booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  pages     = {497--516},
  year      = {2012},
  crossref  = {DBLP:conf/crypto/2012},
  url       = {https://doi.org/10.1007/978-3-642-32009-5_29},
  doi       = {10.1007/978-3-642-32009-5_29},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/DodisLMV12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/focs/GopalanMRTV12,
  author    = {Parikshit Gopalan and
               Raghu Meka and
               Omer Reingold and
               Luca Trevisan and
               Salil P. Vadhan},
  title     = {Better Pseudorandom Generators from Milder Pseudorandom Restrictions},
  booktitle = {53rd Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
               2012, New Brunswick, NJ, USA, October 20-23, 2012},
  pages     = {120--129},
  year      = {2012},
  crossref  = {DBLP:conf/focs/2012},
  url       = {https://doi.org/10.1109/FOCS.2012.77},
  doi       = {10.1109/FOCS.2012.77},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/focs/GopalanMRTV12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/focs/DworkNV12,
  author    = {Cynthia Dwork and
               Moni Naor and
               Salil P. Vadhan},
  title     = {The Privacy of the Analyst and the Power of the State},
  booktitle = {53rd Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
               2012, New Brunswick, NJ, USA, October 20-23, 2012},
  pages     = {400--409},
  year      = {2012},
  crossref  = {DBLP:conf/focs/2012},
  url       = {https://doi.org/10.1109/FOCS.2012.87},
  doi       = {10.1109/FOCS.2012.87},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/focs/DworkNV12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icalp/ThalerUV12,
  author    = {Justin Thaler and
               Jonathan Ullman and
               Salil P. Vadhan},
  title     = {Faster Algorithms for Privately Releasing Marginals},
  booktitle = {Automata, Languages, and Programming - 39th International Colloquium,
               {ICALP} 2012, Warwick, UK, July 9-13, 2012, Proceedings, Part {I}},
  pages     = {810--821},
  year      = {2012},
  crossref  = {DBLP:conf/icalp/2012-1},
  url       = {https://doi.org/10.1007/978-3-642-31594-7_68},
  doi       = {10.1007/978-3-642-31594-7_68},
  timestamp = {Sun, 04 Jun 2017 10:07:30 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icalp/ThalerUV12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/itw/VadhanZ12,
  author    = {Salil P. Vadhan and
               Colin Jia Zheng},
  title     = {Characterizing pseudoentropy},
  booktitle = {2012 {IEEE} Information Theory Workshop, Lausanne, Switzerland, September
               3-7, 2012},
  pages     = {104--108},
  year      = {2012},
  crossref  = {DBLP:conf/itw/2012},
  url       = {https://doi.org/10.1109/ITW.2012.6404635},
  doi       = {10.1109/ITW.2012.6404635},
  timestamp = {Mon, 22 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/itw/VadhanZ12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/stoc/VadhanZ12,
  author    = {Salil P. Vadhan and
               Colin Jia Zheng},
  title     = {Characterizing pseudoentropy and simplifying pseudorandom generator
               constructions},
  booktitle = {Proceedings of the 44th Symposium on Theory of Computing Conference,
               {STOC} 2012, New York, NY, USA, May 19 - 22, 2012},
  pages     = {817--836},
  year      = {2012},
  crossref  = {DBLP:conf/stoc/2012},
  url       = {http://doi.acm.org/10.1145/2213977.2214051},
  doi       = {10.1145/2213977.2214051},
  timestamp = {Tue, 22 May 2012 21:36:43 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/VadhanZ12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DodisRV12,
  author    = {Yevgeniy Dodis and
               Thomas Ristenpart and
               Salil P. Vadhan},
  title     = {Randomness Condensers for Efficiently Samplable, Seed-Dependent Sources},
  booktitle = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC}
               2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
  pages     = {618--635},
  year      = {2012},
  crossref  = {DBLP:conf/tcc/2012},
  url       = {https://doi.org/10.1007/978-3-642-28914-9_35},
  doi       = {10.1007/978-3-642-28914-9_35},
  timestamp = {Tue, 23 May 2017 01:06:07 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/DodisRV12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/abs-1205-1758,
  author    = {Justin Thaler and
               Jonathan Ullman and
               Salil P. Vadhan},
  title     = {Faster Algorithms for Privately Releasing Marginals},
  journal   = {CoRR},
  volume    = {abs/1205.1758},
  year      = {2012},
  url       = {http://arxiv.org/abs/1205.1758},
  archivePrefix = {arXiv},
  eprint    = {1205.1758},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/abs-1205-1758},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/abs-1210-0049,
  author    = {Parikshit Gopalan and
               Raghu Meka and
               Omer Reingold and
               Luca Trevisan and
               Salil P. Vadhan},
  title     = {Better Pseudorandom Generators from Milder Pseudorandom Restrictions},
  journal   = {CoRR},
  volume    = {abs/1210.0049},
  year      = {2012},
  url       = {http://arxiv.org/abs/1210.0049},
  archivePrefix = {arXiv},
  eprint    = {1210.0049},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/abs-1210-0049},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eccc/GopalanMRTV12,
  author    = {Parikshit Gopalan and
               Raghu Meka and
               Omer Reingold and
               Luca Trevisan and
               Salil P. Vadhan},
  title     = {Better pseudorandom generators from milder pseudorandom restrictions},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {19},
  pages     = {123},
  year      = {2012},
  url       = {http://eccc.hpi-web.de/report/2012/123},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/eccc/GopalanMRTV12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/DodisLMV12,
  author    = {Yevgeniy Dodis and
               Adriana L{\'{o}}pez{-}Alt and
               Ilya Mironov and
               Salil P. Vadhan},
  title     = {Differential Privacy with Imperfect Randomness},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {435},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/435},
  timestamp = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/DodisLMV12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jcss/KampRVZ11,
  author    = {Jesse Kamp and
               Anup Rao and
               Salil P. Vadhan and
               David Zuckerman},
  title     = {Deterministic extractors for small-space sources},
  journal   = {J. Comput. Syst. Sci.},
  volume    = {77},
  number    = {1},
  pages     = {191--220},
  year      = {2011},
  url       = {https://doi.org/10.1016/j.jcss.2010.06.014},
  doi       = {10.1016/j.jcss.2010.06.014},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/jcss/KampRVZ11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/talg/ChungRV11,
  author    = {Kai{-}Min Chung and
               Omer Reingold and
               Salil P. Vadhan},
  title     = {{S-T} connectivity on digraphs with a known stationary distribution},
  journal   = {{ACM} Trans. Algorithms},
  volume    = {7},
  number    = {3},
  pages     = {30:1--30:21},
  year      = {2011},
  url       = {http://doi.acm.org/10.1145/1978782.1978785},
  doi       = {10.1145/1978782.1978785},
  timestamp = {Fri, 06 Jan 2017 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/journals/talg/ChungRV11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MahmoodyMV11,
  author    = {Mohammad Mahmoody and
               Tal Moran and
               Salil P. Vadhan},
  title     = {Time-Lock Puzzles in the Random Oracle Model},
  booktitle = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 14-18, 2011. Proceedings},
  pages     = {39--50},
  year      = {2011},
  crossref  = {DBLP:conf/crypto/2011},
  url       = {https://doi.org/10.1007/978-3-642-22792-9_3},
  doi       = {10.1007/978-3-642-22792-9_3},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/MahmoodyMV11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/innovations/DvirGRV11,
  author    = {Zeev Dvir and
               Dan Gutfreund and
               Guy N. Rothblum and
               Salil P. Vadhan},
  title     = {On Approximating the Entropy of Polynomial Mappings},
  booktitle = {Innovations in Computer Science - {ICS} 2010, Tsinghua University,
               Beijing, China, January 7-9, 2011. Proceedings},
  pages     = {460--475},
  year      = {2011},
  crossref  = {DBLP:conf/innovations/2011},
  url       = {http://conference.itcs.tsinghua.edu.cn/ICS2011/content/papers/28.html},
  timestamp = {Wed, 19 Oct 2011 15:40:50 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/innovations/DvirGRV11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/tcc/UllmanV11,
  author    = {Jonathan Ullman and
               Salil P. Vadhan},
  title     = {PCPs and the Hardness of Generating Private Synthetic Data},
  booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC}
               2011, Providence, RI, USA, March 28-30, 2011. Proceedings},
  pages     = {400--416},
  year      = {2011},
  crossref  = {DBLP:conf/tcc/2011},
  url       = {https://doi.org/10.1007/978-3-642-19571-6_24},
  doi       = {10.1007/978-3-642-19571-6_24},
  timestamp = {Tue, 13 Jun 2017 11:30:16 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/UllmanV11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:books/sp/goldreich2011/GoldreichVW11,
  author    = {Oded Goldreich and
               Salil P. Vadhan and
               Avi Wigderson},
  title     = {Simplified Derandomization of {BPP} Using a Hitting Set Generator},
  booktitle = {Studies in Complexity and Cryptography. Miscellanea on the Interplay
               between Randomness and Computation - In Collaboration with Lidor Avigad,
               Mihir Bellare, Zvika Brakerski, Shafi Goldwasser, Shai Halevi, Tali
               Kaufman, Leonid Levin, Noam Nisan, Dana Ron, Madhu Sudan, Luca Trevisan,
               Salil Vadhan, Avi Wigderson, David Zuckerman},
  pages     = {59--67},
  year      = {2011},
  crossref  = {DBLP:books/sp/goldreich11},
  url       = {https://doi.org/10.1007/978-3-642-22670-0_8},
  doi       = {10.1007/978-3-642-22670-0_8},
  timestamp = {Wed, 15 Nov 2017 19:50:09 +0100},
  biburl    = {http://dblp.org/rec/bib/books/sp/goldreich2011/GoldreichVW11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:books/sp/goldreich2011/GoldreichV11,
  author    = {Oded Goldreich and
               Salil P. Vadhan},
  title     = {On the Complexity of Computational Problems Regarding Distributions},
  booktitle = {Studies in Complexity and Cryptography. Miscellanea on the Interplay
               between Randomness and Computation - In Collaboration with Lidor Avigad,
               Mihir Bellare, Zvika Brakerski, Shafi Goldwasser, Shai Halevi, Tali
               Kaufman, Leonid Levin, Noam Nisan, Dana Ron, Madhu Sudan, Luca Trevisan,
               Salil Vadhan, Avi Wigderson, David Zuckerman},
  pages     = {390--405},
  year      = {2011},
  crossref  = {DBLP:books/sp/goldreich11},
  url       = {https://doi.org/10.1007/978-3-642-22670-0_27},
  doi       = {10.1007/978-3-642-22670-0_27},
  timestamp = {Wed, 15 Nov 2017 19:50:09 +0100},
  biburl    = {http://dblp.org/rec/bib/books/sp/goldreich2011/GoldreichV11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/stoc/2011,
  editor    = {Lance Fortnow and
               Salil P. Vadhan},
  title     = {Proceedings of the 43rd {ACM} Symposium on Theory of Computing, {STOC}
               2011, San Jose, CA, USA, 6-8 June 2011},
  publisher = {{ACM}},
  year      = {2011},
  isbn      = {978-1-4503-0691-1},
  timestamp = {Tue, 22 May 2012 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:reference/crypt/Vadhan11,
  author    = {Salil P. Vadhan},
  title     = {Computational Complexity},
  booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.},
  pages     = {235--240},
  year      = {2011},
  crossref  = {DBLP:reference/crypt/2011},
  url       = {https://doi.org/10.1007/978-1-4419-5906-5_442},
  doi       = {10.1007/978-1-4419-5906-5_442},
  timestamp = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/reference/crypt/Vadhan11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/abs-1111-5472,
  author    = {Yiling Chen and
               Stephen Chong and
               Ian A. Kash and
               Tal Moran and
               Salil P. Vadhan},
  title     = {Truthful Mechanisms for Agents that Value Privacy},
  journal   = {CoRR},
  volume    = {abs/1111.5472},
  year      = {2011},
  url       = {http://arxiv.org/abs/1111.5472},
  archivePrefix = {arXiv},
  eprint    = {1111.5472},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/abs-1111-5472},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eccc/GoldreichV11,
  author    = {Oded Goldreich and
               Salil P. Vadhan},
  title     = {On the complexity of computational problems regarding distributions
               (a survey)},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {18},
  pages     = {4},
  year      = {2011},
  url       = {http://eccc.hpi-web.de/report/2011/004},
  timestamp = {Wed, 15 Nov 2017 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/journals/eccc/GoldreichV11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eccc/McGregorMPRTV11,
  author    = {Andrew McGregor and
               Ilya Mironov and
               Toniann Pitassi and
               Omer Reingold and
               Kunal Talwar and
               Salil P. Vadhan},
  title     = {The Limits of Two-Party Differential Privacy},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {18},
  pages     = {106},
  year      = {2011},
  url       = {http://eccc.hpi-web.de/report/2011/106},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/eccc/McGregorMPRTV11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eccc/VadhanZ11,
  author    = {Salil P. Vadhan and
               Colin Jia Zheng},
  title     = {Characterizing Pseudoentropy and Simplifying Pseudorandom Generator
               Constructions},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {18},
  pages     = {141},
  year      = {2011},
  url       = {http://eccc.hpi-web.de/report/2011/141},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/eccc/VadhanZ11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/MahmoodyMV11,
  author    = {Mohammad Mahmoody and
               Tal Moran and
               Salil P. Vadhan},
  title     = {Non-Interactive Time-Stamping and Proofs of Work in the Random Oracle
               Model},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2011},
  pages     = {553},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/553},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/MahmoodyMV11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/cc/RothblumV10,
  author    = {Guy N. Rothblum and
               Salil P. Vadhan},
  title     = {Are PCPs Inherent in Efficient Arguments?},
  journal   = {Computational Complexity},
  volume    = {19},
  number    = {2},
  pages     = {265--304},
  year      = {2010},
  url       = {https://doi.org/10.1007/s00037-010-0291-3},
  doi       = {10.1007/s00037-010-0291-3},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/cc/RothblumV10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tit/GuruswamiV10,
  author    = {Venkatesan Guruswami and
               Salil P. Vadhan},
  title     = {A Lower Bound on List Size for List Decoding},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {56},
  number    = {11},
  pages     = {5681--5688},
  year      = {2010},
  url       = {https://doi.org/10.1109/TIT.2010.2070170},
  doi       = {10.1109/TIT.2010.2070170},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/tit/GuruswamiV10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChungKV10,
  author    = {Kai{-}Min Chung and
               Yael Tauman Kalai and
               Salil P. Vadhan},
  title     = {Improved Delegation of Computation Using Fully Homomorphic Encryption},
  booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  pages     = {483--501},
  year      = {2010},
  crossref  = {DBLP:conf/crypto/2010},
  url       = {https://doi.org/10.1007/978-3-642-14623-7_26},
  doi       = {10.1007/978-3-642-14623-7_26},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/ChungKV10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/HaitnerHRVW10,
  author    = {Iftach Haitner and
               Thomas Holenstein and
               Omer Reingold and
               Salil P. Vadhan and
               Hoeteck Wee},
  title     = {Universal One-Way Hash Functions via Inaccessible Entropy},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               French Riviera, May 30 - June 3, 2010. Proceedings},
  pages     = {616--637},
  year      = {2010},
  crossref  = {DBLP:conf/eurocrypt/2010},
  url       = {https://doi.org/10.1007/978-3-642-13190-5_31},
  doi       = {10.1007/978-3-642-13190-5_31},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/HaitnerHRVW10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/focs/DworkRV10,
  author    = {Cynthia Dwork and
               Guy N. Rothblum and
               Salil P. Vadhan},
  title     = {Boosting and Differential Privacy},
  booktitle = {51th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
               2010, October 23-26, 2010, Las Vegas, Nevada, {USA}},
  pages     = {51--60},
  year      = {2010},
  crossref  = {DBLP:conf/focs/2010},
  url       = {https://doi.org/10.1109/FOCS.2010.12},
  doi       = {10.1109/FOCS.2010.12},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/focs/DworkRV10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/focs/McGregorMPRTV10,
  author    = {Andrew McGregor and
               Ilya Mironov and
               Toniann Pitassi and
               Omer Reingold and
               Kunal Talwar and
               Salil P. Vadhan},
  title     = {The Limits of Two-Party Differential Privacy},
  booktitle = {51th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
               2010, October 23-26, 2010, Las Vegas, Nevada, {USA}},
  pages     = {81--90},
  year      = {2010},
  crossref  = {DBLP:conf/focs/2010},
  url       = {https://doi.org/10.1109/FOCS.2010.14},
  doi       = {10.1109/FOCS.2010.14},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/focs/McGregorMPRTV10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/stoc/HaitnerRV10,
  author    = {Iftach Haitner and
               Omer Reingold and
               Salil P. Vadhan},
  title     = {Efficiency improvements in constructing pseudorandom generators from
               one-way functions},
  booktitle = {Proceedings of the 42nd {ACM} Symposium on Theory of Computing, {STOC}
               2010, Cambridge, Massachusetts, USA, 5-8 June 2010},
  pages     = {437--446},
  year      = {2010},
  crossref  = {DBLP:conf/stoc/2010},
  url       = {http://doi.acm.org/10.1145/1806689.1806750},
  doi       = {10.1145/1806689.1806750},
  timestamp = {Fri, 12 Oct 2012 12:16:22 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/HaitnerRV10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BirrellV10,
  author    = {Eleanor Birrell and
               Salil P. Vadhan},
  title     = {Composition of Zero-Knowledge Proofs with Efficient Provers},
  booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
               2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  pages     = {572--587},
  year      = {2010},
  crossref  = {DBLP:conf/tcc/2010},
  url       = {https://doi.org/10.1007/978-3-642-11799-2_34},
  doi       = {10.1007/978-3-642-11799-2_34},
  timestamp = {Tue, 23 May 2017 01:06:08 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/BirrellV10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/abs-1003-4029,
  author    = {Yakir Reshef and
               Salil P. Vadhan},
  title     = {On Extractors and Exposure-Resilient Functions for Sublogarithmic
               Entropy},
  journal   = {CoRR},
  volume    = {abs/1003.4029},
  year      = {2010},
  url       = {http://arxiv.org/abs/1003.4029},
  archivePrefix = {arXiv},
  eprint    = {1003.4029},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/abs-1003-4029},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eccc/UllmanV10,
  author    = {Jonathan Ullman and
               Salil P. Vadhan},
  title     = {PCPs and the Hardness of Generating Synthetic Data},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {17},
  pages     = {17},
  year      = {2010},
  url       = {http://eccc.hpi-web.de/report/2010/017},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/eccc/UllmanV10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eccc/HaitnerRV10,
  author    = {Iftach Haitner and
               Omer Reingold and
               Salil P. Vadhan},
  title     = {Efficiency Improvements in Constructing Pseudorandom Generators from
               One-way Functions},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {17},
  pages     = {89},
  year      = {2010},
  url       = {http://eccc.hpi-web.de/report/2010/089},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/eccc/HaitnerRV10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eccc/DvirGRV10,
  author    = {Zeev Dvir and
               Dan Gutfreund and
               Guy N. Rothblum and
               Salil P. Vadhan},
  title     = {On Approximating the Entropy of Polynomial Mappings},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {17},
  pages     = {160},
  year      = {2010},
  url       = {http://eccc.hpi-web.de/report/2010/160},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/eccc/DvirGRV10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/HaitnerHRVW10,
  author    = {Iftach Haitner and
               Thomas Holenstein and
               Omer Reingold and
               Salil P. Vadhan and
               Hoeteck Wee},
  title     = {Universal One-Way Hash Functions via Inaccessible Entropy},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2010},
  pages     = {120},
  year      = {2010},
  url       = {http://eprint.iacr.org/2010/120},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/HaitnerHRVW10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/ChungKV10,
  author    = {Kai{-}Min Chung and
               Yael Tauman Kalai and
               Salil P. Vadhan},
  title     = {Improved Delegation of Computation using Fully Homomorphic Encryption},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2010},
  pages     = {241},
  year      = {2010},
  url       = {http://eprint.iacr.org/2010/241},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/ChungKV10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jacm/GuruswamiUV09,
  author    = {Venkatesan Guruswami and
               Christopher Umans and
               Salil P. Vadhan},
  title     = {Unbalanced expanders and randomness extractors from Parvaresh-Vardy
               codes},
  journal   = {J. {ACM}},
  volume    = {56},
  number    = {4},
  pages     = {20:1--20:34},
  year      = {2009},
  url       = {http://doi.acm.org/10.1145/1538902.1538904},
  doi       = {10.1145/1538902.1538904},
  timestamp = {Fri, 06 Jan 2017 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/journals/jacm/GuruswamiUV09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/siamcomp/HaitnerNORV09,
  author    = {Iftach Haitner and
               Minh{-}Huyen Nguyen and
               Shien Jin Ong and
               Omer Reingold and
               Salil P. Vadhan},
  title     = {Statistically Hiding Commitments and Statistical Zero-Knowledge Arguments
               from Any One-Way Function},
  journal   = {{SIAM} J. Comput.},
  volume    = {39},
  number    = {3},
  pages     = {1153--1218},
  year      = {2009},
  url       = {https://doi.org/10.1137/080725404},
  doi       = {10.1137/080725404},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/siamcomp/HaitnerNORV09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/approx/LovettRTV09,
  author    = {Shachar Lovett and
               Omer Reingold and
               Luca Trevisan and
               Salil P. Vadhan},
  title     = {Pseudorandom Bit Generators That Fool Modular Sums},
  booktitle = {Approximation, Randomization, and Combinatorial Optimization. Algorithms
               and Techniques, 12th International Workshop, {APPROX} 2009, and 13th
               International Workshop, {RANDOM} 2009, Berkeley, CA, USA, August 21-23,
               2009. Proceedings},
  pages     = {615--630},
  year      = {2009},
  crossref  = {DBLP:conf/approx/2009},
  url       = {https://doi.org/10.1007/978-3-642-03685-9_46},
  doi       = {10.1007/978-3-642-03685-9_46},
  timestamp = {Tue, 23 May 2017 01:11:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/approx/LovettRTV09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/coco/RothblumV09,
  author    = {Guy N. Rothblum and
               Salil P. Vadhan},
  title     = {Are PCPs Inherent in Efficient Arguments?},
  booktitle = {Proceedings of the 24th Annual {IEEE} Conference on Computational
               Complexity, {CCC} 2009, Paris, France, 15-18 July 2009},
  pages     = {81--92},
  year      = {2009},
  crossref  = {DBLP:conf/coco/2009},
  url       = {https://doi.org/10.1109/CCC.2009.40},
  doi       = {10.1109/CCC.2009.40},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/coco/RothblumV09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/coco/TrevisanTV09,
  author    = {Luca Trevisan and
               Madhur Tulsiani and
               Salil P. Vadhan},
  title     = {Regularity, Boosting, and Efficiently Simulating Every High-Entropy
               Distribution},
  booktitle = {Proceedings of the 24th Annual {IEEE} Conference on Computational
               Complexity, {CCC} 2009, Paris, France, 15-18 July 2009},
  pages     = {126--136},
  year      = {2009},
  crossref  = {DBLP:conf/coco/2009},
  url       = {https://doi.org/10.1109/CCC.2009.41},
  doi       = {10.1109/CCC.2009.41},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/coco/TrevisanTV09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MironovPRV09,
  author    = {Ilya Mironov and
               Omkant Pandey and
               Omer Reingold and
               Salil P. Vadhan},
  title     = {Computational Differential Privacy},
  booktitle = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
               Proceedings},
  pages     = {126--142},
  year      = {2009},
  crossref  = {DBLP:conf/crypto/2009},
  url       = {https://doi.org/10.1007/978-3-642-03356-8_8},
  doi       = {10.1007/978-3-642-03356-8_8},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/MironovPRV09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/stoc/DworkNRRV09,
  author    = {Cynthia Dwork and
               Moni Naor and
               Omer Reingold and
               Guy N. Rothblum and
               Salil P. Vadhan},
  title     = {On the complexity of differentially private data release: efficient
               algorithms and hardness results},
  booktitle = {Proceedings of the 41st Annual {ACM} Symposium on Theory of Computing,
               {STOC} 2009, Bethesda, MD, USA, May 31 - June 2, 2009},
  pages     = {381--390},
  year      = {2009},
  crossref  = {DBLP:conf/stoc/2009},
  url       = {http://doi.acm.org/10.1145/1536414.1536467},
  doi       = {10.1145/1536414.1536467},
  timestamp = {Fri, 05 Jun 2009 09:31:27 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/DworkNRRV09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/stoc/HaitnerRVW09,
  author    = {Iftach Haitner and
               Omer Reingold and
               Salil P. Vadhan and
               Hoeteck Wee},
  title     = {Inaccessible entropy},
  booktitle = {Proceedings of the 41st Annual {ACM} Symposium on Theory of Computing,
               {STOC} 2009, Bethesda, MD, USA, May 31 - June 2, 2009},
  pages     = {611--620},
  year      = {2009},
  crossref  = {DBLP:conf/stoc/2009},
  url       = {http://doi.acm.org/10.1145/1536414.1536497},
  doi       = {10.1145/1536414.1536497},
  timestamp = {Fri, 05 Jun 2009 09:31:27 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/HaitnerRVW09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/tcc/OngPRV09,
  author    = {Shien Jin Ong and
               David C. Parkes and
               Alon Rosen and
               Salil P. Vadhan},
  title     = {Fairness with an Honest Minority and a Rational Majority},
  booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
               2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  pages     = {36--53},
  year      = {2009},
  crossref  = {DBLP:conf/tcc/2009},
  url       = {https://doi.org/10.1007/978-3-642-00457-5_3},
  doi       = {10.1007/978-3-642-00457-5_3},
  timestamp = {Tue, 23 May 2017 01:06:08 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/OngPRV09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DodisVW09,
  author    = {Yevgeniy Dodis and
               Salil P. Vadhan and
               Daniel Wichs},
  title     = {Proofs of Retrievability via Hardness Amplification},
  booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
               2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  pages     = {109--127},
  year      = {2009},
  crossref  = {DBLP:conf/tcc/2009},
  url       = {https://doi.org/10.1007/978-3-642-00457-5_8},
  doi       = {10.1007/978-3-642-00457-5_8},
  timestamp = {Tue, 23 May 2017 01:06:08 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/DodisVW09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eccc/HaitnerRVW09,
  author    = {Iftach Haitner and
               Omer Reingold and
               Salil P. Vadhan and
               Hoeteck Wee},
  title     = {Inaccessible Entropy},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {16},
  pages     = {45},
  year      = {2009},
  url       = {http://eccc.hpi-web.de/report/2009/045},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/eccc/HaitnerRVW09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eccc/RothblumV09,
  author    = {Guy N. Rothblum and
               Salil P. Vadhan},
  title     = {Are PCPs Inherent in Efficient Arguments?},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {16},
  pages     = {89},
  year      = {2009},
  url       = {http://eccc.hpi-web.de/report/2009/089},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/eccc/RothblumV09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/DodisVW09,
  author    = {Yevgeniy Dodis and
               Salil P. Vadhan and
               Daniel Wichs},
  title     = {Proofs of Retrievability via Hardness Amplification},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {41},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/041},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/DodisVW09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BirrellV09,
  author    = {Eleanor Birrell and
               Salil P. Vadhan},
  title     = {Composition of Zero-Knowledge Proofs with Efficient Provers},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {604},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/604},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/BirrellV09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/joc/NguyenV08,
  author    = {Minh{-}Huyen Nguyen and
               Salil P. Vadhan},
  title     = {Simpler Session-Key Generation from Short Random Passwords},
  journal   = {J. Cryptology},
  volume    = {21},
  number    = {1},
  pages     = {52--96},
  year      = {2008},
  url       = {https://doi.org/10.1007/s00145-007-9008-4},
  doi       = {10.1007/s00145-007-9008-4},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/joc/NguyenV08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/siamcomp/SanghviV08,
  author    = {Saurabh Sanghvi and
               Salil P. Vadhan},
  title     = {The Round Complexity of Two-Party Random Selection},
  journal   = {{SIAM} J. Comput.},
  volume    = {38},
  number    = {2},
  pages     = {523--550},
  year      = {2008},
  url       = {https://doi.org/10.1137/050641715},
  doi       = {10.1137/050641715},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/siamcomp/SanghviV08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/approx/BogdanovMV08,
  author    = {Andrej Bogdanov and
               Elchanan Mossel and
               Salil P. Vadhan},
  title     = {The Complexity of Distinguishing Markov Random Fields},
  booktitle = {Approximation, Randomization and Combinatorial Optimization. Algorithms
               and Techniques, 11th International Workshop, {APPROX} 2008, and 12th
               International Workshop, {RANDOM} 2008, Boston, MA, USA, August 25-27,
               2008. Proceedings},
  pages     = {331--342},
  year      = {2008},
  crossref  = {DBLP:conf/approx/2008},
  url       = {https://doi.org/10.1007/978-3-540-85363-3_27},
  doi       = {10.1007/978-3-540-85363-3_27},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/approx/BogdanovMV08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/approx/ChungV08,
  author    = {Kai{-}Min Chung and
               Salil P. Vadhan},
  title     = {Tight Bounds for Hashing Block Sources},
  booktitle = {Approximation, Randomization and Combinatorial Optimization. Algorithms
               and Techniques, 11th International Workshop, {APPROX} 2008, and 12th
               International Workshop, {RANDOM} 2008, Boston, MA, USA, August 25-27,
               2008. Proceedings},
  pages     = {357--370},
  year      = {2008},
  crossref  = {DBLP:conf/approx/2008},
  url       = {https://doi.org/10.1007/978-3-540-85363-3_29},
  doi       = {10.1007/978-3-540-85363-3_29},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/approx/ChungV08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/approx/GutfreundV08,
  author    = {Dan Gutfreund and
               Salil P. Vadhan},
  title     = {Limitations of Hardness vs. Randomness under Uniform Reductions},
  booktitle = {Approximation, Randomization and Combinatorial Optimization. Algorithms
               and Techniques, 11th International Workshop, {APPROX} 2008, and 12th
               International Workshop, {RANDOM} 2008, Boston, MA, USA, August 25-27,
               2008. Proceedings},
  pages     = {469--482},
  year      = {2008},
  crossref  = {DBLP:conf/approx/2008},
  url       = {https://doi.org/10.1007/978-3-540-85363-3_37},
  doi       = {10.1007/978-3-540-85363-3_37},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/approx/GutfreundV08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/focs/ReingoldTTV08,
  author    = {Omer Reingold and
               Luca Trevisan and
               Madhur Tulsiani and
               Salil P. Vadhan},
  title     = {Dense Subsets of Pseudorandom Sets},
  booktitle = {49th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
               2008, October 25-28, 2008, Philadelphia, PA, {USA}},
  pages     = {76--85},
  year      = {2008},
  crossref  = {DBLP:conf/focs/2008},
  url       = {https://doi.org/10.1109/FOCS.2008.38},
  doi       = {10.1109/FOCS.2008.38},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/focs/ReingoldTTV08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/soda/MitzenmacherV08,
  author    = {Michael Mitzenmacher and
               Salil P. Vadhan},
  title     = {Why simple hash functions work: exploiting the entropy in a data stream},
  booktitle = {Proceedings of the Nineteenth Annual {ACM-SIAM} Symposium on Discrete
               Algorithms, {SODA} 2008, San Francisco, California, USA, January 20-22,
               2008},
  pages     = {746--755},
  year      = {2008},
  crossref  = {DBLP:conf/soda/2008},
  url       = {http://dl.acm.org/citation.cfm?id=1347082.1347164},
  timestamp = {Fri, 07 Dec 2012 17:02:08 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/soda/MitzenmacherV08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/tcc/OngV08,
  author    = {Shien Jin Ong and
               Salil P. Vadhan},
  title     = {An Equivalence Between Zero Knowledge and Commitments},
  booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
               2008, New York, USA, March 19-21, 2008.},
  pages     = {482--500},
  year      = {2008},
  crossref  = {DBLP:conf/tcc/2008},
  url       = {https://doi.org/10.1007/978-3-540-78524-8_27},
  doi       = {10.1007/978-3-540-78524-8_27},
  timestamp = {Fri, 02 Jun 2017 13:01:06 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/OngV08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/tcc/ChaillouxCKV08,
  author    = {Andr{\'{e}} Chailloux and
               Dragos Florin Ciocan and
               Iordanis Kerenidis and
               Salil P. Vadhan},
  title     = {Interactive and Noninteractive Zero Knowledge are Equivalent in the
               Help Model},
  booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
               2008, New York, USA, March 19-21, 2008.},
  pages     = {501--534},
  year      = {2008},
  crossref  = {DBLP:conf/tcc/2008},
  url       = {https://doi.org/10.1007/978-3-540-78524-8_28},
  doi       = {10.1007/978-3-540-78524-8_28},
  timestamp = {Fri, 02 Jun 2017 13:01:06 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/ChaillouxCKV08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/abs-0806-1948,
  author    = {Kai{-}Min Chung and
               Salil P. Vadhan},
  title     = {Tight Bounds for Hashing Block Sources},
  journal   = {CoRR},
  volume    = {abs/0806.1948},
  year      = {2008},
  url       = {http://arxiv.org/abs/0806.1948},
  archivePrefix = {arXiv},
  eprint    = {0806.1948},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/abs-0806-1948},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eccc/GutfreundV08,
  author    = {Dan Gutfreund and
               Salil P. Vadhan},
  title     = {Limitations of Hardness vs. Randomness under Uniform Reductions},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {15},
  number    = {007},
  year      = {2008},
  url       = {http://eccc.hpi-web.de/eccc-reports/2008/TR08-007/index.html},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/eccc/GutfreundV08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eccc/ReingoldTTV08,
  author    = {Omer Reingold and
               Luca Trevisan and
               Madhur Tulsiani and
               Salil P. Vadhan},
  title     = {Dense Subsets of Pseudorandom Sets},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {15},
  number    = {045},
  year      = {2008},
  url       = {http://eccc.hpi-web.de/eccc-reports/2008/TR08-045/index.html},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/eccc/ReingoldTTV08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eccc/TrevisanTV08,
  author    = {Luca Trevisan and
               Madhur Tulsiani and
               Salil P. Vadhan},
  title     = {Regularity, Boosting, and Efficiently Simulating Every High-Entropy
               Distribution},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {15},
  number    = {103},
  year      = {2008},
  url       = {http://eccc.hpi-web.de/eccc-reports/2008/TR08-103/index.html},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/eccc/TrevisanTV08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/OngPRV08,
  author    = {Shien Jin Ong and
               David C. Parkes and
               Alon Rosen and
               Salil P. Vadhan},
  title     = {Fairness with an Honest Minority and a Rational Majority},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2008},
  pages     = {97},
  year      = {2008},
  url       = {http://eprint.iacr.org/2008/097},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/OngPRV08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/cc/GoldreichV07,
  author    = {Oded Goldreich and
               Salil P. Vadhan},
  title     = {Special Issue On Worst-case Versus Average-case Complexity Editors'
               Foreword},
  journal   = {Computational Complexity},
  volume    = {16},
  number    = {4},
  pages     = {325--330},
  year      = {2007},
  url       = {https://doi.org/10.1007/s00037-007-0232-y},
  doi       = {10.1007/s00037-007-0232-y},
  timestamp = {Wed, 15 Nov 2017 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/journals/cc/GoldreichV07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/cc/TrevisanV07,
  author    = {Luca Trevisan and
               Salil P. Vadhan},
  title     = {Pseudorandomness and Average-Case Complexity Via Uniform Reductions},
  journal   = {Computational Complexity},
  volume    = {16},
  number    = {4},
  pages     = {331--364},
  year      = {2007},
  url       = {https://doi.org/10.1007/s00037-007-0233-x},
  doi       = {10.1007/s00037-007-0233-x},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/cc/TrevisanV07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ipl/RonRV07,
  author    = {Dana Ron and
               Amir Rosenfeld and
               Salil P. Vadhan},
  title     = {The hardness of the Expected Decision Depth problem},
  journal   = {Inf. Process. Lett.},
  volume    = {101},
  number    = {3},
  pages     = {112--118},
  year      = {2007},
  url       = {https://doi.org/10.1016/j.ipl.2006.08.012},
  doi       = {10.1016/j.ipl.2006.08.012},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/ipl/RonRV07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/siamcomp/BarakOV07,
  author    = {Boaz Barak and
               Shien Jin Ong and
               Salil P. Vadhan},
  title     = {Derandomization in Cryptography},
  journal   = {{SIAM} J. Comput.},
  volume    = {37},
  number    = {2},
  pages     = {380--400},
  year      = {2007},
  url       = {https://doi.org/10.1137/050641958},
  doi       = {10.1137/050641958},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/siamcomp/BarakOV07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/sigact/Vadhan07,
  author    = {Salil P. Vadhan},
  title     = {The unified theory of pseudorandomness: guest column},
  journal   = {{SIGACT} News},
  volume    = {38},
  number    = {3},
  pages     = {39--54},
  year      = {2007},
  url       = {http://doi.acm.org/10.1145/1324215.1324225},
  doi       = {10.1145/1324215.1324225},
  timestamp = {Thu, 08 May 2008 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/sigact/Vadhan07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/coco/GuruswamiUV07,
  author    = {Venkatesan Guruswami and
               Christopher Umans and
               Salil P. Vadhan},
  title     = {Unbalanced Expanders and Randomness Extractors from Parvaresh-Vardy
               Codes},
  booktitle = {22nd Annual {IEEE} Conference on Computational Complexity {(CCC} 2007),
               13-16 June 2007, San Diego, California, {USA}},
  pages     = {96--108},
  year      = {2007},
  crossref  = {DBLP:conf/coco/2007},
  url       = {https://doi.org/10.1109/CCC.2007.38},
  doi       = {10.1109/CCC.2007.38},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/coco/GuruswamiUV07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/coco/ChungRV07,
  author    = {Kai{-}Min Chung and
               Omer Reingold and
               Salil P. Vadhan},
  title     = {{S-T} Connectivity on Digraphs with a Known Stationary Distribution},
  booktitle = {22nd Annual {IEEE} Conference on Computational Complexity {(CCC} 2007),
               13-16 June 2007, San Diego, California, {USA}},
  pages     = {236--249},
  year      = {2007},
  crossref  = {DBLP:conf/coco/2007},
  url       = {https://doi.org/10.1109/CCC.2007.30},
  doi       = {10.1109/CCC.2007.30},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/coco/ChungRV07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CanettiRSTVW07,
  author    = {Ran Canetti and
               Ronald L. Rivest and
               Madhu Sudan and
               Luca Trevisan and
               Salil P. Vadhan and
               Hoeteck Wee},
  title     = {Amplifying Collision Resistance: {A} Complexity-Theoretic Treatment},
  booktitle = {Advances in Cryptology - {CRYPTO} 2007, 27th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007,
               Proceedings},
  pages     = {264--283},
  year      = {2007},
  crossref  = {DBLP:conf/crypto/2007},
  url       = {https://doi.org/10.1007/978-3-540-74143-5_15},
  doi       = {10.1007/978-3-540-74143-5_15},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/CanettiRSTVW07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/OngV07,
  author    = {Shien Jin Ong and
               Salil P. Vadhan},
  title     = {Zero Knowledge and Soundness Are Symmetric},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Barcelona, Spain, May 20-24, 2007, Proceedings},
  pages     = {187--209},
  year      = {2007},
  crossref  = {DBLP:conf/eurocrypt/2007},
  url       = {https://doi.org/10.1007/978-3-540-72540-4_11},
  doi       = {10.1007/978-3-540-72540-4_11},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/OngV07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fsttcs/Vadhan07,
  author    = {Salil P. Vadhan},
  title     = {The Complexity of Zero Knowledge},
  booktitle = {{FSTTCS} 2007: Foundations of Software Technology and Theoretical
               Computer Science, 27th International Conference, New Delhi, India,
               December 12-14, 2007, Proceedings},
  pages     = {52--70},
  year      = {2007},
  crossref  = {DBLP:conf/fsttcs/2007},
  url       = {https://doi.org/10.1007/978-3-540-77050-3_5},
  doi       = {10.1007/978-3-540-77050-3_5},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fsttcs/Vadhan07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/tcc/2007,
  editor    = {Salil P. Vadhan},
  title     = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
               2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4392},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-70936-7},
  doi       = {10.1007/978-3-540-70936-7},
  isbn      = {3-540-70935-5},
  timestamp = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/2007},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eccc/ChungRV07,
  author    = {Kai{-}Min Chung and
               Omer Reingold and
               Salil P. Vadhan},
  title     = {{S-T} Connectivity on Digraphs with a Known Stationary Distribution},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {14},
  number    = {030},
  year      = {2007},
  url       = {http://eccc.hpi-web.de/eccc-reports/2007/TR07-030/index.html},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/eccc/ChungRV07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/CiocanV07,
  author    = {Dragos Florin Ciocan and
               Salil P. Vadhan},
  title     = {Interactive and Noninteractive Zero Knowledge Coincide in the Help
               Model},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2007},
  pages     = {389},
  year      = {2007},
  url       = {http://eprint.iacr.org/2007/389},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/CiocanV07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/ChaillouxCKV07,
  author    = {Andr{\'{e}} Chailloux and
               Dragos Florin Ciocan and
               Iordanis Kerenidis and
               Salil P. Vadhan},
  title     = {Interactive and Noninteractive Zero Knowledge are Equivalent in the
               Help Model},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2007},
  pages     = {467},
  year      = {2007},
  url       = {http://eprint.iacr.org/2007/467},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/ChaillouxCKV07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jcss/BarakLV06,
  author    = {Boaz Barak and
               Yehuda Lindell and
               Salil P. Vadhan},
  title     = {Lower bounds for non-black-box zero knowledge},
  journal   = {J. Comput. Syst. Sci.},
  volume    = {72},
  number    = {2},
  pages     = {321--391},
  year      = {2006},
  url       = {https://doi.org/10.1016/j.jcss.2005.06.010},
  doi       = {10.1016/j.jcss.2005.06.010},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/jcss/BarakLV06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/siamcomp/HealyVV06,
  author    = {Alexander Healy and
               Salil P. Vadhan and
               Emanuele Viola},
  title     = {Using Nondeterminism to Amplify Hardness},
  journal   = {{SIAM} J. Comput.},
  volume    = {35},
  number    = {4},
  pages     = {903--931},
  year      = {2006},
  url       = {https://doi.org/10.1137/S0097539705447281},
  doi       = {10.1137/S0097539705447281},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/siamcomp/HealyVV06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/siamcomp/Ben-SassonGHSV06,
  author    = {Eli Ben{-}Sasson and
               Oded Goldreich and
               Prahladh Harsha and
               Madhu Sudan and
               Salil P. Vadhan},
  title     = {Robust PCPs of Proximity, Shorter PCPs, and Applications to Coding},
  journal   = {{SIAM} J. Comput.},
  volume    = {36},
  number    = {4},
  pages     = {889--974},
  year      = {2006},
  url       = {https://doi.org/10.1137/S0097539705446810},
  doi       = {10.1137/S0097539705446810},
  timestamp = {Wed, 15 Nov 2017 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/journals/siamcomp/Ben-SassonGHSV06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/siamcomp/Vadhan06,
  author    = {Salil P. Vadhan},
  title     = {An Unconditional Study of Computational Zero Knowledge},
  journal   = {{SIAM} J. Comput.},
  volume    = {36},
  number    = {4},
  pages     = {1160--1214},
  year      = {2006},
  url       = {https://doi.org/10.1137/S0097539705447207},
  doi       = {10.1137/S0097539705447207},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/siamcomp/Vadhan06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GradwohlVZ06,
  author    = {Ronen Gradwohl and
               Salil P. Vadhan and
               David Zuckerman},
  title     = {Random Selection with an Adversarial Majority},
  booktitle = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 20-24,
               2006, Proceedings},
  pages     = {409--426},
  year      = {2006},
  crossref  = {DBLP:conf/crypto/2006},
  url       = {https://doi.org/10.1007/11818175_25},
  doi       = {10.1007/11818175_25},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/GradwohlVZ06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/focs/NguyenOV06,
  author    = {Minh{-}Huyen Nguyen and
               Shien Jin Ong and
               Salil P. Vadhan},
  title     = {Statistical Zero-Knowledge Arguments for {NP} from Any One-Way Function},
  booktitle = {47th Annual {IEEE} Symposium on Foundations of Computer Science {(FOCS}
               2006), 21-24 October 2006, Berkeley, California, USA, Proceedings},
  pages     = {3--14},
  year      = {2006},
  crossref  = {DBLP:conf/focs/2006},
  url       = {https://doi.org/10.1109/FOCS.2006.71},
  doi       = {10.1109/FOCS.2006.71},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/focs/NguyenOV06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sigecom/SchoenebeckV06,
  author    = {Grant Schoenebeck and
               Salil P. Vadhan},
  title     = {The computational complexity of nash equilibria in concisely represented
               games},
  booktitle = {Proceedings 7th {ACM} Conference on Electronic Commerce (EC-2006),
               Ann Arbor, Michigan, USA, June 11-15, 2006},
  pages     = {270--279},
  year      = {2006},
  crossref  = {DBLP:conf/sigecom/2006},
  url       = {http://doi.acm.org/10.1145/1134707.1134737},
  doi       = {10.1145/1134707.1134737},
  timestamp = {Mon, 24 Feb 2014 16:09:46 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/sigecom/SchoenebeckV06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/stoc/NguyenV06,
  author    = {Minh{-}Huyen Nguyen and
               Salil P. Vadhan},
  title     = {Zero knowledge with efficient provers},
  booktitle = {Proceedings of the 38th Annual {ACM} Symposium on Theory of Computing,
               Seattle, WA, USA, May 21-23, 2006},
  pages     = {287--295},
  year      = {2006},
  crossref  = {DBLP:conf/stoc/2006},
  url       = {http://doi.acm.org/10.1145/1132516.1132559},
  doi       = {10.1145/1132516.1132559},
  timestamp = {Thu, 15 Feb 2007 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/NguyenV06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/stoc/ReingoldTV06,
  author    = {Omer Reingold and
               Luca Trevisan and
               Salil P. Vadhan},
  title     = {Pseudorandom walks on regular digraphs and the {RL} vs. {L} problem},
  booktitle = {Proceedings of the 38th Annual {ACM} Symposium on Theory of Computing,
               Seattle, WA, USA, May 21-23, 2006},
  pages     = {457--466},
  year      = {2006},
  crossref  = {DBLP:conf/stoc/2006},
  url       = {http://doi.acm.org/10.1145/1132516.1132583},
  doi       = {10.1145/1132516.1132583},
  timestamp = {Thu, 15 Feb 2007 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/ReingoldTV06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/stoc/KampRVZ06,
  author    = {Jesse Kamp and
               Anup Rao and
               Salil P. Vadhan and
               David Zuckerman},
  title     = {Deterministic extractors for small-space sources},
  booktitle = {Proceedings of the 38th Annual {ACM} Symposium on Theory of Computing,
               Seattle, WA, USA, May 21-23, 2006},
  pages     = {691--700},
  year      = {2006},
  crossref  = {DBLP:conf/stoc/2006},
  url       = {http://doi.acm.org/10.1145/1132516.1132613},
  doi       = {10.1145/1132516.1132613},
  timestamp = {Thu, 15 Feb 2007 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/KampRVZ06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/tcc/MicciancioOSV06,
  author    = {Daniele Micciancio and
               Shien Jin Ong and
               Amit Sahai and
               Salil P. Vadhan},
  title     = {Concurrent Zero Knowledge Without Complexity Assumptions},
  booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC}
               2006, New York, NY, USA, March 4-7, 2006, Proceedings},
  pages     = {1--20},
  year      = {2006},
  crossref  = {DBLP:conf/tcc/2006},
  url       = {https://doi.org/10.1007/11681878_1},
  doi       = {10.1007/11681878_1},
  timestamp = {Tue, 30 May 2017 16:36:52 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/MicciancioOSV06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eccc/GradwohlVZ06,
  author    = {Ronen Gradwohl and
               Salil P. Vadhan and
               David Zuckerman},
  title     = {Random Selection with an Adversarial Majority},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {13},
  number    = {026},
  year      = {2006},
  url       = {http://eccc.hpi-web.de/eccc-reports/2006/TR06-026/index.html},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/eccc/GradwohlVZ06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eccc/Vadhan06,
  author    = {Salil P. Vadhan},
  title     = {An Unconditional Study of Computational Zero Knowledge},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {13},
  number    = {056},
  year      = {2006},
  url       = {http://eccc.hpi-web.de/eccc-reports/2006/TR06-056/index.html},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/eccc/Vadhan06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eccc/NguyenOV06,
  author    = {Minh{-}Huyen Nguyen and
               Shien Jin Ong and
               Salil P. Vadhan},
  title     = {Statistical Zero-Knowledge Arguments for {NP} from Any One-Way Function},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {13},
  number    = {075},
  year      = {2006},
  url       = {http://eccc.hpi-web.de/eccc-reports/2006/TR06-075/index.html},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/eccc/NguyenOV06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eccc/GuruswamiUV06,
  author    = {Venkatesan Guruswami and
               Christopher Umans and
               Salil P. Vadhan},
  title     = {Extractors and condensers from univariate polynomials},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {13},
  number    = {134},
  year      = {2006},
  url       = {http://eccc.hpi-web.de/eccc-reports/2006/TR06-134/index.html},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/eccc/GuruswamiUV06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eccc/OngV06,
  author    = {Shien Jin Ong and
               Salil P. Vadhan},
  title     = {Zero Knowledge and Soundness are Symmetric},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {13},
  number    = {139},
  year      = {2006},
  url       = {http://eccc.hpi-web.de/eccc-reports/2006/TR06-139/index.html},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/eccc/OngV06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/NguyenOV06,
  author    = {Minh{-}Huyen Nguyen and
               Shien Jin Ong and
               Salil P. Vadhan},
  title     = {Statistical Zero-Knowledge Arguments for {NP} from Any One-Way Function},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2006},
  pages     = {185},
  year      = {2006},
  url       = {http://eprint.iacr.org/2006/185},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/NguyenOV06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/OngV06,
  author    = {Shien Jin Ong and
               Salil P. Vadhan},
  title     = {Zero Knowledge and Soundness are Symmetric},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2006},
  pages     = {414},
  year      = {2006},
  url       = {http://eprint.iacr.org/2006/414},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/OngV06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/cc/TrevisanVZ05,
  author    = {Luca Trevisan and
               Salil P. Vadhan and
               David Zuckerman},
  title     = {Compression of Samplable Sources},
  journal   = {Computational Complexity},
  volume    = {14},
  number    = {3},
  pages     = {186--227},
  year      = {2005},
  url       = {https://doi.org/10.1007/s00037-005-0198-6},
  doi       = {10.1007/s00037-005-0198-6},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/cc/TrevisanVZ05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/approx/GuruswamiV05,
  author    = {Venkatesan Guruswami and
               Salil P. Vadhan},
  title     = {A Lower Bound on List Size for List Decoding},
  booktitle = {Approximation, Randomization and Combinatorial Optimization, Algorithms
               and Techniques, 8th International Workshop on Approximation Algorithms
               for Combinatorial Optimization Problems, {APPROX} 2005 and 9th InternationalWorkshop
               on Randomization and Computation, {RANDOM} 2005, Berkeley, CA, USA,
               August 22-24, 2005, Proceedings},
  pages     = {318--329},
  year      = {2005},
  crossref  = {DBLP:conf/approx/2005},
  url       = {https://doi.org/10.1007/11538462_27},
  doi       = {10.1007/11538462_27},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/approx/GuruswamiV05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/approx/RozenmanV05,
  author    = {Eyal Rozenman and
               Salil P. Vadhan},
  title     = {Derandomized Squaring of Graphs},
  booktitle = {Approximation, Randomization and Combinatorial Optimization, Algorithms
               and Techniques, 8th International Workshop on Approximation Algorithms
               for Combinatorial Optimization Problems, {APPROX} 2005 and 9th InternationalWorkshop
               on Randomization and Computation, {RANDOM} 2005, Berkeley, CA, USA,
               August 22-24, 2005, Proceedings},
  pages     = {436--447},
  year      = {2005},
  crossref  = {DBLP:conf/approx/2005},
  url       = {https://doi.org/10.1007/11538462_37},
  doi       = {10.1007/11538462_37},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/approx/RozenmanV05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/coco/Ben-SassonGHSV05,
  author    = {Eli Ben{-}Sasson and
               Oded Goldreich and
               Prahladh Harsha and
               Madhu Sudan and
               Salil P. Vadhan},
  title     = {Short PCPs Verifiable in Polylogarithmic Time},
  booktitle = {20th Annual {IEEE} Conference on Computational Complexity {(CCC} 2005),
               11-15 June 2005, San Jose, CA, {USA}},
  pages     = {120--134},
  year      = {2005},
  crossref  = {DBLP:conf/coco/2005},
  url       = {https://doi.org/10.1109/CCC.2005.27},
  doi       = {10.1109/CCC.2005.27},
  timestamp = {Wed, 15 Nov 2017 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/coco/Ben-SassonGHSV05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/stoc/SanghviV05,
  author    = {Saurabh Sanghvi and
               Salil P. Vadhan},
  title     = {The round complexity of two-party random selection},
  booktitle = {Proceedings of the 37th Annual {ACM} Symposium on Theory of Computing,
               Baltimore, MD, USA, May 22-24, 2005},
  pages     = {338--347},
  year      = {2005},
  crossref  = {DBLP:conf/stoc/2005},
  url       = {http://doi.acm.org/10.1145/1060590.1060641},
  doi       = {10.1145/1060590.1060641},
  timestamp = {Wed, 15 Feb 2006 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/SanghviV05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:reference/crypt/Vadhan05,
  author    = {Salil P. Vadhan},
  title     = {Computational Complexity},
  booktitle = {Encyclopedia of Cryptography and Security},
  year      = {2005},
  crossref  = {DBLP:reference/crypt/2005},
  url       = {https://doi.org/10.1007/0-387-23483-7_75},
  doi       = {10.1007/0-387-23483-7_75},
  timestamp = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/reference/crypt/Vadhan05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR05-012,
  author    = {Luca Trevisan and
               Salil P. Vadhan and
               David Zuckerman},
  title     = {Compression of Samplable Sources},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  number    = {012},
  year      = {2005},
  url       = {http://eccc.hpi-web.de/eccc-reports/2005/TR05-012/index.html},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/eccc/ECCC-TR05-012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR05-022,
  author    = {Omer Reingold and
               Luca Trevisan and
               Salil P. Vadhan},
  title     = {Pseudorandom Walks in Biregular Graphs and the {RL} vs. {L} Problem},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  number    = {022},
  year      = {2005},
  url       = {http://eccc.hpi-web.de/eccc-reports/2005/TR05-022/index.html},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/eccc/ECCC-TR05-022},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR05-052,
  author    = {Grant Schoenebeck and
               Salil P. Vadhan},
  title     = {The Computational Complexity of Nash Equilibria in Concisely Represented
               Games},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  number    = {052},
  year      = {2005},
  url       = {http://eccc.hpi-web.de/eccc-reports/2005/TR05-052/index.html},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/eccc/ECCC-TR05-052},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR05-092,
  author    = {Eyal Rozenman and
               Salil P. Vadhan},
  title     = {Derandomized Squaring of Graphs},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  number    = {092},
  year      = {2005},
  url       = {http://eccc.hpi-web.de/eccc-reports/2005/TR05-092/index.html},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/eccc/ECCC-TR05-092},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR05-093,
  author    = {Daniele Micciancio and
               Shien Jin Ong and
               Amit Sahai and
               Salil P. Vadhan},
  title     = {Concurrent Zero Knowledge without Complexity Assumptions},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  number    = {093},
  year      = {2005},
  url       = {http://eccc.hpi-web.de/eccc-reports/2005/TR05-093/index.html},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/eccc/ECCC-TR05-093},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR05-110,
  author    = {Saurabh Sanghvi and
               Salil P. Vadhan},
  title     = {The Round Complexity of Two-Party Random Selection},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  number    = {110},
  year      = {2005},
  url       = {http://eccc.hpi-web.de/eccc-reports/2005/TR05-110/index.html},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/eccc/ECCC-TR05-110},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR05-114,
  author    = {Boaz Barak and
               Shien Jin Ong and
               Salil P. Vadhan},
  title     = {Derandomization in Cryptography},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  number    = {114},
  year      = {2005},
  url       = {http://eccc.hpi-web.de/eccc-reports/2005/TR05-114/index.html},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/eccc/ECCC-TR05-114},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/MicciancioOSV05,
  author    = {Daniele Micciancio and
               Shien Jin Ong and
               Amit Sahai and
               Salil P. Vadhan},
  title     = {Concurrent Zero Knowledge without Complexity Assumptions},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2005},
  pages     = {286},
  year      = {2005},
  url       = {http://eprint.iacr.org/2005/286},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/MicciancioOSV05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BarakOV05,
  author    = {Boaz Barak and
               Shien Jin Ong and
               Salil P. Vadhan},
  title     = {Derandomization in Cryptography},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2005},
  pages     = {365},
  year      = {2005},
  url       = {http://eprint.iacr.org/2005/365},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/BarakOV05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/joc/Vadhan04,
  author    = {Salil P. Vadhan},
  title     = {Constructing Locally Computable Extractors and Cryptosystems in the
               Bounded-Storage Model},
  journal   = {J. Cryptology},
  volume    = {17},
  number    = {1},
  pages     = {43--77},
  year      = {2004},
  url       = {https://doi.org/10.1007/s00145-003-0237-x},
  doi       = {10.1007/s00145-003-0237-x},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/joc/Vadhan04},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/coco/TrevisanVZ04,
  author    = {Luca Trevisan and
               Salil P. Vadhan and
               David Zuckerman},
  title     = {Compression of Samplable Sources},
  booktitle = {19th Annual {IEEE} Conference on Computational Complexity {(CCC} 2004),
               21-24 June 2004, Amherst, MA, {USA}},
  pages     = {1--14},
  year      = {2004},
  crossref  = {DBLP:conf/coco/2004},
  url       = {https://doi.org/10.1109/CCC.2004.1313766},
  doi       = {10.1109/CCC.2004.1313766},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/coco/TrevisanVZ04},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/focs/Vadhan04,
  author    = {Salil P. Vadhan},
  title     = {An Unconditional Study of Computational Zero Knowledge},
  booktitle = {45th Symposium on Foundations of Computer Science {(FOCS} 2004), 17-19
               October 2004, Rome, Italy, Proceedings},
  pages     = {176--185},
  year      = {2004},
  crossref  = {DBLP:conf/focs/2004},
  url       = {https://doi.org/10.1109/FOCS.2004.13},
  doi       = {10.1109/FOCS.2004.13},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/focs/Vadhan04},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/stoc/Ben-SassonGHSV04,
  author    = {Eli Ben{-}Sasson and
               Oded Goldreich and
               Prahladh Harsha and
               Madhu Sudan and
               Salil P. Vadhan},
  title     = {Robust pcps of proximity, shorter pcps and applications to coding},
  booktitle = {Proceedings of the 36th Annual {ACM} Symposium on Theory of Computing,
               Chicago, IL, USA, June 13-16, 2004},
  pages     = {1--10},
  year      = {2004},
  crossref  = {DBLP:conf/stoc/2004},
  url       = {http://doi.acm.org/10.1145/1007352.1007361},
  doi       = {10.1145/1007352.1007361},
  timestamp = {Wed, 15 Nov 2017 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/Ben-SassonGHSV04},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/stoc/HealyVV04,
  author    = {Alexander Healy and
               Salil P. Vadhan and
               Emanuele Viola},
  title     = {Using nondeterminism to amplify hardness},
  booktitle = {Proceedings of the 36th Annual {ACM} Symposium on Theory of Computing,
               Chicago, IL, USA, June 13-16, 2004},
  pages     = {192--201},
  year      = {2004},
  crossref  = {DBLP:conf/stoc/2004},
  url       = {http://doi.acm.org/10.1145/1007352.1007389},
  doi       = {10.1145/1007352.1007389},
  timestamp = {Wed, 15 Feb 2006 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/HealyVV04},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/tcc/ReingoldTV04,
  author    = {Omer Reingold and
               Luca Trevisan and
               Salil P. Vadhan},
  title     = {Notions of Reducibility between Cryptographic Primitives},
  booktitle = {Theory of Cryptography, First Theory of Cryptography Conference, {TCC}
               2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings},
  pages     = {1--20},
  year      = {2004},
  crossref  = {DBLP:conf/tcc/2004},
  url       = {https://doi.org/10.1007/978-3-540-24638-1_1},
  doi       = {10.1007/978-3-540-24638-1_1},
  timestamp = {Mon, 29 May 2017 16:53:43 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/ReingoldTV04},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/tcc/NguyenV04,
  author    = {Minh{-}Huyen Nguyen and
               Salil P. Vadhan},
  title     = {Simpler Session-Key Generation from Short Random Passwords},
  booktitle = {Theory of Cryptography, First Theory of Cryptography Conference, {TCC}
               2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings},
  pages     = {428--445},
  year      = {2004},
  crossref  = {DBLP:conf/tcc/2004},
  url       = {https://doi.org/10.1007/978-3-540-24638-1_24},
  doi       = {10.1007/978-3-540-24638-1_24},
  timestamp = {Mon, 29 May 2017 16:53:43 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/NguyenV04},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR04-021,
  author    = {Eli Ben{-}Sasson and
               Oded Goldreich and
               Prahladh Harsha and
               Madhu Sudan and
               Salil P. Vadhan},
  title     = {Robust PCPs of Proximity, Shorter PCPs and Applications to Coding},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  number    = {021},
  year      = {2004},
  url       = {http://eccc.hpi-web.de/eccc-reports/2004/TR04-021/index.html},
  timestamp = {Wed, 15 Nov 2017 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/journals/eccc/ECCC-TR04-021},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR04-083,
  author    = {Boaz Barak and
               Yehuda Lindell and
               Salil P. Vadhan},
  title     = {Lower Bounds for Non-Black-Box Zero Knowledge},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  number    = {083},
  year      = {2004},
  url       = {http://eccc.hpi-web.de/eccc-reports/2004/TR04-083/index.html},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/eccc/ECCC-TR04-083},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR04-087,
  author    = {Alexander Healy and
               Salil P. Vadhan and
               Emanuele Viola},
  title     = {Using Nondeterminism to Amplify Hardness},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  number    = {087},
  year      = {2004},
  url       = {http://eccc.hpi-web.de/eccc-reports/2004/TR04-087/index.html},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/eccc/ECCC-TR04-087},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/NguyenV04,
  author    = {Minh{-}Huyen Nguyen and
               Salil P. Vadhan},
  title     = {Simpler Session-Key Generation from Short Random Passwords},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2004},
  pages     = {182},
  year      = {2004},
  url       = {http://eprint.iacr.org/2004/182},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/NguyenV04},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BarakLV04,
  author    = {Boaz Barak and
               Yehuda Lindell and
               Salil P. Vadhan},
  title     = {Lower Bounds for Non-Black-Box Zero Knowledge},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2004},
  pages     = {226},
  year      = {2004},
  url       = {http://eprint.iacr.org/2004/226},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/BarakLV04},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jacm/SahaiV03,
  author    = {Amit Sahai and
               Salil P. Vadhan},
  title     = {A complete problem for statistical zero knowledge},
  journal   = {J. {ACM}},
  volume    = {50},
  number    = {2},
  pages     = {196--249},
  year      = {2003},
  url       = {http://doi.acm.org/10.1145/636865.636868},
  doi       = {10.1145/636865.636868},
  timestamp = {Thu, 20 Nov 2003 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/journals/jacm/SahaiV03},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Vadhan03,
  author    = {Salil P. Vadhan},
  title     = {On Constructing Locally Computable Extractors and Cryptosystems in
               the Bounded Storage Model},
  booktitle = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 17-21,
               2003, Proceedings},
  pages     = {61--77},
  year      = {2003},
  crossref  = {DBLP:conf/crypto/2003},
  url       = {https://doi.org/10.1007/978-3-540-45146-4_4},
  doi       = {10.1007/978-3-540-45146-4_4},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/Vadhan03},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MicciancioV03,
  author    = {Daniele Micciancio and
               Salil P. Vadhan},
  title     = {Statistical Zero-Knowledge Proofs with Efficient Provers: Lattice
               Problems and More},
  booktitle = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 17-21,
               2003, Proceedings},
  pages     = {282--298},
  year      = {2003},
  crossref  = {DBLP:conf/crypto/2003},
  url       = {https://doi.org/10.1007/978-3-540-45146-4_17},
  doi       = {10.1007/978-3-540-45146-4_17},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/MicciancioV03},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BarakOV03,
  author    = {Boaz Barak and
               Shien Jin Ong and
               Salil P. Vadhan},
  title     = {Derandomization in Cryptography},
  booktitle = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 17-21,
               2003, Proceedings},
  pages     = {299--315},
  year      = {2003},
  crossref  = {DBLP:conf/crypto/2003},
  url       = {https://doi.org/10.1007/978-3-540-45146-4_18},
  doi       = {10.1007/978-3-540-45146-4_18},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/BarakOV03},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/focs/BarakLV03,
  author    = {Boaz Barak and
               Yehuda Lindell and
               Salil P. Vadhan},
  title     = {Lower Bounds for Non-Black-Box Zero Knowledge},
  booktitle = {44th Symposium on Foundations of Computer Science {(FOCS} 2003), 11-14
               October 2003, Cambridge, MA, USA, Proceedings},
  pages     = {384--393},
  year      = {2003},
  crossref  = {DBLP:conf/focs/2003},
  url       = {https://doi.org/10.1109/SFCS.2003.1238212},
  doi       = {10.1109/SFCS.2003.1238212},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/focs/BarakLV03},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/stoc/LuRVW03,
  author    = {Chi{-}Jen Lu and
               Omer Reingold and
               Salil P. Vadhan and
               Avi Wigderson},
  title     = {Extractors: optimal up to constant factors},
  booktitle = {Proceedings of the 35th Annual {ACM} Symposium on Theory of Computing,
               June 9-11, 2003, San Diego, CA, {USA}},
  pages     = {602--611},
  year      = {2003},
  crossref  = {DBLP:conf/stoc/2003},
  url       = {http://doi.acm.org/10.1145/780542.780630},
  doi       = {10.1145/780542.780630},
  timestamp = {Mon, 17 Oct 2011 15:55:10 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/LuRVW03},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/stoc/Ben-SassonSVW03,
  author    = {Eli Ben{-}Sasson and
               Madhu Sudan and
               Salil P. Vadhan and
               Avi Wigderson},
  title     = {Randomness-efficient low degree tests and short PCPs via epsilon-biased
               sets},
  booktitle = {Proceedings of the 35th Annual {ACM} Symposium on Theory of Computing,
               June 9-11, 2003, San Diego, CA, {USA}},
  pages     = {612--621},
  year      = {2003},
  crossref  = {DBLP:conf/stoc/2003},
  url       = {http://doi.acm.org/10.1145/780542.780631},
  doi       = {10.1145/780542.780631},
  timestamp = {Mon, 17 Oct 2011 15:55:10 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/Ben-SassonSVW03},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/cc/GoldreichVW02,
  author    = {Oded Goldreich and
               Salil P. Vadhan and
               Avi Wigderson},
  title     = {On interactive proofs with a laconic prover},
  journal   = {Computational Complexity},
  volume    = {11},
  number    = {1-2},
  pages     = {1--53},
  year      = {2002},
  url       = {https://doi.org/10.1007/s00037-002-0169-0},
  doi       = {10.1007/s00037-002-0169-0},
  timestamp = {Wed, 15 Nov 2017 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/journals/cc/GoldreichVW02},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iandc/BenderFRSV02,
  author    = {Michael A. Bender and
               Antonio Fern{\'{a}}ndez and
               Dana Ron and
               Amit Sahai and
               Salil P. Vadhan},
  title     = {The Power of a Pebble: Exploring and Mapping Directed Graphs},
  journal   = {Inf. Comput.},
  volume    = {176},
  number    = {1},
  pages     = {1--21},
  year      = {2002},
  url       = {https://doi.org/10.1006/inco.2001.3081},
  doi       = {10.1006/inco.2001.3081},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iandc/BenderFRSV02},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jcss/RazRV02,
  author    = {Ran Raz and
               Omer Reingold and
               Salil P. Vadhan},
  title     = {Extracting all the Randomness and Reducing the Error in Trevisan's
               Extractors},
  journal   = {J. Comput. Syst. Sci.},
  volume    = {65},
  number    = {1},
  pages     = {97--128},
  year      = {2002},
  url       = {https://doi.org/10.1006/jcss.2002.1824},
  doi       = {10.1006/jcss.2002.1824},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/jcss/RazRV02},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/coco/CapalboRVW02,
  author    = {Michael R. Capalbo and
               Omer Reingold and
               Salil P. Vadhan and
               Avi Wigderson},
  title     = {Randomness Conductors and Constant-Degree Lossless Expanders},
  booktitle = {Proceedings of the 17th Annual {IEEE} Conference on Computational
               Complexity, Montr{\'{e}}al, Qu{\'{e}}bec, Canada, May 21-24,
               2002},
  pages     = {15},
  year      = {2002},
  crossref  = {DBLP:conf/coco/2002},
  url       = {https://doi.org/10.1109/CCC.2002.1004327},
  doi       = {10.1109/CCC.2002.1004327},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/coco/CapalboRVW02},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/coco/TrevisanV02,
  author    = {Luca Trevisan and
               Salil P. Vadhan},
  title     = {Pseudorandomness and Average-Case Complexity via Uniform Reductions},
  booktitle = {Proceedings of the 17th Annual {IEEE} Conference on Computational
               Complexity, Montr{\'{e}}al, Qu{\'{e}}bec, Canada, May 21-24,
               2002},
  pages     = {129--138},
  year      = {2002},
  crossref  = {DBLP:conf/coco/2002},
  url       = {https://doi.org/10.1109/CCC.2002.1004348},
  doi       = {10.1109/CCC.2002.1004348},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/coco/TrevisanV02},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/focs/Vadhan02,
  author    = {Salil P. Vadhan},
  title     = {Randomness Extractors and their Many Guises},
  booktitle = {43rd Symposium on Foundations of Computer Science {(FOCS} 2002), 16-19
               November 2002, Vancouver, BC, Canada, Proceedings},
  pages     = {9},
  year      = {2002},
  crossref  = {DBLP:conf/focs/2002},
  url       = {https://doi.org/10.1109/SFCS.2002.1181877},
  doi       = {10.1109/SFCS.2002.1181877},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/focs/Vadhan02},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/scn/DedicRV02,
  author    = {Nenad Dedic and
               Leonid Reyzin and
               Salil P. Vadhan},
  title     = {An Improved Pseudorandom Generator Based on Hardness of Factoring},
  booktitle = {Security in Communication Networks, Third International Conference,
               {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  pages     = {88--101},
  year      = {2002},
  crossref  = {DBLP:conf/scn/2002},
  url       = {https://doi.org/10.1007/3-540-36413-7_7},
  doi       = {10.1007/3-540-36413-7_7},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/scn/DedicRV02},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/stoc/CapalboRVW02,
  author    = {Michael R. Capalbo and
               Omer Reingold and
               Salil P. Vadhan and
               Avi Wigderson},
  title     = {Randomness conductors and constant-degree lossless expanders},
  booktitle = {Proceedings on 34th Annual {ACM} Symposium on Theory of Computing,
               May 19-21, 2002, Montr{\'{e}}al, Qu{\'{e}}bec, Canada},
  pages     = {659--668},
  year      = {2002},
  crossref  = {DBLP:conf/stoc/2002},
  url       = {http://doi.acm.org/10.1145/509907.510003},
  doi       = {10.1145/509907.510003},
  timestamp = {Thu, 16 Feb 2012 12:04:12 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/CapalboRVW02},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/random/2002,
  editor    = {Jos{\'{e}} D. P. Rolim and
               Salil P. Vadhan},
  title     = {Randomization and Approximation Techniques, 6th International Workshop,
               {RANDOM} 2002, Cambridge, MA, USA, September 13-15, 2002, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2483},
  publisher = {Springer},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-45726-7},
  doi       = {10.1007/3-540-45726-7},
  isbn      = {3-540-44147-6},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/random/2002},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/DedicRV02,
  author    = {Nenad Dedic and
               Leonid Reyzin and
               Salil P. Vadhan},
  title     = {An Improved Pseudorandom Generator Based on Hardness of Factoring},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2002},
  pages     = {131},
  year      = {2002},
  url       = {http://eprint.iacr.org/2002/131},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/DedicRV02},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/Vadhan02,
  author    = {Salil P. Vadhan},
  title     = {On Constructing Locally Computable Extractors and Cryptosystems in
               the Bounded Storage Model},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2002},
  pages     = {162},
  year      = {2002},
  url       = {http://eprint.iacr.org/2002/162},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/Vadhan02},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jcss/SudanTV01,
  author    = {Madhu Sudan and
               Luca Trevisan and
               Salil P. Vadhan},
  title     = {Pseudorandom Generators without the {XOR} Lemma},
  journal   = {J. Comput. Syst. Sci.},
  volume    = {62},
  number    = {2},
  pages     = {236--266},
  year      = {2001},
  url       = {https://doi.org/10.1006/jcss.2000.1730},
  doi       = {10.1006/jcss.2000.1730},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/jcss/SudanTV01},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/siamcomp/Vadhan01,
  author    = {Salil P. Vadhan},
  title     = {The Complexity of Counting in Sparse, Regular, and Planar Graphs},
  journal   = {{SIAM} J. Comput.},
  volume    = {31},
  number    = {2},
  pages     = {398--427},
  year      = {2001},
  url       = {https://doi.org/10.1137/S0097539797321602},
  doi       = {10.1137/S0097539797321602},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/siamcomp/Vadhan01},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BarakGIRSVY01,
  author    = {Boaz Barak and
               Oded Goldreich and
               Russell Impagliazzo and
               Steven Rudich and
               Amit Sahai and
               Salil P. Vadhan and
               Ke Yang},
  title     = {On the (Im)possibility of Obfuscating Programs},
  booktitle = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 19-23,
               2001, Proceedings},
  pages     = {1--18},
  year      = {2001},
  crossref  = {DBLP:conf/crypto/2001},
  url       = {https://doi.org/10.1007/3-540-44647-8_1},
  doi       = {10.1007/3-540-44647-8_1},
  timestamp = {Wed, 15 Nov 2017 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/BarakGIRSVY01},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icalp/GoldreichVW01,
  author    = {Oded Goldreich and
               Salil P. Vadhan and
               Avi Wigderson},
  title     = {On Interactive Proofs with a Laconic Prover},
  booktitle = {Automata, Languages and Programming, 28th International Colloquium,
               {ICALP} 2001, Crete, Greece, July 8-12, 2001, Proceedings},
  pages     = {334--345},
  year      = {2001},
  crossref  = {DBLP:conf/icalp/2001},
  url       = {https://doi.org/10.1007/3-540-48224-5_28},
  doi       = {10.1007/3-540-48224-5_28},
  timestamp = {Wed, 15 Nov 2017 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/icalp/GoldreichVW01},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/random/Vadhan01,
  author    = {Salil P. Vadhan},
  title     = {Order in Pseudorandomness},
  booktitle = {Approximation, Randomization and Combinatorial Optimization: Algorithms
               and Techniques, 4th International Workshop on Approximation Algorithms
               for Combinatorial Optimization Problems, {APPROX} 2001 and 5th International
               Workshop on Randomization and Approximation Techniques in Computer
               Science, {RANDOM} 2001 Berkeley, CA, USA, August 18-20, 2001, Proceedings},
  pages     = {10--11},
  year      = {2001},
  crossref  = {DBLP:conf/random/2001},
  url       = {https://doi.org/10.1007/3-540-44666-4_5},
  doi       = {10.1007/3-540-44666-4_5},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/random/Vadhan01},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR01-018,
  author    = {Omer Reingold and
               Salil P. Vadhan and
               Avi Wigderson},
  title     = {Entropy Waves, the Zig-Zag Graph Product, and New Constant-Degree
               Expanders and Extractors},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {8},
  number    = {18},
  year      = {2001},
  url       = {http://eccc.hpi-web.de/eccc-reports/2001/TR01-018/index.html},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/eccc/ECCC-TR01-018},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR01-046,
  author    = {Oded Goldreich and
               Salil P. Vadhan and
               Avi Wigderson},
  title     = {On Interactive Proofs with a Laconic Prover},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {8},
  number    = {46},
  year      = {2001},
  url       = {http://eccc.hpi-web.de/eccc-reports/2001/TR01-046/index.html},
  timestamp = {Wed, 15 Nov 2017 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/journals/eccc/ECCC-TR01-046},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR01-057,
  author    = {Boaz Barak and
               Oded Goldreich and
               Russell Impagliazzo and
               Steven Rudich and
               Amit Sahai and
               Salil P. Vadhan and
               Ke Yang},
  title     = {On the (Im)possibility of Obfuscating Programs},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {8},
  number    = {057},
  year      = {2001},
  url       = {http://eccc.hpi-web.de/eccc-reports/2001/TR01-057/index.html},
  timestamp = {Wed, 15 Nov 2017 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/journals/eccc/ECCC-TR01-057},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BarakGIRSVY01,
  author    = {Boaz Barak and
               Oded Goldreich and
               Russell Impagliazzo and
               Steven Rudich and
               Amit Sahai and
               Salil P. Vadhan and
               Ke Yang},
  title     = {On the (Im)possibility of Obfuscating Programs},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2001},
  pages     = {69},
  year      = {2001},
  url       = {http://eprint.iacr.org/2001/069},
  timestamp = {Wed, 15 Nov 2017 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/BarakGIRSVY01},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/focs/ReingoldVW00,
  author    = {Omer Reingold and
               Salil P. Vadhan and
               Avi Wigderson},
  title     = {Entropy Waves, the Zig-Zag Graph Product, and New Constant-Degree
               Expanders and Extractors},
  booktitle = {41st Annual Symposium on Foundations of Computer Science, {FOCS} 2000,
               12-14 November 2000, Redondo Beach, California, {USA}},
  pages     = {3--13},
  year      = {2000},
  crossref  = {DBLP:conf/focs/2000},
  url       = {https://doi.org/10.1109/SFCS.2000.892006},
  doi       = {10.1109/SFCS.2000.892006},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/focs/ReingoldVW00},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/focs/TrevisanV00,
  author    = {Luca Trevisan and
               Salil P. Vadhan},
  title     = {Extracting Randomness from Samplable Distributions},
  booktitle = {41st Annual Symposium on Foundations of Computer Science, {FOCS} 2000,
               12-14 November 2000, Redondo Beach, California, {USA}},
  pages     = {32--42},
  year      = {2000},
  crossref  = {DBLP:conf/focs/2000},
  url       = {https://doi.org/10.1109/SFCS.2000.892063},
  doi       = {10.1109/SFCS.2000.892063},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/focs/TrevisanV00},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/stoc/Vadhan00,
  author    = {Salil P. Vadhan},
  title     = {On transformation of interactive proofs that preserve the prover's
               complexity},
  booktitle = {Proceedings of the Thirty-Second Annual {ACM} Symposium on Theory
               of Computing, May 21-23, 2000, Portland, OR, {USA}},
  pages     = {200--207},
  year      = {2000},
  crossref  = {DBLP:conf/stoc/2000},
  url       = {http://doi.acm.org/10.1145/335305.335330},
  doi       = {10.1145/335305.335330},
  timestamp = {Thu, 16 Feb 2012 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/Vadhan00},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR00-004,
  author    = {Oded Goldreich and
               Salil P. Vadhan and
               Avi Wigderson},
  title     = {Simplified derandomization of {BPP} using a hitting set generator},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {7},
  number    = {4},
  year      = {2000},
  url       = {http://eccc.hpi-web.de/eccc-reports/2000/TR00-004/index.html},
  timestamp = {Wed, 15 Nov 2017 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/journals/eccc/ECCC-TR00-004},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR00-084,
  author    = {Amit Sahai and
               Salil P. Vadhan},
  title     = {A Complete Problem for Statistical Zero Knowledge},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {7},
  number    = {84},
  year      = {2000},
  url       = {http://eccc.hpi-web.de/eccc-reports/2000/TR00-084/index.html},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/eccc/ECCC-TR00-084},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/SahaiV00,
  author    = {Amit Sahai and
               Salil P. Vadhan},
  title     = {A Complete Problem for Statistical Zero Knowledge},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2000},
  pages     = {56},
  year      = {2000},
  url       = {http://eprint.iacr.org/2000/056},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/SahaiV00},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/coco/SudanTV99,
  author    = {Madhu Sudan and
               Luca Trevisan and
               Salil P. Vadhan},
  title     = {Pseudorandom Generators without the {XOR} Lemma (Abstract)},
  booktitle = {Proceedings of the 14th Annual {IEEE} Conference on Computational
               Complexity, Atlanta, Georgia, USA, May 4-6, 1999},
  pages     = {4},
  year      = {1999},
  crossref  = {DBLP:conf/coco/1999},
  url       = {https://doi.org/10.1109/CCC.1999.766253},
  doi       = {10.1109/CCC.1999.766253},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/coco/SudanTV99},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/coco/GoldreichV99,
  author    = {Oded Goldreich and
               Salil P. Vadhan},
  title     = {Comparing Entropies in Statistical Zero Knowledge with Applications
               to the Structure of {SZK}},
  booktitle = {Proceedings of the 14th Annual {IEEE} Conference on Computational
               Complexity, Atlanta, Georgia, USA, May 4-6, 1999},
  pages     = {54},
  year      = {1999},
  crossref  = {DBLP:conf/coco/1999},
  url       = {https://doi.org/10.1109/CCC.1999.766262},
  doi       = {10.1109/CCC.1999.766262},
  timestamp = {Wed, 15 Nov 2017 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/coco/GoldreichV99},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoldreichSV99,
  author    = {Oded Goldreich and
               Amit Sahai and
               Salil P. Vadhan},
  title     = {Can Statistical Zero Knowledge Be Made Non-interactive? or On the
               Relationship of {SZK} and {NISZK}},
  booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  pages     = {467--484},
  year      = {1999},
  crossref  = {DBLP:conf/crypto/1999},
  url       = {https://doi.org/10.1007/3-540-48405-1_30},
  doi       = {10.1007/3-540-48405-1_30},
  timestamp = {Wed, 15 Nov 2017 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/GoldreichSV99},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/focs/MicaliRV99,
  author    = {Silvio Micali and
               Michael O. Rabin and
               Salil P. Vadhan},
  title     = {Verifiable Random Functions},
  booktitle = {40th Annual Symposium on Foundations of Computer Science, {FOCS} '99,
               17-18 October, 1999, New York, NY, {USA}},
  pages     = {120--130},
  year      = {1999},
  crossref  = {DBLP:conf/focs/1999},
  url       = {https://doi.org/10.1109/SFFCS.1999.814584},
  doi       = {10.1109/SFFCS.1999.814584},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/focs/MicaliRV99},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/focs/RazRV99,
  author    = {Ran Raz and
               Omer Reingold and
               Salil P. Vadhan},
  title     = {Error Reduction for Extractors},
  booktitle = {40th Annual Symposium on Foundations of Computer Science, {FOCS} '99,
               17-18 October, 1999, New York, NY, {USA}},
  pages     = {191--201},
  year      = {1999},
  crossref  = {DBLP:conf/focs/1999},
  url       = {https://doi.org/10.1109/SFFCS.1999.814591},
  doi       = {10.1109/SFFCS.1999.814591},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/focs/RazRV99},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/stoc/RazRV99,
  author    = {Ran Raz and
               Omer Reingold and
               Salil P. Vadhan},
  title     = {Extracting all the Randomness and Reducing the Error in Trevisan's
               Extractors},
  booktitle = {Proceedings of the Thirty-First Annual {ACM} Symposium on Theory of
               Computing, May 1-4, 1999, Atlanta, Georgia, {USA}},
  pages     = {149--158},
  year      = {1999},
  crossref  = {DBLP:conf/stoc/1999},
  url       = {http://doi.acm.org/10.1145/301250.301292},
  doi       = {10.1145/301250.301292},
  timestamp = {Thu, 16 Feb 2012 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/RazRV99},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/stoc/SudanTV99,
  author    = {Madhu Sudan and
               Luca Trevisan and
               Salil P. Vadhan},
  title     = {Pseudorandom Generators Without the {XOR} Lemma (Extended Abstract)},
  booktitle = {Proceedings of the Thirty-First Annual {ACM} Symposium on Theory of
               Computing, May 1-4, 1999, Atlanta, Georgia, {USA}},
  pages     = {537--546},
  year      = {1999},
  crossref  = {DBLP:conf/stoc/1999},
  url       = {http://doi.acm.org/10.1145/301250.301397},
  doi       = {10.1145/301250.301397},
  timestamp = {Thu, 16 Feb 2012 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/SudanTV99},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR99-013,
  author    = {Oded Goldreich and
               Amit Sahai and
               Salil P. Vadhan},
  title     = {Can Statistical Zero Knowledge be made Non-Interactive? or On the
               Relationship of {SZK} and {NISZK}},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {6},
  number    = {13},
  year      = {1999},
  url       = {http://eccc.hpi-web.de/eccc-reports/1999/TR99-013/index.html},
  timestamp = {Wed, 15 Nov 2017 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/journals/eccc/ECCC-TR99-013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR99-046,
  author    = {Ran Raz and
               Omer Reingold and
               Salil P. Vadhan},
  title     = {Extracting All the Randomness and Reducing the Error in Trevisan's
               Extractors},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  number    = {46},
  year      = {1999},
  url       = {http://eccc.hpi-web.de/eccc-reports/1999/TR99-046/index.html},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/eccc/ECCC-TR99-046},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BellareHSV98,
  author    = {Mihir Bellare and
               Shai Halevi and
               Amit Sahai and
               Salil P. Vadhan},
  title     = {Many-to-One Trapdoor Functions and Their Ralation to Public-Key Cryptosystems},
  booktitle = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings},
  pages     = {283--298},
  year      = {1998},
  crossref  = {DBLP:conf/crypto/1998},
  url       = {https://doi.org/10.1007/BFb0055735},
  doi       = {10.1007/BFb0055735},
  timestamp = {Tue, 23 May 2017 11:53:59 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/BellareHSV98},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/stoc/BenderFRSV98,
  author    = {Michael A. Bender and
               Antonio Fern{\'{a}}ndez and
               Dana Ron and
               Amit Sahai and
               Salil P. Vadhan},
  title     = {The Power of a Pebble: Exploring and Mapping Directed Graphs},
  booktitle = {Proceedings of the Thirtieth Annual {ACM} Symposium on the Theory
               of Computing, Dallas, Texas, USA, May 23-26, 1998},
  pages     = {269--278},
  year      = {1998},
  crossref  = {DBLP:conf/stoc/1998},
  url       = {http://doi.acm.org/10.1145/276698.276759},
  doi       = {10.1145/276698.276759},
  timestamp = {Sat, 13 Jul 2013 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/BenderFRSV98},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/stoc/GoldreichSV98,
  author    = {Oded Goldreich and
               Amit Sahai and
               Salil P. Vadhan},
  title     = {Honest-Verifier Statistical Zero-Knowledge Equals General Statistical
               Zero-Knowledge},
  booktitle = {Proceedings of the Thirtieth Annual {ACM} Symposium on the Theory
               of Computing, Dallas, Texas, USA, May 23-26, 1998},
  pages     = {399--408},
  year      = {1998},
  crossref  = {DBLP:conf/stoc/1998},
  url       = {http://doi.acm.org/10.1145/276698.276852},
  doi       = {10.1145/276698.276852},
  timestamp = {Wed, 15 Nov 2017 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/GoldreichSV98},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/stoc/LewinV98,
  author    = {Daniel Lewin and
               Salil P. Vadhan},
  title     = {Checking Polynomial Identities over any Field: Towards a Derandomization?},
  booktitle = {Proceedings of the Thirtieth Annual {ACM} Symposium on the Theory
               of Computing, Dallas, Texas, USA, May 23-26, 1998},
  pages     = {438--447},
  year      = {1998},
  crossref  = {DBLP:conf/stoc/1998},
  url       = {http://doi.acm.org/10.1145/276698.276856},
  doi       = {10.1145/276698.276856},
  timestamp = {Thu, 16 Feb 2012 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/LewinV98},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR98-047,
  author    = {Salil P. Vadhan},
  title     = {Extracting All the Randomness from a Weakly Random Source},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {5},
  number    = {47},
  year      = {1998},
  url       = {http://eccc.hpi-web.de/eccc-reports/1998/TR98-047/index.html},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/eccc/ECCC-TR98-047},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR98-063,
  author    = {Oded Goldreich and
               Salil P. Vadhan},
  title     = {Comparing Entropies in Statistical Zero-Knowledge with Applications
               to the Structure of {SZK}},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {5},
  number    = {63},
  year      = {1998},
  url       = {http://eccc.hpi-web.de/eccc-reports/1998/TR98-063/index.html},
  timestamp = {Wed, 15 Nov 2017 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/journals/eccc/ECCC-TR98-063},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR98-074,
  author    = {Madhu Sudan and
               Luca Trevisan and
               Salil P. Vadhan},
  title     = {Pseudorandom generators without the {XOR} Lemma},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {5},
  number    = {74},
  year      = {1998},
  url       = {http://eccc.hpi-web.de/eccc-reports/1998/TR98-074/index.html},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/eccc/ECCC-TR98-074},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BellareHSV98,
  author    = {Mihir Bellare and
               Shai Halevi and
               Amit Sahai and
               Salil P. Vadhan},
  title     = {Many-to-one Trapdoor Functions and their Relation to Public-key Cryptosystems},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {1998},
  pages     = {19},
  year      = {1998},
  url       = {http://eprint.iacr.org/1998/019},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/BellareHSV98},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/GoldreichV98,
  author    = {Oded Goldreich and
               Salil P. Vadhan},
  title     = {Comparing Entropies in Statistical Zero-Knowledge with Applications
               to the Structure of {SZK}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {1998},
  pages     = {26},
  year      = {1998},
  url       = {http://eprint.iacr.org/1998/026},
  timestamp = {Wed, 15 Nov 2017 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/GoldreichV98},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/SahaiV97,
  author    = {Amit Sahai and
               Salil P. Vadhan},
  title     = {Manipulating statistical difference},
  booktitle = {Randomization Methods in Algorithm Design, Proceedings of a {DIMACS}
               Workshop, Princeton, New Jersey, USA, December 12-14, 1997},
  pages     = {251--270},
  year      = {1997},
  crossref  = {DBLP:conf/dimacs/dimacs43},
  timestamp = {Mon, 14 Mar 2016 19:27:05 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/dimacs/SahaiV97},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/focs/SahaiV97,
  author    = {Amit Sahai and
               Salil P. Vadhan},
  title     = {A Complete Promise Problem for Statistical Zero-Knowledge},
  booktitle = {38th Annual Symposium on Foundations of Computer Science, {FOCS} '97,
               Miami Beach, Florida, USA, October 19-22, 1997},
  pages     = {448--457},
  year      = {1997},
  crossref  = {DBLP:conf/focs/1997},
  url       = {https://doi.org/10.1109/SFCS.1997.646133},
  doi       = {10.1109/SFCS.1997.646133},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/focs/SahaiV97},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/colt/2017,
  editor    = {Satyen Kale and
               Ohad Shamir},
  title     = {Proceedings of the 30th Conference on Learning Theory, {COLT} 2017,
               Amsterdam, The Netherlands, 7-10 July 2017},
  series    = {Proceedings of Machine Learning Research},
  volume    = {65},
  publisher = {{PMLR}},
  year      = {2017},
  url       = {http://jmlr.org/proceedings/papers/v65/},
  timestamp = {Wed, 16 Aug 2017 11:08:55 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/colt/2017},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/focs/2017,
  editor    = {Chris Umans},
  title     = {58th {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS}
               2017, Berkeley, CA, USA, October 15-17, 2017},
  publisher = {{IEEE} Computer Society},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8100284},
  isbn      = {978-1-5386-3464-6},
  timestamp = {Thu, 16 Nov 2017 15:01:42 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/focs/2017},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@book{DBLP:books/sp/L2017,
  editor    = {Yehuda Lindell},
  title     = {Tutorials on the Foundations of Cryptography},
  publisher = {Springer International Publishing},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-57048-8},
  doi       = {10.1007/978-3-319-57048-8},
  isbn      = {978-3-319-57047-1},
  timestamp = {Thu, 29 Jun 2017 17:40:41 +0200},
  biburl    = {http://dblp.org/rec/bib/books/sp/L2017},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icml/2016,
  editor    = {Maria{-}Florina Balcan and
               Kilian Q. Weinberger},
  title     = {Proceedings of the 33nd International Conference on Machine Learning,
               {ICML} 2016, New York City, NY, USA, June 19-24, 2016},
  series    = {{JMLR} Workshop and Conference Proceedings},
  volume    = {48},
  publisher = {JMLR.org},
  year      = {2016},
  url       = {http://jmlr.org/proceedings/papers/v48/},
  timestamp = {Tue, 12 Jul 2016 21:51:16 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icml/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/nips/2016,
  editor    = {Daniel D. Lee and
               Masashi Sugiyama and
               Ulrike von Luxburg and
               Isabelle Guyon and
               Roman Garnett},
  title     = {Advances in Neural Information Processing Systems 29: Annual Conference
               on Neural Information Processing Systems 2016, December 5-10, 2016,
               Barcelona, Spain},
  year      = {2016},
  url       = {http://papers.nips.cc/book/advances-in-neural-information-processing-systems-29-2016},
  timestamp = {Fri, 03 Mar 2017 14:59:41 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/nips/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/pods/2016,
  editor    = {Tova Milo and
               Wang{-}Chiew Tan},
  title     = {Proceedings of the 35th {ACM} {SIGMOD-SIGACT-SIGAI} Symposium on Principles
               of Database Systems, {PODS} 2016, San Francisco, CA, USA, June 26
               - July 01, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {http://doi.acm.org/10.1145/2902251},
  doi       = {10.1145/2902251},
  isbn      = {978-1-4503-4191-2},
  timestamp = {Sat, 18 Jun 2016 14:40:49 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/pods/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/tcc/2016a1,
  editor    = {Eyal Kushilevitz and
               Tal Malkin},
  title     = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A,
               Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9562},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-49096-9},
  doi       = {10.1007/978-3-662-49096-9},
  isbn      = {978-3-662-49095-2},
  timestamp = {Tue, 23 May 2017 01:06:08 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/2016a1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/tcc/2016b1,
  editor    = {Martin Hirt and
               Adam D. Smith},
  title     = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
               Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9985},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-53641-4},
  doi       = {10.1007/978-3-662-53641-4},
  isbn      = {978-3-662-53640-7},
  timestamp = {Tue, 23 May 2017 01:06:07 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/2016b1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/focs/2015,
  editor    = {Venkatesan Guruswami},
  title     = {{IEEE} 56th Annual Symposium on Foundations of Computer Science, {FOCS}
               2015, Berkeley, CA, USA, 17-20 October, 2015},
  publisher = {{IEEE} Computer Society},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7352273},
  isbn      = {978-1-4673-8191-8},
  timestamp = {Mon, 04 Jan 2016 11:39:48 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/focs/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/approx/2014,
  editor    = {Klaus Jansen and
               Jos{\'{e}} D. P. Rolim and
               Nikhil R. Devanur and
               Cristopher Moore},
  title     = {Approximation, Randomization, and Combinatorial Optimization. Algorithms
               and Techniques, {APPROX/RANDOM} 2014, September 4-6, 2014, Barcelona,
               Spain},
  series    = {LIPIcs},
  volume    = {28},
  publisher = {Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik},
  year      = {2014},
  isbn      = {978-3-939897-74-3},
  timestamp = {Wed, 17 Sep 2014 16:43:51 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/approx/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/innovations/2014,
  editor    = {Moni Naor},
  title     = {Innovations in Theoretical Computer Science, ITCS'14, Princeton, NJ,
               USA, January 12-14, 2014},
  publisher = {{ACM}},
  year      = {2014},
  url       = {http://dl.acm.org/citation.cfm?id=2554797},
  isbn      = {978-1-4503-2698-8},
  timestamp = {Fri, 14 Feb 2014 17:36:37 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/innovations/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/stoc/2014,
  editor    = {David B. Shmoys},
  title     = {Symposium on Theory of Computing, {STOC} 2014, New York, NY, USA,
               May 31 - June 03, 2014},
  publisher = {{ACM}},
  year      = {2014},
  url       = {http://dl.acm.org/citation.cfm?id=2591796},
  isbn      = {978-1-4503-2710-7},
  timestamp = {Wed, 29 Mar 2017 16:45:26 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/wine/2014,
  editor    = {Tie{-}Yan Liu and
               Qi Qi and
               Yinyu Ye},
  title     = {Web and Internet Economics - 10th International Conference, {WINE}
               2014, Beijing, China, December 14-17, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8877},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-13129-0},
  doi       = {10.1007/978-3-319-13129-0},
  isbn      = {978-3-319-13128-3},
  timestamp = {Fri, 26 May 2017 00:49:40 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/wine/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/approx/2013,
  editor    = {Prasad Raghavendra and
               Sofya Raskhodnikova and
               Klaus Jansen and
               Jos{\'{e}} D. P. Rolim},
  title     = {Approximation, Randomization, and Combinatorial Optimization. Algorithms
               and Techniques - 16th International Workshop, {APPROX} 2013, and 17th
               International Workshop, {RANDOM} 2013, Berkeley, CA, USA, August 21-23,
               2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8096},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-40328-6},
  doi       = {10.1007/978-3-642-40328-6},
  isbn      = {978-3-642-40327-9},
  timestamp = {Tue, 23 May 2017 01:10:59 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/approx/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2013-1,
  editor    = {Ran Canetti and
               Juan A. Garay},
  title     = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8042},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-40041-4},
  doi       = {10.1007/978-3-642-40041-4},
  isbn      = {978-3-642-40040-7},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/2013-1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2013,
  editor    = {Thomas Johansson and
               Phong Q. Nguyen},
  title     = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Athens, Greece, May 26-30, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7881},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-38348-9},
  doi       = {10.1007/978-3-642-38348-9},
  isbn      = {978-3-642-38347-2},
  timestamp = {Wed, 24 May 2017 08:31:21 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/innovations/2013,
  editor    = {Robert D. Kleinberg},
  title     = {Innovations in Theoretical Computer Science, {ITCS} '13, Berkeley,
               CA, USA, January 9-12, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2422436},
  isbn      = {978-1-4503-1859-4},
  timestamp = {Sun, 17 Feb 2013 11:19:02 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/innovations/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sigecom/2013,
  editor    = {Michael J. Kearns and
               R. Preston McAfee and
               {\'{E}}va Tardos},
  title     = {{ACM} Conference on Electronic Commerce, {EC} '13, Philadelphia, PA,
               USA, June 16-20, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2492002},
  isbn      = {978-1-4503-1962-1},
  timestamp = {Mon, 27 Nov 2017 14:42:24 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/sigecom/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/stoc/2013,
  editor    = {Dan Boneh and
               Tim Roughgarden and
               Joan Feigenbaum},
  title     = {Symposium on Theory of Computing Conference, STOC'13, Palo Alto, CA,
               USA, June 1-4, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2488608},
  isbn      = {978-1-4503-2029-0},
  timestamp = {Sun, 26 May 2013 10:30:47 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2012,
  editor    = {Reihaneh Safavi{-}Naini and
               Ran Canetti},
  title     = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7417},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-32009-5},
  doi       = {10.1007/978-3-642-32009-5},
  isbn      = {978-3-642-32008-8},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/focs/2012,
  title     = {53rd Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
               2012, New Brunswick, NJ, USA, October 20-23, 2012},
  publisher = {{IEEE} Computer Society},
  year      = {2012},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6374356},
  isbn      = {978-1-4673-4383-1},
  timestamp = {Mon, 15 Dec 2014 18:48:44 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/focs/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icalp/2012-1,
  editor    = {Artur Czumaj and
               Kurt Mehlhorn and
               Andrew M. Pitts and
               Roger Wattenhofer},
  title     = {Automata, Languages, and Programming - 39th International Colloquium,
               {ICALP} 2012, Warwick, UK, July 9-13, 2012, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {7391},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-31594-7},
  doi       = {10.1007/978-3-642-31594-7},
  isbn      = {978-3-642-31593-0},
  timestamp = {Sun, 04 Jun 2017 10:07:30 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icalp/2012-1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/itw/2012,
  title     = {2012 {IEEE} Information Theory Workshop, Lausanne, Switzerland, September
               3-7, 2012},
  publisher = {{IEEE}},
  year      = {2012},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6389798},
  isbn      = {978-1-4673-0224-1},
  timestamp = {Mon, 08 Dec 2014 10:21:29 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/itw/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/stoc/2012,
  editor    = {Howard J. Karloff and
               Toniann Pitassi},
  title     = {Proceedings of the 44th Symposium on Theory of Computing Conference,
               {STOC} 2012, New York, NY, USA, May 19 - 22, 2012},
  publisher = {{ACM}},
  year      = {2012},
  url       = {http://dl.acm.org/citation.cfm?id=2213977},
  isbn      = {978-1-4503-1245-5},
  timestamp = {Tue, 22 May 2012 21:36:43 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/tcc/2012,
  editor    = {Ronald Cramer},
  title     = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC}
               2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7194},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-28914-9},
  doi       = {10.1007/978-3-642-28914-9},
  isbn      = {978-3-642-28913-2},
  timestamp = {Tue, 23 May 2017 01:06:07 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2011,
  editor    = {Phillip Rogaway},
  title     = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 14-18, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6841},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-22792-9},
  doi       = {10.1007/978-3-642-22792-9},
  isbn      = {978-3-642-22791-2},
  timestamp = {Fri, 26 May 2017 00:50:21 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/innovations/2011,
  editor    = {Bernard Chazelle},
  title     = {Innovations in Computer Science - {ICS} 2010, Tsinghua University,
               Beijing, China, January 7-9, 2011. Proceedings},
  publisher = {Tsinghua University Press},
  year      = {2011},
  isbn      = {978-7-302-24517-9},
  timestamp = {Wed, 19 Oct 2011 15:40:50 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/innovations/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/tcc/2011,
  editor    = {Yuval Ishai},
  title     = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC}
               2011, Providence, RI, USA, March 28-30, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6597},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-19571-6},
  doi       = {10.1007/978-3-642-19571-6},
  isbn      = {978-3-642-19570-9},
  timestamp = {Tue, 13 Jun 2017 11:30:16 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@book{DBLP:books/sp/goldreich11,
  editor    = {Oded Goldreich},
  title     = {Studies in Complexity and Cryptography. Miscellanea on the Interplay
               between Randomness and Computation - In Collaboration with Lidor Avigad,
               Mihir Bellare, Zvika Brakerski, Shafi Goldwasser, Shai Halevi, Tali
               Kaufman, Leonid Levin, Noam Nisan, Dana Ron, Madhu Sudan, Luca Trevisan,
               Salil Vadhan, Avi Wigderson, David Zuckerman},
  series    = {Lecture Notes in Computer Science},
  volume    = {6650},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-22670-0},
  doi       = {10.1007/978-3-642-22670-0},
  isbn      = {978-3-642-22669-4},
  timestamp = {Wed, 15 Nov 2017 19:50:09 +0100},
  biburl    = {http://dblp.org/rec/bib/books/sp/goldreich11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@book{DBLP:reference/crypt/2011,
  editor    = {Henk C. A. van Tilborg and
               Sushil Jajodia},
  title     = {Encyclopedia of Cryptography and Security, 2nd Ed},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-1-4419-5906-5},
  doi       = {10.1007/978-1-4419-5906-5},
  isbn      = {978-1-4419-5905-8},
  timestamp = {Tue, 16 May 2017 14:01:51 +0200},
  biburl    = {http://dblp.org/rec/bib/reference/crypt/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2010,
  editor    = {Tal Rabin},
  title     = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6223},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-14623-7},
  doi       = {10.1007/978-3-642-14623-7},
  isbn      = {978-3-642-14622-0},
  timestamp = {Fri, 26 May 2017 00:50:21 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2010,
  editor    = {Henri Gilbert},
  title     = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               French Riviera, May 30 - June 3, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6110},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-13190-5},
  doi       = {10.1007/978-3-642-13190-5},
  isbn      = {978-3-642-13189-9},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/focs/2010,
  title     = {51th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
               2010, October 23-26, 2010, Las Vegas, Nevada, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2010},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5669376},
  isbn      = {978-0-7695-4244-7},
  timestamp = {Mon, 15 Dec 2014 18:48:44 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/focs/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/stoc/2010,
  editor    = {Leonard J. Schulman},
  title     = {Proceedings of the 42nd {ACM} Symposium on Theory of Computing, {STOC}
               2010, Cambridge, Massachusetts, USA, 5-8 June 2010},
  publisher = {{ACM}},
  year      = {2010},
  isbn      = {978-1-4503-0050-6},
  timestamp = {Fri, 12 Oct 2012 12:16:22 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/tcc/2010,
  editor    = {Daniele Micciancio},
  title     = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
               2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5978},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-11799-2},
  doi       = {10.1007/978-3-642-11799-2},
  isbn      = {978-3-642-11798-5},
  timestamp = {Tue, 23 May 2017 01:06:08 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/approx/2009,
  editor    = {Irit Dinur and
               Klaus Jansen and
               Joseph Naor and
               Jos{\'{e}} D. P. Rolim},
  title     = {Approximation, Randomization, and Combinatorial Optimization. Algorithms
               and Techniques, 12th International Workshop, {APPROX} 2009, and 13th
               International Workshop, {RANDOM} 2009, Berkeley, CA, USA, August 21-23,
               2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5687},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-03685-9},
  doi       = {10.1007/978-3-642-03685-9},
  isbn      = {978-3-642-03684-2},
  timestamp = {Tue, 23 May 2017 01:11:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/approx/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/coco/2009,
  title     = {Proceedings of the 24th Annual {IEEE} Conference on Computational
               Complexity, {CCC} 2009, Paris, France, 15-18 July 2009},
  publisher = {{IEEE} Computer Society},
  year      = {2009},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5231175},
  isbn      = {978-0-7695-3717-7},
  timestamp = {Fri, 13 May 2016 10:27:38 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/coco/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2009,
  editor    = {Shai Halevi},
  title     = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5677},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-03356-8},
  doi       = {10.1007/978-3-642-03356-8},
  isbn      = {978-3-642-03355-1},
  timestamp = {Fri, 26 May 2017 00:50:21 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/stoc/2009,
  editor    = {Michael Mitzenmacher},
  title     = {Proceedings of the 41st Annual {ACM} Symposium on Theory of Computing,
               {STOC} 2009, Bethesda, MD, USA, May 31 - June 2, 2009},
  publisher = {{ACM}},
  year      = {2009},
  isbn      = {978-1-60558-506-2},
  timestamp = {Fri, 05 Jun 2009 09:31:27 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/tcc/2009,
  editor    = {Omer Reingold},
  title     = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
               2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5444},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-00457-5},
  doi       = {10.1007/978-3-642-00457-5},
  isbn      = {978-3-642-00456-8},
  timestamp = {Tue, 23 May 2017 01:06:08 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/approx/2008,
  editor    = {Ashish Goel and
               Klaus Jansen and
               Jos{\'{e}} D. P. Rolim and
               Ronitt Rubinfeld},
  title     = {Approximation, Randomization and Combinatorial Optimization. Algorithms
               and Techniques, 11th International Workshop, {APPROX} 2008, and 12th
               International Workshop, {RANDOM} 2008, Boston, MA, USA, August 25-27,
               2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5171},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-85363-3},
  doi       = {10.1007/978-3-540-85363-3},
  isbn      = {978-3-540-85362-6},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/approx/2008},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/focs/2008,
  title     = {49th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
               2008, October 25-28, 2008, Philadelphia, PA, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2008},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4690923},
  isbn      = {978-0-7695-3436-7},
  timestamp = {Mon, 15 Dec 2014 18:48:44 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/focs/2008},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/soda/2008,
  editor    = {Shang{-}Hua Teng},
  title     = {Proceedings of the Nineteenth Annual {ACM-SIAM} Symposium on Discrete
               Algorithms, {SODA} 2008, San Francisco, California, USA, January 20-22,
               2008},
  publisher = {{SIAM}},
  year      = {2008},
  url       = {http://dl.acm.org/citation.cfm?id=1347082},
  timestamp = {Fri, 07 Dec 2012 17:02:08 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/soda/2008},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/tcc/2008,
  editor    = {Ran Canetti},
  title     = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
               2008, New York, USA, March 19-21, 2008},
  series    = {Lecture Notes in Computer Science},
  volume    = {4948},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-78524-8},
  doi       = {10.1007/978-3-540-78524-8},
  isbn      = {978-3-540-78523-1},
  timestamp = {Fri, 02 Jun 2017 13:01:06 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/2008},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/coco/2007,
  title     = {22nd Annual {IEEE} Conference on Computational Complexity {(CCC} 2007),
               13-16 June 2007, San Diego, California, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2007},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4262736},
  isbn      = {0-7695-2780-9},
  timestamp = {Fri, 13 May 2016 10:28:33 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/coco/2007},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2007,
  editor    = {Alfred Menezes},
  title     = {Advances in Cryptology - {CRYPTO} 2007, 27th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007,
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4622},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-74143-5},
  doi       = {10.1007/978-3-540-74143-5},
  isbn      = {978-3-540-74142-8},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/2007},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2007,
  editor    = {Moni Naor},
  title     = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Barcelona, Spain, May 20-24, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4515},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-72540-4},
  doi       = {10.1007/978-3-540-72540-4},
  isbn      = {978-3-540-72539-8},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/2007},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fsttcs/2007,
  editor    = {Vikraman Arvind and
               Sanjiva Prasad},
  title     = {{FSTTCS} 2007: Foundations of Software Technology and Theoretical
               Computer Science, 27th International Conference, New Delhi, India,
               December 12-14, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4855},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-77050-3},
  doi       = {10.1007/978-3-540-77050-3},
  isbn      = {978-3-540-77049-7},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fsttcs/2007},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2006,
  editor    = {Cynthia Dwork},
  title     = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 20-24,
               2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4117},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11818175},
  doi       = {10.1007/11818175},
  isbn      = {3-540-37432-9},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/2006},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/focs/2006,
  title     = {47th Annual {IEEE} Symposium on Foundations of Computer Science {(FOCS}
               2006), 21-24 October 2006, Berkeley, California, USA, Proceedings},
  publisher = {{IEEE} Computer Society},
  year      = {2006},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4031329},
  isbn      = {0-7695-2720-5},
  timestamp = {Mon, 15 Dec 2014 18:48:44 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/focs/2006},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sigecom/2006,
  editor    = {Joan Feigenbaum and
               John C.{-}I. Chuang and
               David M. Pennock},
  title     = {Proceedings 7th {ACM} Conference on Electronic Commerce (EC-2006),
               Ann Arbor, Michigan, USA, June 11-15, 2006},
  publisher = {{ACM}},
  year      = {2006},
  isbn      = {1-59593-236-4},
  timestamp = {Mon, 24 Feb 2014 16:09:46 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/sigecom/2006},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/stoc/2006,
  editor    = {Jon M. Kleinberg},
  title     = {Proceedings of the 38th Annual {ACM} Symposium on Theory of Computing,
               Seattle, WA, USA, May 21-23, 2006},
  publisher = {{ACM}},
  year      = {2006},
  isbn      = {1-59593-134-1},
  timestamp = {Thu, 28 Sep 2006 09:38:26 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/2006},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/tcc/2006,
  editor    = {Shai Halevi and
               Tal Rabin},
  title     = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC}
               2006, New York, NY, USA, March 4-7, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3876},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11681878},
  doi       = {10.1007/11681878},
  isbn      = {3-540-32731-2},
  timestamp = {Tue, 30 May 2017 16:36:52 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/2006},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/approx/2005,
  editor    = {Chandra Chekuri and
               Klaus Jansen and
               Jos{\'{e}} D. P. Rolim and
               Luca Trevisan},
  title     = {Approximation, Randomization and Combinatorial Optimization, Algorithms
               and Techniques, 8th International Workshop on Approximation Algorithms
               for Combinatorial Optimization Problems, {APPROX} 2005 and 9th InternationalWorkshop
               on Randomization and Computation, {RANDOM} 2005, Berkeley, CA, USA,
               August 22-24, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3624},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11538462},
  doi       = {10.1007/11538462},
  isbn      = {3-540-28239-4},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/approx/2005},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/coco/2005,
  title     = {20th Annual {IEEE} Conference on Computational Complexity {(CCC} 2005),
               11-15 June 2005, San Jose, CA, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2005},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=9851},
  isbn      = {0-7695-2364-1},
  timestamp = {Fri, 13 May 2016 10:29:32 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/coco/2005},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/stoc/2005,
  editor    = {Harold N. Gabow and
               Ronald Fagin},
  title     = {Proceedings of the 37th Annual {ACM} Symposium on Theory of Computing,
               Baltimore, MD, USA, May 22-24, 2005},
  publisher = {{ACM}},
  year      = {2005},
  isbn      = {1-58113-960-8},
  timestamp = {Tue, 12 Jul 2005 13:48:39 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/2005},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@book{DBLP:reference/crypt/2005,
  editor    = {Henk C. A. van Tilborg},
  title     = {Encyclopedia of Cryptography and Security},
  publisher = {Springer},
  year      = {2005},
  isbn      = {978-0-387-23473-1},
  timestamp = {Fri, 25 Nov 2011 17:44:27 +0100},
  biburl    = {http://dblp.org/rec/bib/reference/crypt/2005},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/coco/2004,
  title     = {19th Annual {IEEE} Conference on Computational Complexity {(CCC} 2004),
               21-24 June 2004, Amherst, MA, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2004},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=9188},
  isbn      = {0-7695-2120-7},
  timestamp = {Fri, 13 May 2016 10:29:53 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/coco/2004},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/focs/2004,
  title     = {45th Symposium on Foundations of Computer Science {(FOCS} 2004), 17-19
               October 2004, Rome, Italy, Proceedings},
  publisher = {{IEEE} Computer Society},
  year      = {2004},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=9430},
  isbn      = {0-7695-2228-9},
  timestamp = {Mon, 15 Dec 2014 18:48:44 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/focs/2004},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/stoc/2004,
  editor    = {L{\'{a}}szl{\'{o}} Babai},
  title     = {Proceedings of the 36th Annual {ACM} Symposium on Theory of Computing,
               Chicago, IL, USA, June 13-16, 2004},
  publisher = {{ACM}},
  year      = {2004},
  isbn      = {1-58113-852-0},
  timestamp = {Fri, 03 Sep 2004 08:58:11 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/2004},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/tcc/2004,
  editor    = {Moni Naor},
  title     = {Theory of Cryptography, First Theory of Cryptography Conference, {TCC}
               2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2951},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b95566},
  doi       = {10.1007/b95566},
  isbn      = {3-540-21000-8},
  timestamp = {Mon, 29 May 2017 16:53:43 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/2004},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2003,
  editor    = {Dan Boneh},
  title     = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 17-21,
               2003, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2729},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/b11817},
  doi       = {10.1007/b11817},
  isbn      = {3-540-40674-3},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/2003},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/focs/2003,
  title     = {44th Symposium on Foundations of Computer Science {(FOCS} 2003), 11-14
               October 2003, Cambridge, MA, USA, Proceedings},
  publisher = {{IEEE} Computer Society},
  year      = {2003},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8767},
  isbn      = {0-7695-2040-5},
  timestamp = {Mon, 15 Dec 2014 18:48:44 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/focs/2003},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/stoc/2003,
  editor    = {Lawrence L. Larmore and
               Michel X. Goemans},
  title     = {Proceedings of the 35th Annual {ACM} Symposium on Theory of Computing,
               June 9-11, 2003, San Diego, CA, {USA}},
  publisher = {{ACM}},
  year      = {2003},
  isbn      = {1-58113-674-9},
  timestamp = {Mon, 17 Oct 2011 15:55:10 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/2003},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/coco/2002,
  title     = {Proceedings of the 17th Annual {IEEE} Conference on Computational
               Complexity, Montr{\'{e}}al, Qu{\'{e}}bec, Canada, May 21-24,
               2002},
  publisher = {{IEEE} Computer Society},
  year      = {2002},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7872},
  isbn      = {0-7695-1468-5},
  timestamp = {Fri, 13 May 2016 10:30:36 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/coco/2002},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/focs/2002,
  title     = {43rd Symposium on Foundations of Computer Science {(FOCS} 2002), 16-19
               November 2002, Vancouver, BC, Canada, Proceedings},
  publisher = {{IEEE} Computer Society},
  year      = {2002},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8411},
  isbn      = {0-7695-1822-2},
  timestamp = {Mon, 15 Dec 2014 18:48:44 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/focs/2002},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/scn/2002,
  editor    = {Stelvio Cimato and
               Clemente Galdi and
               Giuseppe Persiano},
  title     = {Security in Communication Networks, Third International Conference,
               {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {2576},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/3-540-36413-7},
  doi       = {10.1007/3-540-36413-7},
  isbn      = {3-540-00420-3},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/scn/2002},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/stoc/2002,
  editor    = {John H. Reif},
  title     = {Proceedings on 34th Annual {ACM} Symposium on Theory of Computing,
               May 19-21, 2002, Montr{\'{e}}al, Qu{\'{e}}bec, Canada},
  publisher = {{ACM}},
  year      = {2002},
  isbn      = {1-58113-495-9},
  timestamp = {Thu, 16 Feb 2012 12:04:12 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/2002},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2001,
  editor    = {Joe Kilian},
  title     = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 19-23,
               2001, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2139},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-44647-8},
  doi       = {10.1007/3-540-44647-8},
  isbn      = {3-540-42456-3},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/2001},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icalp/2001,
  editor    = {Fernando Orejas and
               Paul G. Spirakis and
               Jan van Leeuwen},
  title     = {Automata, Languages and Programming, 28th International Colloquium,
               {ICALP} 2001, Crete, Greece, July 8-12, 2001, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2076},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-48224-5},
  doi       = {10.1007/3-540-48224-5},
  isbn      = {3-540-42287-0},
  timestamp = {Fri, 26 May 2017 14:09:14 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icalp/2001},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/random/2001,
  editor    = {Michel X. Goemans and
               Klaus Jansen and
               Jos{\'{e}} D. P. Rolim and
               Luca Trevisan},
  title     = {Approximation, Randomization and Combinatorial Optimization: Algorithms
               and Techniques, 4th International Workshop on Approximation Algorithms
               for Combinatorial Optimization Problems, {APPROX} 2001 and 5th International
               Workshop on Randomization and Approximation Techniques in Computer
               Science, {RANDOM} 2001 Berkeley, CA, USA, August 18-20, 2001, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2129},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-44666-4},
  doi       = {10.1007/3-540-44666-4},
  isbn      = {3-540-42470-9},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/random/2001},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/focs/2000,
  title     = {41st Annual Symposium on Foundations of Computer Science, {FOCS} 2000,
               12-14 November 2000, Redondo Beach, California, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2000},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7164},
  isbn      = {0-7695-0850-2},
  timestamp = {Mon, 15 Dec 2014 18:48:44 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/focs/2000},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/stoc/2000,
  editor    = {F. Frances Yao and
               Eugene M. Luks},
  title     = {Proceedings of the Thirty-Second Annual {ACM} Symposium on Theory
               of Computing, May 21-23, 2000, Portland, OR, {USA}},
  publisher = {{ACM}},
  year      = {2000},
  isbn      = {1-58113-184-4},
  timestamp = {Mon, 17 Oct 2011 15:55:10 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/2000},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/coco/1999,
  title     = {Proceedings of the 14th Annual {IEEE} Conference on Computational
               Complexity, Atlanta, Georgia, USA, May 4-6, 1999},
  publisher = {{IEEE} Computer Society},
  year      = {1999},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6217},
  isbn      = {0-7695-0075-7},
  timestamp = {Fri, 13 May 2016 10:31:33 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/coco/1999},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/1999,
  editor    = {Michael J. Wiener},
  title     = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1666},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/3-540-48405-1},
  doi       = {10.1007/3-540-48405-1},
  isbn      = {3-540-66347-9},
  timestamp = {Wed, 24 May 2017 15:40:44 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/1999},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/focs/1999,
  title     = {40th Annual Symposium on Foundations of Computer Science, {FOCS} '99,
               17-18 October, 1999, New York, NY, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {1999},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6604},
  isbn      = {0-7695-0409-4},
  timestamp = {Mon, 15 Dec 2014 18:48:45 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/focs/1999},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/stoc/1999,
  editor    = {Jeffrey Scott Vitter and
               Lawrence L. Larmore and
               Frank Thomson Leighton},
  title     = {Proceedings of the Thirty-First Annual {ACM} Symposium on Theory of
               Computing, May 1-4, 1999, Atlanta, Georgia, {USA}},
  publisher = {{ACM}},
  year      = {1999},
  isbn      = {1-58113-067-8},
  timestamp = {Mon, 17 Oct 2011 15:55:10 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/1999},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/1998,
  editor    = {Hugo Krawczyk},
  title     = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1462},
  publisher = {Springer},
  year      = {1998},
  url       = {https://doi.org/10.1007/BFb0055715},
  doi       = {10.1007/BFb0055715},
  isbn      = {3-540-64892-5},
  timestamp = {Tue, 23 May 2017 11:53:59 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/1998},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/stoc/1998,
  editor    = {Jeffrey Scott Vitter},
  title     = {Proceedings of the Thirtieth Annual {ACM} Symposium on the Theory
               of Computing, Dallas, Texas, USA, May 23-26, 1998},
  publisher = {{ACM}},
  year      = {1998},
  isbn      = {0-89791-962-9},
  timestamp = {Mon, 17 Oct 2011 15:55:10 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/1998},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/dimacs/dimacs43,
  editor    = {Panos M. Pardalos and
               Sanguthevar Rajasekaran and
               Jos{\'{e}} Rolim},
  title     = {Randomization Methods in Algorithm Design, Proceedings of a {DIMACS}
               Workshop, Princeton, New Jersey, USA, December 12-14, 1997},
  series    = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume    = {43},
  publisher = {{DIMACS/AMS}},
  year      = {1999},
  url       = {http://dimacs.rutgers.edu/Volumes/Vol43.html},
  timestamp = {Mon, 14 Mar 2016 19:27:05 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/dimacs/dimacs43},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/focs/1997,
  title     = {38th Annual Symposium on Foundations of Computer Science, {FOCS} '97,
               Miami Beach, Florida, USA, October 19-22, 1997},
  publisher = {{IEEE} Computer Society},
  year      = {1997},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5208},
  isbn      = {0-8186-8197-7},
  timestamp = {Mon, 15 Dec 2014 18:48:44 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/focs/1997},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier